Top of Page
 

Continuing education

Stay relevant and on top of the latest trends. Leverage our online courses to gain interactive, engaging and timely learning experiences throughout your career. Each course is designed with input from leading industry experts and based on proven learning techniques to maximize your time and content retention.

The self-paced learning format delivers modular content combined with interactive activities involving videos, labs, case studies, quizzes, etc. Learn at your own pace on your own time and earn valuable Continuing Professionals Education (CPE) credits towards your ISC2; certifications. (Note: Credits may be eligible for continuing education credits for non-ISC2 certifications. Please review the requirements established by the credentialing organization for eligibility.)

ISC2; Members and Associates have free unlimited access to courses that are denoted as ‘Free for Members’ by logging in above and clicking the ‘My Courses’ menu item.

For individual course purchases learners will have access to the course content for 180 days from the time of purchase. Please note, we do not offer time extensions for you to complete this training course.

For All Access and Express Learning Bundle purchases learners will have access to the course content for 365 day from the time of purchase. Please see course description for pricing and CPEs.

  Certification
This learning experience invites you to review the set of guiding principles for workflow, system design, and operations that create a zero trust architecture. (2.0 CPE)
This course invites you to review risk management and incident response in a zero trust environment.
This course invites you to review how zero trust implementation can strategically strengthen the security posture of an organization.
This course invites you to review the communication strategies and skills necessary for successful zero trust implementation.
This course invites you to review the communication strategies and skills necessary for successful zero trust implementation.
This learning experience invites you to review key aspects of implementing continuous monitoring and incident response within a Zero Trust framework. (1.0 CPE)
This learning experience invites you to review key aspects of implementing continuous monitoring and incident response within a Zero Trust framework. (1.0 CPE)
This learning experience invites you to review essential principles and best practices of zero trust vulnerability management, including asset discovery, risk-based trust assessment, and integration with policy enforcement mechanisms inherent to zero trust. (1.0 CPE)
This learning experience invites you to review essential principles and best practices of zero trust vulnerability management, including asset discovery, risk-based trust assessment, and integration with policy enforcement mechanisms inherent to zero trust. (1.0 CPE)
This learning experience invites you to review the set of guiding principles for workflow, system design, and operations that create a zero trust architecture. (2.0 CPE)
This learning experience prepares you to deliver relevant presentations to your board of directors to keep them engaged and prepared in the realm of cybersecurity. (1.0 CPE)
This learning experience invites you to build meaningful communication with the board of directors to leverage their expertise in cybersecurity events. (1.0 CPE)
This learning experience invites you to build meaningful communication with the board of directors to leverage their expertise in cybersecurity events. (1.0 CPE)
A strong Zero Trust strategy for identity requires a concerted effort from leadership to govern and enforce strategic initiatives. Learn to apply segmentation policies, employ the principle of least privilege access, and use analytics to help detect and respond quickly. (0.50 CPE)
This learning experience prepares you to understand and leverage the role of the board of directors in incident response. (1.0 CPE)
This learning experience prepares you to understand and leverage the role of the board of directors in incident response. (1.0 CPE)
This learning experience prepares you to deliver relevant presentations to your board of directors to keep them engaged and prepared in the realm of cybersecurity. (1.0 CPE)
*Free for (ISC)² Members/Associates can access this course for free by logging into your Member Portal for more information. This skill builder provides a summary of the recent report on cyber policy and legislation issued by the Royal United Services Institute and ISC2. This report details how governments around the world are addressing the increasingly complex and uncertain threat landscape. This learning experience positions cybersecurity leaders to leverage the report to make effective decisions in their own jurisdictions and beyond.
Denial of service and distributed denial of service cyberthreats are on the rise. Find out how to identify the different types of attacks, how they’re carried out and what measures you can take to protect your organization’s systems and data. (0.50 CPE)
Learn how testing, tools and human ingenuity can work together to safeguard systems and data from malicious attacks. By investing in software security, you can build trust with users, ensure compliance with industry standards and stay ahead of potential threats. (0.50 CPE)