Online Professional Certification seminars in

Cybersecurity

Learn and apply cybersecurity tactics to real-world situations through the Cybersecurity Workforce Development Program.

Cybersecurity is a critical function to all forms of business and organizations require qualified resources to lead their protection efforts. Cyber threats continue to grow and evolve and the ability to safeguard IT infrastructure is an essential responsibility of organizations.  Successfully protecting the cyber infrastructure requires an in-depth understanding and vigilance across the entire organization from entry-level employees to the Board of Directors. The various certificates offered through the Cybersecurity Workforce Development Program help to prepare students to do just that.

According to Cybersecurity Ventures, by 2021, it is expected that there will be 3.5 million unfilled cybersecurity jobs globally, up from 1 million positions in 2014!

Professional Certification Courses and Information

There are no pre-requisites for the Cybersecurity certifications. Students will receive certification through Mile2® (powered by MERIT) for each course after passing the final exam with a score of 70 percent or higher.  

COURSE OBJECTIVES
The Certified Information Systems Security Officer course addresses a wide range of industry best practices, knowledge and skills expected of a security manager. This course will cover in-depth theory relating to the everyday implementation of essential security concepts, practices, monitoring and compliance. Covered topics include: symmetric cryptography and hashing, security architecture and attacks, access control, risk management, security management, authentication and much more. For a full breakdown of course objectives and modules, please review the  Mile2® C)ISSO Course Overview.

PREREQUISITES - None

TARGET AUDIENCE
IS security officers/managers, risk managers, auditors, information systems owners, IS control assessors, system managers, government employees and any person seeking a foundational knowledge of security and best practices.

AT COURSE COMPLETION
Once completed, students will be able to establish industry acceptable cybersecurity and IS management standards with current best practices.

*Please note: The Course Overview linked above mentions a 5-day course duration and multiple prerequisites. The BGSU course is modeled off the Mile2® objectives, but is taught over an 7-week period with no prerequisites required.

COURSE OBJECTIVES
In the Certified Professional Ethical Hacker course, students will learn the business skills needed to identify protection opportunities, justify testing activities and optimize security controls appropriate to business needs in order to reduce business risk. Students will learn how malware and destructive viruses function through modules covering topics such as cryptography, reconnaissance, enumeration and scanning, covering tracks, password cracking, buffer overflows, etc.   

For a full breakdown of course objectives and modules, please review the  Mile2® C)PEH Course Overview.

PREREQUISITES - None

TARGET AUDIENCE
Information systems owners, security officers, ethical hackers, penetration testers, system owner managers, cybersecurity engineers and individuals seeking theoretical and technical hands-on knowledge of how to identify, mitigate and defend attacks through designing and building systems that are resistant to failure.

AT COURSE COMPLETION
Once completed, students will understand the importance of vulnerability assessments by providing industry knowledge and skills in Vulnerability Assessment.

*Please note: The Course Overview linked above mentions a 5-day course duration and multiple prerequisites. The BGSU course is modeled off the Mile2® objectives, but is taught over an 7-week period with no prerequisites required.

COURSE OBJECTIVES
The Certified Network Forensics Examiner course will teach students to put together a complete report using evidence from reconstructed and recovered network transactions. Students will learn principles of network forensics analysis and how to apply them to real-life situations. Modules covered include digital evidence concepts, network-based evidence, Layer 2 Protocol, physical interception, wireless access points and more.

For a full breakdown of course objectives and modules, please review the  Mile2® C)NFE Course Overview.

PREREQUISITES - None

TARGET AUDIENCE
Digital and network forensic engineers, IS and IT managers, network auditors and individuals seeking foundational knowledge of network forensics techniques associated with evidence collection, reporting and reconstruction.

AT COURSE COMPLETION
Once completed, students will have the knowledge needed to perform network forensic examinations an accurately report on their findings from examinations.

*Please note: The Course Overview linked above mentions a 5-day course duration and multiple prerequisites. The BGSU course is modeled off the Mile2® objectives, but is taught over an 7-week period with no prerequisites required.

COURSE OBJECTIVES
As part of the Certified Secure Web Application Engineer course, students will learn to identify and defend against security vulnerabilities in software applications. The course provides a thorough and broad understanding of secure application concepts, principles and standards, and students will learn to identify, mitigate and defend against all attacks through designing and building systems that are resistant to failure. Modules in this course include threat modeling and risk management, data validation, authentication and authorization attacks, code review, security test scripts and more.  

For a full breakdown of course objectives and modules, please review the  Mile2® C)SWAE Course Overview.

PREREQUISITES - None

TARGET AUDIENCE
Coders, web application engineers, IS managers, application engineers, developers, programmers and individuals seeking theoretical and technical hands-on knowledge of how to identify, mitigate and defend attacks through designing and building systems that are resistant to failure.

AT COURSE COMPLETION
Once completed, students will be able to establish industry acceptable auditing standards with current best practices and policies.

*Please note: The Course Overview linked above mentions a 5 day course duration and multiple prerequisites. The BGSU course is modeled off of the Mile2® objectives, but is taught over an 7-week period with no prerequisites required.

COURSE OBJECTIVES
The Certified Penetration Testing Engineer course presents information based on the “5 Key Elements of Pen Testing” (information gathering, scanning, enumeration, exploitation and reporting). Students will utilize ethical hacking methodologies and learn penetration testing methodologies using advanced persistent threat techniques. This course will also focus on the business skills required to identify protection opportunities, justify testing activities and optimize security controls to reduce risks associated to working with the internet.

For a full breakdown of course objectives and modules, please review the  Mile2® C)PTE Course Overview.

PREREQUISITES - None

TARGET AUDIENCE
Pent testers, ethical hackers, network auditors, cybersecurity professionals, vulnerability assessors, cybersecurity managers, IS managers and individuals seeking foundational knowledge of best practices including the five key elements of penetration testing.  

AT COURSE COMPLETION
Once completed, students will be able to recognize vulnerabilities, exploit system weaknesses and help safeguard threats through penetration testing and other valuable business sills.

*Please note: The Course Overview linked above mentions a 5-day course duration and multiple prerequisites. The BGSU course is modeled off the Mile2® objectives, but is taught over an 7-week period with no prerequisites required.

Registration Information

  • OPEN REGISTRATION March 19 – June 1, 2018 | Class begins June 11, 2018
  • REQUIREMENTS NONE! Registrants do NOT need to be full/part-time, degree-seeking students to enroll in these courses
  • COST $2000/student for C)ISSO course - includes all course materials and fee for Mile2® (powered by MERIT) exam . Cost of other courses TBD.

Cybersecurity - Professional Certifications

Advance Your Career

Chief Information Security Officer
Information Security Manager
Information Security Analyst
IT Auditor
Security Consultant
Digital Forensic Investigator

Courses/Cost/Time

5 courses, each with a Mile2® certification (powered by MERIT)
$2000 for C)ISSO course. Cost of other courses TBD.
7-week sessions

NOTE: There are no prerequisites for taking any of the Workforce Development Cybersecurity Certification courses

In-Demand Skills

  • According to Cybersecurity Ventures by 2021, it is expected that there will be 3.5 million unfilled cybersecurity jobs globally, up from 1 million positions in 2014!