Information Systems Security Certificate Program

Similar documents
E-guide Getting your CISSP Certification

Big Data Specialized Studies

Web Design and Development Certificate Program

ITU CBS. Digital Security Capacity Building: Role of the University GLOBAL ICT CAPACITY BUILDING SYMPOSIUM SANTO DOMINGO 2018

IT Technician Pathways Course Guide

Information Systems and Tech (IST)

Shon Harris s Newly Updated CISSP Materials

Search Engine Optimization Specialized Studies

Course overview. CompTIA Security+ Certification (Exam SY0-501) Study Guide (G635eng v107)

CompTIA Cybersecurity Analyst+

E-guide CISSP Prep: 4 Steps to Achieve Your Certification

EC-Council Certified Incident Handler v2. Prepare to Handle and Respond to Security Incidents EC-COUNCIL CERTIFIED INCIDENT HANDLER 1

Computer Information Systems (CIS) CIS 105 Current Operating Systems/Security CIS 101 Introduction to Computers

M.S. IN INFORMATION ASSURANCE MAJOR: CYBERSECURITY. Graduate Program

Certified information Systems Security Professional(CISSP) Bootcamp

BACHELOR OF SCIENCE IN INFORMATION TECHNOLOGY

Systems Engineering Certificate Program

DIABLO VALLEY COLLEGE CATALOG

Mobile Application Development Certificate Program

Introducing Maryville University s CYBER SECURITY ONLINE PROGRAMS. Bachelor of Science in Cyber Security & Master of Science in Cyber Security

Computer Information Systems (CIS) CIS 105 Current Operating Systems/Security CIS 101 Introduction to Computers

Associate in Science and Bachelor of Science in Information Technology

Embedded Systems Engineering Certificate Program

CYBER FRAUD & DATA BREACHES 16 CPE s May 16-17, 2018

CyberVista Certify cybervista.net

VMEdu. 94 (Out of 100) D&B Rating. A+ BBB Rating. VMEdu Training. VMEdu Platform

Course Outline. CISSP - Certified Information Systems Security Professional

COMPUTER FORENSICS (CFRS)

Instructor PIERRE A. COLOMBEL II, M.S, CISSP-ISSAP, CEH, CIH, CHFI, LPT, PMP, MCT, Network+ & 30 more

CYBERSECURITY: Scholarship and Job Opportunities

Pearson CISSP Cert Guide with Labs. Course Outline. Pearson CISSP Cert Guide with Labs. 17 Oct

CCNA Cybersecurity Operations. Program Overview

BACHELOR OF SCIENCE IN INFORMATION TECHNOLOGY

Computer Science & IT

Bachelor of Applied Science Degree IT NETWORKING

NISTCSF.COM. NIST Cybersecurity Framework (NCSF) Workforce Development Solutions

Computer Network Engineering

GUIDELINES FOR SUBMITTING CONTINUING PROFESSIONAL EDUCATION (CPE) CREDITS

NISTCSF.COM. NIST Cybersecurity Framework (NCSF) Workforce Development Solutions

Curriculum Catalog

CyberSecurity Training and Capacity Building: A Starting Point for Collaboration and Partnerships. from the most trusted name in information security

Les joies et les peines de la transformation numérique

CCISO Blueprint v1. EC-Council

Embedded Systems Engineering Certificate Program

Computer Network Engineering

Computer Information Science xxx

Why MyITstudy is the best solution for your IT training needs

CYBERSECURITY HOW IT IS TRANSFORMING THE IT ASSURANCE FIELD

CompTIA IT Fundamentals:

Mohammad Shahadat Hossain

Networking Fundamentals Training

Bachelor of Information Technology (Network Security)

Blending Information Systems Security and Forensics Curricula

CERTIFICATION TRAINING - ISC2

IT Foundations Networking Specialist Certification with Exam

C T I A CERTIFIED THREAT INTELLIGENCE ANALYST. EC-Council PROGRAM BROCHURE. Certified Threat Intelligence Analyst 1. Certified

