Top 10 Skill-Builders - Bundle & Save 20%
Grow what you know with ISC2 Skill-Builders, short-format learning created by industry experts and designed to fit your busy schedule.
Check out the top trending topics our CISSPs are learning right now. Sharpen your skills with this Top 10 bundle – Over 5 hours for only $185.
Top 10 Skill-Builders:
Skill-Builder | Time | Experience |
---|---|---|
Zero Trust Architecture in the Cloud | 15 minutes | Article + Skill Application Exercise |
An Orientation to Cloud Native | 30 minutes | Video |
Cloud GRC | 30 minutes | Video |
Cybersecurity Strategies | 15 minutes | Article + Skill Application Exercise |
Eight Steps to Establish a Successful Governance, Risk, and Compliance Program | 15 minutes | Article + Skill Application Exercise |
Zero Trust for Identity: Strategies and Leadership to Protect Businesses | 15 minutes | Article + Skill Application Exercise |
The What, Why, Who, and How of Cybersecurity Strategy? | 15 minutes | Article + Skill Application Exercise |
Introduction to Denial of Service Attacks | 15 minutes | Article + Skill Application Exercise |
Cybersecurity in Industrial Control Systems (ICS) | 2 hours | Video + Immersive Scenarios + Knowledge Checks |
Security in the IoT Ecosystem: Surveying IoT Security Challenges | 1 hour | Video + Immersive Scenarios + Knowledge Checks |
1. Zero Trust Architecture in the Cloud
Learn how to develop a Zero Trust cloud security architecture in the cloud. We’ll explore cloud-native tools and the concepts of a Zero Trust methodology using real-world examples, as well as guidance for creating Zero Trust architecture at your organization.
2. An Orientation to Cloud Native
Find out the differences between intrusion detection system (IDS) services in cloud-native environments and traditional data center IDS appliances. Gain the knowledge needed to harness the power of cloud-native approaches for scalable, cost-effective intrusion detection.
3. Cloud Governance, Risk and Compliance
Explore popular cloud governance, risk and compliance reports: what they mean, how they can help, how they could be misinterpreted and what you can do to leverage them. You'll gain the knowledge to select the right provider for your organization's needs.
4. Cybersecurity Strategies
This course examines strategies used to mitigate risks associated with cyberthreats and protect sensitive data, systems and networks. Learn how to use existing security benchmarks and compliance standards to design a comprehensive cybersecurity strategy.
5. Eight Steps to Establish a Successful Governance, Risk, and Compliance Program
Walk through eight steps to follow for implementing effective information security governance, risk and compliance (GRC). You'll learn how to develop a comprehensive policy for your organization that addresses identified risks and vulnerabilities.
6. Zero Trust for Identity: Strategies and Leadership to Protect Businesses
A strong Zero Trust strategy for identity requires a concerted effort from leadership to govern and enforce strategic initiatives. Learn to apply segmentation policies, employ the principle of least privilege access, and use analytics to help detect and respond quickly.
7. The What, Why, Who, and How of Cybersecurity Strategy
Your cybersecurity strategy is your high-level plan for how your business will protect its assets and reduce cyber risk. What elements make up a cybersecurity strategy? Why is it important? Who are the key leaders and stakeholders? How is a strategy created and implemented?
8. Introduction to Denial of Service Attacks
Denial of service and distributed denial of service cyberthreats are on the rise. Find out how to identify the different types of attacks, how they’re carried out and what measures you can take to protect your organization’s systems and data.
9. Cybersecurity in Industrial Control Systems (ICS)
Explore IT and OT perspectives, the inverted CIA triad and industrial control system (ICS) devices to support critical infrastructure and the need for ICS security at your organization. This course will guide you through the fundamental concepts around security concerns.
10. Security in the IoT Ecosystem: Surveying IoT Security Challenges
Get strategies to navigate the exponential growth of IoT, harnessing its opportunities while safeguarding against risks through comprehensive security strategies. You'll gain key insights from real-world examples of IoT architectures and frameworks.
With ISC2 Skill-Builders You Get:
- Access to self-paced cybersecurity education 24/7
- Learning activities focused on real-world applications
Don’t miss out. Grab these special 20% bundle savings while they last!