CyberSecurity
Technology
Security
Certified Security Principles (C)SP)

This Certified Security Principles cybersecurity class is only available in self-study.

Security Principles are your first line of defense, but often the last box checked! The IT world never stands still! Therefore, neither can IT security. It does not matter if we are talking about the implementation of loT devices or cloud services, security is important. According to a recent study, the top source of security incidents within a company are the current employees!

The Certified Security Principles, C)SP, course is going to prepare you for security across the entire environment including understanding risk management, identity and access control, network and data security. This is just a short list of everything that we cover within this course, which will include new technologies like loT and cloud services. This course is intended to prepare you to become a benefit to any company that is attempting to improve its security posture!

The C) SP is a Foundational Part of Several Career Paths.

We suggest that you master the concepts in the C)SP before moving into 300 level in the Management, Response and Recovery, or Auditing Career Paths. This course will introduce you to many of the key concepts you will need to succeed in the other courses.

About the course

Prerequisites:

The knowledge and skills that the learner should have before attending this course are as follows:

  • 12 Months of experience with server administration

Course Objectives:

Upon completion, the Certified Security Principles candidate will not only be able to competently take the C)SP exam but will also understand the principle security knowledge to keep companies' IP and IT infrastructure safe.

Course content

Course Outline:

  • Module 1 – Intro to IT Security
  • Module 2 – Risk Management
  • Module 3 – Understanding of Cryptography
  • Module 4 – Understanding Identity and Access Management
  • Module 5 – Managing Data Security
  • Module 6 – Managing Network Security
  • Module 7 – Managing Server/Host Security
  • Module 8 – Application Security for Non­-Developers
  • Module 9 – Understanding Mobile Device Security
  • Module 10 – Managing Day to Day Security
  • Module 11 – Understanding Compliance and Auditing
Who Should Attend

The primary audience for this course is as follows:

  • IT Professionals
  • Server Administrators
  • Virtualization and Cloud Administrators