Cybersecurity Leadership Express Courses
Excel in Your Career + Earn CPE Credits
Follow your path to purpose and impact with ISC2 Cybersecurity Leadership Express Courses, created by industry experts and available now on demand. Grow what you know and earn CPE credits with short-format learning designed to fit your busy schedule.
Best Practices in Managing IoT Cybersecurity
DELIVERY METHOD: ON-DEMAND | TIME: 1 HOUR | EXPERIENCE: VIDEO + APPLIED SCENARIOS + KNOWLEDGE CHECKS | CPE: 0.50 | PROFICENCY LEVEL: FOUNDATIONAL | LANGUAGE: ENGLISH | KNOWLEDGE AREA: OPERATIONS
The proliferation of internet of things (IoT) devices has brought advancements and convenience across various industries and everyday life, but the increasing connectivity and complexity of IoT systems also raise significant cybersecurity concerns. Securing these interconnected devices and networks is paramount to protect data, mitigate risks and preserve privacy.
Budget and Talent Shortfalls
DELIVERY METHOD: ON-DEMAND | TIME: 15 MINUTES | EXPERIENCE: ARTICLE + SKILL APPLICATION EXERCISE | CPE: 0.50 | PROFICENCY LEVEL: INTERMEDIATE | LANGUAGE: ENGLISH | KNOWLEDGE AREA: STRATEGY
You know that a robust cybersecurity program is vital to the success of any organization, large or small. In an ideal world, CISOs have ample funding for staffing and well-qualified candidates are readily available. But the post-pandemic world is not ideal — with the talent shortage, qualified personnel are difficult to find. How will you ensure your organization has the financial support and staffing to sustain your cybersecurity needs? Learn strategies to determine how much to budget for cybersecurity, assess where to allocate those funds, and ensure you have enough skilled professionals in place to protect your organization’s digital assets and infrastructure.
Building a Strong Culture of Security: Implementing and Reviewing SETA Programs
DELIVERY METHOD: ON-DEMAND | TIME: 1 HOUR | EXPERIENCE: VIDEO + APPLIED SCENARIOS + KNOWLEDGE CHECKS | CPE: 1 | PROFICENCY LEVEL: INTERMEDIATE | LANGUAGE: ENGLISH | KNOWLEDGE AREA: STRATEGY
Security education and training awareness (SETA) plans must be clear, well-defined and communicated appropriately to all personnel. This course briefly reviews strategies for implementing, measuring and reporting SETA program outcomes and guides security professionals to apply what they learn to their organization.
Building a Strong Culture of Security: Planning a SETA Program
DELIVERY METHOD: ON-DEMAND | TIME: 1 HOUR | EXPERIENCE: VIDEO + APPLIED SCENARIOS | CPE: 1 | PROFICENCY LEVEL: INTERMEDIATE | LANGUAGE: ENGLISH | KNOWLEDGE AREA: STRATEGY
Explore the broad range of considerations necessary to plan an effective SETA program. To facilitate a strong culture of security, your program must include a variety of elements, resources and support structures. Build on the information and guiding questions provided in this course to address the needs of your organization.
Challenges Integrating Cyber Risk with Business Risk
DELIVERY METHOD: ON-DEMAND | TIME: 30 MINUTES | EXPERIENCE: VIDEO | CPE: 0.50 | PROFICENCY LEVEL: INTERMEDIATE | LANGUAGE: ENGLISH | KNOWLEDGE AREA: STRATEGY
This video-based learning experience explores how to integrate cyber risk in a business context. From determining acceptable levels of risk tolerance to translating technical threats into meaningful business impacts, you’ll learn risk assessment methodologies, how to treat risk and ways to effectively communicate risks to senior management.
Cyber Ethics Overview
DELIVERY METHOD: ON-DEMAND | TIME: 15 MINUTES | EXPERIENCE: ARTICLE + SKILL APPLICATION EXERCISE | CPE: 0.50 | PROFICENCY LEVEL: FOUNDATIONAL | LANGUAGE: ENGLISH | KNOWLEDGE AREA: STRATEGY
A strong ethical program can help you meet your bottom line, deliver your service, and encourage growth and sustainability. Most employees feel good about doing the right thing, and a well-defined ethics policy will help team members stay motivated to produce quality work. Clearly communicating what’s not tolerated will give your employees an opportunity to continue to uphold company values.
Cybersecurity Burnout
DELIVERY METHOD: ON-DEMAND | TIME: 15 MINUTES | EXPERIENCE: ARTICLE + SKILL APPLICATION EXERCISE | CPE: 0.50 | PROFICENCY LEVEL: FOUNDATIONAL | LANGUAGE: ENGLISH | KNOWLEDGE AREA: STRATEGY
As cybersecurity professionals operate in an increasingly interconnected and threat-prone digital landscape, the demand and pressure for constant vigilance and immediate response can be overwhelming. Unfortunately, this pressure often leads to burnout, impacting not only individuals but entire teams and organizations. As a leader in this space, your role extends beyond managing tasks and systems to ensuring your team’s well-being and effectiveness. This course will equip you with the knowledge and tools needed to understand, prevent and manage cybersecurity burnout, promoting a healthier, more balanced and ultimately more effective work environment.
