Education & Training (Online)
Information Technology - ICT; Cyber Security & Privacy

Price: Under 500 USD$
Special Offer: $750 US
Visit Event Website

Information technology security has been among the top ten management concerns since the 1980’s. 
Technologies such as computer networks, PCs, the web, and more recently SMAC (Social, Mobile, Analytics, Cloud) along with SCADA/Internet of Things, Blockchain, AI, Robotics, etc., continually bring new security considerations and challenges to organizations. 

These technologies in concert with changes in regulations, especially in light of the growth of valuable and sensitive information assets stored by organizations such as individuals’ taxes, financial assets, medical records, job performance reviews, trade secrets, new product developments, and customer data, demand a strong focus on security management; the protection of data/information/knowledge. 

The threat of invasion by cyber criminals (e.g., governments, competitors, individuals) continues to grow. No one can escape cyber-attacks, and the fact that it is hard to find trusted people who are expert in this new art of war has driven the demand for security professionals to an all-time high. Many companies are starting to address this issue with the new understanding that constant and ongoing vigilance is the only way to protect infrastructure and data in the long term. 
The purpose of this certificate is to help organizations meet the increased demand for information security professionals by preparing attendees via a comprehensive, in-depth, practical set of courses addressing the entire infrastructure (e.g., data, network, web, applications, systems), as well as the management, organizational, and legal issues. Upon completion of this Certificate, candidates will be more than prepared to pass the respective certification provided by CISSP.

Learning Outcomes

Candidates who register for the asynchronous online course may select at least 4 courses from the following:

This 24 hour introduction to information security provides the foundation for understanding the planning and implementation of policies and procedures for protecting information assets, determining the levels of protection and response to security threats and incidents, and designing an appropriate information security system. The primary topics covered in the course are intended to prepare candidates to:
(a) Understand the importance of information security in business continuity.
(b) Critically analyze security threats and define appropriate technical and managerial controls for these threats.
(c) Understand procedures for ensuring compliance with security policies and standards, establish appropriate systems and plans for security implementation.
(d) Identify the legal implications of security and standards for security management.
(e) Recognize the management, organizational, and sourcing considerations for having an effective information security program.
(f) Describe audit and recovery approaches for coping with security breaches.

This 40 hour course offers a comprehensive guide for ethical hacking. The primary topics covered in the course are intended to prepare candidates to:

- Footprinting and Reconnaissance - Scanning Networks
- Enumeration - System Hacking
- Trojans and Backdoors
- Viruses and Worms
- Sniffers - Social Engineering
- Denial of Service
- Session Hijacking
- Hacking Webservers
- Hacking Web Applications
 - SQL Injection
- Hacking Wireless Networks
- Evading IDS, Firewalls, and Honeypots
- Buffer Overflow
- Cryptography
- Penetration Testing

This 40-hour course presents a detailed and methodological approach to computer forensics and evidence analysis.The primary topics covered in the course are intended to prepare candidates to:

(a) Understand the function and limitations of forensic investigations.
(b) Understand the procedures used in conducting forensic investigations.
(c) Guide first responders towards successful data acquisition and preservation.
(d) Describe digital forensics and relate it to an investigative process.
(e) Explain the legal issues of preparing for and performing digital forensic analysis. based on the investigator's position and duty.
(f) Be aware of (digital) evidence storage preparation and requirements.
(g) Perform basic digital forensic investigations.
(h) Demonstrate use of digital forensics tools and their underlying principles.
(i) Size and set up a digital forensic lab.
(j) Conduct simple binary analysis on files with unknown and possible malicious functionality.
(k) Recognize the state of the practice and the gaps in technology, policy, and legal issues.

