Real-World Cybersecurity Scenarios

MIND1700 - Real-World Cybersecurity Scenarios

Learning Path | Continuing Education Units | Estimated 30-Hour Workload

In Collaboration with Mindedge Logo
$399.00
How To Enroll?
  • feature icon Professional Development
  • feature icon All Level
  • feature icon Continuing Education Units
  • feature icon Estimated 30-Hour Workload
  • feature icon Self-Paced
  • feature icon 1-Year Access

Description

This suite of five related courses covers various aspects of securing cloud services. Its structure is based on the Certified Cloud Security Professional (CCSP) certification administered jointly by the Cloud Security Alliance and (ISC)2. Each course is comprised of two modules. The first provides content related to the course subject matter. The second module engages the learner with real-world scenarios in which he or she must apply the content of the first module. This bundle is designed for adult learners who are interested in gaining an introduction to information technology security. Some understanding of basic IT concepts is helpful. Individual courses included in this bundle are listed below.

Continuing Education Units and Credits

PMI PDUs: 10 | IACET CEUs: 2.5 | HRCI Credits: 25 | SHRM PDCs: 25

Eligibility

  • Must be 18 or older

Refund Policy

You will have seven days to request a full refund after purchase. No hidden fees. All books and materials are included with purchase.

Curriculum

  • Network Security Scenarios

    This course examines communications and network security. It covers the different types of networks and different transmission technologies and the two main models that govern how networks work, the OSI model and the TCP/IP model, and their related layers. This course also features a number of fictional scenarios that will help you apply what you've learned to situations you may encounter in the real world. This course requires a basic understanding of IT concepts.

  • Cryptography Scenarios

    This course contains an introduction to the key concepts of cryptography and security engineering. It examines the role of encryption in information security and considers common encryption methods. This course also features a number of fictional scenarios based on cryptography to help you apply the concepts to situations you may see in the real world. This course requires some basic understanding of IT concepts. This course is part of the Cybersecurity suite of courses. However, the course can be taken as a stand-alone course.

  • Compliance and Operational Security Scenarios

    This course contains a discussion of the role of security governance and risk management in information security. It looks at the policies and standards that are needed to operate an effective information security function and to oversee good information security practices. This course also features a number of fictional scenarios based on compliance and operational security to allow you to practice the concepts learned in the material. This course requires some basic understanding of IT concepts.

  • Threats and Vulnerabilities Scenarios

    This course examines the process of identifying and mitigating threats and vulnerabilities in information systems. It covers common categories of threats and vulnerabilities and the resources used to detect them. This course also features a number of fictional scenarios based on threats and vulnerabilities. This course is designed for IT professionals and other adult learners who are interested in information technology security, with an eye towards handling real world scenarios.

  • Application, Data, and Host Security Scenarios

    When you download an app, or access a database, you want to trust that the software engineer who developed the app had an eye toward security. This course covers the security of applications, data, and hosts in information systems. It provides a comprehensive examination of software development and change management. This course also features a number of fictional scenarios based on real-world application, data, and host security. Although not required, having some experience or working knowledge in IT concepts is helpful in taking this course.

  • Access Control and Identity Management Scenarios

    Access control is the restriction of access to a computer system. So how does a cybersecurity professional manage this access control? This course introduces the principles of access controls, beginning with the central modes of information security and continuing through various attacks and defenses. It provides an overview of Identity Management and the resources used on modern-day information systems, including Web and cloud-based ones. This course also features a number of fictional scenarios based on access control and identity management that professionals face in the real-world.

Features

Real-World Case Studies

Real-World Case Studies

Learn knowledge and best practices through relevant scenarios

Ask an Expert

Ask an Expert

Receive answers to your cybersecurity questions directly from an expert in the field

Flexible Learning

Flexible Learning

Easily consumable segments to adapt around your busy life

Awards

Professional Certificate

Professional Certificate in Real-World Cybersecurity Scenarios

$399.00
How To Enroll?
  • feature icon Professional Development
  • feature icon All Level
  • feature icon Continuing Education Units
  • feature icon Estimated 30-Hour Workload
  • feature icon Self-Paced
  • feature icon 1-Year Access

How to enroll?

  • 1Add course to cart
  • 2Create your account
  • 3Register for course
  • 4Make payment and submit application
  • 5Start learning
-or-
email [email protected] for additional assistance

Who is this for

  • All levels of IT auditor / penetration tester
  • Security consultants / managers
  • IT directors / managers / consultants
  • Security auditors / architects
  • Security systems engineers
  • Chief information security officers (CISOs)
  • Chief compliance / privacy / risk officers
  • Network specialists, analysts, managers, architects, consultants, or administrators
  • Technical support engineers
  • Systems analysts or administrators

Things To Know About Walden's Partnership With MindEdge

Founded by Harvard and MIT educators in 1998, MindEdge is a leading online training provider that has served more than three 3 million learners. Walden University’s School of Lifelong Learning is partnering with MindEdge to offer courses in high-demand, focused areas to help learners upskill.

Courses offered in partnership with MindEdge are designed by subject matter experts in the field and reviewed by Walden’s faculty experts to ensure content meets our educational standards and bridges critical skills gaps.

Courses are designed by subject matter experts in the field and reviewed by Walden’s faculty experts to ensure content meets our educational standards and bridges critical skills gaps. After purchasing a course, learners will access the course content in the Walden learning environment and will be supported by MindEdge’s experts and Walden’s staff. You can always contact [email protected] for additional assistance.

You will earn a certificate of completion in your classroom after completion of each course’s required criteria. Most courses offer continuing education units (e.g., CEU, PDU, SHRM, HRCI, CFRE, ISC2). Once you have successfully completed and passed your course, you will have access to the continuing education certificate(s) offered.

You will have seven calendar days to request a full refund after your date of purchase. There are no hidden fees, and all books and materials are included with purchase. If you have any questions or would like to request a refund, contact us at [email protected].