|
Certification |
|

|
*(ISC)² のメンバーおよびアソシエイトは、上からログインし、「My Courses」をクリックすれば無料でアクセスできます。人工知能 (AI) は、既に情報セキュリティに従事する人々によりプライベートや職場で幅広く使用されています。数多くの見慣れたアプリケーションだけでなく、私たちの見えない所やあまり知られていないような形でも活用されています。この分野の拡大に伴い、AI の検討されている、または実際の導入化に関するディスカッションに参加できるようになるには、この変化し続ける分野の関連用語やテクノロジーの理解を深めておくとよいでしょう。このエクスプレスラーニングコースでは、ディープラーニングや機械学習、AI ニューラルネットワーク、自然言語処理など、AI テクノロジーのスペクトラムに関連する用語について学ぶほか、こうしたテクノロジーの現時点での実用化についてもいくつかご紹介します。
|
|

|
*Free for (ISC)² Members/Associates by logging in above and clicking "My Courses". In today’s app-enabled world it is more important than ever for security practitioners to work with their organization to ensure their digital assets are adequately protected against attacks. In most cases, the internet-facing application is the primary target for attackers. Applications, when not properly hardened and secured, create the entryway for criminals to gain access to sensitive data or even allow for the complete compromise of the underlying system. Whether the application is bought, built or acquired it is important to consider its vulnerabilities and the types of attacks that might be used to exploit them. This course will explore the foundations of how to assess an application’s security.
|
|

|
*Free for (ISC)² Members/Associates by logging in above and clicking "My Courses". Mobile devices have become the central hub allowing anywhere, anytime access to information. Consequently, these devices have become targets for cyber criminals and a huge management issue for security practitioners. This course provides an introduction to mobile security, explores the unique challenges facing mobile security, and instruction on how to secure the mobile infrastructure of your organization.
|
|

|
*Free for (ISC)² Members/Associates by logging in above and clicking "My Courses". This Express Learning course provides an overview of Big Data components, architectures and applications. Cybersecurity professionals will learn to apply the concept of data flows to gain insights on how to help defend their organizations by successfully managing and analyzing large amounts of data.
|
|

|
*Free for (ISC)² Members/Associates by logging in above and clicking "My Courses". In this Express Learning course, you will learn more about the history of AI and the related ethical principles and will apply select thought experiments to modern issues and technology, including AI. As a security professional, you’ll consider the role ethics plays in the development and uses of AI and examine the ways bias and fairness will help to shape the role of AI in future applications.
|
|

|
*Free for (ISC)² Members/Associates by logging in above and clicking "My Courses". Navigating the various privacy legislations and ensuring compliance requires not only knowledge of the law, but how frameworks can be utilized to ensure privacy is at the forefront of security practices. In this course, participants examine global privacy legislation and learn the importance of identifying and complying with privacy laws and regulations that apply to their industry and customer base. Course content breaks down the practical application of privacy legislation to the cybersecurity professional and provides a systematic plan for incorporating privacy into cybersecurity practices.
|
|

|
*Free for (ISC)² Members/Associates by logging in above and clicking "My Courses". The Intelligence Cycle is the primary process intelligence analysts use when creating intelligence. In this Express Learning course, cybersecurity professionals compare the various intelligence disciplines and learn to leverage the Intelligence Cycle to outline the when, why, and how of cyber events. At the end of this course, you will take on the role of a cyber intelligence analyst and learn to create a cyber intelligence product.
|
|

|
*Free for (ISC)² Members/Associates by logging in above and clicking "My Courses". Having an insurance policy that is expressly dedicated to covering cyber-related incidents is critical, but unfortunately, not all cyber-insurance policies are created equal. In this Express Learning course, participants navigate the ins and outs of cyber insurance and examine real-world examples to fully understand the scope of what the cyber-insurance policy covers, should an incident take place.
|
|

|
*Free for (ISC)² Members/Associates by logging in above and clicking "My Courses". Containers allow for the creation of fast, repeatable, and secure deployment cycles for applications, making them an excellent fit for DevOps. This Express Learning course offers learners an overview of important security features and best practices to protect containerized services. Learn to describe containers and its main characteristics, then it delves into the most prominent security threats and countermeasures, and finally describing how to use automation and orchestration to do deploy containers in an automated and secure manner.
|
|