Developing Career-Relevant Academic Programs

Networking and Cybersecurity. Computer Service Technician. Cybersecurity Award: Career Studies Certificate Length: 25 credits

STUDENT LEARNING OUTCOMES Beacom College of Computer and Cyber Sciences

HCISPP HealthCare Information Security and Privacy Practitioner

Certified Cyber Security Analyst VS-1160

Computer Information Systems

Building the Cybersecurity Workforce. November 2017

Make Your Statement. Master of Management in Library and Information Science online. Graduate Certificate in Library and Information Management online

itsm003 v.3.0 NISTCSF.COM NICE Training Curriculum & Workforce Planning Program

CCNA Cybersecurity Operations 1.1 Scope and Sequence

Career Paths In Cybersecurity

Indicate whether the statement is true or false.

Operations & Technology Seminar. Tuesday, November 8, 2016 Crowne Plaza Monroe, Monroe Township, NJ

COMPUTER INFORMATION SYSTEMS

EC-Council - EC-Council Certified Security Analyst (ECSA) v8

Information Technology

Val-EdTM. Valiant Technologies Education & Training Services. Workshop for CISM aspirants. All Trademarks and Copyrights recognized.

NEW JERSEY INSTITUTE OF TECHNOLOGY. Initiation of Cyber Defense Option. for the Master of Science in

CompTIA Network+ (Exam N10-006)

"Charting the Course... Certified Information Systems Auditor (CISA) Course Summary

Application for Certification

COMPUTER TECHNOLOGY (COMT)

INFORMATION TECHNOLOGY (IT)

COUNTERING CYBER CHAOS WITH HIPAA COMPLIANCE. Presented by Paul R. Hales, J.D. May 8, 2017

DUNS CAGE 5T5C3

Cisco Networking Academy CCNA Cybersecurity Operations 1.1 Curriculum Overview Updated July 2018

CYBER APPRENTICESHIP. Dr. Leigh Armistead, President

Pearson CISSP Lab. Course Outline. Pearson CISSP Lab. 05 Apr

Opportunities to Integrate Technology Into the Classroom. Presented by:

SALARY $ $72.54 Hourly $3, $5, Biweekly $8, $12, Monthly $103, $150, Annually

CYBER SECURITY TRAINING

Vice President and Chief Information Security Officer FINRA Technology, Cyber & Information Security

Bachelor of Information Technology

NATIONAL INFORMATION TECHNOLOGY AUTHORITY - UGANDA (NITA-U) REGIONAL COMMUNICATIONS INFRASTRUCTURE PROGRAM (RCIP) INFORMATION SECURITY SPECIALIST

Workforce Certification

Information Systems. Courses. Information Systems 1

Master of Science (MS) in Information Assurance and Cybersecurity with a specialization in. Digital Forensics

BHConsulting. Your trusted cybersecurity partner

RISK MANAGEMENT Education and Certification

Accounting Ethics and Auditing

locuz.com SOC Services

Reasons to Become CISSP Certified. Keith A. Watson, CISSP CERIAS

COMPUTER INFORMATION SYSTEMS

Descriptions for CIS Classes (Fall 2017)

Transcription:

Information Technologies Programs Information Systems Security Certificate Program Accelerate Your Career ce.uci.edu/infosec

UCI Division of Continuing Education s professional certificate and specialized studies programs help you increase or enhance your current skills or prepare for a Improve Your Career Options with a Professional Certificate new career. Courses are highly practical and instructors are qualified leaders in their field. Convenient online courses make it easy to learn on your own time, in your own way. A certificate bearing the UC seal signifies a well-known, uncompromising standard of excellence.

