Information Security Specialists

Information Security Specialists

Get your certification as a "Information Security Specialist" - Information Security Specialists are in charge of developing and implementing security measures for their organization.

Information Security Specialist

Information Security (infosec) is a set of strategies for managing the processes, tools and policies necessary to prevent, detect, document and counter threats to digital and non-digital information. Infosec responsibilities include establishing a set of business processes that will protect information assets regardless of how the information is formatted or whether it is in transit, is being processed or is at rest in storage.

Infosec programs are built around the core objectives of the CIA triad: maintaining the confidentiality, integrity and availability of IT systems and business data. These objectives ensure that sensitive information is only disclosed to authorized parties (confidentiality), prevent unauthorized modification of data (integrity) and guarantee the data can be accessed by authorized parties when requested (availability).

Many large enterprises employ a dedicated security group to implement and maintain the organization's infosec program. Typically, this group is led by a chief information security officer. The security group is generally responsible for conducting risk management, a process through which vulnerabilities and threats to information assets are continuously assessed, and the appropriate protective controls are decided on and applied. The value of an organization lies within its information -- its security is critical for business operations, as well as retaining credibility and earning the trust of clients.

Threats to sensitive and private information come in many different forms, such as malware and phishing attacks, identity theft and ransomware. To deter attackers and mitigate vulnerabilities at various points, multiple security controls are implemented and coordinated as part of a layered defense in depth strategy. This should minimize the impact of an attack. To be prepared for a security breach, security groups should have an incident response plan (IRP) in place. This should allow them to contain and limit the damage, remove the cause and apply updated defense controls.

Course Overview:

This course provides the foundation for understanding the key issues associated with protecting information assets, determining the levels of protection and response to security incidents, and designing a consistent, reasonable information security system, with appropriate intrusion detection and reporting features. The purpose of the course is to provide the student with an overview of the field of information security and assurance. Students will be exposed to the spectrum of security activities, methods, methodologies, and procedures. Coverage will include inspection and protection of information assets, detection of and reaction to threats to information assets, and examination of pre- and post-incident procedures, technical and managerial responses, and an overview of the information security planning and staffing functions.

You will learn:

  • Information Security Terminology.
  • Introduction to Information Security.
  • Legal, Ethical, and Professional Issues Related to Information Security.
  • Security Policy and Procedures.
  • Information Security Components.
  • Identification, Assessment and Control of Risks Related to Information Security.
  • Defining key terms in information security terminology.
  • Learn the components and characteristics of an information system.
  • Identifying threats to an information system.
  • Identifying types of attacks to an information system.
  • Learn the laws relevant to information security.
  • Learn ethical and professional issues relevant to information security.
  • Identifying international laws and legal bodies.
  • Demonstrate an understanding of implementing security in systems' project management.
  • Discuss technical and non-technical topics of implementation.
  • Identify key physical threats to the information facility.
  • Identify and state the purpose of firewalls, intrusion detection systems and other security devices.
  • Identify cryptography and encryption-based solutions.
  • Identify access control devices.
  • State the steps in risk identification and assessment.
  • Identify risk control strategies.
  • Identify major security models.
  • The Need for Security
  • Planning for Security
  • Risk Management
  • Security Technology: Firewalls, VPNs, and Wireless
  • Security Technology: Intrusion Detection and Prevention Systems and Other Security Tools
  • Cryptography
  • Physical Security
  • Implementing Information Security
  • Security and Personnel
  • Information Security Maintenance and eDiscovery


This course is taught both as a self-paced online course as well as in a classroom setting.

What is included in the course:

  • Instruction by an expert facilitator
  • Online Assistance
  • Specialized manual and course materials

IT Security Specialist Salaries in the United States Salary estimated from 21,517 employees, users, and past and present job advertisements on Indeed in the past 24 months. Last updated: November 21, 2017





  • Course Discussion
  • Lesson Overview
  • Careers In IT Security

Chapter 1- The world of Information Security

  • Chapter 1- The world of Information Security
  • Chp 1 - Quiz

Chapter 2 - The Need For Security

  • Chapter 2 - The Need For Security

Chapter 3 - Issues in Information Security

  • Chapter 3 - Issues in Information Security

Chapter 4 - Planning For Security

  • Chapter 4 - Planning For Security

Chapter 5 - Risk Management


  • Chapter 5 - Risk Management
  • How to combat Employee Risk

Chapter 6 - Firewalls and VPNs


  • Chapter 6 - Firewalls and VPNs
  • Example Of Cisco Intrusion Prevention Systems
  • IDS and Firewall
  • SSH (Secure Shell)

