Start building the foundational knowledge that will help guide you on your cyber career path.
![](https://media.isc2.org/-/media/Project/ISC2/Main/Components/Masthead-and-Content-Card/General-Entry-Level-PD-Banner-554x554.png?h=554&iar=0&w=554&rev=aa3ff56f56584e52b6ce8fb79d6b6db5&hash=508FF5FD6D208B42FDDFCA03132E3A41)
Entry-level Cybersecurity Learning
If you’re entering the field for the first time, use these introductory learning resources to explore the cybersecurity areas of focus that fit your interests and professional goals.
Cloud Security
Cloud Basics Certificate
DELIVERY METHOD: ON-DEMAND | TIME: 4 HOURS | EXPERIENCE: VIDEO + TEXT + INTERACTIVE GRAPHICS + IMMERSIVE EXERCISE + KNOWLEDGE CHECKS + ASSESSMENT | CPE: 4 | PROFICENCY LEVEL: FOUNDATIONAL | LANGUAGE: ENGLISH | KNOWLEDGE AREA: OPERATIONS
Gain a solid understanding of cloud computing, including the key drivers and rationale for moving to the cloud; cloud architecture; computing concepts and characteristics; cloud service and deployment models; and cloud brokers.
Buy Learning and Assessment Buy Assessment Only Member Pricing
Network Security
IT/OT Convergence: The Good, the Bad and the Ugly Skill-Builder
DELIVERY METHOD: ON-DEMAND | TIME: 30 MINUTES | EXPERIENCE: VIDEO | CPE: 0.50 | PROFICENCY LEVEL: FOUNDATIONAL | LANGUAGE: ENGLISH | KNOWLEDGE AREA: OPERATIONS
The convergence of information technology (IT) and operational technology (OT) creates new attack vectors and requires a different approach to cybersecurity than traditional IT security. Explore the technologies and systems to consider when securing devices and processes.
Non-Member $19.00 Free for Members
Security Operations
Defining the Boundaries of Zero Trust Course
DELIVERY METHOD: ON-DEMAND | TIME: 2 HOURS | EXPERIENCE: VIDEO | CPE: 2 | PROFICENCY LEVEL: FOUNDATIONAL | LANGUAGE: ENGLISH | KNOWLEDGE AREA: OPERATIONS
Review the principles and requirements necessary to transition from the traditional approach of perimeter-based security to a security operating model focused on granular trust relationships that are business-enabling and data-centric. Throughout your learning, you will identify the importance of continual and vigilant analysis of the entire ecosystem; the requirements of specific models, business needs and use cases; and the necessary components to implement in the context of zero trust.
Non-Member $46.00 Member U.S. $38.00Vulnerability Management in Zero Trust Course
DELIVERY METHOD: ON-DEMAND | TIME: 1 HOUR | EXPERIENCE: VIDEO | CPE: 1 | PROFICENCY LEVEL: FOUNDATIONAL | LANGUAGE: ENGLISH | KNOWLEDGE AREA: OPERATIONS
Explore vulnerability management as a crucial component in cybersecurity operations, specifically in zero trust architecture (ZTA). You’ll learn essential principles and best practices, such as asset discovery, risk-based trust assessment and integration with zero trust policy enforcement mechanisms. This course also reviews the identification, assessment, prioritization and remediation of vulnerabilities unique to zero trust implementation to maintain a robust security posture.
Non-Member $23.00 Member U.S. $19.00Continuous Monitoring and Incident Response for Zero Trust Course
DELIVERY METHOD: ON-DEMAND | TIME: 1 HOUR | EXPERIENCE: VIDEO | CPE: 1 | PROFICENCY LEVEL: FOUNDATIONAL | LANGUAGE: ENGLISH | KNOWLEDGE AREA: OPERATIONS
Understand the necessity for real-time collection, analysis and assessment of data from various sources to identify potential security incidents, anomalies and threats. Learn key aspects of implementing continuous monitoring and incident response within a zero trust framework, including the integration of security information and event management (SIEM) systems, automated threat intelligence feeds and orchestrated incident response workflows.
Non-Member $23.00 Member U.S. $19.00Preventing and Mitigating API Data Breaches Skill-Builder
DELIVERY METHOD: ON-DEMAND | TIME: 15 MINUTES | EXPERIENCE: ARTICLE + SKILL APPLICATION EXERCISE | CPE: 0.50 | PROFICENCY LEVEL: FOUNDATIONAL | LANGUAGE: ENGLISH | KNOWLEDGE AREA: OPERATIONS
As more organizations adopt application programming interfaces (APIs), they’ve become a target for bad actors as an easy entry point into their systems. This course explores the circumstances behind several widely publicized API breaches and the most common threats and vulnerabilities that can expose APIs to attack.
Non-Member $19.00 Free for MembersCybersecurity in Industrial Control Systems (ICS) Skill-Builder
DELIVERY METHOD: ON-DEMAND | TIME: 2 HOURS | EXPERIENCE: VIDEO + APPLIED SCENARIOS + KNOWLEDGE CHECKS | CPE: 2 | PROFICENCY LEVEL: FOUNDATIONAL | LANGUAGE: ENGLISH | KNOWLEDGE AREA: OPERATIONS
Explore IT and OT perspectives, the inverted CIA triad and industrial control system (ICS) devices to support critical infrastructure and the need for ICS security at your organization. This course will guide you through the fundamental concepts around security concerns.
Non-Member $45.00 Free for MembersICS Convergence Skill-Builder
DELIVERY METHOD: ON-DEMAND | TIME: 1 HOUR | EXPERIENCE: VIDEO + APPLIED SCENARIOS + KNOWLEDGE CHECKS | CPE: 0.50 | PROFICENCY LEVEL: FOUNDATIONAL | LANGUAGE: ENGLISH | KNOWLEDGE AREA: OPERATIONS
Merging traditionally isolated operational technology (OT) with information technology (IT) networks and systems presents unique security challenges. Learn how to leverage emerging technologies, hazard analysis and control protocols to address them.
Non-Member $19.00 Free for MembersSecurity in the IoT Ecosystem: What is IoT and the IoT Ecosystem? Skill-Builder
DELIVERY METHOD: ON-DEMAND | TIME: 1 HOUR | EXPERIENCE: VIDEO + APPLIED SCENARIOS + KNOWLEDGE CHECKS | CPE: 1 | PROFICENCY LEVEL: FOUNDATIONAL | LANGUAGE: ENGLISH | KNOWLEDGE AREA: OPERATIONS
IoT is a complex ecosystem of technologies, products and services applied across industries. This course explores IoT reference architectures and real-life examples, focusing on security vulnerabilities within IoT layers.
Non-Member $35.00 Free for Members
Software Security
Software Security: Fixing Forward at Scale in Real Life Skill-Builder
DELIVERY METHOD: ON-DEMAND | TIME: 30 MINUTES | EXPERIENCE: VIDEO | CPE: 0.50 | PROFICENCY LEVEL: FOUNDATIONAL | LANGUAGE: ENGLISH | KNOWLEDGE AREA: OPERATIONS
Learn how testing, tools and human ingenuity can work together to safeguard systems and data from malicious attacks. By investing in software security, you can build trust with users, ensure compliance with industry standards and stay ahead of potential threats.