Cybersecurity Leadership Express Courses
Excel in Your Career
Stay in front of the hottest topics and trends impacting your current role and your career with ISC2 Cybersecurity Leadership Express Courses, short-format learning created by industry experts and available now on demand. Gain key perspectives on the fundamental concepts of cybersecurity and their real-world applications for executive- and board-level planning and decision-making.
Start expanding your expertise today and stay at the forefront of cybersecurity with fast learning that delivers results.
Best Practices in Managing IoT Cybersecurity
DELIVERY METHOD: ON-DEMAND | TIME: 1 HOUR | EXPERIENCE: VIDEO + APPLIED SCENARIOS + KNOWLEDGE CHECKS | CPE: 0.50 | PROFICENCY LEVEL: FOUNDATIONAL | LANGUAGE: ENGLISH | KNOWLEDGE AREA: OPERATIONS
The proliferation of internet of things (IoT) devices has brought advancements and convenience across various industries and everyday life, but the increasing connectivity and complexity of IoT systems also raise significant cybersecurity concerns. Securing these interconnected devices and networks is paramount to protect data, mitigate risks and preserve privacy.
Non-Member $19.00 Member Pricing
Budget and Talent Shortfalls
DELIVERY METHOD: ON-DEMAND | TIME: 15 MINUTES | EXPERIENCE: ARTICLE + SKILL APPLICATION EXERCISE | CPE: 0.50 | PROFICENCY LEVEL: INTERMEDIATE | LANGUAGE: ENGLISH | KNOWLEDGE AREA: STRATEGY
You know that a robust cybersecurity program is vital to the success of any organization, large or small. In an ideal world, CISOs have ample funding for staffing and well-qualified candidates are readily available. But the post-pandemic world is not ideal — with the talent shortage, qualified personnel are difficult to find. How will you ensure your organization has the financial support and staffing to sustain your cybersecurity needs? Learn strategies to determine how much to budget for cybersecurity, assess where to allocate those funds, and ensure you have enough skilled professionals in place to protect your organization’s digital assets and infrastructure.
Non-Member $19.00 Member Pricing
Building a Strong Culture of Security: Implementing and Reviewing SETA Programs
DELIVERY METHOD: ON-DEMAND | TIME: 1 HOUR | EXPERIENCE: VIDEO + APPLIED SCENARIOS + KNOWLEDGE CHECKS | CPE: 1 | PROFICENCY LEVEL: INTERMEDIATE | LANGUAGE: ENGLISH | KNOWLEDGE AREA: STRATEGY
Security education and training awareness (SETA) plans must be clear, well-defined and communicated appropriately to all personnel. This course briefly reviews strategies for implementing, measuring and reporting SETA program outcomes and guides security professionals to apply what they learn to their organization.
Non-Member $35.00 Member Pricing
Building a Strong Culture of Security: Planning a SETA Program
DELIVERY METHOD: ON-DEMAND | TIME: 1 HOUR | EXPERIENCE: VIDEO + APPLIED SCENARIOS | CPE: 1 | PROFICENCY LEVEL: INTERMEDIATE | LANGUAGE: ENGLISH | KNOWLEDGE AREA: STRATEGY
Explore the broad range of considerations necessary to plan an effective SETA program. To facilitate a strong culture of security, your program must include a variety of elements, resources and support structures. Build on the information and guiding questions provided in this course to address the needs of your organization.
Non-Member $35.00 Member Pricing
Challenges Integrating Cyber Risk with Business Risk
DELIVERY METHOD: ON-DEMAND | TIME: 30 MINUTES | EXPERIENCE: VIDEO | CPE: 0.50 | PROFICENCY LEVEL: INTERMEDIATE | LANGUAGE: ENGLISH | KNOWLEDGE AREA: STRATEGY
This video-based learning experience explores how to integrate cyber risk in a business context. From determining acceptable levels of risk tolerance to translating technical threats into meaningful business impacts, you’ll learn risk assessment methodologies, how to treat risk and ways to effectively communicate risks to senior management.
