Security Operations Express Courses
Stay in Front of SecOps Trends + Earn CPE Credits
Build your SecOps skills with ISC2 Security Operations Express Courses, created by industry experts and available on demand. Grow what you know and earn CPE credits with short-format learning designed to fit your busy schedule.
Building a Strong Culture of Security: Foundations of Engaging SETA
DELIVERY METHOD: ON-DEMAND | TIME: 1 HOUR | EXPERIENCE: VIDEO + APPLIED SCENARIOS + KNOWLEDGE CHECKS | CPE: 1 | PROFICENCY LEVEL: FOUNDATIONAL | LANGUAGE: ENGLISH | KNOWLEDGE AREA: STRATEGY
This course provides a brief introduction to the learning continuum of security education training and awareness (SETA), including the fundamental of learning and impactful and engaging delivery techniques. By carefully considering these elements, security professionals can strengthen the effectiveness of their SETA programs and improve engagement in their organizations.
Cybersecurity in Industrial Control Systems (ICS)
DELIVERY METHOD: ON-DEMAND | TIME: 2 HOURS | EXPERIENCE: VIDEO + APPLIED SCENARIOS + KNOWLEDGE CHECKS | CPE: 2 | PROFICENCY LEVEL: FOUNDATIONAL | LANGUAGE: ENGLISH | KNOWLEDGE AREA: OPERATIONS
Cybersecurity in industrial control systems (ICS) refers to the measures and practices implemented to protect critical infrastructure. It encompasses the hardware, software and networked systems used to monitor and control industrial processes. This course explores IT and OT perspectives, the inverted CIA triad and ICS devices, enabling you to support critical infrastructure and the need for ICS security.
Data Protection: Classification, Categorization and Security of Data
DELIVERY METHOD: ON-DEMAND | TIME: 1 HOUR | EXPERIENCE: VIDEO + APPLIED SCENARIO + KNOWLEDGE CHECKS | CPE: 1 | PROFICENCY LEVEL: FOUNDATIONAL | LANGUAGE: ENGLISH | KNOWLEDGE AREA: STRATEGY
Follow the SemiSwiss team as they identify the active flows of information within an organization to gain a better understanding of best practices, including how they are structured and implemented. This may sound like a challenge, but it is also an opportunity to improve overall data efficiency and organization.
Data Protection: Impact, Analysis and Management of Violations
DELIVERY METHOD: ON-DEMAND | TIME: 1 HOUR | EXPERIENCE: VIDEO + APPLIED SCENARIOS + KNOWLEDGE CHECKS | CPE: 1 | PROFICENCY LEVEL: INTERMEDIATE | LANGUAGE: ENGLISH | KNOWLEDGE AREA: COMPLIANCE
Follow the SemiSwiss team as they experience the business impacts of violating a privacy or data protection regulation. The team learns more about the data generated by a gap analysis and reflects on the importance of maintaining a clear picture of organizational data.
ICS Convergence
DELIVERY METHOD: ON-DEMAND | TIME: 1 HOUR | EXPERIENCE: VIDEO + APPLIED SCENARIOS + KNOWLEDGE CHECKS | CPE: 0.50 | PROFICENCY LEVEL: FOUNDATIONAL | LANGUAGE: ENGLISH | KNOWLEDGE AREA: OPERATIONS
Industrial control systems (ICS) convergence refers to the merging of traditionally isolated operational technology networks and systems with information technology networks and systems. This merging poses unique security challenges that can be addressed through leveraging emerging technologies and hazard analysis and control protocols.
Open-Source Intelligence
DELIVERY METHOD: ON-DEMAND | TIME: 30 MINUTES | EXPERIENCE: VIDEO | CPE: 0.50 | PROFICENCY LEVEL: INTERMEDIATE | LANGUAGE: ENGLISH | KNOWLEDGE AREA: OPERATIONS
In this open-source intelligence (OSINT) course, you’ll learn how to defend against adversaries, protect your systems and gain an advantage over competitors. We’ll start by exploring practical examples from a bad actor’s perspective. You’ll gain insights into the various OSINT sources available, such as social media, procurement websites and mainstream news. We’ll also delve into the crucial role of OSINT in identifying and mitigating cyberthreats like botnets and denial-of-service attacks. Finally, you’ll gain hands-on experience by using OSINT tools to assess vulnerabilities and improve your organization’s security posture.
Preventing and Mitigating API Data Breaches
DELIVERY METHOD: ON-DEMAND | TIME: 15 MINUTES | EXPERIENCE: ARTICLE + SKILL APPLICATION EXERCISE | CPE: 0.50 | PROFICENCY LEVEL: FOUNDATIONAL | LANGUAGE: ENGLISH | KNOWLEDGE AREA: OPERATIONS
More organizations are adopting APIs and connecting to other systems, including healthcare, financial services and other industries that handle sensitive personal information. APIs have consequently become a common target for attackers, providing an easy entry point into an organization’s systems. This course explores the circumstances behind several widely publicized API breaches and the most common threats and vulnerabilities that can expose APIs to attack. You’ll learn steps your organization can take to protect your APIs.
Security in the IoT Ecosystem
DELIVERY METHOD: ON-DEMAND | TIME: 1 HOUR | EXPERIENCE: VIDEO + APPLIED SCENARIOS + KNOWLEDGE CHECKS | CPE: 1 | PROFICENCY LEVEL: INTERMEDIATE | LANGUAGE: ENGLISH | KNOWLEDGE AREA: OPERATIONS
The internet of things (IoT) ecosystem has transformed the ways we interact with technology and the world around us and has ushered in significant security challenges. Securing the IoT ecosystem is crucial to protect sensitive data, ensure privacy and mitigate potential risks.
Security in the IoT Ecosystem: What is IoT and the IoT Ecosystem?
DELIVERY METHOD: ON-DEMAND | TIME: 1 HOUR | EXPERIENCE: VIDEO + APPLIED SCENARIOS + KNOWLEDGE CHECKS | CPE: 1 | PROFICENCY LEVEL: FOUNDATIONAL | LANGUAGE: ENGLISH | KNOWLEDGE AREA: OPERATIONS
IoT connects billions of objects and devices to the internet, enabling data collection and sharing for data-driven decisions. It empowers businesses to innovate through remote access and control of devices. IoT is a complex ecosystem of technologies, products and services applied across various industries. This course explores IoT reference architectures and real-life examples, focusing on security vulnerabilities within IoT layers.
Why ISC2 Express Courses?
- Stay current and demonstrate knowledge of emerging cybersecurity topics
- Access quick, on-demand learning that fits your busy schedule
- Earn CPE credits
With ISC2 Express Courses you get:
- Self-paced cybersecurity education available on demand 24/7
- Content created by leading minds in the field
- Learning activities focused on real-world applications
Dive in and start building your knowledge today.