Top of Page
 

Professional Development

Stay relevant and on top of the latest trends. Leverage our online courses to gain interactive, engaging and timely learning experiences throughout your career. Each course is designed with input from leading industry experts and based on proven learning techniques to maximize your time and content retention.

The self-paced learning format delivers modular content combined with interactive activities involving videos, labs, case studies, quizzes, etc. Learn at your own pace on your own time and earn valuable Continuing Professionals Education (CPE) credits towards your (ISC)² certifications. (Note: Credits may be eligible for continuing education credits for non-(ISC)² certifications. Please review the requirements established by the credentialing organization for eligibility.)

(ISC)² Members and Associates have free unlimited access to courses that are denoted as ‘Free for Members’ by logging in above and clicking the ‘My Courses’ menu item.

For individual course purchases learners will have access to the course content for 180 days from the time of purchase. Please note, we do not offer time extensions for you to complete this training course.

For All Access and Express Learning Bundle purchases learners will have access to the course content for 365 day from the time of purchase. Please see course description for pricing and CPEs.

  Certification
Leveraging the Intelligence Cycle
*Free for (ISC)² Members/Associates by logging in above and clicking "My Courses". The Intelligence Cycle is the primary process intelligence analysts use when creating intelligence. In this Express Learning course, cybersecurity professionals compare the various intelligence disciplines and learn to leverage the Intelligence Cycle to outline the when, why, and how of cyber events. At the end of this course, you will take on the role of a cyber intelligence analyst and learn to create a cyber intelligence product.
Navigating Cyber Insurance
*Free for (ISC)² Members/Associates by logging in above and clicking "My Courses". Having an insurance policy that is expressly dedicated to covering cyber-related incidents is critical, but unfortunately, not all cyber-insurance policies are created equal. In this Express Learning course, participants navigate the ins and outs of cyber insurance and examine real-world examples to fully understand the scope of what the cyber-insurance policy covers, should an incident take place.
Securing Containers at the Speed of DevOps
*Free for (ISC)² Members/Associates by logging in above and clicking "My Courses". Containers allow for the creation of fast, repeatable, and secure deployment cycles for applications, making them an excellent fit for DevOps. This Express Learning course offers learners an overview of important security features and best practices to protect containerized services. Learn to describe containers and its main characteristics, then it delves into the most prominent security threats and countermeasures, and finally describing how to use automation and orchestration to do deploy containers in an automated and secure manner. 
A Security Professional's Guide to AI
*Free for (ISC)² Members/Associates by logging in above and clicking "My Courses". Artificial intelligence (AI) continues to become prevalent in the security professionals’ personal and work life, including many familiar and highly visible applications and others that are behind-the-scenes and not so obvious. This Express Learning course introduces the security professional to the details of data science in AI, its frameworks and languages and the challenges that security professionals face when working with AI development teams. It is designed to give you a primer of the concepts, frameworks and languages currently used in the development on AI and the security issues that you may face.
Techniques for Malware Analysis
*Free for (ISC)² Members/Associates by logging in above and clicking "My Courses". The ability to find and analyze malware has become a necessary skill for anyone performing incident response. This Express Learning course will introduce the various types and categories of malware and their characteristics. The course will also introduce broad categories of malware analysis and show you how to collect information about malware by examining its characteristics. Finally, you will learn how to execute malware and watch how it interacts with your system.
Técnicas para el análisis de malware
* Gratis para miembros o asociados de (ISC)²; iniciando sesión arriba y haciendo clic en Mis cursos. La capacidad de encontrar y analizar malware se ha convertido en una habilidad necesaria para cualquier persona que trabaje en la respuesta a incidentes. Este curso de aprendizaje exprés presentará los distintos tipos y las distintas categorías de malware y sus características. El curso también contendrá amplias categorías de análisis de malware y le mostrará cómo recopilar información sobre este software malicioso al examinar sus características. Finalmente, aprenderá cómo ejecutar el malware y verá cómo interactúa con su sistema.
