Top 10 Express Courses - Bundle & Save 20%

Grow what you know with ISC2 Express Courses, short-format learning created by industry experts and designed to fit your busy schedule.

Check out the top trending topics our CISSPs are learning right now. Sharpen your skills with this Top 10 bundle – Over 5 hours for only $185.

Top 10 Express Courses:

Express Courses Time Experience
An Orientation to Cloud Native 30 minutes Video
Cloud GRC 30 minutes Video
Cybersecurity in Industrial Control Systems (ICS) 2 hours Video + Immersive Scenarios + Knowledge Checks
Cybersecurity Strategies 15 minutes Article + Skill Application Exercise
8 Steps to Establish a Successful Governance, Risk, and Compliance Program 15 minutes Article + Skill Application Exercise
Introduction to Denial of Service Attacks 15 minutes Article + Skill Application Exercise
Security in the IoT Ecosystem: Surveying IoT Security Challenges 1 hour Video + Immersive Scenarios + Knowledge Checks
The What, Why, Who, and How of Cybersecurity Strategy? 15 minutes Article + Skill Application Exercise
Zero Trust Architecture in the Cloud 15 minutes Article + Skill Application Exercise
Zero Trust for Identity: Strategies and Leadership to Protect Businesses 15 minutes Article + Skill Application Exercise
Get the Bundle

An Orientation to Cloud Native

DELIVERY METHOD: ON-DEMAND | TIME: 30 MINUTES | EXPERIENCE: VIDEO | CPE: 0.50 | PROFICENCY LEVEL: INTERMEDIATE | LANGUAGE: ENGLISH | KNOWLEDGE AREA: OPERATIONS

Learn from an industry professional as he recounts his experience transitioning to a cloud-native approach. During this video-based experience, the instructor will walk you through the differences between cloud-native services and tools and traditional enterprise tools. You’ll learn to leverage cloud-native solutions and consider which cloud-native services or tools are a good match for your organization.

Buy Now $19.00  Buy Bundle


Cloud Governance, Risk and Compliance

DELIVERY METHOD: ON-DEMAND | TIME: 30 MINUTES | EXPERIENCE: VIDEO | CPE: 0.50 | PROFICENCY LEVEL: FOUNDATIONAL | LANGUAGE: ENGLISH | KNOWLEDGE AREA: COMPLIANCE

During this learning experience, you’ll hear from an industry professional about popular governance, risk and compliance (GRC) reports — what they mean, how they can help, how they might be misinterpreted and what you can do to leverage them. Learn to leverage the reports to benefit your organization.

Buy Now $19.00  Buy Bundle


Cybersecurity in Industrial Control Systems (ICS)

DELIVERY METHOD: ON-DEMAND | TIME: 2 HOURS | EXPERIENCE: VIDEO + APPLIED SCENARIOS + KNOWLEDGE CHECKS | CPE: 2 | PROFICENCY LEVEL: FOUNDATIONAL | LANGUAGE: ENGLISH | KNOWLEDGE AREA: OPERATIONS

Cybersecurity in industrial control systems (ICS) refers to the measures and practices implemented to protect critical infrastructure. It encompasses the hardware, software and networked systems used to monitor and control industrial processes. This course explores IT and OT perspectives, the inverted CIA triad and ICS devices, enabling you to support critical infrastructure and the need for ICS security.

Buy Now $45.00  Buy Bundle


Cybersecurity Strategies

DELIVERY METHOD: ON-DEMAND | TIME: 15 MINUTES | EXPERIENCE: ARTICLE + SKILL APPLICATION EXERCISE | CPE: 0.50 | PROFICENCY LEVEL: FOUNDATIONAL | LANGUAGE: ENGLISH | KNOWLEDGE AREA: STRATEGY

A cybersecurity strategy is not a one-time effort but an ongoing process. From establishing an information security policy to understanding the threat landscape, organizations should continuously evaluate and update their security controls and incident response procedures to adapt to emerging threats and risks. Learn how to use existing security benchmarks and compliance standards to design a comprehensive cybersecurity strategy without having to start from scratch.

Buy Now $19.00  Buy Bundle


8 Steps to Establish a Successful Governance, Risk, and Compliance Program

DELIVERY METHOD: ON-DEMAND | TIME: 15 MINUTES | EXPERIENCE: ARTICLE + SKILL APPLICATION EXERCISE | CPE: 0.50 | PROFICENCY LEVEL: INTERMEDIATE | LANGUAGE: ENGLISH | KNOWLEDGE AREA: STRATEGY

Effective information security programs require the integration of three elements to be truly effective: governance, risk and compliance. Governance provides the framework for managing and overseeing security programs, risk management provides the means for identifying and mitigating potential risks, and compliance provides the means for ensuring that the organization adheres to relevant laws and regulations. This learning experience walks you through eight steps to follow for implementing effective information security governance, risk and compliance.

