Top of Page

Professional Development

Stay relevant and on top of the latest trends. Leverage our online courses to gain interactive, engaging and timely learning experiences throughout your career. Each course is designed with input from leading industry experts and based on proven learning techniques to maximize your time and content retention.

The self-paced learning format delivers modular content combined with interactive activities involving videos, labs, case studies, quizzes, etc. Learn at your own pace on your own time and earn valuable Continuing Professionals Education (CPE) credits towards your (ISC)² certifications. (Note: Credits may be eligible for continuing education credits for non-(ISC)² certifications. Please review the requirements established by the credentialing organization for eligibility.)

(ISC)² Members and Associates have free unlimited access to courses that are denoted as ‘Free for Members’ by logging in above and clicking the ‘My Courses’ menu item.

For individual course purchases learners will have access to the course content for 180 days from the time of purchase. Please note, we do not offer time extensions for you to complete this training course.

For All Access and Express Learning Bundle purchases learners will have access to the course content for 365 day from the time of purchase. Please see course description for pricing and CPEs.

All-Access Pass
1-Year unlimited access to Professional Development Institute catalog of 31 online self-paced courses offering 3 unique learning experiences from Immersive in-depth learning to hands on Labs and short format Express Learning courses. Topics include IoT, ICS, devsecops, privacy cyber insurance, mobile security, AI, penetration testing, malware, interpersonal skills, cloud, forensics, incident management and many more. Courses offer continuing professional development credits, are tailored for those learners with a basic to intermediate knowledge of security concepts, designed to go at your own pace and available 24/7. Time commitments range from 2 to 8 hours.
Express Bundle
1-Year unlimited access to Professional Development Institute (PDI) Express Learning courses. Includes access to 17 short format online self-paced courses for the on-the-go cybersecurity professional. Leveraging the expertise of industry experts these courses quickly address emerging industry topics and trends. Subjects include privacy, cyber insurance, presentation skills, AI, big data, purple teams, malware and more. Courses offer continuing professional education credits, are tailored for those learners with a basic to intermediate knowledge of security concepts, designed to go at your own pace and available 24/7. Time commitment is estimated at 1-2 hours – some are even doable during a lunch break.
Ransomware: Identify, Protect, Detect, Recover
*Free for (ISC)² Members/Associates by logging in above and clicking "My Courses". Ransomware is a type of malware that limits users from accessing their system, while demanding a ransom payment. It is becoming a large problem around the world. Victims are at risk of temporary and permanent data loss. In this Express Learning course, learn the major distinctions between ransomware and malware, the key characteristics of ransomware attacks, and the protection strategies and remediation plans for ransomware attacks that should be in place ahead of time. 
Adquisición de datos forenses
*Gratis para los miembros/socios de (ISC)² iniciando sesión arriba y haciendo clic en "Mis cursos". El análisis forense de datos se utiliza para recuperar e investigar evidencia digital que se utilizará en un tribunal en relación con delitos, que incluyen fraude, espionaje, acoso cibernético, robo de datos o delitos violentos. La evidencia forense digital está sujeta a las mismas normas que la evidencia física, lo que significa que debe ser auténtica, admisible y haberse obtenido de manera confiable. Es fundamental que los profesionales de la seguridad comprendan las dificultades técnicas, legales y administrativas que enfrenta el análisis forense de datos para proteger la información reunida antes de entregarla para su análisis y garantizar que la evidencia se sostenga en un tribunal. Este curso de aprendizaje rápido explica el proceso científico del análisis forense digital, los métodos de adquisición de datos, y los principios de manipulación y conservación de la evidencia digital.
Preparing for a Zero Trust Initiative