Practical Intrusion Analysis Using the Diamond Model
*Free for (ISC)² Members/Associates by logging in above and clicking "My Courses". The Diamond Model provides security professionals a means to better understanding the enemy (adversary) as they work to identify the victims, capabilities, and infrastructure of a cybersecurity event. It also assists in understanding the adversary’s technology and social-political motivations and intentions. In this Express Learning course, you will take on the role of a cyber intelligence analyst and gain experience populating a Diamond Model following a cybersecurity event. Learn the core features of the Diamond Model and how to apply source information to communicate event details.
Web Application Penetration Testing
*Free for (ISC)² Members/Associates by logging in above and clicking "My Courses". In this Express Learning self-paced course, you will be introduced to the discipline of web application penetration testing and gain a hands-on perspective of how a penetration tester (pentester) applies methodology with practice to test web applications for security flaws. We will review several basic web application penetration testing techniques and gain hands-on experience as a penetration tester using a popular open source (FOSS) tool, Burp Suite. You will also learn to examine injection attacks such as cross-site scripting and SQL injection attacks and learn how to perform automated attacks with Intruder, as well as analyze responses with Repeater and Comparer.
Introduction to Artificial Intelligence (AI)
*Free for (ISC)² Members/Associates by logging in above and clicking "My Courses". Artificial intelligence (AI) is already prevalent in the information security professional’s personal and work life, both in many familiar and highly visible applications as well as in some behind-the-scenes and not so obvious ways. As this field continues to expand, it is beneficial to have an understanding of the related terms and technologies of this ever-changing field in order to participate in discussions about its use in potential and actual implementations. In this Express Learning course, participants will learn terminology related to the spectrum of AI technology, including deep learning, machine learning, AI neural networks, and natural language processing, and will be introduced to some of the current practical applications of these technologies.
Introducción a la Inteligencia Artificial (AI)
*Gratis para miembros / asociados de (ISC)² iniciando sesión arriba y haciendo clic en "Mis cursos". La inteligencia artificial (AI) ya predomina en la vida laboral y personal de los profesionales en seguridad informática, tanto en aplicaciones familiares altamente visibles como en algunos modos más ocultos y no tan obvios. A medida que este campo continúa extendiéndose, es útil comprender los términos relacionados y las tecnologías de este campo que está en constante movimiento para poder participar en discusiones sobre su uso en implementaciones reales y potenciales. En este curso de aprendizaje exprés, los participantes aprenderán términos relacionados con el espectro de la tecnología de AI, como el aprendizaje profundo, el aprendizaje automático, las redes neuronales de AI y el procesamiento de lenguajes naturales. Además, se les mostrarán algunas de las aplicaciones prácticas actuales de estas tecnologías.
Creating Your Path to CISO
*Free for (ISC)² Members/Associates by logging in above and clicking "My Courses". This interactive, immersive course guides you through a process of self-assessment, skill development, brand building and interview preparation to give you the tools you need to advance your security career.
CISO's Guide to Success
*Free for (ISC)² Members/Associates by logging in above and clicking "My Courses". You got the CISO. Now what? A New CISO’s Guide to Success Course Description: You reached your goal of becoming a CISO. Now what? This self-paced interactive and immersive training experience leverages thought leadership from industry experts to help you develop a plan for your first 30, 60 and 90 days in this new role.
Responding to a Breach
*Free for (ISC)² Members/Associates by logging in above and clicking "My Courses". This interactive, immersive course takes you inside a cybersecurity breach scenario and helps you design your own cybersecurity response plan.
DevSecOps: Integrating Security into DevOps
*Free for (ISC)² Members/Associates by logging in above and clicking "My Courses". DevSecOps bridges the gap between security and agility, building security into the DevOps cycle and making it an integral part of the process. This self-paced interactive and immersive training experience leverages thought leadership from industry experts to provide security professionals with a deep dive into securing DevOps to achieve DevSecOps. Participants will receive 5 CPEs toward their (ISC)² credential upon successful completion of the course.