|
Certification |
|

|
*Free for (ISC)² Members/Associates by logging in above and clicking "My Courses". With an ever-increasing list of global data protection regulations, it is more important than ever for security professionals to ensure privacy is at the forefront of security practices. Laws and regulations require companies protect data and personal information. Violations can carry stiff penalties and fines. In this Immersive course, join the team at SemiSwiss as they experience the impact of violating a data protection regulation, and learn the steps to remediate and improve business practices. As you work through the course, you will be introduced to a variety of regulations and security frameworks as well as presented some best practices for incorporating privacy principles into security.
|
|

|
*Gratis para los miembros/socios de (ISC)² si inician sesión arriba y hacen clic en “Mis cursos”. DevSecOps reduce la brecha entre la seguridad y la agilidad, incorporando la seguridad en el ciclo de DevOps y convirtiéndola en una parte integral del proceso. Esta experiencia de capacitación interactiva e inmersiva para hacer a su propio ritmo aprovecha el liderazgo intelectual de expertos de la industria para brindar a los profesionales de la seguridad un panorama detallado de la seguridad de DevOps para lograr DevSecOps. Los participantes recibirán 5 créditos de CPE para su credencial de (ISC)2 después de completar el curso de manera satisfactoria.
|
|

|
*Free for (ISC)² Members/Associates by logging in above and clicking "My Courses". Ransomware is a type of malware that limits users from accessing their system, while demanding a ransom payment. It is becoming a large problem around the world. Victims are at risk of temporary and permanent data loss. In this Express Learning course, learn the major distinctions between ransomware and malware, the key characteristics of ransomware attacks, and the protection strategies and remediation plans for ransomware attacks that should be in place ahead of time.
|
|

|
*Gratis para los miembros/socios de (ISC)² iniciando sesión arriba y haciendo clic en "Mis cursos". El análisis forense de datos se utiliza para recuperar e investigar evidencia digital que se utilizará en un tribunal en relación con delitos, que incluyen fraude, espionaje, acoso cibernético, robo de datos o delitos violentos. La evidencia forense digital está sujeta a las mismas normas que la evidencia física, lo que significa que debe ser auténtica, admisible y haberse obtenido de manera confiable. Es fundamental que los profesionales de la seguridad comprendan las dificultades técnicas, legales y administrativas que enfrenta el análisis forense de datos para proteger la información reunida antes de entregarla para su análisis y garantizar que la evidencia se sostenga en un tribunal. Este curso de aprendizaje rápido explica el proceso científico del análisis forense digital, los métodos de adquisición de datos, y los principios de manipulación y conservación de la evidencia digital.
|
|

|
*上記でログインして「マイコース」をクリックすると、(ISC)²会員/アソシエイトは無料で利用できます。データフォレンジックは、詐欺、スパイ行為、サイバーストーキング、データ盗難、または暴力犯罪などの犯罪について法廷で使用されるデジタル証拠を回復および調査するために使用されます。デジタルフォレンジックの証拠は、物理的な証拠と同じ基準で扱われます。つまり、本物であり、許容され、確実に取得できるものである必要があります。証拠が法廷で扱われることを保証するために分析に引き渡される前に収集された情報を保護するため、セキュリティ専門家がデータフォレンジックにおいて直面する技術的、法的、および管理上の課題を理解することが重要です。このエクスプレスラーニングコースでは、デジタルフォレンジックの科学的プロセス、データ取得方法、デジタル証拠の処理と保存の原則について説明します。
|
|

|
*Free for (ISC)² Members/Associates by logging in above and clicking "My Courses." A Zero Trust security model, when implemented by an organization, reduces external and internal threats to systems and data. Preparing for a Zero Trust initiative is paradigm shifting for organizations that are migrating to the Cloud and/or transforming legacy network-based controls for Authentication (AuthN) and Authorization (AuthZ). This course prepares you to be successful by presenting foundational principles, threat scenarios, reference architectures, and a policy governance framework that can be applied to reduce risk.
|
|

|
*Free for (ISC)² Members/Associates by logging in above and clicking "My Courses." Although it’s been a growing trend in business circles over the past decade, the subject of remote work has become an increasingly important topic for businesses since early 2020. The increased availability of portable, inexpensive, and highly capable computing and communications technology combined with nearly ubiquitous internet availability means employees no longer need to be constrained within the confines of a corporate office to get their work done using a company’s systems and data. For many workers, all that is needed is a mobile phone or laptop and access to a local internet access point and they have an office, whether that’s in a company building, at home, in a neighborhood café, or at a tropical resort.
|
|

|
*Free for (ISC)² Members/Associates by logging in above and clicking "My Courses". Data forensics is used to recover and investigate digital evidence to be used in court for crimes including fraud, espionage, cyberstalking, data theft, or violent crimes. Digital forensics evidence is held to the same standards as physical evidence, which means that it must be authentic, admissible, and reliably obtained. It is critical that security professionals understand the technical, legal, and administrative challenges facing data forensics in order to protect the information gathered prior to it being turned over for analysis to ensure the evidence holds up in a court of law. This Express Learning course explains the digital forensics scientific process, data acquisition methods, and digital evidence handling and preservation principles.
|
|

|
*Gratis para miembros / asociados de (ISC)² iniciando sesión arriba y haciendo clic en "Mis cursos". La inteligencia artificial (IA) continúa prevaleciendo en la vida personal y laboral de los profesionales en seguridad, incluyendo muchas aplicaciones familiares y altamente visibles, así como otras que operan detrás de bambalinas y no son tan obvias. Este curso presenta los detalles de la ciencia de los datos en IA, sus marcos y lenguajes, y los desafíos que los profesionales en seguridad enfrentan cuando trabajan con equipos de desarrollo de IA.
|
|

