Class Details

Course Includes:

  • Class exercises in addition to training instruction
  • Courseware books, notepads, pens, highlighters and other materials
  • Full breakfast with variety of bagels, fruits, yogurt, doughnuts and juice
  • Tea, coffee, and soda available all day
  • Freshly baked cookies every afternoon - * only at participating locations

This PTS training course is available online and in-person. The three-day instructor-led training experience provides foundational knowledge and skills on networking basics, cybercrime and security concepts, security procedures and threats that apply to the workplace. The course also addresses security vulnerabilities for wireless network access points, business transactions, and the use of mobile devices.

For group training options, please call us at (240) 667-7757 or email

Course Outline

Module 1: Information System Security

Module 2: Changing the Way People and Business do Business

Module 3: Malicious Attacks, Threats, and Vulnerabilities

Module 4: The Drivers of Information Security Business

Module 5: Access Controls

Module 6: Security Operations and Administration

Module 7: Auditing, Testing, and Monitoring

Module 8: Risk, Response, and Recovery

Module 9: Cryptography

Module 10: Networks and Communications

Module 11: Malicious Code and Activity

Module 12: Information Security Standards

Module 13: Information Security Education and Training

Module 14: Information Security Professional Certifications

Module 15: US Compliance Laws


At the conclusion of this course, students will be able to do the following:

  • Explain the concepts of information systems security as applied to an IT infrastructure
  • Describe how malicious attacks, threats, and vulnerabilities impact an IT infrastructure
  • Explain the role of access controls in implementing a security policy.
  • Explain the role of operations and administration in effective implementation of security policy.
  • Explain the importance of security audits, testing, and monitoring to effective security policy.
  • Describe teh principles of risk management, common response techniques, and issues related to recovery of IT systems.
  • Explain how businesses apply cryptography in maintaining information security.
  • Analyze the importance of network principles and architecture to security operations.
  • Explain the means attackers use to compromise systems and networks and defenses used by organizations.
  • Apply international and domestic information security standards and compliance laws to real-world implementation in both the private and public sector.