Non-Member $19.00 Member Pricing
Cyber Ethics Overview
DELIVERY METHOD: ON-DEMAND | TIME: 15 MINUTES | EXPERIENCE: ARTICLE + SKILL APPLICATION EXERCISE | CPE: 0.50 | PROFICENCY LEVEL: FOUNDATIONAL | LANGUAGE: ENGLISH | KNOWLEDGE AREA: STRATEGY
A strong ethical program can help you meet your bottom line, deliver your service, and encourage growth and sustainability. Most employees feel good about doing the right thing, and a well-defined ethics policy will help team members stay motivated to produce quality work. Clearly communicating what’s not tolerated will give your employees an opportunity to continue to uphold company values.
Non-Member $19.00 Member Pricing
Cybersecurity Burnout
DELIVERY METHOD: ON-DEMAND | TIME: 15 MINUTES | EXPERIENCE: ARTICLE + SKILL APPLICATION EXERCISE | CPE: 0.50 | PROFICENCY LEVEL: FOUNDATIONAL | LANGUAGE: ENGLISH | KNOWLEDGE AREA: STRATEGY
As cybersecurity professionals operate in an increasingly interconnected and threat-prone digital landscape, the demand and pressure for constant vigilance and immediate response can be overwhelming. Unfortunately, this pressure often leads to burnout, impacting not only individuals but entire teams and organizations. As a leader in this space, your role extends beyond managing tasks and systems to ensuring your team’s well-being and effectiveness. This course will equip you with the knowledge and tools needed to understand, prevent and manage cybersecurity burnout, promoting a healthier, more balanced and ultimately more effective work environment.
Non-Member $19.00 Member Pricing
Cybersecurity Strategies
DELIVERY METHOD: ON-DEMAND | TIME: 15 MINUTES | EXPERIENCE: ARTICLE + SKILL APPLICATION EXERCISE | CPE: 0.50 | PROFICENCY LEVEL: FOUNDATIONAL | LANGUAGE: ENGLISH | KNOWLEDGE AREA: STRATEGY
A cybersecurity strategy is not a one-time effort but an ongoing process. From establishing an information security policy to understanding the threat landscape, organizations should continuously evaluate and update their security controls and incident response procedures to adapt to emerging threats and risks. Learn how to use existing security benchmarks and compliance standards to design a comprehensive cybersecurity strategy without having to start from scratch.
Non-Member $19.00 Member Pricing
Data Protection: Building an Organizational Culture
DELIVERY METHOD: ON-DEMAND | TIME: 1 HOUR | EXPERIENCE: VIDEO + APPLIED SCENARIOS + KNOWLEDGE CHECKS | CPE: 1 | PROFICENCY LEVEL: FOUNDATIONAL | LANGUAGE: ENGLISH | KNOWLEDGE AREA: STRATEGY
Follow the SemiSwiss team as they finalize plans to put more resources into protecting privacy. Compliance is a driver, but like security, a risk-based approach must be utilized to drive alignment, provide better privacy and gain buy-in from the organization. The team commits to keeping their client data safe, ensuring ongoing regulatory compliance, and incorporating privacy by design into business practices.
Non-Member $35.00 Member Pricing
Developing an API Security Strategy
DELIVERY METHOD: ON-DEMAND | TIME: 15 MINUTES | EXPERIENCE: ARTICLE + SKILL APPLICATION EXERCISE | CPE: 0.50 | PROFICENCY LEVEL: FOUNDATIONAL | LANGUAGE: ENGLISH | KNOWLEDGE AREA: STRATEGY
Application programming interfaces (APIs) offer many benefits, connecting applications and services to allow for seamless communication and data sharing. However, because they’re gateways to sensitive data and systems, they can also be potential security risks. This course explains techniques for securing APIs in order to protect sensitive data, maintain compliance, preserve business continuity, prevent malicious activity and minimize third-party risk. By securing APIs, you can defend your organization’s data and reputation.