*Free for (ISC)² Members/Associates by logging in above and clicking "My Courses." A Zero Trust security model, when implemented by an organization, reduces external and internal threats to systems and data. Preparing for a Zero Trust initiative is paradigm shifting for organizations that are migrating to the Cloud and/or transforming legacy network-based controls for Authentication (AuthN) and Authorization (AuthZ). This course prepares you to be successful by presenting foundational principles, threat scenarios, reference architectures, and a policy governance framework that can be applied to reduce risk.
Working in the Cloud
*Free for (ISC)² Members/Associates by logging in above and clicking "My Courses." Companies of all sizes are quickly adopting cloud computing as a core business practice. While cloud computing offers many benefits, security professionals can face a range of challenges as they work to utilize, optimize, and secure critical assets in the cloud. This course uses an immersive experience in which the learner takes the role of a security professional within an organization, who will need to think critically, apply knowledge, and make decisions to determine the best solution regarding cloud security challenges. 
Securing the Remote Workforce
*Free for (ISC)² Members/Associates by logging in above and clicking "My Courses." Although it’s been a growing trend in business circles over the past decade, the subject of remote work has become an increasingly important topic for businesses since early 2020. The increased availability of portable, inexpensive, and highly capable computing and communications technology combined with nearly ubiquitous internet availability means employees no longer need to be constrained within the confines of a corporate office to get their work done using a company’s systems and data. For many workers, all that is needed is a mobile phone or laptop and access to a local internet access point and they have an office, whether that’s in a company building, at home, in a neighborhood café, or at a tropical resort. 
Forensic Data Acquisition
*Free for (ISC)² Members/Associates by logging in above and clicking "My Courses". Data forensics is used to recover and investigate digital evidence to be used in court for crimes including fraud, espionage, cyberstalking, data theft, or violent crimes. Digital forensics evidence is held to the same standards as physical evidence, which means that it must be authentic, admissible, and reliably obtained. It is critical that security professionals understand the technical, legal, and administrative challenges facing data forensics in order to protect the information gathered prior to it being turned over for analysis to ensure the evidence holds up in a court of law. This Express Learning course explains the digital forensics scientific process, data acquisition methods, and digital evidence handling and preservation principles.
Risk Fundamentals
*Free for (ISC)² Members/Associates by logging in above and clicking "My Courses". Risk is something ever present in business and the field of cybersecurity, but far too often organizations fail to proactively manage risk. Regardless of the framework or model used, every organization makes its own determination of what constitutes risk and the level of risk they are willing to accept. However, there are commonalities among the terms, concepts, and skills needed to measure and manage risk. This Express Learning course presents the foundational terms, concepts, and skills needed to communicate and effectively integrate risk management strategies into workplace practices.  This course leverages video content from EJ4, LLC Business School Library. 
Guía de inteligencia artificial para profesionales en seguridad
*Gratis para miembros / asociados de (ISC)² iniciando sesión arriba y haciendo clic en "Mis cursos". La inteligencia artificial (IA) continúa prevaleciendo en la vida personal y laboral de los profesionales en seguridad, incluyendo muchas aplicaciones familiares y altamente visibles, así como otras que operan detrás de bambalinas y no son tan obvias. Este curso presenta los detalles de la ciencia de los datos en IA, sus marcos y lenguajes, y los desafíos que los profesionales en seguridad enfrentan cuando trabajan con equipos de desarrollo de IA.
*(ISC)²会員/準会員の方は、上記ログイン後、「My Courses(マイコース)」をクリックすることで無料でご利用いただけます。人工知能(AI)はセキュリティ専門家の個人的な生活や仕事の中で普及し続けており、身近で目に見えるアプリケーションもあれば、あまり目立たないアプリケーションもあります。 このエクスプレス学習コースでは、AIにおけるデータサイエンスの詳細、フレームワークや言語、セキュリティ専門家がAI開発チームと仕事をする際に直面する課題などを紹介します。このコースでは、AI上の開発で現在使用されている概念、フレームワーク、言語、および直面する可能性のあるセキュリティ上の問題について、入門的な知識を身につけることができます。
人工知能 (AI) の紹介
*(ISC)² のメンバーおよびアソシエイトは、上からログインし、「My Courses」をクリックすれば無料でアクセスできます。人工知能 (AI) は、既に情報セキュリティに従事する人々によりプライベートや職場で幅広く使用されています。数多くの見慣れたアプリケーションだけでなく、私たちの見えない所やあまり知られていないような形でも活用されています。この分野の拡大に伴い、AI の検討されている、または実際の導入化に関するディスカッションに参加できるようになるには、この変化し続ける分野の関連用語やテクノロジーの理解を深めておくとよいでしょう。このエクスプレスラーニングコースでは、ディープラーニングや機械学習、AI ニューラルネットワーク、自然言語処理など、AI テクノロジーのスペクトラムに関連する用語について学ぶほか、こうしたテクノロジーの現時点での実用化についてもいくつかご紹介します。
