Information Security Master Certification Training (Voucher Included)


Course provides valuable knowledge with vouchers for industry-recognized certification exams

Through the University of Central Missouri's Information Security Master Certification Training (Voucher Included) program, students will gain expertise in all areas of IT security. This valuable program includes seven different training courses covering the entire spectrum of information technology security. Included in this course are registration fees for the Cisco CCNA Security, CompTIA Advanced Security Practitioner (CASP), Certificate of Cloud Security Knowledge (CCSK), Certified Information Systems Auditor (CISA), Certified Information Security Manager (CISM), PMI Risk Management Professional and Certified Information Systems Security Professional (CISSP) certification exams.

UCM certificate cost icon   $5,695
Calendar icon  

Online, self-paced course

Contact hours icon    330 hours  Prerequesites checklist icon   No prerequisites other than students should have a strong understanding of IT networking and security



Topics cover technical security, risk assessment, policy management and moreWoman-working-at-computer

In today’s world, security is a constant concern for any business or organization, and IT professionals with this expertise are in high-demand. This course covers areas such as technical security, risk assessment, cloud security, and policy management as well as how to manage and write policy to govern security practices. Students are able to login via virtual machines to live infrastructure and practice on live environments, providing a true hands-on experience. Course participants also have full access to a variety of preconfigured virtual exercises. The flexible program is entirely online and is completed at each student’s own pace. At registration, students will have 12 months to complete this program.


What you will learn

  • Network security
  • AAA
  • Firewall
  • Remove access VPNS and VPN lab
  • Cryptography
  • Storage
  • Virtual computing
  • Risk assessment, testing/assessment and common vulnerabilities
  • Monitoring
  • Incident handling
  • Email security
  • Legal issues, compliance and audit management



  • facebook
  • twitter
  • youtube
  • linkedin
  • instagram