Cybersecurity Leadership Express Courses

Excel in Your Career + Earn CPE Credits

Follow your path to purpose and impact with ISC2 Cybersecurity Leadership Express Courses, created by industry experts and available now on demand. Grow what you know and earn CPE credits with short-format learning designed to fit your busy schedule.


Best Practices in Managing IoT Cybersecurity

DELIVERY METHOD: ON-DEMAND | TIME: 1 HOUR | EXPERIENCE: VIDEO + APPLIED SCENARIOS + KNOWLEDGE CHECKS | CPE: 0.50 | PROFICENCY LEVEL: FOUNDATIONAL | LANGUAGE: ENGLISH | KNOWLEDGE AREA: OPERATIONS

The proliferation of internet of things (IoT) devices has brought advancements and convenience across various industries and everyday life, but the increasing connectivity and complexity of IoT systems also raise significant cybersecurity concerns. Securing these interconnected devices and networks is paramount to protect data, mitigate risks and preserve privacy.

Start Course


Budget and Talent Shortfalls

DELIVERY METHOD: ON-DEMAND | TIME: 15 MINUTES | EXPERIENCE: ARTICLE + SKILL APPLICATION EXERCISE | CPE: 0.50 | PROFICENCY LEVEL: INTERMEDIATE | LANGUAGE: ENGLISH | KNOWLEDGE AREA: STRATEGY

You know that a robust cybersecurity program is vital to the success of any organization, large or small. In an ideal world, CISOs have ample funding for staffing and well-qualified candidates are readily available. But the post-pandemic world is not ideal — with the talent shortage, qualified personnel are difficult to find. How will you ensure your organization has the financial support and staffing to sustain your cybersecurity needs? Learn strategies to determine how much to budget for cybersecurity, assess where to allocate those funds, and ensure you have enough skilled professionals in place to protect your organization’s digital assets and infrastructure.

Start Course


Building a Strong Culture of Security: Implementing and Reviewing SETA Programs

DELIVERY METHOD: ON-DEMAND | TIME: 1 HOUR | EXPERIENCE: VIDEO + APPLIED SCENARIOS + KNOWLEDGE CHECKS | CPE: 1 | PROFICENCY LEVEL: INTERMEDIATE | LANGUAGE: ENGLISH | KNOWLEDGE AREA: STRATEGY

Security education and training awareness (SETA) plans must be clear, well-defined and communicated appropriately to all personnel. This course briefly reviews strategies for implementing, measuring and reporting SETA program outcomes and guides security professionals to apply what they learn to their organization.

Start Course


Building a Strong Culture of Security: Planning a SETA Program

DELIVERY METHOD: ON-DEMAND | TIME: 1 HOUR | EXPERIENCE: VIDEO + APPLIED SCENARIOS | CPE: 1 | PROFICENCY LEVEL: INTERMEDIATE | LANGUAGE: ENGLISH | KNOWLEDGE AREA: STRATEGY

Explore the broad range of considerations necessary to plan an effective SETA program. To facilitate a strong culture of security, your program must include a variety of elements, resources and support structures. Build on the information and guiding questions provided in this course to address the needs of your organization.

Start Course


Challenges Integrating Cyber Risk with Business Risk

DELIVERY METHOD: ON-DEMAND | TIME: 30 MINUTES | EXPERIENCE: VIDEO | CPE: 0.50 | PROFICENCY LEVEL: INTERMEDIATE | LANGUAGE: ENGLISH | KNOWLEDGE AREA: STRATEGY

This video-based learning experience explores how to integrate cyber risk in a business context. From determining acceptable levels of risk tolerance to translating technical threats into meaningful business impacts, you’ll learn risk assessment methodologies, how to treat risk and ways to effectively communicate risks to senior management.

Start Course


Cyber Ethics Overview

DELIVERY METHOD: ON-DEMAND | TIME: 15 MINUTES | EXPERIENCE: ARTICLE + SKILL APPLICATION EXERCISE | CPE: 0.50 | PROFICENCY LEVEL: FOUNDATIONAL | LANGUAGE: ENGLISH | KNOWLEDGE AREA: STRATEGY

A strong ethical program can help you meet your bottom line, deliver your service, and encourage growth and sustainability. Most employees feel good about doing the right thing, and a well-defined ethics policy will help team members stay motivated to produce quality work. Clearly communicating what’s not tolerated will give your employees an opportunity to continue to uphold company values.

Start Course


Cybersecurity Burnout

DELIVERY METHOD: ON-DEMAND | TIME: 15 MINUTES | EXPERIENCE: ARTICLE + SKILL APPLICATION EXERCISE | CPE: 0.50 | PROFICENCY LEVEL: FOUNDATIONAL | LANGUAGE: ENGLISH | KNOWLEDGE AREA: STRATEGY

As cybersecurity professionals operate in an increasingly interconnected and threat-prone digital landscape, the demand and pressure for constant vigilance and immediate response can be overwhelming. Unfortunately, this pressure often leads to burnout, impacting not only individuals but entire teams and organizations. As a leader in this space, your role extends beyond managing tasks and systems to ensuring your team’s well-being and effectiveness. This course will equip you with the knowledge and tools needed to understand, prevent and manage cybersecurity burnout, promoting a healthier, more balanced and ultimately more effective work environment.

