Information Technology Security Certificate Programme
Master the skills needed to protect critical IT systems and data. Our comprehensive ITS certification covers all areas of cybersecurity for information technology professionals.
Register Now
Return to Homepage
Program Overview
Comprehensive Curriculum
Covers computer hardware and software security, wireless communications, device security, cryptography, social engineering, virus detection, troubleshooting, disaster prevention/recovery, and risk analysis.
Prerequisites
5 CXC Certificates (Math and English mandatory) OR Mature Entry (21 years) with 2 years related work experience and relevant certifications.
Program Duration
15 Weeks of intensive training designed to prepare you for real-world cybersecurity challenges.
Core Knowledge Areas
Our curriculum covers essential cybersecurity domains to prepare you for industry challenges.
15
Training Weeks
Intensive hands-on curriculum
$7,200
Investment
All-inclusive program fee
Please note: Initial pricing excludes registration fees.
Payment plans available. Fee includes all materials, lab access, and certification exam vouchers.
Core Knowledge Areas
Network Security
Hardware firewalls, NAT, packet filtering, IDS/IPS, VPNs, DMZ implementation
Physical Security
Site perimeter safeguards, access control, PIDS, redundant power supplies
Wireless Security
IEEE standards, encryption keys, IoT networks, attack vectors
Device Security
IoT concepts, Bluetooth vulnerabilities, mobile device protection
Software Security
Malware protection, exploits, vulnerabilities, attack vectors
Cryptography
Authentication types, encryption algorithms, PKI, multi-factor authentication
Network Hardware Security
Network Firewalls
Learn about NAT, packet filtering, IDS/IPS, stateful and stateless firewalls, and inspection techniques.
Gateway Infrastructure
Master gateway servers, routers, switches, VPNs, and various proxy types including reverse, transparent, and anonymous proxies.
DMZ Implementation
Understand network "Demilitarized Zones" and perimeter network services including VPN, internet access, and application access.
Data Redundancy
Learn RAID arrays, server clustering, and failover cluster solutions to ensure data availability.
Wireless & Device Security
IEEE Standards
Understand wireless encryption keys, TKIP, AES, CCMP, and SSID configuration.
IoT Networks
Learn security best practices for mesh networks including Bluetooth, ZigBee, RFID, and Z-Wave.
Mobile Security
Identify vulnerabilities of iOS and Android devices, risks of jailbreaking, and mobile malware types.
Attack Mitigation
Protect against wireless attacks including Evil Twin WAPs, Wardriving, and Bluetooth exploits.
Cryptography & Social Engineering
Cryptography Fundamentals
Three types of authentication: password, smartcard, and biometrics
Asymmetric and symmetric key encryption
Encryption algorithms and block ciphers
Hashing techniques including SHA and MD5
Public Key Infrastructure (PKI) and X.509 standard
Social Engineering Threats
Phishing attacks including smishing and vishing
Baiting, pretexting, and scareware attacks
Email spoofing and advanced persistent threats
Watering hole attacks and intimidation tactics
Countermeasures and employee training programs
Disaster Recovery & Risk Management
Risk Assessment
Learn to identify forms of security risk, develop assessment plans, and implement risk monitoring and control procedures.
Operational Standards
Master access authentication policies, authorization procedures, separation of duties, and mandatory vacation protocols.
Disaster Planning
Develop comprehensive disaster recovery plans including continuity of operations planning, secure recovery, and backup procedures.
Computer Forensics
Understand cyberforensics techniques including cross-drive analysis, forensic feature extraction, and incident handling procedures.
Enroll Today
Flexible Payment Options
We offer flexible payment plans, partial scholarships, and JMMB Express Financing to make your education accessible.
Career Opportunities
ITS-certified specialists are in high demand across industries to protect critical systems and data from evolving threats.
Contact Us
Email Us
Reach our marketing team directly for program inquiries and enrollment information.
Marketing@astitnt.com
Call Today
Speak with our IT security specialists to discuss certification options.
1 (868) 610-7500
WhatsApp
Message us for quick responses about course schedules and prerequisites.
+1 (868) 778-2135
Visit Us
Tour our facilities and meet our instructors in person.
#46 Boundary Road, San Juan