Certified Professional in Information Security Training
-- viewing nowInformation Security is a critical field that requires professionals to protect sensitive data from cyber threats. The Certified Professional in Information Security (CPIS) training program is designed for IT professionals and security enthusiasts who want to advance their careers in this field.
6,279+
Students enrolled
GBP £ 149
GBP £ 215
Save 44% with our special offer
About this course
100% online
Learn from anywhere
Shareable certificate
Add to your LinkedIn profile
2 months to complete
at 2-3 hours a week
Start anytime
No waiting period
Course details
Network Security Fundamentals: This unit covers the basics of network security, including network architecture, protocols, and security measures to protect against cyber threats. Primary keyword: Network Security, Secondary keywords: Cybersecurity, Information Security. •
Threat Intelligence and Vulnerability Assessment: This unit focuses on identifying and assessing potential threats to an organization's information security posture. Primary keyword: Threat Intelligence, Secondary keywords: Vulnerability Management, Cybersecurity. •
Cryptography and Encryption: This unit explores the principles and techniques of cryptography, including encryption methods, algorithms, and protocols. Primary keyword: Cryptography, Secondary keywords: Encryption, Cybersecurity. •
Incident Response and Disaster Recovery: This unit teaches students how to respond to and recover from security incidents, including disaster recovery planning and business continuity. Primary keyword: Incident Response, Secondary keywords: Disaster Recovery, Business Continuity. •
Cloud Security Architecture: This unit covers the security design and implementation of cloud-based systems, including cloud security models, compliance, and risk management. Primary keyword: Cloud Security, Secondary keywords: Cloud Computing, Information Security. •
Identity and Access Management (IAM): This unit focuses on the management of identities and access to sensitive resources, including authentication, authorization, and accounting. Primary keyword: Identity and Access Management, Secondary keywords: IAM, Cybersecurity. •
Penetration Testing and Vulnerability Exploitation: This unit teaches students how to simulate cyber attacks and identify vulnerabilities in an organization's information security posture. Primary keyword: Penetration Testing, Secondary keywords: Vulnerability Exploitation, Cybersecurity. •
Security Governance and Compliance: This unit covers the principles and practices of security governance, including risk management, compliance, and regulatory requirements. Primary keyword: Security Governance, Secondary keywords: Compliance, Risk Management. •
Data Protection and Privacy: This unit explores the principles and practices of data protection and privacy, including data encryption, access control, and data breach response. Primary keyword: Data Protection, Secondary keywords: Privacy, Cybersecurity. •
Secure Software Development Life Cycle: This unit teaches students how to design and develop secure software, including secure coding practices, testing, and validation. Primary keyword: Secure Software Development, Secondary keywords: Secure Coding, Cybersecurity.
Career path
| **Job Title** | **Description** |
|---|---|
| Cyber Security Analyst | Design and implement secure computer systems and networks, and respond to security incidents. |
| Information Security Manager | Develop and implement information security strategies, policies, and procedures to protect an organization's assets. |
| Penetration Tester | Simulate cyber attacks on computer systems and networks to test their security and identify vulnerabilities. |
| Incident Responder | Respond to and manage security incidents, such as data breaches and system compromises, to minimize damage and downtime. |
| Security Consultant | Provide expert advice and guidance on information security best practices, risk management, and compliance to organizations. |
Entry requirements
- Basic understanding of the subject matter
- Proficiency in English language
- Computer and internet access
- Basic computer skills
- Dedication to complete the course
No prior formal qualifications required. Course designed for accessibility.
Course status
This course provides practical knowledge and skills for professional development. It is:
- Not accredited by a recognized body
- Not regulated by an authorized institution
- Complementary to formal qualifications
You'll receive a certificate of completion upon successfully finishing the course.
Why people choose us for their career
Loading reviews...
Frequently Asked Questions
Course fee
- 3-4 hours per week
- Early certificate delivery
- Open enrollment - start anytime
- 2-3 hours per week
- Regular certificate delivery
- Open enrollment - start anytime
- Full course access
- Digital certificate
- Course materials
Get course information
Earn a career certificate