RANGER RECOVERY: Updated mask / face covering requirements

Information Security Training (Vouchers Included)

Online Information Security Training

Become a Certified Information Security Professional

Globally, information security is one the fastest growing industries. This 100% online course will prepare you for three industry recognized certifications: ISACA's Certified Information Systems Auditor (CISA) and Certified Information Security Manager (CISM), and (ISC)2's Certified Information Security Professional (CISSP).

ENROLL NOW

Job Outlook for Information Security

According to Payscale.com, the average reported salary for infosec credential holders is over $125,000 annually.

The BLS estimates that demand for InfoSec professionals in the United States will grow over 32% by 2028, nearly triple the demand of all other industries. 

Information Security FAQs

The Certified Information Security Manager (CSIM), offered by ISACA, is a business-oriented credential that focuses on leading information risk management within an enterprise-level organization. Its subject domains are geared toward leadership/advanced-career professionals who are charged with designing, implementing and assessing an organization’s information security program.

The CISA designation proves a professional’s ability to assess threats and vulnerabilities in IT business processes as well as create technology controls to protect valuable assets. While not required, CISA is a globally-recognized certification that is seen as a benchmark for senior-level experience in the IT and IS security field. 

The CISSP is considered the world's leading information security credential. It is held by Information Security Officers and Directors of Security from many of the world's most recognizable institutions and organizations. It is among the few security certifications to meet the US Department of Defense’s cybersecurity training requirements.

Course Objectives

  • Demonstrate standard security practices to manage and assess enterprise cybersecurity networks and devices
  • Specify the proper procedures to assess vulnerabilities, report on compliance and establish controls within an enterprise
  • Analyze security and risk management as well as safely manage security operations, assessments and testing, architectures, and assets

Prerequisites and Requirements
There are no prerequisites to take this course. However, ISACA and (ISC)2 both recommend at least five years of work experience in information security. 


Registration and Enrollment
This course is 100% online. Start anytime.

Ready to start Information Security Training?

ENROLL NOW

Curriculum

CISA
Governance and management of IT; information system auditing process; IT life cycle management & systems acquisition

CISM
Information system auditing process; governance and management of IT; information systems operations and business resilience

CISSP
Security and risk management; asset security and engineering; communication and network security
 

Get started today and join one of the fastest growing industries. 

ENROLL NOW

Instructor

David Grimes  |  David Grimes has more than 10 years of management and leadership experience in the private and non-profit sectors. Grimes is passionate about technology and education, having worked as academic dean, student services director, technology coordinator, teacher, consultant, and technology columnist. He holds a Master of Education and a Bachelor of Science from Ohio State University, both in Technology Education.

The University of Wisconsin-Parkside is committed to providing access, equal opportunity, and reasonable accommodation in its services, program activities, education, and employment for individuals with disabilities. To request disability accommodations, contact Professional and Continuing Education at least eight weeks in advance at: 262-595-3340 (V), 262-595-2513 (FAX), or email continuing.ed@uwp.edu.
 

UW Extended Campus
Scroll to top