Chapter 7 - Security Technology

  • Chapter 7 - Security Technology

Chapter 8 - Cryptography


  • Chapter 8 - Cryptography
  • What Are The Types Of Cryptography
  • Public Key Cryptography
  • Digital Certificates

Chapter 9 - Physical Security

  • Chapter 9 - Physical Security

Chapter 10 - Implementing Information Security

  • Chapter 10 - Implementing Information Security

Chapter 11 - Security and Personnel

  • Chapter 11 - Security and Personnel

Chapter 12 - Information Security Maintenance

  • Chapter 12 - Information Security Maintenance

Final Chapter

  • Final Projects


$500.00 Regular Price Buy $500.00
$800.00 Save $100 Buy Now

About Your Instructor

Udeme  Aaron

Udeme Aaron



  • Walden University – EdD in Education Technology
  • Capella University – MS in Information Security Systems
  • Mercer University – BS in Information Technology
  • Georgia Military College – AS in Criminal Justice

  • Proficient in Mobile Applications, Computer Network, Access Reporting, C# Programming, Comp 1000, PeopleSoft, C++, MS Project, Excel, Word, PowerPoint, Access, Outlook, Small Basic, VB, java, Oracle, WebCT, Blackboard, and Adobe Suites.


  • Adjunct Faculty (September, 2007-Present)
  • Atlanta Technical College
  • Teach a diverse group of nontraditional students, identifying different learning styles and meeting learning outcomes.
  • Participate in school retention initiatives by providing regular, accurate, and timely feedback to students and the school concerning academics, behavior, attendance, etc.
  • Recognized by lead faculty in the Computer Technology Department as being dedicated to students, willing to assist student development and “one of the most liked Technology teachers” on campus.
  • Motivate students to actively participate in all aspects of the educational process.
  • Complete professional development and in-service activities in accordance with college standards.
  • Incorporate and educate nontraditional students in SQL Background, Access Reporting, and development.
  • Design and deliver classroom materials such as the syllabus and learning materials.
  • Participate in Education Department meetings and continuing teacher education classes to further develop as a facilitator.
  • Teach material from approved curriculum and develops daily lesson plans to include instructional aids.

Adjunct Professor (July 2010-Ongoing)

Macon State College

  • Develop educational technology curriculum for delivery of classroom and online
  • coursework. Instruct online students in the grammar and writing skills necessary for success at the university level.
  • Design and deliver curriculum for online coursework, main newsgroups, online lectures, and learning teams.
  • Attend regular faculty meetings and continuing education opportunities including Learning Teams Workshop, Plagiarism Workshop, and Grading Evaluation and Feedback class.
  • Maintain expertise in subject area and recommends improvements in curriculum design.
  • Incorporate and educate nontraditional students in SQL Background, Access Reporting, development.
  • Research new and innovative applications and theories on technology.
  • Inspire students to integrate technology into daily classroom activities.
  • Restructure student attitudes regarding purpose and use of technology in classroom.
  • Plan and implement special university events with the proper coordination along with officials and community representatives.

Adjunct Instructor (December 2009-August 2016)

ITT Technical Institute

  • Develop and teach a full range of introduction to information systems, application software suites, computer science, web design and implementation, computer privacy and ethics.
  • Develop lesson plans and achieve cross-level customization of material and presentation.
  • Manage classroom of 80 students in an adult setting. Instruct students in laboratory safety procedures if applicable.
  • Perform duties in the Learning Resource Center as assigned.
  • Participate in core course academic support programs, certification programs, and student professional associations.
  • Utilize multiple methods of teaching to capture different learning styles and ensure student success.
  • Work with traditional and nontraditional college age students in a classroom Setting.