|
*Free for (ISC)² Members/Associates by logging in above and clicking "My Courses". Artificial intelligence (AI) continues to become prevalent in the security professionals’ personal and work life, including many familiar and highly visible applications and others that are behind-the-scenes and not so obvious. This Express Learning course introduces the security professional to the details of data science in AI, its frameworks and languages and the challenges that security professionals face when working with AI development teams. It is designed to give you a primer of the concepts, frameworks and languages currently used in the development on AI and the security issues that you may face.
|
|

|
*Free for (ISC)² Members/Associates by logging in above and clicking "My Courses". The Diamond Model provides security professionals a means to better understanding the enemy (adversary) as they work to identify the victims, capabilities, and infrastructure of a cybersecurity event. It also assists in understanding the adversary’s technology and social-political motivations and intentions. In this Express Learning course, you will take on the role of a cyber intelligence analyst and gain experience populating a Diamond Model following a cybersecurity event. Learn the core features of the Diamond Model and how to apply source information to communicate event details.
|
|

|
*Free for (ISC)² Members/Associates by logging in above and clicking "My Courses". In this Express Learning self-paced course, you will be introduced to the discipline of web application penetration testing and gain a hands-on perspective of how a penetration tester (pentester) applies methodology with practice to test web applications for security flaws. We will review several basic web application penetration testing techniques and gain hands-on experience as a penetration tester using a popular open source (FOSS) tool, Burp Suite. You will also learn to examine injection attacks such as cross-site scripting and SQL injection attacks and learn how to perform automated attacks with Intruder, as well as analyze responses with Repeater and Comparer.
|
|

|
*Free for (ISC)² Members/Associates by logging in above and clicking "My Courses". Artificial intelligence (AI) is already prevalent in the information security professional’s personal and work life, both in many familiar and highly visible applications as well as in some behind-the-scenes and not so obvious ways. As this field continues to expand, it is beneficial to have an understanding of the related terms and technologies of this ever-changing field in order to participate in discussions about its use in potential and actual implementations. In this Express Learning course, participants will learn terminology related to the spectrum of AI technology, including deep learning, machine learning, AI neural networks, and natural language processing, and will be introduced to some of the current practical applications of these technologies.
|
|

|
*Gratis para miembros / asociados de (ISC)² iniciando sesión arriba y haciendo clic en "Mis cursos". La inteligencia artificial (AI) ya predomina en la vida laboral y personal de los profesionales en seguridad informática, tanto en aplicaciones familiares altamente visibles como en algunos modos más ocultos y no tan obvios. A medida que este campo continúa extendiéndose, es útil comprender los términos relacionados y las tecnologías de este campo que está en constante movimiento para poder participar en discusiones sobre su uso en implementaciones reales y potenciales. En este curso de aprendizaje exprés, los participantes aprenderán términos relacionados con el espectro de la tecnología de AI, como el aprendizaje profundo, el aprendizaje automático, las redes neuronales de AI y el procesamiento de lenguajes naturales. Además, se les mostrarán algunas de las aplicaciones prácticas actuales de estas tecnologías.
|
|

|
*Free for (ISC)² Members/Associates by logging in above and clicking "My Courses". This interactive, immersive course guides you through a process of self-assessment, skill development, brand building and interview preparation to give you the tools you need to advance your security career.
|
|

|
*Free for (ISC)² Members/Associates by logging in above and clicking "My Courses". You got the CISO. Now what? A New CISO’s Guide to Success Course Description: You reached your goal of becoming a CISO. Now what? This self-paced interactive and immersive training experience leverages thought leadership from industry experts to help you develop a plan for your first 30, 60 and 90 days in this new role.
|
|

|
*Free for (ISC)² Members/Associates by logging in above and clicking "My Courses". DevSecOps bridges the gap between security and agility, building security into the DevOps cycle and making it an integral part of the process. This self-paced interactive and immersive training experience leverages thought leadership from industry experts to provide security professionals with a deep dive into securing DevOps to achieve DevSecOps. Participants will receive 5 CPEs toward their (ISC)² credential upon successful completion of the course.
|
|