Career Training
Online
2 Months
Continuous
Course Description
Gain practical knowledge and skills in various key areas of cybersecurity operations including the implementation of access control policies to enforce security measures, and ensuring authorized access to systems and data. You will learn to design and implement network perimeter security, safeguarding the organization's network infrastructure from external threats. The program also delves into cryptography, teaching you to use encryption algorithms to protect sensitive information.
Another crucial aspect of the program is the preparation of incident policies and the management of cybersecurity incidents. You will learn to develop incident response plans, effectively mitigate incidents, and analyze and respond to security breaches. The program also includes training in implementing forensic technologies to investigate and analyze cybersecurity incidents, teaching you to gather evidence, identify attackers, and support legal proceedings if required.
Learning Objectives
- Implementing access control Policies
- Implementing Network perimeter security
- Designing and Implementing Cryptography
- Preparing incident policy and Managing incidents
- Implementing forensics technologies
Contact Us
Email: lifetimelearning@bsu.edu
Phone: 765-285-8565
Materials Provided
All materials are included within the course.
Measure of Performance
Professional Certification Opportunity
Upon completion of the program, candidates will be qualified for various specialized roles in cybersecurity, such as security analysts, incident response specialists, cybersecurity consultants, or forensic analysts. They will have the expertise to implement robust security measures, manage incidents, conduct forensic investigations, and contribute to overall cybersecurity operations.
Course Requirements
High School Diploma or GED
To enroll in the program, candidates must first complete the "Fundamentals of System and Network Administration" and "Ethical Hacking and Penetration Testing" modules. Alternatively, they can demonstrate high-level expertise in the field of cybersecurity, showcasing their comprehensive knowledge and skills in system administration, ethical hacking, and penetration testing. This ensures that students have the necessary foundational knowledge and experience to excel in the advanced coursework and specialize in security operations.
If you need course adaptations or accommodations because of a disability, please fill out the self-disclosure form. The Office of Disability Services coordinates services for students with disabilities. Documentation of a disability needs to be on file in that office before any accommodations can be provided.