Asset Protection Detective (July 2007-Present)

Wal-mart Stores

  • Advise Management staff on the fiscal aspects of protecting and managing the safety of stores.
  • Oversee the implementation of associates and managers on how to follow asset protection procedures. Navigated program development practices, procedures, budgets, training, marketing, and evaluations for various programmatic offices designed to address areas such as management systems, training activities, education, therapeutic counseling, family dynamics, geriatric concerns.
  • Recommend and implement plans for deterrence and detention of shoplifting, accidents, and loss. Review available data to monitor asset protection processes and make recommendations to address deficiencies.
  • Coordinate controversial, unconventional, criminal case related matters between and among Federal, State, and City agencies to address criminal, civil, and internal investigations.
  • Perform and compile credit card chargeback data in report format to identify and evaluate transaction level losses.
  • Proficient use of CCTV media devices to include 24 hour VCR multiplexer and digital video editing.

IT Specialist (April 2005-July 2007)

Mercer University

  • Incorporate and educate nontraditional students in SQL Background, Access Reporting, development.
  • Coordinated the scheduling of 300+ required educational experiences for Continuing Education students and staff with emphasis and concentration in Microsoft Suites.
  • Utilized Blackboard and WebCT to facilitate web page development for course design and enhance its content by using flash, audio, and animation.
  • Manage IT and web projects with budgets up to $50 million across organizational teams of over 50 people.
  • Administer IT functions, software delivery processes, professional services, consulting and project management.
  • Manage methodologies that execute IT programs established for an organizational framework/oversight process.
  • Modify and maintain client websites, strong customer focus, and experience in internal consulting and customer account management.
  • Managed and maintained relational databases (Oracle, SQL Server, Sybase), C++, VB, Java, data models Program .NET framework including C#, ADO.NET, ASP.NET and stored procedures.
  • Develop, implement, integrate, and support application solutions such as rich client, web applications, and distribute systems.
  • Maintain A/V equipment for the standard up-keep at the regional centers and monitors the management, logging/tracking use of equipment, and equipment maintenance.
  • Develop web content for the university’s academic centers. Maintain the computerized database of individual preceptors and institutions participating in the experiential education program.

Tax Examining Technician (January 2006-September 2006)
Department of Treasury

  • Followed Internal Revenue Service (IRS) regulations, Revenue rulings, Revenue procedures, and the Internal Revenue Manual to determine how to accurately process 1040X Amended Returns and RAIVS requests for information.
  • Researched taxpayer’s tax account information using 1040X information, attachments, Integrated Data Retrieval System (IDRS) and Service wide Electronic Research Program (SERP) online research sources to math verify and make adjustments to the account.
  • Communicated information to taxpayers in a clear and understandable manner through correspondence according to Internal Revenue Manual procedures and disclosure guidelines.
  • Responded to taxpayer’s inquiries regarding the preparation of a variety of tax returns, related schedules and other documentation. Protected confidentiality of taxpayer’s information within the confines of disclosure laws, rules, and regulations.
  • Referred cases to Examination, Collection, Criminal Investigations, Appeals, or Counsel according to prescribed criteria. Informed supervisor of recurrent procedural or processing problems, and suggests new or revised procedures or methods.
  • Prioritized routed returns and efficiently organized work flow processes to insure timely processing of tax returns.
  • Received specialized training to analyze and process Statute returns using IDRS command code TXMODA to determine the ASCED date, math verify and route the return accordingly.
  • Selected to coach new tax examiners on RAIVS program procedures and conduct quality reviews which required giving both oral and written feedback based on Internal Revenue Manual references, disclosure rules and guidelines.
  • Developed 1040X Clerical programs to prescreen, sort, date and batch returns to be routed to the appropriate locations or worked by a tax examiner. Worked Code & Edit programs by researching, copying and stuffing extensions to file.

General Manager (January 1999- June 2005)

Junald Used Auto

  • Incorporate and educate employees in SQL Background, Access Reporting, development.
  • Responded to inquires and requests for information, data, and analyses. Coordinated with Legal Department, Procurement Office, Accounting Department, etc. to review &/or revise project/programmatic issues.
  • Served as the primary point of contact and conduit regarding the overall strategy and operation of parts for clients throughout the US and abroad.
  • Collaborated with major fortune 500 companies, small businesses, & government entities to link the ADP with international markets.
  • Responsible for membership recruitment, corporate development, marketing, sales, promotion, advertising, & moderate fund raising activities.