Assessing Application Security
*Free for (ISC)² Members/Associates by logging in above and clicking "My Courses". In today’s app-enabled world it is more important than ever for security practitioners to work with their organization to ensure their digital assets are adequately protected against attacks. In most cases, the internet-facing application is the primary target for attackers. Applications, when not properly hardened and secured, create the entryway for criminals to gain access to sensitive data or even allow for the complete compromise of the underlying system. Whether the application is bought, built or acquired it is important to consider its vulnerabilities and the types of attacks that might be used to exploit them. This course will explore the foundations of how to assess an application’s security. 
Mobile Security from Every Angle
*Free for (ISC)² Members/Associates by logging in above and clicking "My Courses". Mobile devices have become the central hub allowing anywhere, anytime access to information. Consequently, these devices have become targets for cyber criminals and a huge management issue for security practitioners. This course provides an introduction to mobile security, explores the unique challenges facing mobile security, and instruction on how to secure the mobile infrastructure of your organization.  
ICS OT Application-Level DoS Attack
*Free for (ISC)² Members/Associates by logging in above and clicking "My Courses". A Denial of Service (DoS) attack can cripple your business operations or do even worse to your physical infrastructure. How will you find and stop such an attack? How will your personnel perform when the system is in a degraded state? This scenario-based lab presents just such an attack on the OT network—a DoS attack at the application layer, aimed at disrupting normal operations. The DoS attack takes place when a malicious entity generates a large number of connections to the server to block legitimate applications from connecting to the victim server. The advanced lab challenges you to find, neutralize and contain an attack aimed at bringing down the OT network. Can you find and mitigate the attack?
DoS Attacks and Defense
*Free for (ISC)² Members/Associates by logging in above and clicking "My Courses". Denial of Service (DoS) attacks are increasing in regularity and sophistication. These attacks can have massive negative impacts to an organization, and as this threat vector continues to grow it is important to understand how they work, and the tools and processes needed to keep your organization safe. DoS attacks can result in loss of revenue, brand damage, and a loss of customer trust. Security practitioners need to be able to build effective defense solutions. This hands-on lab is designed to help learners better understand how these attacks work, how they are deployed and the mechanisms they can implement to protect their organization.  
Conducting Practical Risk Analysis for Security Professionals
*Free for (ISC)² Members/Associates by logging in above and clicking "My Courses". Risks and security related issues represent an ongoing concern of any business. Assessing and analyzing risks and issues should be a continuous and comprehensive exercise in any organization. In this Immersive Course, learners gain practical experience working through risk assessment, analysis, mitigation, remediation, and communication. Throughout the course, security professionals acquire skills needed to holistically examine operational risk management, learn to work cross-functionally, determine how to use risk data effectively, and disseminate actionable information and findings. Within the immersive exercise experienced throughout the course, learners apply policies and procedures against organizational risk appetite, assess governance and compliance frameworks, and select the best means to communicate given an organizations risk culture and awareness.
Firewall Configuration with pfSense
*Free for (ISC)² Members/Associates by logging in above and clicking "My Courses". Firewalls provide an essential line of defense against network attacks and are an indispensable tool. pfSense, a widely used, free, and open-source firewall software, can be installed on any physical or virtual machine for use as a firewall on a network. In this lab, cybersecurity professionals or anyone new to firewalls learn how to harden, secure, configure, and operate a firewall using pfSense. Learners in this lab will create and apply firewall rules and discover how to leverage pfSense aliases to simplify a rule set. Finally, learners will view statistics and logs collected to monitor, report, and resolve security problems.