Start Course


Cybersecurity Strategies

DELIVERY METHOD: ON-DEMAND | TIME: 15 MINUTES | EXPERIENCE: ARTICLE + SKILL APPLICATION EXERCISE | CPE: 0.50 | PROFICENCY LEVEL: FOUNDATIONAL | LANGUAGE: ENGLISH | KNOWLEDGE AREA: STRATEGY

A cybersecurity strategy is not a one-time effort but an ongoing process. From establishing an information security policy to understanding the threat landscape, organizations should continuously evaluate and update their security controls and incident response procedures to adapt to emerging threats and risks. Learn how to use existing security benchmarks and compliance standards to design a comprehensive cybersecurity strategy without having to start from scratch.

Start Course


Data Protection: Building an Organizational Culture

DELIVERY METHOD: ON-DEMAND | TIME: 1 HOUR | EXPERIENCE: VIDEO + APPLIED SCENARIOS + KNOWLEDGE CHECKS | CPE: 1 | PROFICENCY LEVEL: FOUNDATIONAL | LANGUAGE: ENGLISH | KNOWLEDGE AREA: STRATEGY

Follow the SemiSwiss team as they finalize plans to put more resources into protecting privacy. Compliance is a driver, but like security, a risk-based approach must be utilized to drive alignment, provide better privacy and gain buy-in from the organization. The team commits to keeping their client data safe, ensuring ongoing regulatory compliance, and incorporating privacy by design into business practices.

Start Course


Developing an API Security Strategy

DELIVERY METHOD: ON-DEMAND | TIME: 15 MINUTES | EXPERIENCE: ARTICLE + SKILL APPLICATION EXERCISE | CPE: 0.50 | PROFICENCY LEVEL: FOUNDATIONAL | LANGUAGE: ENGLISH | KNOWLEDGE AREA: STRATEGY

Application programming interfaces (APIs) offer many benefits, connecting applications and services to allow for seamless communication and data sharing. However, because they’re gateways to sensitive data and systems, they can also be potential security risks. This course explains techniques for securing APIs in order to protect sensitive data, maintain compliance, preserve business continuity, prevent malicious activity and minimize third-party risk. By securing APIs, you can defend your organization’s data and reputation.

Start Course


Security in the IoT Ecosystem: Surveying IoT Security Challenges

DELIVERY METHOD: ON-DEMAND | TIME: 1 HOUR | EXPERIENCE: VIDEO + APPLIED SCENARIOS + KNOWLEDGE CHECKS | CPE: 1 | PROFICENCY LEVEL: FOUNDATIONAL | LANGUAGE: ENGLISH | KNOWLEDGE AREA: STRATEGY

Identify IoT security vulnerabilities and explore global organizations’ approaches, references and guidelines. This course highlights the risks associated with IoT growth and compares IT security to IoT security. You’ll learn from real-world examples of IoT architectures and frameworks, gaining valuable insights into effective security practices. Evaluate the challenges of securing IoT and understand its business and technical vulnerabilities. Equip yourself with the knowledge to implement robust security measures in the ever-expanding IoT ecosystem.

Start Course


The What, Why, Who and How of Cybersecurity Strategy?

DELIVERY METHOD: ON-DEMAND | TIME: 15 MINUTES | EXPERIENCE: ARTICLE + SKILL EXERCISE | CPE: 0.50 | PROFICENCY LEVEL: INTERMEDIATE | LANGUAGE: ENGLISH | KNOWLEDGE AREA: STRATEGY

Your cybersecurity strategy is your high-level plan for how your organization defends its assets and reduces cyber risk. Developing an effective strategy requires security leaders to understand the what, why, who and how. What elements make up a cybersecurity strategy? Why is it important? Who are the key leaders and stakeholders? How is a strategy created and implemented? Learn the answers to these questions and gain the tools you need to get started developing a strategy for your organization.

Start Course


Translating Cyber Risk into Business Language for Effective Leadership

DELIVERY METHOD: ON-DEMAND | TIME: 15 MINUTES | EXPERIENCE: ARTICLE + SKILL APPLICATION EXERCISE | CPE: 0.50 | PROFICENCY LEVEL: FOUNDATIONAL | LANGUAGE: ENGLISH | KNOWLEDGE AREA: STRATEGY

An effective CISO must be able to translate cybersecurity issues into language that will carry weight with executives who make financial and business decisions. That means understanding basic accounting, finance and economic principles and how to relate expenditures in cybersecurity to financial aspects, such as cash flow and return on investment. As a CISO, you also need to clearly express the relationships between cyber risk and other organizational risks within the language of business.

Start Course


Zero Trust for Identity: Strategies and Leadership to Protect Businesses

DELIVERY METHOD: ON-DEMAND | TIME: 15 MINUTES | EXPERIENCE: ARTICLE + SKILL APPLICATION EXERCISE | CPE: 0.50 | PROFICENCY LEVEL: INTERMEDIATE | LANGUAGE: ENGLISH | KNOWLEDGE AREA: STRATEGY

The zero trust model assumes every request is a potential breach. Every request must be verified as though it originates from an open network. Regardless of the origin or target of the request, never trust, always verify. At the core is identity and access management. To plan, develop and execute a strong zero trust strategy for identity, there must be a concerted effort from leadership to govern and enforce the strategic initiatives across the organization. To limit the impact of potential breaches, we apply segmentation policies, employ the principle of least privilege access, and use analytics to help detect and respond quickly.

Start Course


Why ISC2 Express Courses?

  • Stay current and demonstrate knowledge of emerging cybersecurity topics
  • Access quick, on-demand learning that fits your busy schedule
  • Earn CPE credits

With ISC2 Express Courses you get:

  • Self-paced cybersecurity education available on demand 24/7
  • Content created by leading minds in the field
  • Learning activities focused on real-world applications

Dive in and start building your knowledge today.