Information Systems Security Professional Training

  • 9 Months
  • 165 Course Hours
  • $3,445

Overview

Gain the Training for a Career in Cybersecurity

It's no question that cybersecurity is necessary for any organization. But in this growing field, how do you show that you're qualified to lead security efforts? Certification. Holding a certification from ISACA or (ISC)2 demonstrates your ability to identify, assess, and mitigate evolving security threats.  Throughout this program, you will become proficient in a variety of areas within IT security. With CISA, CISM & CISSP being the 3 highest level IT security certifications, you prepare yourself with the marketability needed to compete for high paying positions in this field.  The vendor-neutral CISSP certification is the ideal credential for those looking to learn deep technical and managerial competence in order to design, engineer, implement, and manage their overall information security program to protect organizations from growing sophisticated attacks.  The CISM course promotes international practices and provides management with assurance that those earning this designation have the necessary knowledge and experience to provide effective security management. You will become an expert in IT policy management, especially in the IT Security sector.  The CISA certification is recognized internationally as the benchmark for IT auditing skill. Giving professionals with the knowledge, skills, experience and credibility to leverage standards, manage vulnerabilities, ensure compliance, offer solutions, institute controls and deliver value to the enterprise.

The registration fees for the Certified Information Systems Security Professional (CISSP), Certified Information Systems Auditor (CISA), and Certified Information Security Manager (CISM) certification exams are included with this program.

What you will learn

  • Demonstrate standard security practices to manage and assess enterprise cybersecurity networks and devices
  • Specify the proper procedures to assess vulnerabilities, report on compliance and establish controls within an enterprise.
  • Analyze security and risk management as well as safely manage security operations, assessments and testing, architectures, and assets.

How you will benefit

  • Holding Certified Information Systems Auditor (CISA) certification confirms your ability to assess vulnerabilities, compliance, and instituting controls in an enterprise
  • Holding Certified Information Security Manager (CISM) certification demonstrates your knowledge of managing, assessing, designing, and overseeing enterprise information security functions
  • Holding Certified Information Security Professional (CISSP) certification showcases your skills in security and risk management, asset security, security architecture, and network security.

How this course is taught

  • This is a non-credit program offered in partnership with ed2go.  You do not have to be admitted to the university to enroll in this program. 
  • This is an open enrollment program, which means you can enroll and start at any time.  There are no set start and end dates. 
  • This course is entirely online and can be completed at a pace and time that is convenient for you.  There are not set times you must attend classes.  
  • You will have 9-months from the date of enrollment to complete this program.  

Prerequisites

While there are no prerequisites to take this course bundle, ISACA and (ISC)2 both require at least five years of information security work experience to be eligible for the certification exams.


Job Outlook

It’s predicted that there will be 3.5 million unfilled cybersecurity jobs by 2021. In fact, the number of cyber security jobs is growing three times faster than other tech jobs.

Earn $100,000+ annually
According to ZipRecruiter, the average salary for IT Cyber Security professionals in Mississippi is $110K.
 
Expect 32% Job Growth
The Bureau of Labor Statistics estimates a 32% (much faster) job growth rate for information security analysts over the next 10 years. 

 

Requirements

Hardware Requirements:

  • This course can be taken on either a PC or Mac.

Software Requirements:

  • PC: Windows 8 or later.
  • Mac: OS X Snow Leopard 10.6 or later.
  • Browser: The latest version of Google Chrome or Mozilla Firefox are preferred. Microsoft Edge and Safari are also compatible.
  • Adobe Acrobat Reader. Click here to download the Acrobat Reader.
  • Software must be installed and fully operational before the course begins.

Other:

  • Email capabilities and access to a personal email account.

    Instructional Materials

    The instructional materials required for this course are included in enrollment. The following textbooks will be shipped to you approximately 7-10 business days after enrollment:

    • CISA Certified Information Systems Auditor All-in-One Exam Guide
    • CISM Certified Information Security Manager All-in-One Exam Guide
    • CISSP Guide to Security Essentials

    Exam Requirements:

    Certified Information Systems Security Professional (CISSP):

    • Candidates must have a minimum of 5 years of cumulative paid full-time work experience in two or more of the 8 domains of the (ISC)² CISSP CBK®. Candidates may receive a one-year experience waiver with a 4-year college degree, or regional equivalent or additional credential from the (ISC)² approved list, thus requiring four years of direct full-time professional security work experience in 2 or more of the 8 domains of the CISSP CBK.

