INFORMATION SECURITY

TRAINING

Information security, sometimes shortened to infosec, is the practice of protecting information by mitigating information risks. It is part of information risk management. It typically involves preventing or at least reducing the probability of unauthorized/inappropriate access, use, disclosure, disruption, deletion/destruction, corruption, modification, inspection, recording or devaluation, although it may also involve reducing the adverse impacts of incidents. Information may take any form, e.g. electronic or physical, tangible (e.g. paperwork) or intangible (e.g. knowledge). Information security's primary focus is the balanced protection of the confidentiality, integrity and availability of data (also known as the CIA triad) while maintaining a focus on efficient policy implementation, all without hampering organization productivity.

Technical Skills

  • Soft Skills

    • Communication

    • Creativity

    • Critical Thinking

    • Curiosity

    • Decisiveness

    • Interpersonal

    • Leadership

    • Organization

    • Positive Attitude

    • Problem Solving

    • Strong Work Ethic

    • Teamwork

  • Foundational Skills

    • Algebra

    • Algorithms

    • Calculus and analysis

    • Combinatorics

    • Computation

    • Differential equations

    • Discrete Mathematics

    • English Composition

    • Game theory

    • Geometry

    • Information theory

    • Logic

    • Number theory

    • Operations research

    • Probability

    • Quantitative Reasoning

    • Reading and Writing

    • Statistics

    • Trigonometry

Technical Skills

  • Algorithm

    • Rivest–Shamir–Adleman (RSA)

    • Message Authentication Code (MAC)

  • Application

    • Intrusion Detection System (IDS)

    • Proxy Server

  • Cipher

    • Advanced Encryption Standard (AES)

    • Data Encryption Algorithm (DES)

    • International Data Encryption Algorithm (IDEA)

  • Device

    • Cisco Adaptive Security Appliance (ASA)

    • Firewall

    • Next Generation Firewall (NGFW)

    • Security Token

    • Smart Card

  • Discipline

    • Cloud Computing

    • Complexity Theory

    • Cybersecurity

    • Denial-of-Service (DoS) Attack

    • Domain Name System (DNS)

    • Information Theory

    • IT Security

    • LAN Security

    • WAN Security

    • Network Forensics

    • Number Theory

    • Probability Theory

    • Security Posture

  • Document

    • Digital Certificate

    • Security Policy

  • Framework

    • Control Objectives for Information and

    • Related Technology (COBIT)

    • Identity and Access Management (IAM)

    • Metasploit Project

    • Public Key Infrastructure (PKI)

    • Open System Interconnection (OSI) Model

  • Methodology

    • Application Security

    • Cloud Security

    • Computer Security

    • Database Security

    • Governance, Risk, and Compliance (GRC)

    • Information Technology Security Assessment

    • Key Exchange

    • Network Access Control (NAC)

    • Role-Based Access Control (RBAC)

  • Network

    • Active Directory

    • Advanced Persistent Threat (APT)

    • Ethernet

    • Virtual LAN (VLAN)

  • Operating System

    • ​Windows Server

  • Platform

    • ​Cellebrite

    • Check Point

    • Cisco

    • Dell EMC

    • Fidelis Cybersecurity

    • HP Enterprise Security Products

    • Niksun

    • Forcepoint

    • McAfee Gateway Anti-Malware

    • Juniper Networks

    • McAfee

    • Veritas

  • Practice

    • ​Access Control

    • ACPO Guidelines

    • Computer Emergency Response Team (CERT)

    • Cyberlaw

    • Cyberethics

    • Data Integrity

    • Enterprise Information Security Architecture (EISA)

    • Ethical Hacking

    • Information Assurance

    • IT Security Audit

    • Logging

    • Monitoring

    • Tracing

    • Network Security

    • Network Segmentation

    • Penetration Testing

    • Phishing

    • Compliance Audit

    • Software Reverse Engineering (SRE)

    • Secure Coding

    • Social Engineering

    • Security Intelligence

    • Threat Assessment

Technical Skills

  • Process

    • ​Application Encryption

    • Archiving

    • Authentication

    • Backup

    • Computer Network Defense (CND)

    • Data Encryption

    • Data Loss Prevention (DLP)

    • Data Recovery

    • Digital Forensics

    • Digital Signature

    • Disk Encryption

    • Encryption

    • Forensic Analysis

    • Hardening

    • Incident Response (IR)

    • Integrity Constraints

    • IT Infrastructure Risk Assessment

    • Malware Analysis

    • Reverse Engineering Malware

    • Risk Analysis and Management

    • Risk Assessment

    • Threat Modeling

    • Troubleshooting

    • Virtualization

    • Vulnerability Assessment

    • Vulnerability Scanning

  • Protocol

    • ​Secure HyperText Transfer Protocol (S-HTTP)

    • Internet Protocol Security (IPSec)

