Saturday 26 May 2012

Online Cyber Security Courses and Training Program Info

Online cyber security courses teach students how to protect a computer or network of computer systems from malicious viruses, hackers, spyware, unauthorized users and other digital dangers. Courses offered include how to defend your personal computer from Internet threats and the management of information security for multiple networks. These courses are often part of a degree program in information security or information systems.

Review of Distance Learning Cyber Security Courses and Training Program Info

Online cyber security courses focus information security management, business continuity and disaster recovery, corporate network security, ethical hacking, network infrastructure and cryptology. Programs can be taken as electives or as a course that counts toward a degree or professional certificate program in information technology, cyber security or computer and information science.
Students trained in cyber security may work as network administrators, information security analysts, information technology managers or consultants, or as public or private computer security and repair specialists. Along with technical skills, students develop a greater understanding of how information security plays a role in a company's overall risk management policy.

Course requirements

Students need a fast computer with a high-speed Internet connection to take full advantage of streaming video, multimedia presentations, podcasts and live online discussion boards that may be used. Some courses require access to a secure online course management system and to a school's library. Course schedules could have set times or be self-paced.

Summary of Online Cyber Security Courses

Introduction to Personal Computer Security Course

Students study the fundamental vulnerabilities of various operating systems and software in personal computers and how to fix them in this class. They learn about the creation and use of malicious worms and viruses and how to defend against such attacks. Students learn how to utilize a firewall to protect computer systems.

Fundamentals of Information Security Management Course

This online cyber security course provides a basic overview of managing information security in a corporate setting. Students study introductory topics in information security and assurance principles, risk management issues and organizational plans. Students learn about the various types of security tools available. Other relevant issues discussed include ethics, law and policies.

Risk Management in Information Security Course

This cyber security course teaches students the goals of security management and learn how to assess, model, communicate and address risks involved in information security. Students will learn to identify the various classifications of data and the security levels needed for each. They learn to present to security plans to mitigate trouble spots.

Cryptography Course

Students in this advanced course learn how cryptography applications maintain confidentiality and integrity of data being transferred across network systems. Students learn to apply the appropriate cryptography plan for a given scenario and how digital signatures, public key infrastructure and certificate authorities aid in the secure transmission of data.

Ethical Hacking Course

This cyber security course encourages students to use common hacking tools and techniques to test their own networks for security holes, a practice known as ethical or white-hat hacking. This allows students to better protect their network from unauthorized access. Students learn to trace the interactions between hardware and software and to follow data packets through a network to identify security breaches and loss of information.

Disaster Recovery and Business Continuity Planning Course

Students in this course learn to prepare for a planned recovery from an unforeseen disaster, such as a cyber attack. Students learn to identify and create a strategy to recovery critical resources in order to keep the business operating. Students must demonstrate the ability to craft a recovery plan based on any number of 'what if?' scenarios.

No comments:

Post a Comment