Cyber Security Training

Personal Interest and Development

Professional and Career Training

According to the Department of Homeland Security, Cyberspace and its underlying infrastructure are vulnerable to a wide range of risk stemming from both physical and cyber threats and hazards. Sophisticated cyber actors and nation-states exploit vulnerabilities to steal information and money and are developing capabilities to disrupt, destroy, or threaten the delivery of essential services. A range of traditional crimes are now being perpetrated through cyberspace. This includes the production and distribution of child pornography and child exploitation conspiracies, banking and financial fraud, intellectual property violations, and other crimes, all of which have substantial human and economic consequences.  

Chattanooga State Community College offers a selection of Cyber Security related courses for industry professionals looking to upgrade their skills or learn new skills.

Cyber Security Courses 

Complete End-user Cyber Security Training - $499.00

Series includes:

  • Cyber Security Awareness and Prevention 
  • Data Security Compliance 

The Cyber Security Awareness and Prevention course will teach you how to keep your network safe, how to stay safe on the internet, how to keep your email safe, how to use anti-virus software and much more. You will walk away from this training with a level of understanding that will let you apply the proper amount of digital protection to your home or office computer systems.

The Data Security Compliance course outlines important data security measures to be taken by individuals to protect sensitive data and PI. Some of the topics include how to prevent data breaches, safeguard, protecting your personal information and different types of breaches. The security measures outlined in this course not only protect the individual (mobile devices, etc) but also protect data up to the corporate level. These safe practices can prevent hacking into personal social media accounts up to hacking of sensitive corporate data and data breaches. Learn how to better protect yourself and your company by implementing these security measures into your usage.

Cyber Security & Forensics Certificate Series - $1,200.00

Series includes:

  • CHFI Computer Hacking Forensic Investigator
  • CEH Certified Ethical Hacker
  • Computer Hacking Forensic Investigator

CHFI certifies individuals in the specific security discipline of computer forensics from a vendor-neutral perspective. The CHFI certification will fortify the application knowledge of law enforcement personnel, system administrators, security officers, defense and military personal, legal professionals, bankers, security professionals, and anyone who is concerned about the integrity of the network infrastructure.

Certified Ethical Hacker (CEH)
The Certified Ethical Hacker (CEH) training course enables students to identify, counter and defend hackers from penetrating networks and gaining access to vital information. This will allow students to deploy proactive countermeasures and in turn, stay ahead of information security developments and exploited vulnerabilities. With this certification, professionals will gain a valuable credential commanding an average salary of over $100,000 per year. This course is also the prerequisite for the CHFI certification which will expand on the hacking techniques and lead into the area of cyber forensics and investigation. Topics included in this course are: DDOS Attacks, Detection, Policy Creation, Social Engineering, Virus Creation and Buffer Overflows to name a few.

IT Cyber Security Certificate Series - $1,300.00

Series includes:  

  • CISA Certified Information Systems Auditor
  • CISSP Certified Information Systems Security Pro
  • CISM Certified Information Security Manager

CISAs are recognized internationally as professionals with the knowledge, skills, experience and credibility to leverage standards, manage vulnerabilities, ensure compliance, offer solutions, institute controls and deliver value to the enterprise.  CISA job practice analysis has been completed by ISACA. This analysis resulted in a new CISA job practice which reflects the vital and evolving responsibilities of IT auditors. The new CISA job practice (identified below) was effective beginning with the June 2011 CISA exam administration.

Developed and maintained by the International Information Systems Security Certification Consortium (ISC)2, CISSP is a premium, vendor-neutral certification that recognizes mastery of an international standard for information security and understanding of a Common Body of Knowledge (CBK). The CISSP course provides you with the knowledge and skills to pass the CISSP certification, after which you’ll have the ability to manage, operate, develop and plan an effective network security infrastructure. This certification gives students the opportunity to demonstrate their level of competence with the various domains of the compendium of best practices for information security.

The Certified Information Security Manager (CISM) certification program was developed by ISACA to start or develop individual careers as security managers. Once certified the CISM qualifies students to design, manage, asses and oversee an enterprise’s information security infrastructure.  IT Security is without question one of the hottest and most lucrative areas of Information Technology today and the CISM is one of the most valued credentials in the marketplace. This Technology Institute course promotes international practices and provides management with assurance that those earning this designation have the necessary knowledge and experience to provide effective security management. This course trains students for a position in Risk Management, Security Auditor, Compliance Officer or an executive management position as a CSO, CTO or CIO.

For more information, please call (423) 697-3100.