Top 10 Express Courses - Bundle & Save 20%
Grow what you know with ISC2 Express Courses, short-format learning created by industry experts and designed to fit your busy schedule.
Check out the top trending topics our CISSPs are learning right now. Sharpen your skills with this Top 10 bundle – Over 5 hours for only $185.
Top 10 Express Courses:
Express Courses | Time | Experience |
---|---|---|
An Orientation to Cloud Native | 30 minutes | Video |
Cloud GRC | 30 minutes | Video |
Cybersecurity in Industrial Control Systems (ICS) | 2 hours | Video + Immersive Scenarios + Knowledge Checks |
Cybersecurity Strategies | 15 minutes | Article + Skill Application Exercise |
8 Steps to Establish a Successful Governance, Risk, and Compliance Program | 15 minutes | Article + Skill Application Exercise |
Introduction to Denial of Service Attacks | 15 minutes | Article + Skill Application Exercise |
Security in the IoT Ecosystem: Surveying IoT Security Challenges | 1 hour | Video + Immersive Scenarios + Knowledge Checks |
The What, Why, Who, and How of Cybersecurity Strategy? | 15 minutes | Article + Skill Application Exercise | Zero Trust Architecture in the Cloud | 15 minutes | Article + Skill Application Exercise |
Zero Trust for Identity: Strategies and Leadership to Protect Businesses | 15 minutes | Article + Skill Application Exercise |
An Orientation to Cloud Native
DELIVERY METHOD: ON-DEMAND | TIME: 30 MINUTES | EXPERIENCE: VIDEO | CPE: 0.50 | PROFICENCY LEVEL: INTERMEDIATE | LANGUAGE: ENGLISH | KNOWLEDGE AREA: OPERATIONS
Learn from an industry professional as he recounts his experience transitioning to a cloud-native approach. During this video-based experience, the instructor will walk you through the differences between cloud-native services and tools and traditional enterprise tools. You’ll learn to leverage cloud-native solutions and consider which cloud-native services or tools are a good match for your organization.
Cloud Governance, Risk and Compliance
DELIVERY METHOD: ON-DEMAND | TIME: 30 MINUTES | EXPERIENCE: VIDEO | CPE: 0.50 | PROFICENCY LEVEL: FOUNDATIONAL | LANGUAGE: ENGLISH | KNOWLEDGE AREA: COMPLIANCE
During this learning experience, you’ll hear from an industry professional about popular governance, risk and compliance (GRC) reports — what they mean, how they can help, how they might be misinterpreted and what you can do to leverage them. Learn to leverage the reports to benefit your organization.
Cybersecurity in Industrial Control Systems (ICS)
DELIVERY METHOD: ON-DEMAND | TIME: 2 HOURS | EXPERIENCE: VIDEO + APPLIED SCENARIOS + KNOWLEDGE CHECKS | CPE: 2 | PROFICENCY LEVEL: FOUNDATIONAL | LANGUAGE: ENGLISH | KNOWLEDGE AREA: OPERATIONS
Cybersecurity in industrial control systems (ICS) refers to the measures and practices implemented to protect critical infrastructure. It encompasses the hardware, software and networked systems used to monitor and control industrial processes. This course explores IT and OT perspectives, the inverted CIA triad and ICS devices, enabling you to support critical infrastructure and the need for ICS security.
Cybersecurity Strategies
DELIVERY METHOD: ON-DEMAND | TIME: 15 MINUTES | EXPERIENCE: ARTICLE + SKILL APPLICATION EXERCISE | CPE: 0.50 | PROFICENCY LEVEL: FOUNDATIONAL | LANGUAGE: ENGLISH | KNOWLEDGE AREA: STRATEGY
A cybersecurity strategy is not a one-time effort but an ongoing process. From establishing an information security policy to understanding the threat landscape, organizations should continuously evaluate and update their security controls and incident response procedures to adapt to emerging threats and risks. Learn how to use existing security benchmarks and compliance standards to design a comprehensive cybersecurity strategy without having to start from scratch.
8 Steps to Establish a Successful Governance, Risk, and Compliance Program
DELIVERY METHOD: ON-DEMAND | TIME: 15 MINUTES | EXPERIENCE: ARTICLE + SKILL APPLICATION EXERCISE | CPE: 0.50 | PROFICENCY LEVEL: INTERMEDIATE | LANGUAGE: ENGLISH | KNOWLEDGE AREA: STRATEGY
Effective information security programs require the integration of three elements to be truly effective: governance, risk and compliance. Governance provides the framework for managing and overseeing security programs, risk management provides the means for identifying and mitigating potential risks, and compliance provides the means for ensuring that the organization adheres to relevant laws and regulations. This learning experience walks you through eight steps to follow for implementing effective information security governance, risk and compliance.
