Information Security Training (Vouchers Included)
Online Information Security Training
Become a Certified Information Security Professional
Globally, information security is one the fastest growing industries. This 100% online course will prepare you for three industry recognized certifications: ISACA's Certified Information Systems Auditor (CISA) and Certified Information Security Manager (CISM), and (ISC)2's Certified Information Security Professional (CISSP).
Job Outlook for Information Security
According to Payscale.com, the average reported salary for infosec credential holders is over $125,000 annually.
The BLS estimates that demand for InfoSec professionals in the United States will grow over 32% by 2028, nearly triple the demand of all other industries.
Information Security FAQs
WHY IS GETTING A CISM CREDENTIAL IMPORTANT?
The Certified Information Security Manager (CSIM), offered by ISACA, is a business-oriented credential that focuses on leading information risk management within an enterprise-level organization. Its subject domains are geared toward leadership/advanced-career professionals who are charged with designing, implementing and assessing an organization’s information security program.
WHY IS GETTING A CISA CREDENTIAL IMPORTANT?
The CISA designation proves a professional’s ability to assess threats and vulnerabilities in IT business processes as well as create technology controls to protect valuable assets. While not required, CISA is a globally-recognized certification that is seen as a benchmark for senior-level experience in the IT and IS security field.
WHY IS GETTING A CISSP CREDENTIAL IMPORTANT?
The CISSP is considered the world's leading information security credential. It is held by Information Security Officers and Directors of Security from many of the world's most recognizable institutions and organizations. It is among the few security certifications to meet the US Department of Defense’s cybersecurity training requirements.
- Demonstrate standard security practices to manage and assess enterprise cybersecurity networks and devices
- Specify the proper procedures to assess vulnerabilities, report on compliance and establish controls within an enterprise
- Analyze security and risk management as well as safely manage security operations, assessments and testing, architectures, and assets
Prerequisites and Requirements
There are no prerequisites to take this course. However, ISACA and (ISC)2 both recommend at least five years of work experience in information security.
Registration and Enrollment
This course is 100% online. Start anytime.
Governance and management of IT; information system auditing process; IT life cycle management & systems acquisition
Information system auditing process; governance and management of IT; information systems operations and business resilience
Security and risk management; asset security and engineering; communication and network security
David Grimes | David Grimes has more than 10 years of management and leadership experience in the private and non-profit sectors. Grimes is passionate about technology and education, having worked as academic dean, student services director, technology coordinator, teacher, consultant, and technology columnist. He holds a Master of Education and a Bachelor of Science from Ohio State University, both in Technology Education.
The University of Wisconsin-Parkside is committed to providing access, equal opportunity, and reasonable accommodation in its services, program activities, education, and employment for individuals with disabilities. To request disability accommodations, contact Professional and Continuing Education at least eight weeks in advance at: 262-595-3340 (V), 262-595-2513 (FAX), or email firstname.lastname@example.org.