This 40 hour course provides an in-depth understanding of how to effectively protect computers and computer networks. The primary objectives of the course are to ensure candidates understand how:

(a) Computer systems are attacked, and how to defend against those attacks.
(b) To analyze legal questions, ethical dilemmas, and privacy issues related to computer security.
(c) To use their knowledge of computer security to analyze and suggest means of securing information systems.
(d) To use their knowledge of computer forensics technology and laws relevant to computer-based crime to analyze various technical challenges, scenarios and cases regarding computer crime.

The purpose of this 30-hour course (including either the .Net or Java course) is to provide candidates with a comprehensive understanding of what a Secure Development Process is. The primary objectives of the course are to:
(a) Identify what secure programming is and why it is needed.
(b) Work with principles associated with software engineering.
(c) Understand principles of security and quality in the industry and how to use them. (d) Understand the Application Guide. (
e) Learn how to understand, analyze, and interpret software requirements.
(f) Design for quality using industry frameworks.
(g) Know what industry design patterns are and how to carry them out.
(h) Understand industry standard development tools.
(i) Know how to produce secure code.
(j) Sustain a formal development process.

This 24 hour course examines detailed aspects of incident response and contingency planning consisting of incident response planning, disaster recovery planning, and business continuity planning. The primary objectives of the course are to:

(a) An Overview of Information Security and Risk Management
(b) Planning for Organizational Readiness
(c) Contingency Strategies for IR/DR/BC
(d) Principles of Incident Response and Disaster Recovery
(e) Incident Response: Detection and Decision Making
(f) Incident Response: Organizing and Preparing the CSIRT
(g) Incident Response: Response Strategies
(h) Incident Response: Recovery and Maintenance
(i) Disaster Recovery: Preparation and Implementation
(j) Disaster Recovery: Operation and Maintenance
(k) Business Continuity Planning (l) Crises Management and International Standards in IR/DR/BC


This 40-hour course provides an understanding of the various methods in identifying business and technology vulnerabilities. The primary objectives of the course are:
(a) Understanding the importance of disaster recovery in the enterprise.
(b) Understanding how to create an enterprise disaster plan.
(c) Identifying strategies to develop a secure network.
(d) Understanding the importance of Policy and Procedure.
(e) Exploring virtualization technologies.
(f) Understanding the use of traditional and virtual technologies in disaster planning.

This 40-hour course offers a comprehensive guide for understanding information systems network security management. The primary objectives of the course are;

(a) Introduction to Network Security 
(b) Malware and Social Engineering Attacks 
(c) Data Breaches 
(d) Application and Networking-Based Attacks 
(e) Host, Application, and Data Security 
(f) Basic Cryptography 
(g) Advanced Cryptography 
(h) Network Security Fundamentals
(i) Administering a Secure Network 
(j) Wireless Network Security 
(k) Mobile Device Security 
(l) Access Control Fundamentals 
(m) Authentication and Account Management 
(n) Business Continuity 
(o) Risk Mitigation 
(p) Vulnerability Assessment 
(q) Legal, Ethical, and Organizational Factors 

This course focuses on how organizations can effectively and efficiently assess trends and emerging SMAC (Social, Mobile, Analytics, Cloud) and security technologies. Topics include: 
(a) Creating a business case for emerging information technology,
(b) Identifying factors affecting the successful adoption of new information technologies. 
(c) Identifying the key attributes, business benefits, risks, security implications, and cost factors of new technology. 
(d) Knowing how to effectively use advanced search and selection metrics for identifying and selecting new technology. 
(e) Describing technology trends that presently drive or are expected to drive the selection of new technologies over the next decade. 
(f) Providing organizational structures and frameworks that guide the enhanced adoption and capitalization related to what new technologies and approaches can offer.


1. Each online course has a final exam comprised of attaining at least 70% from 50 multiple choice questions taken after completing the online lectures. 
2. After successful completion of this program, candidates will also receive ICCP Certification. 
3. Upon completion of this Certificate, candidates will be more than prepared to pass the respective certification provided by CISSP.

 FAQs for individuals can be found via


Course Provider

GIIM - Global Institute for IT Management