• Call us: 1-800-992-6345 or 316-978-3118
  • Log in to My Records

Real-World Cybersecurity Scenarios

Search Courses

Real-World Cybersecurity Scenarios

Cost: $399.00
MindEdge Learning logo

Total CPEs (ISC)2:30  Group A: 30 | Group B: 0

Total PDUs/Contact Hours: 30
Leadership PDUs:  3.5
Strategic & Business Management PDUs: 6
Technical PM PDUs: 20.5
CEUs: 3 (Contact Hours: 30)
Estimated time to complete: 40 hours
Access Time: 365 days

 

Register button

Description

What would you do in the face of an actual information security problem? These courses each include a module devoted to fictional scenarios, based on real-world challenges that cybersecurity professionals face. Each course is self-paced and contain interactive games, real-world examples, expert videos, quizzes, assessments, and focused instruction.

Each of the courses in this bundle helps refine and enhance the skills that cybersecurity and IT professionals need. The concepts and principles covered focus attention on the needs of the expanding computer information security industry.

This bundle is designed for adult learners who are interested in gaining an introduction to information technology security. Some understanding of basic IT concepts is helpful.

Individual courses included in this bundle are listed below.


Key Features

  • Expert-supported
  • Guaranteed exam passing
  • Mobile-friendly
  • Accessible
  • Badge and credit-awarding
  • Games & Flashcards
  • Video content
  • Real-world case studies
  • Audio-enabled in app

Refund Policy

You may request a refund up to 5 days from the purchase date. The registration fee will only be refunded if less than 10% of each course in the certificate has been completed. Completion percentage can be viewed on the Course Progress page from within the course.


Notes

This course has an “Ask the Expert” feature, which submits your questions directly to an expert in the field you are studying. Questions are answered as quickly as possible and usually within 24–48 hours.

This course does not require any additional purchases of supplementary materials.

Courses include:

  • Access Control and Identity Management Scenarios
  • Application, Data, and Host Security Scenarios
  • Compliance and Operational Security Scenarios
  • Cryptography Scenarios
  • Network Security Scenarios
  • Threats and Vulnerabilities Scenarios
Sign up for
Newsletter