Submit
Open Calendar

Breadcrumb

Click to print this page

Information Security Training (Voucher Included)

Man-working-at-computer

 

Course provides valuable knowledge with vouchers for industry-recognized certification exams

The University of Central Missouri’s Information Security Training (Voucher Included) course provides students with valuable expertise in all areas of IT security. This online cybersecurity training course will prepare you for three globally recognized certifications: ISACA's Certified Information Systems Auditor (CISA), Certified Information Security Manager (CISM) and (ISC)2's Certified Information Security Professional (CISSP). In addition, this class offers vouchers for prepaid access to sit for the (CISA) and (CISM) certifying exams upon eligibility.  A voucher for the CISSP exam is not included. Through this program, students earn an industry-recognized certificate and continuing education units which may not be applied to a degree program and are not eligible for federal financial aid. 

UCM certificate cost icon   $3,295
Calendar icon  

Online, open enrollment, self-paced course.

Contact hours icon    300 hours  Prerequesites checklist icon   None although the ISACA and (ISC)2 both require at least five years of information security work to be eligible to be eligible for the certification exams.

 

Woman-working-at-computerComplete this self-paced, online course on your schedule

Learn the skills you need to get ahead in the high-demand, high-salary field of cybersecurity. Students learn to assess vulnerabilities, compliance and institution controls and are able to demonstrate their knowledge in security and risk management. This valuable course is designed with busy adults in mind. Enrollment is open, and students complete this instructor-led course at their own pace. At registration, students will have nine months to complete this program.

 

What you will learn

  • Security and risk management
  • Asset security
  • Security engineering
  • Communication and network security
  • Security assessment and testing
  • Software development security
  • Governance and management of IT
  • Protection of information assets
  • Information systems operations and business resilience

ENROLL NOW

social-section

  • facebook
  • twitter
  • youtube
  • linkedin
  • instagram