Top of Page
 

Professional Development

Stay relevant and on top of the latest trends. Leverage our online courses to gain interactive, engaging and timely learning experiences throughout your career. Each course is designed with input from leading industry experts and based on proven learning techniques to maximize your time and content retention.

The self-paced learning format delivers modular content combined with interactive activities involving videos, labs, case studies, quizzes, etc. Learn at your own pace on your own time and earn valuable Continuing Professionals Education (CPE) credits towards your (ISC)² certifications. (Note: Credits may be eligible for continuing education credits for non-(ISC)² certifications. Please review the requirements established by the credentialing organization for eligibility.)

(ISC)² Members and Associates have free unlimited access to courses that are denoted as ‘Free for Members’ by logging in above and clicking the ‘My Courses’ menu item.

For individual course purchases learners will have access to the course content for 180 days from the time of purchase. Please note, we do not offer time extensions for you to complete this training course.

For All Access and Express Learning Bundle purchases learners will have access to the course content for 365 day from the time of purchase. Please see course description for pricing and CPEs.

  Certification
All-Access Pass
1-Year unlimited access to Professional Development Institute catalog of 30 online self-paced courses offering 3 unique learning experiences from Immersive in-depth learning to hands on Labs and short format Express Learning courses. Topics include IoT, ICS, devsecops, privacy cyber insurance, mobile security, AI, penetration testing, malware, interpersonal skills, cloud, forensics, incident management and many more. Courses offer continuing professional development credits, are tailored for those learners with a basic to intermediate knowledge of security concepts, designed to go at your own pace and available 24/7. Time commitments range from 2 to 8 hours.
Express Bundle
1-Year unlimited access to Professional Development Institute (PDI) Express Learning courses. Includes access to 17 short format online self-paced courses for the on-the-go cybersecurity professional. Leveraging the expertise of industry experts these courses quickly address emerging industry topics and trends. Subjects include privacy, cyber insurance, presentation skills, AI, big data, purple teams, malware and more. Courses offer continuing professional education credits, are tailored for those learners with a basic to intermediate knowledge of security concepts, designed to go at your own pace and available 24/7. Time commitment is estimated at 1-2 hours – some are even doable during a lunch break.
Basics of Forensic Data Parsing
*Free for (ISC)² Members/Associates by logging in above and clicking "My Courses". One of the more challenging obstacles faced by many during digital forensic training is cultural in nature.   Most of us grew up learning Base-10 math and our mind wants to automatically revert to Base 10 when making calculations.  To avoid making errors in digital forensics we need to make a conscious effort to avoid such conversions.    In this course you will review an instructional presentation and engage in a hands-on lab exercise to understand forensic data parsing.
Trasladarse a la nube
*Gratuito para los miembros/socios de (ISC)² debe registrarse arriba y hacer clic en “Mis cursos”. La informática en la nube se está convirtiendo rápidamente en la norma. Impulsadas por la ventaja económica, las empresas de todo el mundo están haciendo la transición de la TI empresarial a la informática en la nube. Pero, ¿lo están haciendo de forma estratégica? ¿Están manteniendo la seguridad en la primera línea de sus prioridades? En “Trasladarse a la nube”, le ofrecemos un enfoque de cuatro fases para transformar su organización —de forma estratégica y segura— utilizando la alineación empresarial como su indicador.
Manually Reconstructing File Names
*Free for (ISC)² Members/Associates by logging in above and clicking "My Courses". Most major forensic software suites will recover file names with ease, even those file names that have been deleted.  However, there may be occasions when important data such as file names cannot be recovered automatically and require manual reassembly or some degree of manual intervention.     In this course you will review an instructional presentation and engage in a hands-on lab exercise to obtain a fundamental understanding of the protocols for constructing file names in various file systems and the ways in which to manually recover file names that cannot be reconstructed through automated means.