Buy Now $19.00  Buy Bundle


Introduction to Denial of Service Attacks

DELIVERY METHOD: ON-DEMAND | TIME: 15 MINUTES | EXPERIENCE: ARTICLE + SKILL APPLICATION EXERCISE | CPE: 0.50 | PROFICENCY LEVEL: INTERMEDIATE | LANGUAGE: ENGLISH | KNOWLEDGE AREA: OPERATIONS

Denial of service (DoS) and distributed denial of service (DDoS) attacks are on the rise. They aim to deny availability, one of the key principles of cybersecurity. This course details the different types of DoS attacks and how perpetrators carry them out, as well as what they hope to gain from these attacks. Learn what measures you can take to protect your organization’s systems and data.

Buy Now $19.00  Buy Bundle


Security in the IoT Ecosystem: Surveying IoT Security Challenges

DELIVERY METHOD: ON-DEMAND | TIME: 1 HOUR | EXPERIENCE: VIDEO + APPLIED SCENARIOS + KNOWLEDGE CHECKS | CPE: 1 | PROFICENCY LEVEL: FOUNDATIONAL | LANGUAGE: ENGLISH | KNOWLEDGE AREA: STRATEGY

Identify IoT security vulnerabilities and explore global organizations’ approaches, references and guidelines. This course highlights the risks associated with IoT growth and compares IT security to IoT security. You’ll learn from real-world examples of IoT architectures and frameworks, gaining valuable insights into effective security practices. Evaluate the challenges of securing IoT and understand its business and technical vulnerabilities. Equip yourself with the knowledge to implement robust security measures in the ever-expanding IoT ecosystem.

Buy Now $35.00  Buy Bundle

The What, Why, Who, and How of Cybersecurity Strategy

DELIVERY METHOD: ON-DEMAND | TIME: 15 MINUTES | EXPERIENCE: ARTICLE + SKILL EXERCISE | CPE: 0.50 | PROFICENCY LEVEL: INTERMEDIATE | LANGUAGE: ENGLISH | KNOWLEDGE AREA: STRATEGY

Your cybersecurity strategy is your high-level plan for how your organization defends its assets and reduces cyber risk. Developing an effective strategy requires security leaders to understand the what, why, who and how. What elements make up a cybersecurity strategy? Why is it important? Who are the key leaders and stakeholders? How is a strategy created and implemented? Learn the answers to these questions and gain the tools you need to get started developing a strategy for your organization.

Buy Now $19.00  Buy Bundle


Zero Trust Architecture in the Cloud

DELIVERY METHOD: ON-DEMAND | TIME: 15 MINUTES | EXPERIENCE: ARTICLE + SKILL APPLICATION EXERCISE | CPE: 0.50 | PROFICENCY LEVEL: INTERMEDIATE | LANGUAGE: ENGLISH | KNOWLEDGE AREA: STRATEGY

In the cloud, controlling access to data through web and internet entry points is particularly challenging. You must identify the information that you will allow to be accessed publicly and protect private information from leaking. This course presents several scenarios and explains how to apply zero trust principles to data in the cloud. Some specific cloud-native security and compliance tools are discussed, with the understanding that a variety of tools exist to facilitate zero trust in the cloud.

Buy Now $19.00  Buy Bundle


Zero Trust for Identity: Strategies and Leadership to Protect Businesses

DELIVERY METHOD: ON-DEMAND | TIME: 15 MINUTES | EXPERIENCE: ARTICLE + SKILL APPLICATION EXERCISE | CPE: 0.50 | PROFICENCY LEVEL: INTERMEDIATE | LANGUAGE: ENGLISH | KNOWLEDGE AREA: STRATEGY

The zero trust model assumes every request is a potential breach. Every request must be verified as though it originates from an open network. Regardless of the origin or target of the request, never trust, always verify. At the core is identity and access management. To plan, develop and execute a strong zero trust strategy for identity, there must be a concerted effort from leadership to govern and enforce the strategic initiatives across the organization. To limit the impact of potential breaches, we apply segmentation policies, employ the principle of least privilege access, and use analytics to help detect and respond quickly.

Buy Now $19.00  Buy Bundle


Why ISC2 Express Courses?

  • Stay current and demonstrate knowledge of emerging cybersecurity topics
  • Access quick, on-demand learning that fits your busy schedule
  • Earn CPE credits

With ISC2 Express Courses you get:

  • Self-paced cybersecurity education available on demand 24/7
  • Content created by leading minds in the field
  • Learning activities focused on real-world applications

Dive in and start building your knowledge today. Take advantage of exclusive bundle pricing and save 20%. Get the bundle.