Online Training
Continuing education
Stay relevant and on top of the latest trends. Leverage our online courses to gain interactive, engaging and timely learning experiences throughout your career. Each course is designed with input from leading industry experts and based on proven learning techniques to maximize your time and content retention.
The self-paced learning format delivers modular content combined with interactive activities involving videos, labs, case studies, quizzes, etc. Learn at your own pace on your own time and earn valuable Continuing Professionals Education (CPE) credits towards your ISC2; certifications. (Note: Credits may be eligible for continuing education credits for non-ISC2 certifications. Please review the requirements established by the credentialing organization for eligibility.)
ISC2; Members and Associates have free unlimited access to courses that are denoted as ‘Free for Members’ by logging in above and clicking the ‘My Courses’ menu item.
For individual course purchases learners will have access to the course content for 180 days from the time of purchase. Please note, we do not offer time extensions for you to complete this training course.
For All Access and Express Learning Bundle purchases learners will have access to the course content for 365 day from the time of purchase. Please see course description for pricing and CPEs.
Certification | ||
Explore IT and OT perspectives, the inverted CIA triad and industrial control system (ICS) devices to support critical infrastructure and the need for ICS security at your organization. This course will guide you through the fundamental concepts around security concerns. (2 CPE)
|
||
Securing the IoT ecosystem is crucial to protect sensitive data, ensure privacy and mitigate potential risks. Learn how to identify threats, vulnerabilities and risks in IoT deployment, and what distinguishes direct and indirect safety hazards. (1 CPE)
|
||
Learn how to incorporate a variety of elements into an effective IoT cybersecurity plan, including risk assessment and management, security governance, and data strategy and life cycle management. (0.50 CPE)
|
||
Get strategies to navigate the exponential growth of IoT, harnessing its opportunities while safeguarding against risks through comprehensive security strategies. You'll gain key insights from real-world examples of IoT architectures and frameworks. (1 CPE)
|
||
IoT is a complex ecosystem of technologies, products and services applied across industries. This course explores IoT reference architectures and real-life examples, focusing on security vulnerabilities within IoT layers. (1 CPE)
|
||
Walk through eight steps to follow for implementing effective information security governance, risk and compliance (GRC). You’ll learn how to develop a comprehensive policy for your organization that addresses identified risks and vulnerabilities. (0.50 CPE)
|
||
Learn best practices for application programming interface (API) security, such as using secure protocols; implementing authentication and access controls; monitoring and logging API activity; and keeping software and libraries up to date. (0.50 CPE)
|
||
As cloud adoption is spread across on-premises and multicloud infrastructures, managing risk and maintaining compliance become even more complex. Get strategies to implement security controls to protect identities, data, resources and applications. (0.50 CPE)
|
||
Get an overview of risk management and its integration with cyber risk in a business context. You’ll learn risk assessment methodologies and the four main methods of risk treatment: avoidance, transfer, mitigation and acceptance. (0.50 CPE)
|
||
Governance, risk and compliance (GRC) is integral to your organization’s reputation. Hear from an industry expert what to consider when you’re making improvements to an existing GRC program or developing a new one that meets your organization’s unique requirements. (0.50 CPE)
|
||
The convergence of information technology (IT) and operational technology (OT) creates new attack vectors and requires a different approach to cybersecurity than traditional IT security. Explore the technologies and systems to consider when securing devices and processes. (0.50 CPE)
|
||
Learn the importance of mapping your supply chain and tracking inventory. Find out how to integrate these efforts into your risk management processes so you have a means to control risk at your organization — even when it’s out of your scope. (0.50 CPE)
|
||
Find out what open systems intelligence (OSINT) means, where to get started when using it and examples of what it looks like from a malicious actor's point of view. You'll be able to determine if OSINT being used against you, as well as where you might want to use it yourself. (0.50 CPE)
|
||
*Free for (ISC)² Members/Associates can access this course for free by logging into your Member Portal for more information.
In this learning experience, you’ll hear from an industry professional about popular GRC reports—what they mean, how they can help, how they might be misinterpreted, and what you can do to leverage them. By exploring the various GRC reports available, you will be able to better leverage these artifacts in the context of your organization.
|
||
Find out the differences between intrusion detection system (IDS) services in cloud-native environments and traditional data center IDS appliances. Gain the knowledge needed to harness the power of cloud-native approaches for scalable, cost-effective intrusion detection. (0.50 CPE)
|
||
Organizations use AI to help with recruiting; automating jobs and tasks; communicating policies; training employees; and responding to the needs of customers. This course explores potential uses for AI chatbot tools in the workplace and points to the potential dangers and benefits. (0.50 CPE)
|
||
With the growing complexity of supply chains, it’s more important than ever to keep yours safe and protected from cyberthreats. Information security governance, risk and compliance enables you to do just that. (0.50 CPE)
|
||
With the growing complexity of supply chains, it’s more important than ever to keep yours safe and protected from cyberthreats. Information security governance, risk and compliance enables you to do just that. (0.50 CPE)
|
||
Your cybersecurity strategy is your high-level plan for how your business will protect its assets and reduce cyber risk. What elements make up a cybersecurity strategy? Why is it important? Who are the key leaders and stakeholders? How is a strategy created and implemented? (0.50 CPE)
|
||
As a cybersecurity leader, you must determine how much to budget for cybersecurity, assess where to allocate those funds, and ensure you have enough skilled professionals in place to protect your organization’s digital assets and infrastructure. (0.50 CPE)
|