    Certified Information Systems Auditor (CISA):

    • To take the course and sit for the CISA exam you should have experience in IT auditing or relevant education in that area.

     

    Curriculum

    CISA
    Governance and Management of IT
    Information System Auditing Process
    IT Life Cycle Management & Systems Acquisition
    IT Service Management and Business Resilience
    Protection of Information Assets
     
    CISM
    Information System Auditing Process
    Governance and Management of IT
    Information Systems Acquisition
    Information Systems Operations and Business Resilience
    Protection of Information Assets
     
    CISSP
    Security and Risk Management
    Asset Security
    Security Engineering
    Communication and Network Security
    Identify and Access Management
    Security Assessment and Testing
    Security Operations
    Software Development Security

     

    Instructor

    David Grimes

    David Grimes has more than 10 years of management and leadership experience in the private and non-profit sectors. Grimes is passionate about technology and education, having worked as academic dean, student services director, technology coordinator, teacher, consultant, and technology columnist. He holds a Master of Education and a Bachelor of Science from Ohio State University, both in Technology Education.


     

    FAQs

    WHAT DO CYBERSECURITY PROFESSIONALS DO?  
    Cybersecurity professionals, or information security analysts, have a wide range of responsibilities, but the biggest part of their job is to protect online data form being compromised.  As a cybersecurity professional, you can expect to safeguard an organization's files and network, install firewalls, create security plans and monitor activity.
     
    DO I HAVE TO BE ADMITTED TO MISSISSIPPI STATE UNIVERSITY TO ENROLL IN THIS PROGRAM?
    No, you do not have to be an admitted student to Mississippi State University to enroll in this program.  Our online non-credit advanced career training programs are open to all. 
     
    WHEN CAN I START THE COURSE? 
    This course is open enrollment, so you can register and start the course as soon as you are ready. Access to your course can take 24-48 business hours.
     
    HOW LONG DOES IT TAKE TO COMPLETE THIS COURSE? 
    This course is self-paced and open enrollment, so you can start when you want and finish at your own pace. When you register, you'll receive nine (9) months to complete the course.
     
    WHAT IF I DON'T HAVE ENOUGH TIME TO COMPLETE MY COURSE WITHIN THE TIME FRAME PROVIDED? 
    The time allotted for course completion has been calculated based on the number of course hours. However, if you are unable to complete the course, contact your Student Advisor to help you work out a suitable completion date. Please note that an extension fee may be charged.
     
    WHAT KIND OF SUPPORT WILL I RECEIVE?  
    You may be assigned with an instructor or team of industry experts for one-on-one course interaction. Your support will be available (via email) to answer any questions you may have and to provide feedback on your performance. All of our instructors are successful working professionals in the fields in which they teach. You will also be assigned to an Advisor for academic support.
     
    WHAT HAPPENS WHEN I COMPLETE THE COURSE? 
    Upon successful completion of the course, you will be awarded a Certificate of Completion from Mississippi State University Extension.
     
    AM I GUARANTEED A JOB?  
    This course will provide you with the skills you need to obtain an entry-level position in most cases. Potential students should always do research on the job market in their area before registering.
     
    CAN I GET FINANCIAL ASSISTANCE?  
    This course is non-credit, so it does not qualify for federal aid, FAFSA and Pell Grant. In some cases, vocational rehab or workforce development boards will pay for qualified students to take our courses. Additionally, some students may qualify for financial assistance when they enroll, if they meet certain requirements. Financing is available, to learn more go to: https://www.ed2go.com/career/financial-assistance
     
    HOW CAN I GET MORE INFORMATION ABOUT THIS COURSE?  
    If you have questions that are not answered on our website, representatives are available via LIVE chat. You can also call us at 1-662-325-5002 during regular business hours to have your questions promptly answered. If you are visiting us during non-business hours, please send us a question using the "Request More Info" form.