|
*(ISC)²会員/準会員の方は、上記ログイン後、「My Courses(マイコース)」をクリックすることで無料でご利用いただけます。人工知能(AI)はセキュリティ専門家の個人的な生活や仕事の中で普及し続けており、身近で目に見えるアプリケーションもあれば、あまり目立たないアプリケーションもあります。 このエクスプレス学習コースでは、AIにおけるデータサイエンスの詳細、フレームワークや言語、セキュリティ専門家がAI開発チームと仕事をする際に直面する課題などを紹介します。このコースでは、AI上の開発で現在使用されている概念、フレームワーク、言語、および直面する可能性のあるセキュリティ上の問題について、入門的な知識を身につけることができます。
|
|

|
*(ISC)² のメンバーおよびアソシエイトは、上からログインし、「My Courses」をクリックすれば無料でアクセスできます。人工知能 (AI) は、既に情報セキュリティに従事する人々によりプライベートや職場で幅広く使用されています。数多くの見慣れたアプリケーションだけでなく、私たちの見えない所やあまり知られていないような形でも活用されています。この分野の拡大に伴い、AI の検討されている、または実際の導入化に関するディスカッションに参加できるようになるには、この変化し続ける分野の関連用語やテクノロジーの理解を深めておくとよいでしょう。このエクスプレスラーニングコースでは、ディープラーニングや機械学習、AI ニューラルネットワーク、自然言語処理など、AI テクノロジーのスペクトラムに関連する用語について学ぶほか、こうしたテクノロジーの現時点での実用化についてもいくつかご紹介します。
|
|

|
*Free for (ISC)² Members/Associates by logging in above and clicking "My Courses". In today’s app-enabled world it is more important than ever for security practitioners to work with their organization to ensure their digital assets are adequately protected against attacks. In most cases, the internet-facing application is the primary target for attackers. Applications, when not properly hardened and secured, create the entryway for criminals to gain access to sensitive data or even allow for the complete compromise of the underlying system. Whether the application is bought, built or acquired it is important to consider its vulnerabilities and the types of attacks that might be used to exploit them. This course will explore the foundations of how to assess an application’s security.
|
|

|
*Free for (ISC)² Members/Associates by logging in above and clicking "My Courses". Mobile devices have become the central hub allowing anywhere, anytime access to information. Consequently, these devices have become targets for cyber criminals and a huge management issue for security practitioners. This course provides an introduction to mobile security, explores the unique challenges facing mobile security, and instruction on how to secure the mobile infrastructure of your organization.
|
|

|
*Free for (ISC)² Members/Associates by logging in above and clicking "My Courses". This Express Learning course provides an overview of Big Data components, architectures and applications. Cybersecurity professionals will learn to apply the concept of data flows to gain insights on how to help defend their organizations by successfully managing and analyzing large amounts of data.
|
|

|
*Free for (ISC)² Members/Associates by logging in above and clicking "My Courses". In this Express Learning course, you will learn more about the history of AI and the related ethical principles and will apply select thought experiments to modern issues and technology, including AI. As a security professional, you’ll consider the role ethics plays in the development and uses of AI and examine the ways bias and fairness will help to shape the role of AI in future applications.
|
|

|
*Free for (ISC)² Members/Associates by logging in above and clicking "My Courses". As manufacturing becomes more automated, digitized and network-enabled the risks and attack surfaces increase. Industrial control systems (ICS) deployment and usage is expanding and cybersecurity professionals need to be more aware of the area and the implications for security. This Immersive Course explores the fundamental concepts around security concerns within industrial control systems (ICS) helping the learners understand how ICS supports critical infrastructure and the global need for ICS security, as it proliferates in various industries.
|
|

|
*Free for (ISC)² Members/Associates by logging in above and clicking "My Courses". Navigating the various privacy legislations and ensuring compliance requires not only knowledge of the law, but how frameworks can be utilized to ensure privacy is at the forefront of security practices. In this course, participants examine global privacy legislation and learn the importance of identifying and complying with privacy laws and regulations that apply to their industry and customer base. Course content breaks down the practical application of privacy legislation to the cybersecurity professional and provides a systematic plan for incorporating privacy into cybersecurity practices.
|
|

|
*Free for (ISC)² Members/Associates by logging in above and clicking "My Courses".
The dramatic and rapid growth in the deployment of the Internet of Things (IoT) creates mounting cybersecurity concerns. The skills and knowledge needed to manage those concerns will only grow in demand. This Immersive course provides a broad overview of IoT. Learners will be presented with the challenges involved in defining the IoT landscape and how that influences cybersecurity vulnerabilities within the complex, distributed, and often unmanaged IoT ecosystem.
The course surveys existing bodies of work in IoT security in order to better understand issues like data privacy and safety. Learners will leave with a clearer picture of the overall state of the IoT industry in terms of approaches to cybersecurity governance.
|
|

|
*Free for (ISC)² Members/Associates by logging in above and clicking "My Courses". The Intelligence Cycle is the primary process intelligence analysts use when creating intelligence. In this Express Learning course, cybersecurity professionals compare the various intelligence disciplines and learn to leverage the Intelligence Cycle to outline the when, why, and how of cyber events. At the end of this course, you will take on the role of a cyber intelligence analyst and learn to create a cyber intelligence product.
|
|

|
*Free for (ISC)² Members/Associates by logging in above and clicking "My Courses". Having an insurance policy that is expressly dedicated to covering cyber-related incidents is critical, but unfortunately, not all cyber-insurance policies are created equal. In this Express Learning course, participants navigate the ins and outs of cyber insurance and examine real-world examples to fully understand the scope of what the cyber-insurance policy covers, should an incident take place.
|
|