Top of Page
 

Professional Development

Stay relevant and on top of the latest trends. Leverage our online courses to gain interactive, engaging and timely learning experiences throughout your career. Each course is designed with input from leading industry experts and based on proven learning techniques to maximize your time and content retention.

The self-paced learning format delivers modular content combined with interactive activities involving videos, labs, case studies, quizzes, etc. Learn at your own pace on your own time and earn valuable Continuing Professionals Education (CPE) credits towards your (ISC)² certifications. (Note: Credits may be eligible for continuing education credits for non-(ISC)² certifications. Please review the requirements established by the credentialing organization for eligibility.)

(ISC)² Members and Associates have free unlimited access to courses that are denoted as ‘Free for Members’ by logging in above and clicking the ‘My Courses’ menu item.

For individual course purchases learners will have access to the course content for 180 days from the time of purchase. Please note, we do not offer time extensions for you to complete this training course.

For All Access and Express Learning Bundle purchases learners will have access to the course content for 365 day from the time of purchase. Please see course description for pricing and CPEs.

  Certification
(ISC)² Cloud Basics Certificate
Cloud computing continues to transform the way we conduct business. As organizations are rethinking IT strategies, cybersecurity professionals need to first understand the cloud before they can help their organizations transition to the cloud. This self-paced immersive certificate is the first in a series of certificates on the cloud, designed to provide a solid understanding of cloud computing including key drivers and rationale for moving to the cloud, cloud architecture and computing concepts and characteristics, cloud service and deployment models, and cloud brokers.
(ISC)² Cloud Basics Certificate - Final Only
Cloud computing continues to transform the way we conduct business. As organizations are rethinking IT strategies, cybersecurity professionals need to first understand the cloud before they can help their organizations transition to the cloud. This self-paced immersive certificate is the first in a series of certificates on the cloud, designed to provide a solid understanding of cloud computing including key drivers and rationale for moving to the cloud, cloud architecture and computing concepts and characteristics, cloud service and deployment models, and cloud brokers.
(ISC)² Moving to the Cloud Certificate
Cloud computing is quickly becoming the norm. Driven by economic advantage, companies worldwide are making the transition from enterprise IT to cloud computing. But are they doing it strategically? Are they keeping security at the fore of their priorities? In Moving to the Cloud, we bring you a four-phased approach to transforming your organization — strategically and securely — using business alignment as your guidepost.
(ISC)² Moving to the Cloud Certificate - Final Only
Cloud computing is quickly becoming the norm. Driven by economic advantage, companies worldwide are making the transition from enterprise IT to cloud computing. But are they doing it strategically? Are they keeping security at the fore of their priorities? In Moving to the Cloud, we bring you a four-phased approach to transforming your organization — strategically and securely — using business alignment as your guidepost.
(ISC)² Working in the Cloud Certificate
Companies of all sizes are quickly adopting cloud computing as a core business practice. While cloud computing offers many benefits, security professionals can face a range of challenges as they work to utilize, optimize, and secure critical assets in the cloud. This certificate uses an immersive experience in which the learner takes the role of a security professional within an organization, who will need to think critically, apply knowledge, and make decisions to determine the best solution regarding cloud security challenges. 
(ISC)² Working in the Cloud Certificate - Final Only
Companies of all sizes are quickly adopting cloud computing as a core business practice. While cloud computing offers many benefits, security professionals can face a range of challenges as they work to utilize, optimize, and secure critical assets in the cloud. This certificate uses an immersive experience in which the learner takes the role of a security professional within an organization, who will need to think critically, apply knowledge, and make decisions to determine the best solution regarding cloud security challenges. 
(ISC)² Conducting Practical Risk Analysis Certificate
Risks and security related issues represent an ongoing concern of any business. Assessing and analyzing risks and issues should be a continuous and comprehensive exercise in any organization. In this Immersive Certificate, learners gain practical experience working through risk assessment, analysis, mitigation, remediation, and communication. Throughout the certificate, security professionals acquire skills needed to holistically examine operational risk management, learn to work cross-functionally, determine how to use risk data effectively, and disseminate actionable information and findings. Within the immersive exercise experienced throughout the certificate, learners apply policies and procedures against organizational risk appetite, assess governance and compliance frameworks, and select the best means to communicate given an organizations risk culture and awareness.
(ISC)² Conducting Practical Risk Analysis Certificate - Final Only
Risks and security related issues represent an ongoing concern of any business. Assessing and analyzing risks and issues should be a continuous and comprehensive exercise in any organization. In this Immersive Certificate, learners gain practical experience working through risk assessment, analysis, mitigation, remediation, and communication. Throughout the certificate, security professionals acquire skills needed to holistically examine operational risk management, learn to work cross-functionally, determine how to use risk data effectively, and disseminate actionable information and findings. Within the immersive exercise experienced throughout the certificate, learners apply policies and procedures against organizational risk appetite, assess governance and compliance frameworks, and select the best means to communicate given an organizations risk culture and awareness.
(ISC)² Exploring Risk Standards Certificate
In the Exploring Risk Standards Certificate we will take a journey through various result-proven, risk management standards. Risk management is a generic terminology meant to encompass all supporting processes for finding, controlling, and minimizing events which will negatively affect resources or operations. Each organization or entity has unique risk management goals dictated by organizational goals and risk appetite. Risk management practitioners, who are well-versed in various standards, are likely better prepared for the task of assessing and finding risks within various operational constraints.
