INFORMATION SECURITY TRAINING

Flexible Enrollment, Duration, and Schedule | Virtual or In-person | $5,000 Average Cost

Information security is the practice of protecting information by mitigating information risks. It is part of information risk management. It typically involves preventing or at least reducing the probability of unauthorized/inappropriate access, use, disclosure, disruption, deletion/destruction, corruption, modification, inspection, recording or devaluation, although it may also involve reducing the adverse impacts of incidents. Information may take any form, e.g. electronic or physical, tangible or intangible. Information security's primary focus is the balanced protection of the confidentiality, integrity, and availability of data while maintaining a focus on efficient policy implementation, all without hampering organization productivity.

Technical Skills

  • Access Control

  • Active Directory

  • Advanced Encryption Standard

  • Advanced Persistent Threat

  • Algorithms

  • Amazon Web Services

  • Anthos

  • Anti-Debugging

  • Anti-Malware

  • Antivirus

  • Application Security

  • Archiving

  • Authentication

  • Authorization

  • Backup

  • Blockchain

  • Botnet Protection & Detection

  • Burp Suite

  • Check Point

  • Cipher

  • Cisco Networking

  • Cloud Computing Security

  • COBIT

  • Computer Forensics

  • Computer Network

  • Computer Security

  • Content-control Software

  • Cryptocurrency

  • Cryptography

  • Cybersecurity

  • Data Loss Prevention

  • Data Recovery

  • Database Security

  • Decryption

  • Dell EMC

  • Denial-of-Service Attack

  • Digital Forensics

  • Digital Signature

  • Disaster Recovery

  • Disk Encryption

  • Domain Name System

  • Encryption

  • Ethical Hacking

  • F5 Networks

  • File Transfer Protocol

  • Filesystem-level Encryption

  • Firewall

  • Forensic Toolkit

  • Governance, Risk, and Compliance

  • Hardening

  • HTTPS

  • Identity and Access Management

  • Incident Response

  • Information Assurance

  • IT Security Assessment

  • IDEA

  • Internet Protocol Security

  • Internet Protocol Suite

  • Internet Security

  • Intrusion Detection System

  • Intrusion Prevention System

  • IT Risk

  • Juniper Networks

  • Kali Linux

  • Kubernetes

  • Lightweight Directory Access Protocol

  • Linux

  • Local Area Network

  • Malware

  • McAfee

  • Metasploit Project

  • Metropolitan Area Network

  • Microsoft Azure

  • MikroTik

  • Nessus

  • Network Access Control

  • Network Attached Storage

  • Network Security

  • Networking

  • Nmap

  • OSI Model

  • Palo Alto Networks

  • Penetration Testing

  • Personal Area Network

  • Phishing

  • Probability

  • ProofPoint

  • Proxy Server

  • RSA

  • Routing

  • Secure Embedded Systems

  • Secure Remote Access

  • Secure Shell

  • SEIM

  • Security Token

  • Server Security

  • Simple Mail Transfer Protocol Secure

  • Social Engineering

  • Splunk

  • Storage Area Network

  • Subnetting

  • Switching

  • Symantec Endpoint Protection

  • Transport Layer Security

  • Troubleshooting

  • User Datagram Protocol

  • Veeam

  • Veritas

  • Virtual LAN

  • VPN

  • Virtualization

  • VMware

  • VoIP

  • Vulnerability Assessment

  • Web Security

  • Wi-Fi Protected Access

  • Wide Area Network

  • Windows Server

  • Wireless Security

  • Wireshark

Career Areas & Jobs

  • Application Security

  • Cloud Security

  • Communication Security

  • Computer Forensics

  • Computer Network Defense (CND)

  • Computer Security

  • Cryptography

  • Cyber Crime

  • Cyber Forensics

  • Cyber Intelligence

  • Cyber Threat

  • Cyber Security

  • Data Governance

  • Data Security

  • Database Security

  • Digital Forensics

  • Encryption

  • End Point Security

  • Ethical Hacking

  • Hardware Security

  • Identity and Access Management

  • Incident Response

  • Information Assurance

  • Information Risk

  • Information Security

  • Intrusion

  • IT Security

  • Malware

  • Mobile Security

  • Network Security

  • Penetration Testing

  • Reverse Engineering

  • Security Control

  • Software Security

  • Source Code

  • Systems Security

  • Threat Intelligence

  • User Security

  • Vulnerability Assessment

  • Vulnerability Research

  • Beginner​

    • Auditor

    • Investigator

    • Technician

    • Tester

  • Intermediate

    • Administrator

    • Analyst

    • Consultant

    • Developer

    • Generalist

  • Advanced

    • Architect

    • Assessor

    • Engineer

    • Examiner

    • Officer

    • Specialist

Training & Certification

Digital Forensics Certificate

Courses

 

CSIA 105: Introduction to Cyber Security/Information Assurance (3)

CSIA 135: Digital Forensics (3)

CSIA 210: Network Protocol Analysis (3)

CSIA 235: Advanced Digital Forensics (3)

INFM 109: Informatics Fundamentals (3)

ITSP 135: Hardware/Software Support (4)

NETI 105: Network Fundamentals (3)

SVAD 111: Linux & Virtualization Tech Fundamentals (3)

ITSP 136: WF Prep: CompTIA A+ Cert. (1)

CSIA 106: WF Prep: CompTIA Security+ Cert. (1)

Network Security Certificate

 

Courses

CSIA 105: Introduction to Cyber Security/Information Assurance (3)

CSIA 106: WF Prep: CompTIA Security+ Cert. (1)

CSIA 210: Network Protocol Analysis (3)

CSIA 215: Perimeter Defense (3)

INFM 109: Informatics Fundamentals (3)

ITSP 135: Hardware/Software Support (4)

NETI 105: Network Fundamentals (3)

NETI 115: Routing and Switching (3)

SVAD 111: Linux & Virtualization Tech Fundamentals (3)

NETI 114: WF Prep: CompTIA Network+ Cert. (1)

Network Penetration Certificate

Courses

 

CSIA 105: Introduction to Cyber Security/Information Assurance (3)

CSIA 106: Workforce Preparation: CompTIA Security+ Certification (1)

CSIA 210: Network Protocol Analysis (3)

CSIA 225: Ethical Hacking (3)

CSIA 260: Business Continuity in an Information World (3)

INFM 109: Informatics Fundamentals (3)

ITSP 135: Hardware/Software Support (4)

NETI 105: Network Fundamentals (3)

SVAD 111: Linux and Virtualization Technologies Fundamentals (3)

Supplemental Training

Please find the list of courses, specializations, and projects on Coursera below. You can pursue these certificates to gain additional technical skills and technical expertise.

Financial Aid

The IT Sector Partnership will help you get funding through Workforce Ready Grant, Employer Training Grant, Pell Grant, and Ivy Tech Scholarships to pay for the training.

Salary

Please find the IT Salary Guide created by CFS Technology and Wages & Benefits Report created by the South Bend - Elkhart Regional Partnership.

Apply

To schedule an info session or to apply for our training program, please click on the tab below and fill our application form.

Contact Us

4100 EDISON LAKES PKWY, MISHAWAKA, IN 46545

ggardner20@ivytech.edu | squtbuddin@ivytech.edu | (574) 271-5145 ext. 210

  • LinkedIn Social Icon
  • Facebook Social Icon
  • Instagram
  • Twitter Social Icon
  • YouTube Social  Icon

Copyright © 2020 IT Sector Partnership. All rights reserved​