An innovative partnership program between CareerBuilder and Capella Learning Solutions

Information Security

Hire an Information Security Specialist

6-8 Weeks
90 Day Guarantee

This course prepares job seekers for roles like information security specialist, cybersecurity specialist, information security administrator, information security analyst and IT specialist.

Practical Experience

Each RightSkill candidate will complete a series of projects to build a career portfolio that can be shared during interviews. This will include demonstrated information security best practices and how to apply these to on the job scenarios.

Verified Skills

To become a verified RightSkill candidate a job seeker must complete the Information for the IT Professional course by passing a comprehensive multiple-choice test to asses and verify their job-ready skills.

Job-Ready Guarantee

Once you hire one of our candidates, you’ll pay a fair RightSkill program fee and we’ll guarantee they have the skills to do the job. If our candidate does not meet your expectations within the first 90 days after hire we will replace them – at no charge.

Skills We Build, Assess and Verify

Managing information security using the CIA Triad and the Authentication, Authorization and Accounting framework

Design and implementation of security policies

Change management processes

Cryptography basics

Identification of and countermeasures for common security threats

Network Security design and technology

Business continuity and disaster recovery planning

Ethical, legal and regulatory considerations for information security

Course Outline

Fundamentals of Information Security
  • Confidentiality, integrity and availability (CIA Triad) framework
  • Implementing security policies
    Authentication, Authorization, and Accounting (AAA) framework
  • Security framework and design principles
Managing Risk in Organizations
  • Strategies for risk management
  • Identifying, measuring and assessing risk
  • Strategies for change management
Security Threats and Technologies
  • Basics of cryptography
  • Data classification
  • Uncovering common security threats
Network Security
  • Considerations for network security design
  • Determining appropriate security controls using baselines
  • Network security technology overview
Administrative & Technical Security Controls
  • Concepts and technologies of physical security
  • Business continuity planning
  • Disaster recovery best practices
  • Security awareness and training
  • Responding to incidents
  • Security monitoring and auditing
The Need for Information Security
  • Understanding the need for information security
  • Ethics
  • Legal and regulatory requirements
  • Protecting private citizen information

Get started with RightSkill today

Start Your Request