Security Operations Skill-Builders

Stay in Front of SecOps Trends

Build your SecOps skills with ISC2 Security Operations Skill-Builders, created by industry experts and available now on demand. Grow what you know with short-format learning designed to fit your busy schedule. Become versed in the fundamentals of threat detection and incident response, including security orchestration, automation and response. Don't miss out – start building skills today and stay at the forefront of security operations.

Preventing and Mitigating API Data Breaches

Time: 15 minutes | Experience: Article + Skill Application Exercise | CPE: 0.50

As more organizations adopt application programming interfaces (APIs), they’ve become a target for bad actors as an easy entry point into their systems. This course explores the circumstances behind several widely publicized API breaches and the most common threats and vulnerabilities that can expose APIs to attack.

Non-Member $19.00 Free for Members


Data Protection: Classification, Categorization and Security of Data

Time: 1 hour | Experience: Video + Applied Scenario + Knowledge Checks | CPE: 1.0

After discussing the impacts of violating a data protection regulation, a cybersecurity team dives into their current data classification, categorization and security practices. Find out how it turns out to be an opportunity to improve overall data efficiency and their organization.

Non-Member $35.00 Free for Members


Cybersecurity in Industrial Control Systems (ICS)

Time: 2 hours | Experience: Video + Applied Scenarios + Knowledge Checks | CPE: 2.0

Explore IT and OT perspectives, the inverted CIA triad and industrial control system (ICS) devices to support critical infrastructure and the need for ICS security at your organization. This course will guide you through the fundamental concepts around security concerns.

Non-Member $45.00 Free for Members


Building a Strong Culture of Security: Foundations of Engaging SETA

Time: 1 hour | Experience: Video + Applied Scenarios + Knowledge Checks | CPE: 1.0

Learn how to build a strong security education, training and awareness (SETA) program at your organization. This course provides an introduction to the learning continuum of SETA, the ABCs of learning, and engaging and impactful delivery techniques.

Non-Member $35.00 Free for Members


ICS Convergence

Time: 1 hour | Experience: Video + Applied Scenarios + Knowledge Checks | CPE: 0.50

Merging traditionally isolated operational technology (OT) with information technology (IT) networks and systems presents unique security challenges. Learn how to leverage emerging technologies, hazard analysis and control protocols to address them.

Non-Member $19.00 Free for Members


Data Protection: Impact, Analysis and Management of Violations

Time: 1 hour | Experience: Video + Applied Scenarios + Knowledge Checks | CPE: 1.0

Without ongoing and deliberate privacy practices in place, organizations may find themselves in violation of global laws and regulations. Learn about the data generated by a gap analysis and the importance of maintaining a clear picture of organizational data.

Non-Member $35.00 Free for Members


Security in the IoT Ecosystem

Time: 1 hour | Experience: Video + Applied Scenarios + Knowledge Checks | CPE: 1.0

Securing the IoT ecosystem is crucial to protect sensitive data, ensure privacy and mitigate potential risks. Learn how to identify threats, vulnerabilities and risks in IoT deployment, and what distinguishes direct and indirect safety hazards.

Non-Member $35.00 Free for Members


Security in the IoT Ecosystem: What is IoT and the IoT Ecosystem?

Time: 1 hour | Experience: Video + Applied Scenarios + Knowledge Checks | CPE: 1.0

IoT is a complex ecosystem of technologies, products and services applied across industries. This course explores IoT reference architectures and real-life examples, focusing on security vulnerabilities within IoT layers.

Non-Member $35.00 Free for Members


Open Systems Intelligence

Time: 30 minutes | Experience: Video | CPE: 0.50

Find out what open systems intelligence (OSINT) means, where to get started when using it and examples of what it looks like from a malicious actor's point of view. You'll be able to determine if OSINT being used against you, as well as where you might want to use it yourself.

Non-Member $19.00 Free for Members

Why ISC2 Skill-Builders?

  • Stay current and demonstrate knowledge of emerging cybersecurity topics
  • Receive quick, on-demand learning that fits your busy schedule
  • Earn CPE credits

With ISC2 Skill-Builders you get:

  • Access to self-paced cybersecurity education 24/7
  • Content created by leading minds in the field
  • Learning activities focused on real-world applications

Dive in and start building your skills today. Take advantage of exclusive bundle pricing and receive 20% off when vou bundle all Security Operations Skill-Builders. Get the bundle.