Security Operations Express Courses

Stay in Front of SecOps Trends + Earn CPE Credits

Build your SecOps skills with ISC2 Security Operations Express Courses, created by industry experts and available on demand. Grow what you know and earn CPE credits with short-format learning designed to fit your busy schedule.


Building a Strong Culture of Security: Foundations of Engaging SETA

DELIVERY METHOD: ON-DEMAND | TIME: 1 HOUR | EXPERIENCE: VIDEO + APPLIED SCENARIOS + KNOWLEDGE CHECKS | CPE: 1 | PROFICENCY LEVEL: FOUNDATIONAL | LANGUAGE: ENGLISH | KNOWLEDGE AREA: STRATEGY

This course provides a brief introduction to the learning continuum of security education training and awareness (SETA), including the fundamental of learning and impactful and engaging delivery techniques. By carefully considering these elements, security professionals can strengthen the effectiveness of their SETA programs and improve engagement in their organizations.

Start Course


Cybersecurity in Industrial Control Systems (ICS)

DELIVERY METHOD: ON-DEMAND | TIME: 2 HOURS | EXPERIENCE: VIDEO + APPLIED SCENARIOS + KNOWLEDGE CHECKS | CPE: 2 | PROFICENCY LEVEL: FOUNDATIONAL | LANGUAGE: ENGLISH | KNOWLEDGE AREA: OPERATIONS

Cybersecurity in industrial control systems (ICS) refers to the measures and practices implemented to protect critical infrastructure. It encompasses the hardware, software and networked systems used to monitor and control industrial processes. This course explores IT and OT perspectives, the inverted CIA triad and ICS devices, enabling you to support critical infrastructure and the need for ICS security.

Start Course


Data Protection: Classification, Categorization and Security of Data

DELIVERY METHOD: ON-DEMAND | TIME: 1 HOUR | EXPERIENCE: VIDEO + APPLIED SCENARIO + KNOWLEDGE CHECKS | CPE: 1 | PROFICENCY LEVEL: FOUNDATIONAL | LANGUAGE: ENGLISH | KNOWLEDGE AREA: STRATEGY

Follow the SemiSwiss team as they identify the active flows of information within an organization to gain a better understanding of best practices, including how they are structured and implemented. This may sound like a challenge, but it is also an opportunity to improve overall data efficiency and organization.

Start Course


Data Protection: Impact, Analysis and Management of Violations

DELIVERY METHOD: ON-DEMAND | TIME: 1 HOUR | EXPERIENCE: VIDEO + APPLIED SCENARIOS + KNOWLEDGE CHECKS | CPE: 1 | PROFICENCY LEVEL: INTERMEDIATE | LANGUAGE: ENGLISH | KNOWLEDGE AREA: COMPLIANCE

Follow the SemiSwiss team as they experience the business impacts of violating a privacy or data protection regulation. The team learns more about the data generated by a gap analysis and reflects on the importance of maintaining a clear picture of organizational data.

Start Course


ICS Convergence

DELIVERY METHOD: ON-DEMAND | TIME: 1 HOUR | EXPERIENCE: VIDEO + APPLIED SCENARIOS + KNOWLEDGE CHECKS | CPE: 0.50 | PROFICENCY LEVEL: FOUNDATIONAL | LANGUAGE: ENGLISH | KNOWLEDGE AREA: OPERATIONS

Industrial control systems (ICS) convergence refers to the merging of traditionally isolated operational technology networks and systems with information technology networks and systems. This merging poses unique security challenges that can be addressed through leveraging emerging technologies and hazard analysis and control protocols.

Start Course


Open-Source Intelligence

DELIVERY METHOD: ON-DEMAND | TIME: 30 MINUTES | EXPERIENCE: VIDEO | CPE: 0.50 | PROFICENCY LEVEL: INTERMEDIATE | LANGUAGE: ENGLISH | KNOWLEDGE AREA: OPERATIONS

In this open-source intelligence (OSINT) course, you’ll learn how to defend against adversaries, protect your systems and gain an advantage over competitors. We’ll start by exploring practical examples from a bad actor’s perspective. You’ll gain insights into the various OSINT sources available, such as social media, procurement websites and mainstream news. We’ll also delve into the crucial role of OSINT in identifying and mitigating cyberthreats like botnets and denial-of-service attacks. Finally, you’ll gain hands-on experience by using OSINT tools to assess vulnerabilities and improve your organization’s security posture.

Start Course


Preventing and Mitigating API Data Breaches

DELIVERY METHOD: ON-DEMAND | TIME: 15 MINUTES | EXPERIENCE: ARTICLE + SKILL APPLICATION EXERCISE | CPE: 0.50 | PROFICENCY LEVEL: FOUNDATIONAL | LANGUAGE: ENGLISH | KNOWLEDGE AREA: OPERATIONS

More organizations are adopting APIs and connecting to other systems, including healthcare, financial services and other industries that handle sensitive personal information. APIs have consequently become a common target for attackers, providing an easy entry point into an organization’s systems. This course explores the circumstances behind several widely publicized API breaches and the most common threats and vulnerabilities that can expose APIs to attack. You’ll learn steps your organization can take to protect your APIs.

Start Course


Security in the IoT Ecosystem

DELIVERY METHOD: ON-DEMAND | TIME: 1 HOUR | EXPERIENCE: VIDEO + APPLIED SCENARIOS + KNOWLEDGE CHECKS | CPE: 1 | PROFICENCY LEVEL: INTERMEDIATE | LANGUAGE: ENGLISH | KNOWLEDGE AREA: OPERATIONS

The internet of things (IoT) ecosystem has transformed the ways we interact with technology and the world around us and has ushered in significant security challenges. Securing the IoT ecosystem is crucial to protect sensitive data, ensure privacy and mitigate potential risks.

Start Course


Security in the IoT Ecosystem: What is IoT and the IoT Ecosystem?

DELIVERY METHOD: ON-DEMAND | TIME: 1 HOUR | EXPERIENCE: VIDEO + APPLIED SCENARIOS + KNOWLEDGE CHECKS | CPE: 1 | PROFICENCY LEVEL: FOUNDATIONAL | LANGUAGE: ENGLISH | KNOWLEDGE AREA: OPERATIONS

IoT connects billions of objects and devices to the internet, enabling data collection and sharing for data-driven decisions. It empowers businesses to innovate through remote access and control of devices. IoT is a complex ecosystem of technologies, products and services applied across various industries. This course explores IoT reference architectures and real-life examples, focusing on security vulnerabilities within IoT layers.

Start Course


Why ISC2 Express Courses?

  • Stay current and demonstrate knowledge of emerging cybersecurity topics
  • Access quick, on-demand learning that fits your busy schedule
  • Earn CPE credits

With ISC2 Express Courses you get:

  • Self-paced cybersecurity education available on demand 24/7
  • Content created by leading minds in the field
  • Learning activities focused on real-world applications

Dive in and start building your knowledge today.