Information Systems Security Certificate Program Corporations have been put on alert to heighten their infrastructure and data security due to threats from hackers and cyber-terrorists. As information security threats and high visibility breaches have skyrocketed in the past few years, government agencies and customers have dramatically increased their requirements and scrutiny of corporate security process and procedures. UCI Continuing Education s Certificate program in Information Systems Security prepares professionals within a wide range of career levels to develop the skills they need to succeed in this rapidly expanding, dynamic field. The curriculum focuses on developing a comprehensive understanding of the underlying principles for designing, engineering, and managing secure information systems environments. Core topic areas include: access control; application development security; business continuity; disaster recovery planning; cryptography; information security governance; risk management; legal; regulations; investigations and compliance; operations security; physical (environmental) security; security architecture; design and telecommunications; and network security. Learn how to effectively combat external attacks that can compromise data and business operations through our cyber security track of elective courses. This program will help prepare you to sit for the Certified Information Systems Security Professional (CISSP ) exam administered by the International Information Systems Security Certification Consortium, Inc., (ISC) 2. For More Information: Julie Pai Program Representative julie.pai@uci.edu (949) 824-6333 Who Should Enroll? This program has been designed to benefit security professionals who require CISSP certification and work on software development and information technology infrastructure teams, security technicians working with Internet service providers, application service providers, systems integrators, and security auditors. Business professionals who must combat potential cyber-threats and attacks that endanger their organizations data will also benefit from this program. The program also includes courses that expand technical skills and enable security professionals and those training to be security professionals to pursue and maintain a variety of industry certifications. The courses include current findings from academic and technological research and state-of-the-art practice. Program Benefits: n Develop key knowledge of information systems security, including access control, administration, audit and monitoring, risk, response, and recovery n Protect the confidentiality, integrity, and availability (CIA) of stored information n Implement government and customer imposed security requirements n Develop best practices for business continuity planning n Broaden your knowledge to include the implementation of multiple technologies, including client/server, Web, mainframe, and wireless n Identify and apply industry standards at the physical, personal, and organizational level n Design, diagnose, implement, manage, and resolve complex computer security threats n Gain the knowledge required to obtain your CISSP certification.

Complete Certificate Program Online Curriculum Program Fees Course Fees: $5,075 Candidacy Fee: $ 125 Textbooks and Materials: $ 700 Total Estimated Cost: $5,900 Certificate Requirements A certificate is awarded upon completion of 15 credit untis (3 required and 6 elective credit units) with a grade point average of B or better. To become an official candidate in the program, students pursuing the certificate must submit a Declaration of Candidacy. To receive the certificate after completing all program requirements, students must submit a Request for Certificate. All requirements must be completed within 5 years after the student enrolls in his/her first course. Students not pursuing the certificate program are welcome to take as many individual courses as they wish. Transfer Credit Graduates from UCI Continuing Education s Information Systems Security Certificate program are eligible to transfer credits to University of Wisconsin-Platteville, Master of Science in Criminal Justice and University of Maryland, Baltimore County (UMBC), Master in Professional Studies (MPS): Cybersecurity programs. Onsite Training Our Corporate Training specialists can deliver this program or a customized one that fits your organization s specific needs. Visit ce.uci.edu/corporte or call (949) 824-1847 for information. Required Courses Introduction to Information Systems Security I&C SCI X465.00 (3 units) Focuses on basic computer security concepts as they pertain to logical and physical security at corporate or remote arenas including mobile workforce. This introductory course will expose students to various design principles of trusted computing bases, legal regulations, investigation and compliance requirements, secure computing concepts, numerous security protocols and principles, practical networking security methodologies. An introduction to business continuity and disaster recovery concepts will also be discussed. Secure Systems I&C SCI X465.01 (3 units) This course will focus on design principles of trusted computing bases (TCB). Issues regarding authentication, access control and authorization, introductory cryptography, controls categories, media, backups and change control management, discretionary and mandatory security policies, secure kernel design, application development security, secure operating systems (patching and vulnerability management), and secure databases will be covered from a systems architecture perspective. Emphasis will be on the design of security measures for critical information infrastructures. Security Architecture & Design I&C SCI X465.02 (3 units) Learn the fundamentals of security architecture design including security models, enterprise architecture and security evaluations. Understand critical issues related to network security such as the OSI reference model, firewalls, TCP/IP and LAN. Apply techniques used to support larger networks such as MAN and WAN, and those accessed via wireless protocols. Discover the practical aspects of cryptography concepts and how to apply them to improve the security of information systems. ce.uci.edu/infosec