Cybersecurity Strategies
DELIVERY METHOD: ON-DEMAND | TIME: 15 MINUTES | EXPERIENCE: ARTICLE + SKILL APPLICATION EXERCISE | CPE: 0.50 | PROFICENCY LEVEL: FOUNDATIONAL | LANGUAGE: ENGLISH | KNOWLEDGE AREA: STRATEGY
A cybersecurity strategy is not a one-time effort but an ongoing process. From establishing an information security policy to understanding the threat landscape, organizations should continuously evaluate and update their security controls and incident response procedures to adapt to emerging threats and risks. Learn how to use existing security benchmarks and compliance standards to design a comprehensive cybersecurity strategy without having to start from scratch.
Data Protection: Building an Organizational Culture
DELIVERY METHOD: ON-DEMAND | TIME: 1 HOUR | EXPERIENCE: VIDEO + APPLIED SCENARIOS + KNOWLEDGE CHECKS | CPE: 1 | PROFICENCY LEVEL: FOUNDATIONAL | LANGUAGE: ENGLISH | KNOWLEDGE AREA: STRATEGY
Follow the SemiSwiss team as they finalize plans to put more resources into protecting privacy. Compliance is a driver, but like security, a risk-based approach must be utilized to drive alignment, provide better privacy and gain buy-in from the organization. The team commits to keeping their client data safe, ensuring ongoing regulatory compliance, and incorporating privacy by design into business practices.
Developing an API Security Strategy
DELIVERY METHOD: ON-DEMAND | TIME: 15 MINUTES | EXPERIENCE: ARTICLE + SKILL APPLICATION EXERCISE | CPE: 0.50 | PROFICENCY LEVEL: FOUNDATIONAL | LANGUAGE: ENGLISH | KNOWLEDGE AREA: STRATEGY
Application programming interfaces (APIs) offer many benefits, connecting applications and services to allow for seamless communication and data sharing. However, because they’re gateways to sensitive data and systems, they can also be potential security risks. This course explains techniques for securing APIs in order to protect sensitive data, maintain compliance, preserve business continuity, prevent malicious activity and minimize third-party risk. By securing APIs, you can defend your organization’s data and reputation.
Security in the IoT Ecosystem: Surveying IoT Security Challenges
DELIVERY METHOD: ON-DEMAND | TIME: 1 HOUR | EXPERIENCE: VIDEO + APPLIED SCENARIOS + KNOWLEDGE CHECKS | CPE: 1 | PROFICENCY LEVEL: FOUNDATIONAL | LANGUAGE: ENGLISH | KNOWLEDGE AREA: STRATEGY
Identify IoT security vulnerabilities and explore global organizations’ approaches, references and guidelines. This course highlights the risks associated with IoT growth and compares IT security to IoT security. You’ll learn from real-world examples of IoT architectures and frameworks, gaining valuable insights into effective security practices. Evaluate the challenges of securing IoT and understand its business and technical vulnerabilities. Equip yourself with the knowledge to implement robust security measures in the ever-expanding IoT ecosystem.
The What, Why, Who and How of Cybersecurity Strategy?
DELIVERY METHOD: ON-DEMAND | TIME: 15 MINUTES | EXPERIENCE: ARTICLE + SKILL EXERCISE | CPE: 0.50 | PROFICENCY LEVEL: INTERMEDIATE | LANGUAGE: ENGLISH | KNOWLEDGE AREA: STRATEGY
Your cybersecurity strategy is your high-level plan for how your organization defends its assets and reduces cyber risk. Developing an effective strategy requires security leaders to understand the what, why, who and how. What elements make up a cybersecurity strategy? Why is it important? Who are the key leaders and stakeholders? How is a strategy created and implemented? Learn the answers to these questions and gain the tools you need to get started developing a strategy for your organization.
Translating Cyber Risk into Business Language for Effective Leadership
DELIVERY METHOD: ON-DEMAND | TIME: 15 MINUTES | EXPERIENCE: ARTICLE + SKILL APPLICATION EXERCISE | CPE: 0.50 | PROFICENCY LEVEL: FOUNDATIONAL | LANGUAGE: ENGLISH | KNOWLEDGE AREA: STRATEGY
An effective CISO must be able to translate cybersecurity issues into language that will carry weight with executives who make financial and business decisions. That means understanding basic accounting, finance and economic principles and how to relate expenditures in cybersecurity to financial aspects, such as cash flow and return on investment. As a CISO, you also need to clearly express the relationships between cyber risk and other organizational risks within the language of business.
Zero Trust for Identity: Strategies and Leadership to Protect Businesses
DELIVERY METHOD: ON-DEMAND | TIME: 15 MINUTES | EXPERIENCE: ARTICLE + SKILL APPLICATION EXERCISE | CPE: 0.50 | PROFICENCY LEVEL: INTERMEDIATE | LANGUAGE: ENGLISH | KNOWLEDGE AREA: STRATEGY
The zero trust model assumes every request is a potential breach. Every request must be verified as though it originates from an open network. Regardless of the origin or target of the request, never trust, always verify. At the core is identity and access management. To plan, develop and execute a strong zero trust strategy for identity, there must be a concerted effort from leadership to govern and enforce the strategic initiatives across the organization. To limit the impact of potential breaches, we apply segmentation policies, employ the principle of least privilege access, and use analytics to help detect and respond quickly.
Why ISC2 Express Courses?
- Stay current and demonstrate knowledge of emerging cybersecurity topics
- Access quick, on-demand learning that fits your busy schedule
- Earn CPE credits
With ISC2 Express Courses you get:
- Self-paced cybersecurity education available on demand 24/7
- Content created by leading minds in the field
- Learning activities focused on real-world applications
Dive in and start building your knowledge today.