Skip to main content
  • W logoWestern Michigan University

W logoWestern Michigan University 

All Life is Learning

  • Professional Development

  •  Catalog Home
  •  View Cart
  •  Help
  •  Search
  •  Sign In

Professional Development

  •  Catalog Home
  •  Cart
  •  Help
  •  Search
  •  Sign In
Sign In  |  View Cart  |    |  Help  |  
Home
Return to Course Catalog

Course Catalog > Cybersecurity Courses

Cybersecurity Courses   

Review the cybersecurity course options below. Once you have made your selections, scroll to the bottom of the page and click "Next."
  • Certified Digital Forensics Examiner

  •  

  • Instructor: Alan Rea

    Capacity Remaining: 20

  • Dates: 3/4/2019 - 4/26/2019

    Times: 12:00 AM - 12:00 AM

  • Sessions: 0

    Days:

  • Building: Online

    Room: Online

  • The Certified Digital Forensics Examiner vendor neutral certification will train you in Cyber Crime and Fraud Investigators. You will learn electronic discovery and advanced investigation techniques. This course is essential to anyone encountering digital evidence while conducting an investigation. The Certified Digital Forensics Examiner course will benefit organizations, individuals, government offices, and law enforcement agencies interested in pursuing litigation, proof of guilt, or corrective action based on digital evidence. This course is ideal for security officers, police officers, police agents, attorneys, data owners, information technology managers and information systems managers. The course: - Has guided instruction - Has WMU faculty support and expertise - Provides two attempts to pass the certification exam - Course begins October 22, 2018

  • Please contact Carol Bale at (269) 387-4223 or email carol.bale@wmich.edu for more information.

 

  • Certified Information Systems Security Officer

  •  

  • Instructor: Alan Rea

    Capacity Remaining: 20

  • Dates: 1/7/2019 - 2/27/2019

    Times: 12:00 AM - 12:00 AM

  • Sessions: 0

    Days:

  • Building: Online

    Room: Online

  • The CISSO course addresses the broad range of industry best practices and the knowledge and skills expected of a security leader. You will learn both the theory and the requirements for practical implementation of core security concepts, practices, monitoring and compliance. Using a risk-based approach, you will be able to implement and maintain cost-effective security controls closely aligned with not only business requirements but also global industry standards. The course: - Has guided instruction - Has WMU faculty support and expertise - Provides two attempts to pass the certification exam - Begins October 22,2018

  • Please contact Carol Bale at (269) 387-4223 or email carol.bale@wmich.edu for more information.

 

  • Certified Information Systems Security Officer

  •  

  • Instructor: Alan Rea

    Capacity Remaining: 20

  • Dates: 3/4/2019 - 4/26/2019

    Times: 12:00 AM - 12:00 AM

  • Sessions: 0

    Days:

  • Building: Online

    Room: Online

  • The CISSO course addresses the broad range of industry best practices and the knowledge and skills expected of a security leader. You will learn both the theory and the requirements for practical implementation of core security concepts, practices, monitoring and compliance. Using a risk-based approach, you will be able to implement and maintain cost-effective security controls closely aligned with not only business requirements but also global industry standards. The course: - Has guided instruction - Has WMU faculty support and expertise - Provides two attempts to pass the certification exam - Begins October 22,2018

  • Please contact Carol Bale at (269) 387-4223 or email carol.bale@wmich.edu for more information.

 

  • Certified Penetration Testing Engineer

  •  

  • Instructor: Jason Johnson

    Capacity Remaining: 20

  • Dates: 1/7/2019 - 2/27/2019

    Times: 12:00 AM - 12:00 AM

  • Sessions: 0

    Days:

  • Building: Online

    Room: Online

  • The CPTE training presents information based on the “5 Key Elements of Pen Testing:” Information Gathering, Scanning, Enumeration, Exploitation and Reporting. You will learn to discover the latest vulnerabilities using these techniques. This course also enhances the business skills needed to identify protection opportunities, justify testing activities and optimize security controls to reduce risk associated to working with the internet. This course is ideal for pen testers, ethical hackers, network auditors, vulnerability assessors and security and information systems managers. The course: - Has guided instruction - Has WMU faculty support and expertise - Provides two attempts to pass the certification exam - Course begins on October 22, 2018

  • Please contact Carol Bale at (269) 387-4223 or email carol.bale@wmich.edu for more information.

 

  • Certified Penetration Testing Engineer

  •  

  • Instructor: Jason Johnson

    Capacity Remaining: 20

  • Dates: 3/4/2019 - 4/26/2019

    Times: 12:00 AM - 12:00 AM

  • Sessions: 0

    Days:

  • Building: Online

    Room: Online

  • The CPTE training presents information based on the “5 Key Elements of Pen Testing:” Information Gathering, Scanning, Enumeration, Exploitation and Reporting. You will learn to discover the latest vulnerabilities using these techniques. This course also enhances the business skills needed to identify protection opportunities, justify testing activities and optimize security controls to reduce risk associated to working with the internet. This course is ideal for pen testers, ethical hackers, network auditors, vulnerability assessors and security and information systems managers. The course: - Has guided instruction - Has WMU faculty support and expertise - Provides two attempts to pass the certification exam - Course begins on October 22, 2018

  • Please contact Carol Bale at (269) 387-4223 or email carol.bale@wmich.edu for more information.

 

  • Certified Professional Ethical Hacker

  •  

  • Instructor: Jason Johnson

    Capacity Remaining: 20

  • Dates: 1/7/2019 - 2/27/2019

    Times: 12:00 AM - 12:00 AM

  • Sessions: 0

    Days:

  • Building: Online

    Room: Online

  • The CPEH certification training enables you to understand the importance of vulnerability assessments. You will be able to understand how malware and destructive viruses function. In addition, the CPEH course helps students learn how to implement counter response and preventative measures when it comes to a network hack. This course is ideal for information systems owners, security officers, ethical hackers, system managers and cyber security engineers. The course: - Has guided instruction - Has WMU faculty support and expertise - Provides two attempts to pass the certification exam - Course begins October 22, 2018

  • Please contact Carol Bale at (269) 387-4223 or email carol.bale@wmich.edu for more information.

 

  • Certified Professional Ethical Hacker

  •  

  • Instructor: Jason Johnson

    Capacity Remaining: 19

  • Dates: 3/4/2019 - 4/26/2019

    Times: 12:00 AM - 12:00 AM

  • Sessions: 0

    Days:

  • Building: Online

    Room: Online

  • The CPEH certification training enables you to understand the importance of vulnerability assessments. You will be able to understand how malware and destructive viruses function. In addition, the CPEH course helps students learn how to implement counter response and preventative measures when it comes to a network hack. This course is ideal for information systems owners, security officers, ethical hackers, system managers and cyber security engineers. The course: - Has guided instruction - Has WMU faculty support and expertise - Provides two attempts to pass the certification exam - Course begins October 22, 2018

  • Please contact Carol Bale at (269) 387-4223 or email carol.bale@wmich.edu for more information.

 

Some Title



Alert
 

W logoWestern Michigan University

Extended University Programs
Western Michigan University
Kalamazoo MI 49008-5230 USA
(269) 387-4200