Non-Member $19.00 Member Pricing
Security in the IoT Ecosystem: Surveying IoT Security Challenges
DELIVERY METHOD: ON-DEMAND | TIME: 1 HOUR | EXPERIENCE: VIDEO + APPLIED SCENARIOS + KNOWLEDGE CHECKS | CPE: 1 | PROFICENCY LEVEL: FOUNDATIONAL | LANGUAGE: ENGLISH | KNOWLEDGE AREA: STRATEGY
Identify IoT security vulnerabilities and explore global organizations’ approaches, references and guidelines. This course highlights the risks associated with IoT growth and compares IT security to IoT security. You’ll learn from real-world examples of IoT architectures and frameworks, gaining valuable insights into effective security practices. Evaluate the challenges of securing IoT and understand its business and technical vulnerabilities. Equip yourself with the knowledge to implement robust security measures in the ever-expanding IoT ecosystem.
Non-Member $35.00 Member Pricing
The What, Why, Who and How of Cybersecurity Strategy?
DELIVERY METHOD: ON-DEMAND | TIME: 15 MINUTES | EXPERIENCE: ARTICLE + SKILL EXERCISE | CPE: 0.50 | PROFICENCY LEVEL: INTERMEDIATE | LANGUAGE: ENGLISH | KNOWLEDGE AREA: STRATEGY
Your cybersecurity strategy is your high-level plan for how your organization defends its assets and reduces cyber risk. Developing an effective strategy requires security leaders to understand the what, why, who and how. What elements make up a cybersecurity strategy? Why is it important? Who are the key leaders and stakeholders? How is a strategy created and implemented? Learn the answers to these questions and gain the tools you need to get started developing a strategy for your organization.
Non-Member $19.00 Member Pricing
Translating Cyber Risk into Business Language for Effective Leadership
DELIVERY METHOD: ON-DEMAND | TIME: 15 MINUTES | EXPERIENCE: ARTICLE + SKILL APPLICATION EXERCISE | CPE: 0.50 | PROFICENCY LEVEL: FOUNDATIONAL | LANGUAGE: ENGLISH | KNOWLEDGE AREA: STRATEGY
An effective CISO must be able to translate cybersecurity issues into language that will carry weight with executives who make financial and business decisions. That means understanding basic accounting, finance and economic principles and how to relate expenditures in cybersecurity to financial aspects, such as cash flow and return on investment. As a CISO, you also need to clearly express the relationships between cyber risk and other organizational risks within the language of business.
Non-Member $19.00 Member Pricing
Zero Trust for Identity: Strategies and Leadership to Protect Businesses
DELIVERY METHOD: ON-DEMAND | TIME: 15 MINUTES | EXPERIENCE: ARTICLE + SKILL APPLICATION EXERCISE | CPE: 0.50 | PROFICENCY LEVEL: INTERMEDIATE | LANGUAGE: ENGLISH | KNOWLEDGE AREA: STRATEGY
The zero trust model assumes every request is a potential breach. Every request must be verified as though it originates from an open network. Regardless of the origin or target of the request, never trust, always verify. At the core is identity and access management. To plan, develop and execute a strong zero trust strategy for identity, there must be a concerted effort from leadership to govern and enforce the strategic initiatives across the organization. To limit the impact of potential breaches, we apply segmentation policies, employ the principle of least privilege access, and use analytics to help detect and respond quickly.
Non-Member $19.00 Member Pricing
Why ISC2 Express Courses?
- Stay current and demonstrate knowledge of emerging cybersecurity topics
- Access quick, on-demand learning that fits your busy schedule
- Earn CPE credits
With ISC2 Express Courses you get:
- Self-paced cybersecurity education available on demand 24/7
- Content created by leading minds in the field
- Learning activities focused on real-world applications
Dive in and start building your knowledge today. Take advantage of exclusive bundle pricing and save 20% when you bundle all Cybersecurity Leadership Express Courses. Get the bundle.