Introduction to Denial of Service Attacks
DELIVERY METHOD: ON-DEMAND | TIME: 15 MINUTES | EXPERIENCE: ARTICLE + SKILL APPLICATION EXERCISE | CPE: 0.50 | PROFICENCY LEVEL: INTERMEDIATE | LANGUAGE: ENGLISH | KNOWLEDGE AREA: OPERATIONS
Denial of service (DoS) and distributed denial of service (DDoS) attacks are on the rise. They aim to deny availability, one of the key principles of cybersecurity. This course details the different types of DoS attacks and how perpetrators carry them out, as well as what they hope to gain from these attacks. Learn what measures you can take to protect your organization’s systems and data.
Security in the IoT Ecosystem: Surveying IoT Security Challenges
DELIVERY METHOD: ON-DEMAND | TIME: 1 HOUR | EXPERIENCE: VIDEO + APPLIED SCENARIOS + KNOWLEDGE CHECKS | CPE: 1 | PROFICENCY LEVEL: FOUNDATIONAL | LANGUAGE: ENGLISH | KNOWLEDGE AREA: STRATEGY
Identify IoT security vulnerabilities and explore global organizations’ approaches, references and guidelines. This course highlights the risks associated with IoT growth and compares IT security to IoT security. You’ll learn from real-world examples of IoT architectures and frameworks, gaining valuable insights into effective security practices. Evaluate the challenges of securing IoT and understand its business and technical vulnerabilities. Equip yourself with the knowledge to implement robust security measures in the ever-expanding IoT ecosystem.
The What, Why, Who, and How of Cybersecurity Strategy
DELIVERY METHOD: ON-DEMAND | TIME: 15 MINUTES | EXPERIENCE: ARTICLE + SKILL EXERCISE | CPE: 0.50 | PROFICENCY LEVEL: INTERMEDIATE | LANGUAGE: ENGLISH | KNOWLEDGE AREA: STRATEGY
Your cybersecurity strategy is your high-level plan for how your organization defends its assets and reduces cyber risk. Developing an effective strategy requires security leaders to understand the what, why, who and how. What elements make up a cybersecurity strategy? Why is it important? Who are the key leaders and stakeholders? How is a strategy created and implemented? Learn the answers to these questions and gain the tools you need to get started developing a strategy for your organization.
Zero Trust Architecture in the Cloud
DELIVERY METHOD: ON-DEMAND | TIME: 15 MINUTES | EXPERIENCE: ARTICLE + SKILL APPLICATION EXERCISE | CPE: 0.50 | PROFICENCY LEVEL: INTERMEDIATE | LANGUAGE: ENGLISH | KNOWLEDGE AREA: STRATEGY
In the cloud, controlling access to data through web and internet entry points is particularly challenging. You must identify the information that you will allow to be accessed publicly and protect private information from leaking. This course presents several scenarios and explains how to apply zero trust principles to data in the cloud. Some specific cloud-native security and compliance tools are discussed, with the understanding that a variety of tools exist to facilitate zero trust in the cloud.
Zero Trust for Identity: Strategies and Leadership to Protect Businesses
DELIVERY METHOD: ON-DEMAND | TIME: 15 MINUTES | EXPERIENCE: ARTICLE + SKILL APPLICATION EXERCISE | CPE: 0.50 | PROFICENCY LEVEL: INTERMEDIATE | LANGUAGE: ENGLISH | KNOWLEDGE AREA: STRATEGY
The zero trust model assumes every request is a potential breach. Every request must be verified as though it originates from an open network. Regardless of the origin or target of the request, never trust, always verify. At the core is identity and access management. To plan, develop and execute a strong zero trust strategy for identity, there must be a concerted effort from leadership to govern and enforce the strategic initiatives across the organization. To limit the impact of potential breaches, we apply segmentation policies, employ the principle of least privilege access, and use analytics to help detect and respond quickly.
Why ISC2 Express Courses?
- Stay current and demonstrate knowledge of emerging cybersecurity topics
- Access quick, on-demand learning that fits your busy schedule
- Earn CPE credits
With ISC2 Express Courses you get:
- Self-paced cybersecurity education available on demand 24/7
- Content created by leading minds in the field
- Learning activities focused on real-world applications
Dive in and start building your knowledge today. Take advantage of exclusive bundle pricing and save 20%. Get the bundle.