(ISC)² Exploring Risk Standards Certificate - Final Only
In the Exploring Risk Standards Certificate we will take a journey through various result-proven, risk management standards. Risk management is a generic terminology meant to encompass all supporting processes for finding, controlling, and minimizing events which will negatively affect resources or operations. Each organization or entity has unique risk management goals dictated by organizational goals and risk appetite. Risk management practitioners, who are well-versed in various standards, are likely better prepared for the task of assessing and finding risks within various operational constraints.
(ISC)² Practical Risk Methods Certificate
In this certificate learners will review techniques for better comparison and measurement of risks focused on methods for calculating value while assessing and prioritizing risk. Throughout the course, practitioners will be exposed to qualitative and quantitative methods in order to foster consistent and effective estimates of organizational assets and risks. Topics are presented from a practical perspective decoupled from any particular risk management framework or standard.
(ISC)² Practical Risk Methods Certificate - Final Only
In this certificate learners will review techniques for better comparison and measurement of risks focused on methods for calculating value while assessing and prioritizing risk. Throughout the course, practitioners will be exposed to qualitative and quantitative methods in order to foster consistent and effective estimates of organizational assets and risks. Topics are presented from a practical perspective decoupled from any particular risk management framework or standard.
All-Access Pass
1-Year unlimited access to Professional Development Institute catalog of 30 online self-paced courses offering 3 unique learning experiences from Immersive in-depth learning to hands on Labs and short format Express Learning courses. Topics include IoT, ICS, devsecops, privacy cyber insurance, mobile security, AI, penetration testing, malware, interpersonal skills, cloud, forensics, incident management and many more. Courses offer continuing professional development credits, are tailored for those learners with a basic to intermediate knowledge of security concepts, designed to go at your own pace and available 24/7. Time commitments range from 2 to 8 hours.
Express Bundle
1-Year unlimited access to Professional Development Institute (PDI) Express Learning courses. Includes access to 17 short format online self-paced courses for the on-the-go cybersecurity professional. Leveraging the expertise of industry experts these courses quickly address emerging industry topics and trends. Subjects include privacy, cyber insurance, presentation skills, AI, big data, purple teams, malware and more. Courses offer continuing professional education credits, are tailored for those learners with a basic to intermediate knowledge of security concepts, designed to go at your own pace and available 24/7. Time commitment is estimated at 1-2 hours – some are even doable during a lunch break.
Basics of Forensic Data Parsing
*Free for (ISC)² Members/Associates by logging in above and clicking "My Courses". One of the more challenging obstacles faced by many during digital forensic training is cultural in nature.   Most of us grew up learning Base-10 math and our mind wants to automatically revert to Base 10 when making calculations.  To avoid making errors in digital forensics we need to make a conscious effort to avoid such conversions.    In this course you will review an instructional presentation and engage in a hands-on lab exercise to understand forensic data parsing.
Manually Reconstructing File Names
*Free for (ISC)² Members/Associates by logging in above and clicking "My Courses". Most major forensic software suites will recover file names with ease, even those file names that have been deleted.  However, there may be occasions when important data such as file names cannot be recovered automatically and require manual reassembly or some degree of manual intervention.     In this course you will review an instructional presentation and engage in a hands-on lab exercise to obtain a fundamental understanding of the protocols for constructing file names in various file systems and the ways in which to manually recover file names that cannot be reconstructed through automated means.
File Allocation and Tracking in FAT32
*Free for (ISC)² Members/Associates by logging in above and clicking "My Courses". Most major forensic software suites will reassemble fragmented files with ease.  However, there may be the occasion when an important file cannot be reassembled automatically and requires manual reassembly.  Digital forensic practitioners must have a fundamental understanding of the fragmentation process in various file systems and how to reassemble a fragmented file.    In this course you will review an instructional presentation and engage in a hands-on lab exercise to understand how data are allocated and tracked on FAT32 file systems. 
Introduction to Image File Forensics
*Free for (ISC)² Members/Associates by logging in above and clicking "My Courses". Image file forensics can be one of the most tedious, exhausting, and frustrating investigative processes possible.  It can also be a pure adrenalin rush characterized by excitement and exhilaration that occurs the moment you know your evidence is going to put a suspect in prison.    In this course you will review an instructional presentation and engage in a hands-on lab exercise delivered via a virtual environment to discover the nature, role and scope of digital investigations.  
File Allocation and Tracking in NTFS
*Free for (ISC)² Members/Associates by logging in above and clicking "My Courses". Most major forensic software suites will reassemble fragmented files with ease.  However, there may be the occasion when an important file cannot be reassembled automatically and requires manual reassembly.  Digital forensic practitioners must have a fundamental understanding of the fragmentation process in various file systems and how to reassemble a fragmented file.    In this course you will review an instructional presentation and engage in a hands-on lab exercise to understand how data are allocated and tracked in the New Technology File System (NTFS).
DevSecOps:DevOpsへのセキュリティの統合
*(ISC)²;会員/準会員は無料です。上記でログインして「マイコース」にアクセスしてください。 DevSecOpsは、セキュリティとアジリティの間のギャップを埋めるものです。セキュリティをDevOpsサイクルに組み込み、そのプロセスにおいてセキュリティを不可欠な要素とします。セルフペース型のインタラクティブで没入型である本トレーニングでは、業界の専門家によるソートリーダーシップを活用しており、セキュリティの専門家にDevOpsを保護しながらDevSecOpsを実現するための詳細を提供します。 本コースを正常に修了すると、(ISC)?資格取得に向けた5単位分のCPEを取得することができます。