Elective Courses (Choose 6 units) Host and OS Security I&C SCI X465.03 (1.5 units) This course will focus on the security aspects of Windows Vista, MAC, and Apple OS technology as it applies to the home and mobile user configuration. It will also cover the various networking and standalone OS s that are prominent in the corporate world and vital to any company s client-to-server operations as well as information security governance and risk management. Database Security I&C SCI X465.05 (3 units) Covers issues related to the design and implementation of secure data stores. Emphasis will be placed on multilevel security in database systems, covert channels, and security measures for relational and object-oriented database systems. Network Security: Concepts & Technologies I&C SCI X465.06 (3 units) Fundamental concepts, principles, networking and internetworking issues relevant to the design, analysis, and implementation of enterprise-level networked systems are covered in this course. Topics include networking and security architectures, techniques, and protocols at the various layers of the Internet model. Security problems will be analyzed, discussed, and implemented. Cyber Security Track Introduction to Computer Forensics I&C SCI X465.07 (3 units) Designed to provide a solid foundation in the theory and practice of essential computer forensic techniques, this introductory course in computer forensics focuses on preparing students to respond to many types of crisis situations by providing the skills needed to respond to an investigation. Focus is placed on the role of computer forensics and the methods used in the investigation of computer crimes. Other topics covered include aspects of the legal process that apply to computer forensics, detailed explanations of how to effectively manage a forensics investigation, and ways to preserve and present evidence. On the technical side, forensics on Windows Systems including the file system, the registry, and events will be discussed. Live analysis, linux systems, and browser artifacts are also included in the topics covered along with a primer on commercial tools as well as open source tools available. Reverse Engineering I&C SCI X465.10 Understanding and analyzing malware through the process of reverse engineering is a key methodology to stop malware attacks. Learn how to use this process to discover vulnerabilities in binaries in order to properly secure your organization from ever evolving threats. This class covers a wide variety of malware, from native Windows executables, to web-based malware with numerous types of obfuscation. Take a hands-on approach to learn how to reverse-engineer malicious code using system/network monitoring utilities, debuggers, disassemblers, and a handful of scripts.

Advisory Committee Leo A. Dregier III, CISSP, CEH, CHFI, CISM, CEO, The Security Matrix, LLC Nelson Eby, M.S., ACE, Forensic Analyst, GE, Federal Bureau of Investigation CART, Member of Technical Working Group for Education and Training in Computer Forensics Tony Gaidhane, MBA, M.S., CISSP(r), CISM(r), CISA(r), PMP, Director, Identity Management, WellPoint Inc. Ian Harris, Ph.D., Associate Professor, Donald Bren School of Information and Computer Science, University of California, Irvine Terry House, Ph.D., Assistant Professor of Computer Science, Methodist University Barbara Johnson, CISA, CISSP, ISSMP, CBCP, MBCI, Information Security and Business Continuity Consultant, Member of the (ISC) 2 Common Body of Knowledge (CBK) Committee Caitlin Pantos, Senior Program Manager, Privacy & Security, Google Inc. David M. Mahoney, MBA, CISSP, PMP, Manager Infrastructure Services, Information Systems Sector, Civil Systems Division, Northrop Grumman Corporation Pramod Pandya, Ph.D., Professor and Director, Information Technologies, California State University Fullerton Debbie Rodriguez, MBA, CISSP, CISA, System Analyst, Intuit Financial Services Maria Suarez, Chief Information Security Officer, University of Southern California Academic Management Dave Dimas, Ph.D., Director, Engineering, Sciences and Information Technologies Information Systems Security Certificate Program Julie Pai n (949) 824-6333 n julie.pai@uci.edu Division of Continuing Education 09.22.16 ce.uci.edu/infosec