Network Security Express Courses

Stay in Front of Network Security Trends + Earn CPE Credits

Build your skills protecting the confidentiality, integrity and availability of information across networks with ISC2 Network Security Express Courses, created by industry experts and available on demand. Grow what you know and earn CPE credits with short-format learning designed to fit your busy schedule.


First Steps for Supply Chain Security

DELIVERY METHOD: ON-DEMAND | TIME: 30 MINUTES | EXPERIENCE: VIDEO | CPE: 0.50 | PROFICENCY LEVEL: FOUNDATIONAL | LANGUAGE: ENGLISH | KNOWLEDGE AREA: STRATEGY

Supply chain security — the security of all components, products and services required for the development, delivery and operation of a tech product or service — is critical to defend an organization’s digital assets and minimize potential risk. Any vulnerabilities in one component could propagate across the entire software supply chain, including software components like libraries, frameworks and code snippets, and result in significant security risks. In this learning experience, an industry expert will walk you through the importance of mapping your supply chain, tracking your inventory and integrating these efforts into your risk management processes so you have a means to control risk even when it’s out of your scope.

Start Course


Introduction to Denial of Service Attacks

DELIVERY METHOD: ON-DEMAND | TIME: 15 MINUTES | EXPERIENCE: ARTICLE + SKILL APPLICATION EXERCISE | CPE: 0.50 | PROFICENCY LEVEL: INTERMEDIATE | LANGUAGE: ENGLISH | KNOWLEDGE AREA: OPERATIONS

Denial of service (DoS) and distributed denial of service (DDoS) attacks are on the rise. They aim to deny availability, one of the key principles of cybersecurity. This course details the different types of DoS attacks and how perpetrators carry them out, as well as what they hope to gain from these attacks. Learn what measures you can take to protect your organization’s systems and data.

Start Course


IT/OT Convergence: The Good, the Bad and the Ugly

DELIVERY METHOD: ON-DEMAND | TIME: 30 MINUTES | EXPERIENCE: VIDEO | CPE: 0.50 | PROFICENCY LEVEL: FOUNDATIONAL | LANGUAGE: ENGLISH | KNOWLEDGE AREA: OPERATIONS

The lines between information technology (IT) and operational technology (OT) are becoming increasingly blurred. Previously these technology categories operated separately, but today they are intertwined and many OT systems rely on IT technology. This convergence creates new attack vectors that bad actors can exploit, requiring a different approach to cybersecurity than traditional IT security. To mitigate these risks, cyber professionals need to understand the technologies and control systems in use across their organizations. Hear from an industry expert about IT/OT convergence and the technologies and systems to consider when securing devices and processes that impact the physical world.

Start Course


Supply Chain Security

DELIVERY METHOD: ON-DEMAND | TIME: 30 MINUTES | EXPERIENCE: VIDEO | CPE: 0.50 | PROFICENCY LEVEL: FOUNDATIONAL | LANGUAGE: ENGLISH | KNOWLEDGE AREA: OPERATIONS

This learning experience focuses on developing a systematic approach to assessing and mitigating supply chain risks, with an emphasis on prioritization and onboarding of suppliers. It includes practical techniques to ensure the security of suppliers, evaluate their risk profiles and establish appropriate measures for assurance. You’ll learn how to hone your skills to optimize supplier contracts and service-level agreements.

Start Course


Why ISC2 Express Courses?

  • Stay current and demonstrate knowledge of emerging cybersecurity topics
  • Access quick, on-demand learning that fits your busy schedule
  • Earn CPE credits

With ISC2 Express Courses you get:

  • Self-paced cybersecurity education available on demand 24/7
  • Content created by leading minds in the field
  • Learning activities focused on real-world applications

Dive in and start building your knowledge today.