     

     

    Overview

    Gain the Training for a Career in Cybersecurity

    It's no question that cybersecurity is necessary for any organization. But in this growing field, how do you show that you're qualified to lead security efforts? Certification. Holding a certification from ISACA or (ISC)2 demonstrates your ability to identify, assess, and mitigate evolving security threats.  Throughout this program, you will become proficient in a variety of areas within IT security. With CISA, CISM & CISSP being the 3 highest level IT security certifications, you prepare yourself with the marketability needed to compete for high paying positions in this field.  The vendor-neutral CISSP certification is the ideal credential for those looking to learn deep technical and managerial competence in order to design, engineer, implement, and manage their overall information security program to protect organizations from growing sophisticated attacks.  The CISM course promotes international practices and provides management with assurance that those earning this designation have the necessary knowledge and experience to provide effective security management. You will become an expert in IT policy management, especially in the IT Security sector.  The CISA certification is recognized internationally as the benchmark for IT auditing skill. Giving professionals with the knowledge, skills, experience and credibility to leverage standards, manage vulnerabilities, ensure compliance, offer solutions, institute controls and deliver value to the enterprise.

    The registration fees for the Certified Information Systems Security Professional (CISSP), Certified Information Systems Auditor (CISA), and Certified Information Security Manager (CISM) certification exams are included with this program.

    What you will learn

    • Demonstrate standard security practices to manage and assess enterprise cybersecurity networks and devices
    • Specify the proper procedures to assess vulnerabilities, report on compliance and establish controls within an enterprise.
    • Analyze security and risk management as well as safely manage security operations, assessments and testing, architectures, and assets.

    How you will benefit

    • Holding Certified Information Systems Auditor (CISA) certification confirms your ability to assess vulnerabilities, compliance, and instituting controls in an enterprise
    • Holding Certified Information Security Manager (CISM) certification demonstrates your knowledge of managing, assessing, designing, and overseeing enterprise information security functions
    • Holding Certified Information Security Professional (CISSP) certification showcases your skills in security and risk management, asset security, security architecture, and network security.

    How this course is taught

    • This is a non-credit program offered in partnership with ed2go.  You do not have to be admitted to the university to enroll in this program. 
    • This is an open enrollment program, which means you can enroll and start at any time.  There are no set start and end dates. 
    • This course is entirely online and can be completed at a pace and time that is convenient for you.  There are not set times you must attend classes.  
    • You will have 9-months from the date of enrollment to complete this program.  

    Prerequisites

    While there are no prerequisites to take this course bundle, ISACA and (ISC)2 both require at least five years of information security work experience to be eligible for the certification exams.


    Job Outlook

    It’s predicted that there will be 3.5 million unfilled cybersecurity jobs by 2021. In fact, the number of cyber security jobs is growing three times faster than other tech jobs.

    Earn $100,000+ annually
    According to ZipRecruiter, the average salary for IT Cyber Security professionals in Mississippi is $110K.
     
    Expect 32% Job Growth
    The Bureau of Labor Statistics estimates a 32% (much faster) job growth rate for information security analysts over the next 10 years. 

     

    Requirements

    Hardware Requirements:

    • This course can be taken on either a PC or Mac.

    Software Requirements:

    • PC: Windows 8 or later.
    • Mac: OS X Snow Leopard 10.6 or later.
    • Browser: The latest version of Google Chrome or Mozilla Firefox are preferred. Microsoft Edge and Safari are also compatible.
    • Adobe Acrobat Reader. Click here to download the Acrobat Reader.
    • Software must be installed and fully operational before the course begins.

    Other:

    • Email capabilities and access to a personal email account.

      Instructional Materials

      The instructional materials required for this course are included in enrollment. The following textbooks will be shipped to you approximately 7-10 business days after enrollment:

      • CISA Certified Information Systems Auditor All-in-One Exam Guide
      • CISM Certified Information Security Manager All-in-One Exam Guide
      • CISSP Guide to Security Essentials

      Exam Requirements:

      Certified Information Systems Security Professional (CISSP):

      • Candidates must have a minimum of 5 years of cumulative paid full-time work experience in two or more of the 8 domains of the (ISC)² CISSP CBK®. Candidates may receive a one-year experience waiver with a 4-year college degree, or regional equivalent or additional credential from the (ISC)² approved list, thus requiring four years of direct full-time professional security work experience in 2 or more of the 8 domains of the CISSP CBK.