クラウドへの移行
*上記でログインして「マイコース」をクリックすると、(ISC)²の会員/準会員は無料でアクセスできます。クラウドコンピューティングは急速に標準的なものになりつつあります。経済的優位性に後押しされ、世界中の企業がエンタープライズITからクラウドコンピューティングへの移行を進めています。しかし、それは戦略的に行われているでしょうか?優先事項の最前線でセキュリティを維持して実施されているでしょうか?「クラウドへの移行」では、ビジネスのアライメントを指針として使用し、組織を戦略的かつ安全に変革するための4段階のアプローチについてご紹介します。
File Allocation and Tracking in FAT32
*Free for (ISC)² Members/Associates by logging in above and clicking "My Courses". Most major forensic software suites will reassemble fragmented files with ease.  However, there may be the occasion when an important file cannot be reassembled automatically and requires manual reassembly.  Digital forensic practitioners must have a fundamental understanding of the fragmentation process in various file systems and how to reassemble a fragmented file.    In this course you will review an instructional presentation and engage in a hands-on lab exercise to understand how data are allocated and tracked on FAT32 file systems. 
Introduction to Image File Forensics
*Free for (ISC)² Members/Associates by logging in above and clicking "My Courses". Image file forensics can be one of the most tedious, exhausting, and frustrating investigative processes possible.  It can also be a pure adrenalin rush characterized by excitement and exhilaration that occurs the moment you know your evidence is going to put a suspect in prison.    In this course you will review an instructional presentation and engage in a hands-on lab exercise delivered via a virtual environment to discover the nature, role and scope of digital investigations.  
File Allocation and Tracking in NTFS
*Free for (ISC)² Members/Associates by logging in above and clicking "My Courses". Most major forensic software suites will reassemble fragmented files with ease.  However, there may be the occasion when an important file cannot be reassembled automatically and requires manual reassembly.  Digital forensic practitioners must have a fundamental understanding of the fragmentation process in various file systems and how to reassemble a fragmented file.    In this course you will review an instructional presentation and engage in a hands-on lab exercise to understand how data are allocated and tracked in the New Technology File System (NTFS).
DevSecOps:DevOpsへのセキュリティの統合
*(ISC)²;会員/準会員は無料です。上記でログインして「マイコース」にアクセスしてください。 DevSecOpsは、セキュリティとアジリティの間のギャップを埋めるものです。セキュリティをDevOpsサイクルに組み込み、そのプロセスにおいてセキュリティを不可欠な要素とします。セルフペース型のインタラクティブで没入型である本トレーニングでは、業界の専門家によるソートリーダーシップを活用しており、セキュリティの専門家にDevOpsを保護しながらDevSecOpsを実現するための詳細を提供します。 本コースを正常に修了すると、(ISC)?資格取得に向けた5単位分のCPEを取得することができます。
Data Protection: Where Regulation Meets Best Practice 
*Free for (ISC)² Members/Associates by logging in above and clicking "My Courses". With an ever-increasing list of global data protection regulations, it is more important than ever for security professionals to ensure privacy is at the forefront of security practices. Laws and regulations require companies protect data and personal information. Violations can carry stiff penalties and fines. In this Immersive course, join the team at SemiSwiss as they experience the impact of violating a data protection regulation, and learn the steps to remediate and improve business practices. As you work through the course, you will be introduced to a variety of regulations and security frameworks as well as presented some best practices for incorporating privacy principles into security.
DevSecOps: Cómo integrar la seguridad en DevOps
*Gratis para los miembros/socios de (ISC)² si inician sesión arriba y hacen clic en “Mis cursos”. DevSecOps reduce la brecha entre la seguridad y la agilidad, incorporando la seguridad en el ciclo de DevOps y convirtiéndola en una parte integral del proceso. Esta experiencia de capacitación interactiva e inmersiva para hacer a su propio ritmo aprovecha el liderazgo intelectual de expertos de la industria para brindar a los profesionales de la seguridad un panorama detallado de la seguridad de DevOps para lograr DevSecOps. Los participantes recibirán 5 créditos de CPE para su credencial de (ISC)2 después de completar el curso de manera satisfactoria.
Aspectos básicos de la nube
*Gratuito para los miembros/asociados de (ISC)² si inician sesión arriba y hacen clic en “Mis cursos”. La informática en la nube sigue transformando la forma en que hacemos negocios. Debido a que las organizaciones están reconsiderando las estrategias de TI, los profesionales de la ciberseguridad primero deben entender la nube antes de poder ayudar a sus organizaciones a trasladarse a esta. Este curso de inmersión para hacer a su propio ritmo es el primero de una serie de cursos en la nube, diseñados para proporcionar un sólido entendimiento de la informática en la nube, incluidos los impulsores clave y los motivos para trasladarse a la nube, los conceptos y las características de la informática y la arquitectura de la nube, los modelos de implementación y los servicios en la nube, y los agentes de nube.
