Grow Your Skills
Professional Development Institute
Certification is just the beginning
Building a Strong Security Culture
Online self-paced course addressing solutions for building a robust organizational security culture. Designed to help create and implement an effective security awareness program focused on the human element, resulting in a culture of security as everyone’s responsibility.
CISO’s Guide to Success
You have reached your goal of becoming a CISO. Now what? This course helps you develop a plan for your first 30, 60 and 90 days in this new role.
Creating Your Path to CISO
This interactive, immersive course guides you through a process of self-assessment, skill development, brand building and interview preparation to give you the tools you need to advance your security career.
DevSecOps – Integrating Security into DevOps
Online self-paced course offering a deep dive into securing DevOps to achieve DevSecOps. Designed to help security professionals successfully remove barriers and achieve enterprise business goals without friction.
GDPR for Security Professionals: A Framework for Success
Online self-paced course designed to help security professionals contribute to the strategy, direction and implementation of the European Union’s General Data Protection Regulation (GDPR). This interactive, immersive training experience provides the tools, knowledge and resources needed to maintain organizational compliance with GDPR mandates.
Responding to a Breach
This interactive, immersive course takes you inside a cybersecurity breach scenario and helps you design your own cybersecurity incident response plan.
Assessing Application Security
In today’s app-enabled world it is more important than ever for security practitioners to work with their organization to ensure digital assets are adequately protected against attacks. In most cases, internet-facing applications are the primary targets for attackers. Applications, when not properly hardened and secured, create the entryway for criminals to gain access to sensitive data or even allow for the complete compromise of the underlying system. Whether the application is bought, built or acquired, it is important to consider its vulnerabilities and the types of attacks that might be used to exploit them. This hands-on practical lab will explore the foundations of how to assess an application’s security.
Looking for more engaging CPE opportunities? Check out our self-paced trainings available from our partners.