      Certified Information Systems Auditor (CISA):

      • To take the course and sit for the CISA exam you should have experience in IT auditing or relevant education in that area.

       

      Curriculum

      CISA
      Governance and Management of IT
      Information System Auditing Process
      IT Life Cycle Management & Systems Acquisition
      IT Service Management and Business Resilience
      Protection of Information Assets
       
      CISM
      Information System Auditing Process
      Governance and Management of IT
      Information Systems Acquisition
      Information Systems Operations and Business Resilience
      Protection of Information Assets
       
      CISSP
      Security and Risk Management
      Asset Security
      Security Engineering
      Communication and Network Security
      Identify and Access Management
      Security Assessment and Testing
      Security Operations
      Software Development Security

       

      Instructor

      David Grimes

      David Grimes has more than 10 years of management and leadership experience in the private and non-profit sectors. Grimes is passionate about technology and education, having worked as academic dean, student services director, technology coordinator, teacher, consultant, and technology columnist. He holds a Master of Education and a Bachelor of Science from Ohio State University, both in Technology Education.


       

      FAQs

      WHAT DO CYBERSECURITY PROFESSIONALS DO?  
      Cybersecurity professionals, or information security analysts, have a wide range of responsibilities, but the biggest part of their job is to protect online data form being compromised.  As a cybersecurity professional, you can expect to safeguard an organization's files and network, install firewalls, create security plans and monitor activity.
       
      DO I HAVE TO BE ADMITTED TO MISSISSIPPI STATE UNIVERSITY TO ENROLL IN THIS PROGRAM?
      No, you do not have to be an admitted student to Mississippi State University to enroll in this program.  Our online non-credit advanced career training programs are open to all. 
       
      WHEN CAN I START THE COURSE? 
      This course is open enrollment, so you can register and start the course as soon as you are ready. Access to your course can take 24-48 business hours.
       
      HOW LONG DOES IT TAKE TO COMPLETE THIS COURSE? 
      This course is self-paced and open enrollment, so you can start when you want and finish at your own pace. When you register, you'll receive nine (9) months to complete the course.
       
      WHAT IF I DON'T HAVE ENOUGH TIME TO COMPLETE MY COURSE WITHIN THE TIME FRAME PROVIDED? 
      The time allotted for course completion has been calculated based on the number of course hours. However, if you are unable to complete the course, contact your Student Advisor to help you work out a suitable completion date. Please note that an extension fee may be charged.
       
      WHAT KIND OF SUPPORT WILL I RECEIVE?  
      You may be assigned with an instructor or team of industry experts for one-on-one course interaction. Your support will be available (via email) to answer any questions you may have and to provide feedback on your performance. All of our instructors are successful working professionals in the fields in which they teach. You will also be assigned to an Advisor for academic support.
       
      WHAT HAPPENS WHEN I COMPLETE THE COURSE? 
      Upon successful completion of the course, you will be awarded a Certificate of Completion from Mississippi State University Extension.
       
      AM I GUARANTEED A JOB?  
      This course will provide you with the skills you need to obtain an entry-level position in most cases. Potential students should always do research on the job market in their area before registering.
       
      CAN I GET FINANCIAL ASSISTANCE?  
      This course is non-credit, so it does not qualify for federal aid, FAFSA and Pell Grant. In some cases, vocational rehab or workforce development boards will pay for qualified students to take our courses. Additionally, some students may qualify for financial assistance when they enroll, if they meet certain requirements. Financing is available, to learn more go to: https://www.ed2go.com/career/financial-assistance
       
      HOW CAN I GET MORE INFORMATION ABOUT THIS COURSE?  
      If you have questions that are not answered on our website, representatives are available via LIVE chat. You can also call us at 1-662-325-5002 during regular business hours to have your questions promptly answered. If you are visiting us during non-business hours, please send us a question using the "Request More Info" form.

       

       

      Registration Information

      The Information Security Training program is 100% online and allows you to enroll at any time.  After enrolling you will have 9-months to complete the program at a pace that is convenient for you.  You can get started today by clicking the "Enroll Now" button below and completing your registration at our partner ed2go site.