CIE Student Area

Computer Security Specialist Course

Learn how to design, install and manage computer security systems.

CIE's distance education Computer Security Specialist course was designed to provide the specialized knowledge required for a career in Cyber Security. This field is growing rapidly as cyber attacks on business and government servers become more common.

Learn about emerging cyber security technologies and get started on a new and exciting career path!

After you complete this program you'll receive a Certificate along with the opportunity to prepare for the CompTIA Security+ certification.

Special Offer! Enroll $15 down | Save 35% | FREE Mug | $10 Bookstore Voucher

  • Enroll on-line in Course 6C for only $15 down.
  • Save 35% off standard tuition.
  • FREE CIE Mug after 10 lessons.
  • FREE $10 Bookstore Voucher upon enrolling.
  • No Risk Trial Period with a Money Back Pledge if not 100% satisfied. Learn more.
  • Includes educational resources like instructor support, a video library and online exams.
  • Low monthly payments of $50.
  • Call (800) 243-6446 with any questions or e-mail us.
  • Courses available to residents of the United States, Australia and countries located in North America. Ohio residents will be enrolled under standard tuition rates.


Course Title


Down Payment

Total Finance

Finance Charge

Annual % Rate

Total Payments

Monthly Installments

Final Installment

Computer Security
12 @ $75

What You Will Learn

  • Identify threats to a computer network
  • How to defend against DoS attacks
  • Install, design, and implement a virtual private network
  • How to analyze log files for network forensics
  • Master concepts of firewalls and VPNs
  • Tools used by hackers
  • How to protect against industrial espionage
  • Understand cyber terrorism
  • How to implement strategies to defend networks from outside attacks


Course Objectives

This distance learning course will allow you to master computer security techniques in an easy-to-understand format. Students learn to design and implement computer security systems and related protocols in different settings.

1. Computer Security
Computer Security Specialist online course This module brings together all the basic concepts, terminology and practical skills essential to security.

Learn core topics such as vulnerability assessment, virus attacks, buffer overflow, hacking, spyware, network defense, Intrusion Detection Systems, and passwords.

Topics will also fully address more specialized issues, including cyber terrorism, industrial espionage and encryption including public/private key systems, digital signatures, and certificates.

2. Firewalls and VPNs
Master concepts of firewalls and VPNs along with techniques used to attack hosts and networks. The course discusses TCP/ IP protocol suites and basic firewall requirements.

Step-by-step guidelines for installation, designing, and implementing a virtual private network are described. Analyzing log files for network forensics is presented and discussed.

3. Security Policies and Awareness
Cover all of the need-to-know information about staying secure, including maintaining a secure environment and how to avoid security attacks.

Topics presented for discussion include: Introduction to Security; Desktop Security; Internet Security; Personal Security; Wireless Network Security; and Enterprise Security.

The goal is to increase the understanding of information security issues and practices in the home or in the office.

Open Enrollment Policy

CIE has an open enrollment policy so you can start this program at anytime.

One of the advantages of enrolling with CIE is that you can study at your own pace. Some students go through the program slowly, others at an accelerated level so we can accommodate almost any arrangement that suits you best.

  • 35 lessons
  • Completion Time Allowed: 8 Months
  • Clock hours: 270


Career Outlook

Computer security specialists plan, coordinate, and maintain an organization’s information security. They install security software, monitor networks for security breaches, protect the integrity of data files, respond to cyber attacks, and in some cases, gather data and evidence to be used in prosecuting cyber crime.

The demand for computer security specialists have increased in recent years as cyber attacks have become more sophisticated. According to the U.S. Bureau of Labor Statistics (BLS), employment of information security analysts nationwide is projected to grow by 22% from 2010 through 2020, which is faster than the 14% average growth rate for all occupations.

Discover the CIE Advantage

Graduate with a Diploma in IT SecurityCIE makes it easy to get your computer training started with absolutely no risk to you while providing you with all the assistance you’ll need to succeed.

  • Over 80 Years of Distance Learning Experience
    Earn a Diploma from a school that has been teaching via distance learning for over 80 years.

  • Take Your Exams Online
    The course material is sent to your home and you can take your exams from home on our e-grade web site.

  • Full Time Instructor Assistance
    Contact our instructors anytime you have a question with your course work. They’ll help guide you through your studies one-one-one so you never have to study alone.

  • Distance Education
    Study at times that are most convenient for you with our generous time allotment to complete this course (12 months).

  • FREE CIE Mug
    You will get a FREE CIE Mug sent to you after you complete 10 lessons! Great for your coffee break this attractive mug is black with a gold CIE seal.

  • FREE $10 Bookstore Voucher
    All students will receive a $10 CIE Bookstore Voucher to use on any item found at the web site This is valid immediately upon registration and can be used on orders over $25.