    • Layer 2 Tunneling Protocol (L2TP)

    • Point-to-Point Tunneling Protocol (PPTP)

    • Secure Shell (SSH)

    • Secure Socket Tunneling Protocol (SSTP)

    • Secure Sockets Layer (SSL)

    • Simple Mail Transfer Protocol Secure (SMTPS)

    • Secure File Transfer Protocol (SFTP)

    • Transmission Control Protocol/Internet Protocol (TCP/IP)

    • Transport Layer Security (TLS)

    • User Datagram Protocol (UDP)

    • Voice over IP (VoIP)

    • Wi-Fi Protected Access

    • Wired Equivalent Privacy (WEP)

  • Software

    • ​Anti-Malware

    • Antivirus

    • Assured Compliance Assessment Solution (ACAS)

    • Clearwell eDiscovery

    • Decompiler

    • Disassembler

    • Debugger

    • EnCase

    • ProofPoint

    • Forensic Toolkit

    • Interactive Disassembler (IDA)

    • Malware

    • Nuix eDiscovery

    • Relativity eDiscovery

    • Security Information and Event Management (SIEM)

    • Symantec Endpoint Protection

    • Veeam

    • Open Virtual Private Network (OpenVPN)

    • XRY

  • Technique

    • ​Anti-Debugging

    • Asymmetric Key Cryptography

    • Botnet Protection and Detection

    • Cryptography

    • Hash Function

    • Risk Mitigation

    • Symmetric Key Cryptography

    • Vector

  • Tool

    • ​Burp Suite

    • Content Filtering

    • Group Policy

    • HCL AppScan

    • Intrusion Prevention System (IPS)

    • Nessus

    • Nmap

    • Retina Network Security Scanner

Career Areas & Jobs

The Information Security Pathway consists of the following career areas and jobs that you can seek after acquiring the technical skills.

Career Areas

  • Application Security

  • Cloud Security

  • Communication Security

  • Computer Forensics

  • Computer Network Defense (CND)

  • Computer Security

  • Cryptography

  • Cyber Crime

  • Cyber Forensics

  • Cyber Intelligence

  • Cyber Threat

  • Cyber Security

  • Data Governance

  • Data Security

  • Database Security

  • Digital Forensics

  • Encryption

  • End Point Security

  • Ethical Hacking

  • Hardware Security

  • Identity and Access Management

  • Incident Response

  • Information Assurance

  • Information Risk

  • Information Security

  • Intrusion

  • IT Security

  • Malware

  • Mobile Security

  • Network Security

  • Penetration Testing

  • Reverse Engineering

  • Security Control

  • Software Security

  • Source Code

  • Systems Security

  • Threat Intelligence

  • User Security

  • Vulnerability Assessment

  • Vulnerability Research

Jobs

  • Beginner​

    • Auditor

    • Investigator

    • Technician

    • Tester

  • Intermediate

    • Administrator

    • Analyst

    • Consultant

    • Developer

    • Generalist

  • Advanced

    • Architect

    • Assessor

    • Engineer

    • Examiner

    • Officer

    • Specialist

Training & Certification

We are currently offering technical skills training through Ivy Tech Community College. Please find the courses being offered below:

Certificates

  • Cyber Security/Information Assurance

  • CompTIA Security +

  • CompTIA A+

Courses

  • INFM 109: Informatics Fundamentals Hybrid

  • ITSP 135: Hardware/Software Support

  • ITSP 136: Workforce Preparation: CompTIA A+ Certification

  • SVAD 111: Linux and Virtualization Technologies Fundamentals

  • CSIA 105: Introduction to Cyber Security/Information Assurance

  • CSIA 106: Workforce Preparation: CompTIA Security+ Certification

  • NETI 105: Routing and Switching

  • CSIA 210: Network Protocol Analysis

  • CSIA 225: Ethical Hacking

  • CSIA 260: Business Continuity in an Information World

Salary

Please find the IT Salary Guide created by CFS Technology and Wages & Benefits Report created by the South Bend - Elkhart Regional Partnership.

Financial Aid

The IT Sector Partnership in addition to the Skill Up Grant and assistance from Garatoni-Smith Family Foundation also relies on TechHire Grant, Workforce Ready Grant, Employer Training Grant, Pell Grant, and Ivy Tech Scholarships.

We work with the Financial Aid office at Ivy Tech Community College to help students get Financial Aid. If they are not qualified for Financial Aid, the Garatoni Family Office offers support, if possible.

How To Apply?

To apply for our training program, please click on the tab below and fill our application form.

Contact Us

4100 EDISON LAKES PKWY, MISHAWAKA, IN 46545

  • LinkedIn Social Icon
  • Facebook Social Icon
  • Twitter Social Icon
  • YouTube Social  Icon

Copyright © 2020 IT Sector Partnership. All rights reserved​