Course Category: Cyber Security, Information Technology

Course Format: Online

Course Solution: Data

Information technology security has been among the top ten management concerns since the 1980’s. Technologies such as computer networks, PCs, the web, and more recently SMAC (Social, Mobile, Analytics, Cloud) along with SCADA/Internet of Things, Blockchain, AI, Robotics, etc., continually bring new security considerations and challenges to organizations.

These technologies in concert with changes in regulations, especially in light of the growth of valuable and sensitive information assets stored by organizations such as individuals’ taxes, financial assets, medical records, job performance reviews, trade secrets, new product developments, and customer data, demand a strong focus on security management; the protection of data/information/knowledge. The threat of invasion by cyber criminals (e.g., governments, competitors, individuals) continues to grow.

No one can escape cyber-attacks, and the fact that it is hard to find trusted people who are expert in this new art of war has driven the demand for security professionals to an all-time high. Many companies are starting to address this issue with the new understanding that constant and ongoing vigilance is the only way to protect infrastructure and data in the long term.

The purpose of this certificate from GIIM is to help organizations meet the increased demand for information security professionals by preparing attendees via a comprehensive practical set of courses addressing the entire IT infrastructure (e.g., data, network, web, applications, systems), as well as the essential management, organizational, and legal considerations.

What are the course requirements for the certificate?

Each certificate/certification requires a passing grade for each of the 4 courses ($750 per course). Select At Least Four (4) From The Following:

Foundations of Cyber Security

This 24 hour introduction to information security provides the foundation for understanding the planning and implementation of policies and procedures for protecting information assets, determining the levels of protection and response to security threats and incidents, and designing an appropriate information security system.

Ethical Hacking

This 40 hour course offers a comprehensive guide for ethical hacking. An ethical hacker is defined as someone who uses the same methods as criminal attackers use to exploit vulnerabilities in a network accessible to them.

Computer Hacking Forensic Investigation

This 40 hour course presents a detailed and methodological approach to computer forensics and evidence analysis.

Security Analysis and Penetration Testing

This 40 hour course provides an in-depth understanding of how to effectively protect computers and computer networks. Candidates will learn the tools and penetration testing methodologies used by penetration testers.

Incident Response Handling/Disaster Recovery

This 24 hour course examines detailed aspects of incident response and contingency planning consisting of incident response planning, disaster recovery planning, and business continuity planning.

Disaster Recovery Virtualization Planning

This 40 hour course provides an understanding of the various methods in identifying business and technology vulnerabilities. In addition, this course outlines the appropriate countermeasures to mitigate risks and prevent failure.

Network Security Administration

This 40 hour course offers a comprehensive guide for understanding information systems network security management.

Managing Emerging IT

IT organizations must be able to leverage new technologies. This course focuses on how organizations can effectively and efficiently assess trends and emerging SMAC (Social, Mobile, Analytics, Cloud) and security technologies.

Security Programming Java OR Security Programming .Net

The purpose of this 30 hour course (including either the .Net or Java course) is to provide candidates with a comprehensive understanding of what a Secure Development Process is.

Elective: CISSP

  • This 8 hour course, after taking the respective GIIM asynchronous or face-to-face courses, prepares candidates to pass the CISSP certification examination.
  • Hence, students have the option of getting a GIIM Certificate, ICCP Certification, Master’s Degree, and/or CISSP certification. This course does not count towards the GIIM Cyber Security Certificate.
  • This CISSP Preparation Course is not included towards the GIIM Certificate

Each online course, offered by GIIM, is 30-40 hours of class time.

Pricing Note: The tuition/fee for each course is $750 US; and the entire 4-course Certificate is $3,000 US. You only pay for one course at a time.
Face-to-Face training and Blended options are also available at a different rate. Kindly contact us for more details.

*ICCP Certificate Registration Fee: $299 per candidate successfully completing the 4-course GIIM Certificate

Course Category:
Cyber Security, Information Technology

Course Format:

Course Solution:

Course Price:

ICCP Certification