Computer Security

  Introduction to Computer Security
    • Identify threats to a computer network.
    • Perimeter and/or layered approaches to network security.
    • Use online resources to secure your network.

  Networks and the Internet
    • Identify each of the major protocols used in network communication.
    • Explain the use of firewalls and proxy servers.

  Cyber-stalking, Fraud and Abuse
    • Internet investment scams, auction frauds, identity theft, cyber stalking.
    • Know what laws apply to these computer crimes.

  Denial-of-Service Attacks
    • Understand how denial-of-service (DoS) attacks are accomplished.
    • Know how to defend against specific DoS attacks.

    • Understand viruses and Trojan horses and how they propagate.
    • Learn working knowledge of several specific virus outbreaks.
    • Defend against various attacks.

  Project 1
    • Case problems from preceding chapters

  Techniques Used by Hackers
    • Hacker methodology and their mentality.
    • Tools used by hackers

Industrial Espionage in Cyberspace
    • Industrial espionage.
    • Protecting a system from espionage.

    • Encryption and modern cryptography methods.
    • Protocols of VPNs.

  Computer Security Software
    • Choose the best type of firewall for an organization.
    • Employ intrusion detection systems to detect problems.

  Project 2
    • Case problems from preceding chapters

  Security Policies
    • Recognize the importance of security policies
    • Evaluate and improve existing policies.

  Network Scanning and Vulnerability Scanning
    • Conduct basic system reconnaissance.
    • Use port monitoring utilities.

  Cyber Terrorism and Information Warfare
    • Understand cyber terrorism.
    • Locate court and criminal records on the web.

  Introduction to Forensics / Project 3
    • Case problems from preceding chapters

Security Policies and Awarenesss

  Introduction to Security
    • Challenges of securing information
    • Types of attackers that are common today
    • The steps in a defense and a comprehensive defense strategy

  Desktop Security
    • The different types of hardware and software attacks
    • Types of desktop defenses
    • How to recover from an attack

  Internet Security
    • How the World Wide Web and e-mail work
    • The different types of Internet attacks
    • The defenses used to repel Internet attacks

  Personal Security
    • Attacks on personal security
    • The dangers of identity theft
    • The defenses against personal security attacks

  Wireless Network Security
    • What a network is and the different types of networks
    • The different attacks that can be launched against a wireless network
    • The steps necessary to secure a wireless network

  Enterprise Security
    • How redundancy planning and disaster recovery planning benefit on organization
    • What a policy is and how it is used
    • The different types of security policies

  Case Project 1
    • Practical case studies from chapters 1 to 3

  Case Project 2
    • Practical case studies from chapters 4 to 6

Firewalls and VPNs

  Introduction to Information Security
    • Key terms of information and network security
    • Identify and differentiate the threats posed to information and network security

  Security Policies and Standards
    • Information security policy
    • Information security management practices

  Authenticating Users
    • Perimeter defense and the process of firewall authentication
    • Centralized authentication systems

  Project 1
    • Case problems from preceding chapters

  Introduction to Firewalls
    • Identify common misconceptions about firewalls
    • Understanding firewalls

  Packet Filtering
    • Approaches to packet filtering
    • Configure specific filtering rules based on business needs

  Firewall Configuration and Administration
    • Firewall configuration strategies
    • Firewall protect network resources
    • Responding to security incidents

  Project 2
    • Case problems from preceding chapters

  Working with Proxy Servers and Application-Level Firewalls
    • Proxy servers and their function
    • Proxy server configurations
    • When a proxy server is not the correct choice

  Implementing the Bastion Host
    • Installing a bastion host
    • Positioning the bastion host
    • Establish a baseline performance level and audit procedures

  Encryption – The Foundation for the Virtual Private Network
    • Learn the role encryption plays in firewall and VPN architectures
    • Internet Protocol Security (IPSec)

  Setting Up a Virtual PrivateNetwork / Project 2
    • Explain the components and essential operations of virtual private networks (VPNs)
    • Configuration and maintenance of VPNs
    • Case problems from preceding chapters.

End of Lessons Required for Certificate.

Once you finish all 35 lessons you’ll have earned a Certificate in Computer Security and the confidence necessary to start a new career.

Student Textbook Responsibilities

Students are responsible for purchasing a limited number of textbooks for this course that are not included in tuition. Please call an Admissions Advisor at (800) 243-6446 if you have any questions.



State Board of Career Colleges and Schools Approval

Approved by the Ohio State Board of Career Colleges and Schools to offer postsecondary programs of electronics technology, computer technology and electronic engineering technology. Registration Certificate 70-11-0002H.


BBB Accredited Business Cleveland Institute of Electronics

Cleveland Institute of Electronics has been an accredited business with the Better Business Bureau since 1964 with an outstanding rating.

A Better Business Bureau Accredited Business rating means the Better Business Bureau has determined that the business meets accreditation standards, which include a commitment to make a good faith effort to resolve any consumer complaints.