Skye Learning Real-World Cybersecurity Scenarios - Details Page

Certificate Suite Details

Key Features

  • Mobile-friendly
  • Audio-enabled
  • Badge and credit-awarding
  • Real-world case studies
  • Fully accessible
  • Games & Flashcards
  • Expert-supported
  • Video content

Certificate Preview

Certificate Description

Courses Included in this Certificate

Course Description

This course examines communications and network security. It covers the different types of networks and different transmission technologies and the two main models that govern how networks work, the OSI model and the TCP/IP model, and their related layers. This course also features a number of fictional scenarios that will help you apply what you've learned to situations you may encounter in the real world. This course requires a basic understanding of IT concepts.

Course Credits

Course Description

This course contains an introduction to the key concepts of cryptography and security engineering. It examines the role of encryption in information security and considers common encryption methods. This course also features a number of fictional scenarios based on cryptography to help you apply the concepts to situations you may see in the real world. This course requires some basic understanding of IT concepts.

Course Credits

Course Description

This course contains a discussion of the role of security governance and risk management in information security. It looks at the policies and standards that are needed to operate an effective information security function and to oversee good information security practices. This course also features a number of fictional scenarios based on compliance and operational security to allow you to practice the concepts learned in the material. This course requires some basic understanding of IT concepts.

Course Credits

Course Description

This course examines the process of identifying and mitigating threats and vulnerabilities in information systems. It covers common categories of threats and vulnerabilities and the resources used to detect them. This course also features a number of fictional scenarios based on threats and vulnerabilities. This course is designed for IT professionals and other adult learners who are interested in information technology security, with an eye towards handling real-world scenarios.

Course Credits

Course Description

When you download an app, or access a database, you want to trust that the software engineer who developed the app had an eye toward security. This course covers the security of applications, data, and hosts in information systems. It provides a comprehensive examination of software development and change management. This course also features a number of fictional scenarios based on real-world application, data, and host security. Although not required, having some experience or working knowledge in IT concepts is helpful in taking this course.

Course Credits

Course Description

Access control is the restriction of access to a computer system. So how does a cybersecurity professional manage this access control? This course introduces the principles of access controls, beginning with the central modes of information security and continuing through various attacks and defenses. It provides an overview of Identity Management and the resources used on modern-day information systems, including Web and cloud-based ones. This course also features a number of fictional scenarios based on access control and identity management that professionals face in the real-world.

Course Credits

Notes

This course has an "Ask the Expert" feature, which submits your questions directly to an expert in the field you are studying. Questions are answered as quickly as possible and usually within 24 hours.

As an Accredited Provider, MindEdge offers for its learning events that comply with the Continuing Education and Training Standard.

Learners must achieve an average test score of at least 70% to meet the minimum successful completion requirement and qualify to receive credit. Learners will have three attempts at all graded assessments.

Project Management Institute, , the Registered Education Provider logo, Project Management Professional, , Project Management Body of Knowledge, , Agile Certified Practitioner, -, Risk Management Professional, -, the Talent Triangle, and the Talent Triangle logo are marks of the Project Management Institute, Inc.

Information in this course has been taken from A Guide to the Project Management Body of Knowledge, (® Guide) - Sixth Edition, Project Management Institute Inc., 2017.

The following list outlines the you will earn for completing this course, based on the certifications you have.