Top of Page

Continuing education

Stay relevant and on top of the latest trends. Leverage our online courses to gain interactive, engaging and timely learning experiences throughout your career. Each course is designed with input from leading industry experts and based on proven learning techniques to maximize your time and content retention.

The self-paced learning format delivers modular content combined with interactive activities involving videos, labs, case studies, quizzes, etc. Learn at your own pace on your own time and earn valuable Continuing Professionals Education (CPE) credits towards your ISC2; certifications. (Note: Credits may be eligible for continuing education credits for non-ISC2 certifications. Please review the requirements established by the credentialing organization for eligibility.)

ISC2; Members and Associates have free unlimited access to courses that are denoted as ‘Free for Members’ by logging in above and clicking the ‘My Courses’ menu item.

For individual course purchases learners will have access to the course content for 180 days from the time of purchase. Please note, we do not offer time extensions for you to complete this training course.

For All Access and Express Learning Bundle purchases learners will have access to the course content for 365 day from the time of purchase. Please see course description for pricing and CPEs.

A strong Zero Trust strategy for identity requires a concerted effort from leadership to govern and enforce strategic initiatives. Learn to apply segmentation policies, employ the principle of least privilege access, and use analytics to help detect and respond quickly. (0.50 CPE)
*Free for (ISC)² Members/Associates can access this course for free by logging into your Member Portal for more information. This skill builder provides a summary of the recent report on cyber policy and legislation issued by the Royal United Services Institute and ISC2. This report details how governments around the world are addressing the increasingly complex and uncertain threat landscape. This learning experience positions cybersecurity leaders to leverage the report to make effective decisions in their own jurisdictions and beyond.
Denial of service and distributed denial of service cyberthreats are on the rise. Find out how to identify the different types of attacks, how they’re carried out and what measures you can take to protect your organization’s systems and data. (0.50 CPE)
Learn how testing, tools and human ingenuity can work together to safeguard systems and data from malicious attacks. By investing in software security, you can build trust with users, ensure compliance with industry standards and stay ahead of potential threats. (0.50 CPE)
Get strategies for developing a systematic approach to assessing and mitigating supply chain risks. You’ll learn practical techniques to help ensure the security of suppliers, evaluate their risk profiles and establish appropriate measures for assurance. (0.50 CPE)
Cyber leaders are required to communicate cybersecurity issues to executive decision makers. That requires an understanding of basic accounting, finance and economic principles. Learn how to relate expenditures to financial aspects, such as cash flow and return on investment. (0.50 CPE)
Learn how to develop a Zero Trust cloud security architecture in the cloud. We’ll explore cloud-native tools and the concepts of a Zero Trust methodology using real-world examples, as well as guidance for creating Zero Trust architecture at your organization. (0.50 CPE)
Addressing privacy and data protection can be a challenge. The principles behind EU regulations like the General Data Protection Regulation can serve as a model for responding to these requirements, especially for smaller organizations. (0.50 CPE)
Growing use of AI chatbots, including platforms like ChatGPT, raises security concerns. Get strategies to proactively manage risks related to data privacy, intellectual property, access control and content integrity. (0.50 CPE)
The demand for constant vigilance and immediate response can be overwhelming for cybersecurity professionals. Learn how to identify, prevent and manage burnout on your teams to promote a healthier, more balanced and ultimately more productive work environment. (0.50 CPE)
To facilitate a strong culture of security, SETA programs must include a variety of elements, resources and support structures. Build on the information and guiding questions provided in this course to identify and address the needs at your organization. (1 CPE)
Learn how to build a strong security education, training and awareness (SETA) program at your organization. This course provides an introduction to the learning continuum of SETA, the ABCs of learning, and engaging and impactful delivery techniques. (1 CPE)
Security education, training and awareness (SETA) plans must be clear, well-defined and communicated appropriately across the organization. This course reviews strategies for implementing, measuring and reporting SETA program outcomes. (1 CPE)
Without ongoing and deliberate privacy practices in place, organizations may find themselves in violation of global laws and regulations. Learn about the data generated by a gap analysis and the importance of maintaining a clear picture of organizational data. (1 CPE)
After discussing the impacts of violating a data protection regulation, a cybersecurity team dives into their current data classification, categorization and security practices. Find out how it turns out to be an opportunity to improve overall data efficiency and their organization. (1 CPE)
Ensuring compliance is more complex today because of evolving privacy regulations and legislation. Follow a cybersecurity team as they examine privacy frameworks and global data protection and privacy regulations to work toward regulatory compliance. (1 CPE)
Follow a cybersecurity team as they examine their organization’s policies, procedures and documentation requirements to refine the solutions required to repair their reputation after a breach. You’ll learn how to use risk ranking to prioritize efforts. (1 CPE)
Follow a cybersecurity team as they finalize plans to put more resources into protecting privacy. Compliance is a driver, but like security, a risk-based approach must be utilized to drive alignment, provide better privacy and gain buy-in from the organization. (1 CPE)
Industrial control systems (ICS) play a crucial role in managing processes. Learn how, given their significance and potential vulnerabilities, the implementation of standards, regulations and frameworks is essential to ensure their security, reliability and interoperability. (0.5 CPE)
Merging traditionally isolated operational technology (OT) with information technology (IT) networks and systems presents unique security challenges. Learn how to leverage emerging technologies, hazard analysis and control protocols to address them. (0.5 CPE)