Secure online networks with Information Security skills.
Governors State University offers fully online courses through the School for Extended Learning (SXL) that will make you an asset to your organization as you protect their online presence from vulnerabilities. The shift to remote work has highlighted the need for Information Security Specialists, as cyber crime, hacking, spyware, and online scams are on the rise with increased online learning and remote work. “Increased telework will drive demand for information
technology (IT) and computer-related occupations, particularly those involved
in IT security,” says the Monthly Labor Review (bls.gov).
SXL offers a number of certification preparation programs that provide the necessary skills to support industry growth. Our on-site Testing Center makes it easy to complete the certification exams immediately following your course. Enroll today to gain the technical knowledge you need to succeed!
CompTIA Security+– Earn an average starting salary of $62,550RegisterCertified Ethical Hacker
Train to become an Information Security Specialist with this certificate that is designed to fully prepare students to sit for and pass the CompTIA™ Security+ Exam SY0-601 Certification exam. Perform network design security, risk calculations, penetration testing, and risk management. Implement device security, wireless security, static environment security, secure authentication methods, and authorization models. Manage attack types, mitigating malware, discovery tools, and security administrative principles. Information Security Specialists/technicians may move into managerial or supervisory roles, such as leading the IT department or move into related fields such as computer programming, interactive media development, web development or systems analysis. This course counts as credit for the CPSC-4580 Introduction to Security Networks course.
In this new self-paced online course, prepare to earn a
respected ethical hacking certification that will set apart
any information security professional! Topics include
incident management process, penetration testing,
network scanning techniques, system hacking, Trojans,
social engineering techniques, identify theft, and social
engineering countermeasures, wireless encryption,
vulnerability analysis, and more!Register
*Salaries listed are verified via Illinois O*Net.
The following programs are approved for WIOA funding:
For additional payment options, visit our ways to pay page.