Network Security Express Courses
Stay in Front of Network Security Trends + Earn CPE Credits
Build your skills protecting the confidentiality, integrity and availability of information across networks with ISC2 Network Security Express Courses, created by industry experts and available on demand. Grow what you know and earn CPE credits with short-format learning designed to fit your busy schedule.
First Steps for Supply Chain Security
DELIVERY METHOD: ON-DEMAND | TIME: 30 MINUTES | EXPERIENCE: VIDEO | CPE: 0.50 | PROFICENCY LEVEL: FOUNDATIONAL | LANGUAGE: ENGLISH | KNOWLEDGE AREA: STRATEGY
Supply chain security — the security of all components, products and services required for the development, delivery and operation of a tech product or service — is critical to defend an organization’s digital assets and minimize potential risk. Any vulnerabilities in one component could propagate across the entire software supply chain, including software components like libraries, frameworks and code snippets, and result in significant security risks. In this learning experience, an industry expert will walk you through the importance of mapping your supply chain, tracking your inventory and integrating these efforts into your risk management processes so you have a means to control risk even when it’s out of your scope.
Introduction to Denial of Service Attacks
DELIVERY METHOD: ON-DEMAND | TIME: 15 MINUTES | EXPERIENCE: ARTICLE + SKILL APPLICATION EXERCISE | CPE: 0.50 | PROFICENCY LEVEL: INTERMEDIATE | LANGUAGE: ENGLISH | KNOWLEDGE AREA: OPERATIONS
Denial of service (DoS) and distributed denial of service (DDoS) attacks are on the rise. They aim to deny availability, one of the key principles of cybersecurity. This course details the different types of DoS attacks and how perpetrators carry them out, as well as what they hope to gain from these attacks. Learn what measures you can take to protect your organization’s systems and data.
IT/OT Convergence: The Good, the Bad and the Ugly
DELIVERY METHOD: ON-DEMAND | TIME: 30 MINUTES | EXPERIENCE: VIDEO | CPE: 0.50 | PROFICENCY LEVEL: FOUNDATIONAL | LANGUAGE: ENGLISH | KNOWLEDGE AREA: OPERATIONS
The lines between information technology (IT) and operational technology (OT) are becoming increasingly blurred. Previously these technology categories operated separately, but today they are intertwined and many OT systems rely on IT technology. This convergence creates new attack vectors that bad actors can exploit, requiring a different approach to cybersecurity than traditional IT security. To mitigate these risks, cyber professionals need to understand the technologies and control systems in use across their organizations. Hear from an industry expert about IT/OT convergence and the technologies and systems to consider when securing devices and processes that impact the physical world.
Supply Chain Security
DELIVERY METHOD: ON-DEMAND | TIME: 30 MINUTES | EXPERIENCE: VIDEO | CPE: 0.50 | PROFICENCY LEVEL: FOUNDATIONAL | LANGUAGE: ENGLISH | KNOWLEDGE AREA: OPERATIONS
This learning experience focuses on developing a systematic approach to assessing and mitigating supply chain risks, with an emphasis on prioritization and onboarding of suppliers. It includes practical techniques to ensure the security of suppliers, evaluate their risk profiles and establish appropriate measures for assurance. You’ll learn how to hone your skills to optimize supplier contracts and service-level agreements.
Why ISC2 Express Courses?
- Stay current and demonstrate knowledge of emerging cybersecurity topics
- Access quick, on-demand learning that fits your busy schedule
- Earn CPE credits
With ISC2 Express Courses you get:
- Self-paced cybersecurity education available on demand 24/7
- Content created by leading minds in the field
- Learning activities focused on real-world applications
Dive in and start building your knowledge today.