クラウドの基本
*(ISC)²会員・準会員の方は、上記ログイン後、[My Courses(マイコース)]をクリックすると無料で受講できます。クラウドコンピューティングは、私たちのビジネスの進め方を変え続けています。組織がIT戦略を見直す中、サイバーセキュリティの専門家は、組織のクラウドへの移行を支援する前に、まずクラウドを理解しておく必要があります。自分のペースで進められる、この没入型コースは、クラウドに関する一連のコースの最初のもので、クラウドへの移行の鍵となる促進要因とその理由、クラウドのアーキテクチャとコンピューティングの概念と特性、クラウドサービスと展開モデル、クラウドブローカーなど、クラウドコンピューティングをしっかりと理解できるように設計されています。
Crowdsourced Security
*Free for (ISC)² Members/Associates by logging in above and clicking "My Courses". Crowdsourced security empowers organizations to provide more secure software. Traditional testing methodologies do not always fit into today’s continuous delivery model. Whether you are using CI/CD pipelines or you leverage modern software development practices, today’s software should be reliable, quick to market, and free of bugs and security issues. This course will dive into how to create a robust crowd-enabled security program that reduces risk, aligns to agile development, and reduces the vulnerabilities of frequent software releases. Whether you want to develop your own program, work with a vendor, or use a mixed testing approach, this course will cover how to fit a crowdsourced component into your security program. 
Ransomware: Identify, Protect, Detect, Recover
*Free for (ISC)² Members/Associates by logging in above and clicking "My Courses". Ransomware is a type of malware that limits users from accessing their system, while demanding a ransom payment. It is becoming a large problem around the world. Victims are at risk of temporary and permanent data loss. In this Express Learning course, learn the major distinctions between ransomware and malware, the key characteristics of ransomware attacks, and the protection strategies and remediation plans for ransomware attacks that should be in place ahead of time. 
Adquisición de datos forenses
*Gratis para los miembros/socios de (ISC)² iniciando sesión arriba y haciendo clic en "Mis cursos". El análisis forense de datos se utiliza para recuperar e investigar evidencia digital que se utilizará en un tribunal en relación con delitos, que incluyen fraude, espionaje, acoso cibernético, robo de datos o delitos violentos. La evidencia forense digital está sujeta a las mismas normas que la evidencia física, lo que significa que debe ser auténtica, admisible y haberse obtenido de manera confiable. Es fundamental que los profesionales de la seguridad comprendan las dificultades técnicas, legales y administrativas que enfrenta el análisis forense de datos para proteger la información reunida antes de entregarla para su análisis y garantizar que la evidencia se sostenga en un tribunal. Este curso de aprendizaje rápido explica el proceso científico del análisis forense digital, los métodos de adquisición de datos, y los principios de manipulación y conservación de la evidencia digital.
フォレンジックデータ取得
*上記でログインして「マイコース」をクリックすると、(ISC)²会員/アソシエイトは無料で利用できます。データフォレンジックは、詐欺、スパイ行為、サイバーストーキング、データ盗難、または暴力犯罪などの犯罪について法廷で使用されるデジタル証拠を回復および調査するために使用されます。デジタルフォレンジックの証拠は、物理的な証拠と同じ基準で扱われます。つまり、本物であり、許容され、確実に取得できるものである必要があります。証拠が法廷で扱われることを保証するために分析に引き渡される前に収集された情報を保護するため、セキュリティ専門家がデータフォレンジックにおいて直面する技術的、法的、および管理上の課題を理解することが重要です。このエクスプレスラーニングコースでは、デジタルフォレンジックの科学的プロセス、データ取得方法、デジタル証拠の処理と保存の原則について説明します。
Preparing for a Zero Trust Initiative
*Free for (ISC)² Members/Associates by logging in above and clicking "My Courses." A Zero Trust security model, when implemented by an organization, reduces external and internal threats to systems and data. Preparing for a Zero Trust initiative is paradigm shifting for organizations that are migrating to the Cloud and/or transforming legacy network-based controls for Authentication (AuthN) and Authorization (AuthZ). This course prepares you to be successful by presenting foundational principles, threat scenarios, reference architectures, and a policy governance framework that can be applied to reduce risk.
Working in the Cloud
*Free for (ISC)² Members/Associates by logging in above and clicking "My Courses." Companies of all sizes are quickly adopting cloud computing as a core business practice. While cloud computing offers many benefits, security professionals can face a range of challenges as they work to utilize, optimize, and secure critical assets in the cloud. This course uses an immersive experience in which the learner takes the role of a security professional within an organization, who will need to think critically, apply knowledge, and make decisions to determine the best solution regarding cloud security challenges.