Security Operations Skill-Builders
![](https://media.isc2.org/-/media/Project/ISC2/Main/Media/skill-builders/Security-Operations-Skill-Builder-700x700.png?h=700&iar=0&w=700&rev=f7abe2de6867403ea1c19a23cda9d688&hash=EA59845607C592F482283E1D3A6AE923)
Stay in Front of SecOps Trends
Build your SecOps skills with ISC2 Security Operations Skill-Builders, created by industry experts and available now on demand. Grow what you know with short-format learning designed to fit your busy schedule. Become versed in the fundamentals of threat detection and incident response, including security orchestration, automation and response. Don't miss out – start building skills today and stay at the forefront of security operations.
Preventing and Mitigating API Data Breaches
DELIVERY METHOD: ON-DEMAND | TIME: 15 MINUTES | EXPERIENCE: ARTICLE + SKILL APPLICATION EXERCISE | CPE: 0.50 | PROFICENCY LEVEL: FOUNDATIONAL | LANGUAGE: ENGLISH | KNOWLEDGE AREA: OPERATIONS
As more organizations adopt application programming interfaces (APIs), they’ve become a target for bad actors as an easy entry point into their systems. This course explores the circumstances behind several widely publicized API breaches and the most common threats and vulnerabilities that can expose APIs to attack.
Non-Member $19.00 Free for Members
Data Protection: Classification, Categorization and Security of Data
DELIVERY METHOD: ON-DEMAND | TIME: 1 HOUR | EXPERIENCE: VIDEO + APPLIED SCENARIO + KNOWLEDGE CHECKS | CPE: 1 | PROFICENCY LEVEL: FOUNDATIONAL | LANGUAGE: ENGLISH | KNOWLEDGE AREA: STRATEGY
After discussing the impacts of violating a data protection regulation, a cybersecurity team dives into their current data classification, categorization and security practices. Find out how it turns out to be an opportunity to improve overall data efficiency and their organization.
Non-Member $35.00 Free for Members
Cybersecurity in Industrial Control Systems (ICS)
DELIVERY METHOD: ON-DEMAND | TIME: 2 HOURS | EXPERIENCE: VIDEO + APPLIED SCENARIOS + KNOWLEDGE CHECKS | CPE: 2 | PROFICENCY LEVEL: FOUNDATIONAL | LANGUAGE: ENGLISH | KNOWLEDGE AREA: OPERATIONS
Explore IT and OT perspectives, the inverted CIA triad and industrial control system (ICS) devices to support critical infrastructure and the need for ICS security at your organization. This course will guide you through the fundamental concepts around security concerns.
Non-Member $45.00 Free for Members
Building a Strong Culture of Security: Foundations of Engaging SETA
DELIVERY METHOD: ON-DEMAND | TIME: 1 HOUR | EXPERIENCE: VIDEO + APPLIED SCENARIOS + KNOWLEDGE CHECKS | CPE: 1 | PROFICENCY LEVEL: FOUNDATIONAL | LANGUAGE: ENGLISH | KNOWLEDGE AREA: STRATEGY
Learn how to build a strong security education, training and awareness (SETA) program at your organization. This course provides an introduction to the learning continuum of SETA, the ABCs of learning, and engaging and impactful delivery techniques.
Non-Member $35.00 Free for Members
ICS Convergence
DELIVERY METHOD: ON-DEMAND | TIME: 1 HOUR | EXPERIENCE: VIDEO + APPLIED SCENARIOS + KNOWLEDGE CHECKS | CPE: 0.50 | PROFICENCY LEVEL: FOUNDATIONAL | LANGUAGE: ENGLISH | KNOWLEDGE AREA: OPERATIONS
Merging traditionally isolated operational technology (OT) with information technology (IT) networks and systems presents unique security challenges. Learn how to leverage emerging technologies, hazard analysis and control protocols to address them.
Non-Member $19.00 Free for Members
Data Protection: Impact, Analysis and Management of Violations
DELIVERY METHOD: ON-DEMAND | TIME: 1 HOUR | EXPERIENCE: VIDEO + APPLIED SCENARIOS + KNOWLEDGE CHECKS | CPE: 1 | PROFICENCY LEVEL: INTERMEDIATE | LANGUAGE: ENGLISH | KNOWLEDGE AREA: COMPLIANCE
Without ongoing and deliberate privacy practices in place, organizations may find themselves in violation of global laws and regulations. Learn about the data generated by a gap analysis and the importance of maintaining a clear picture of organizational data.
Non-Member $35.00 Free for Members
Security in the IoT Ecosystem
DELIVERY METHOD: ON-DEMAND | TIME: 1 HOUR | EXPERIENCE: VIDEO + APPLIED SCENARIOS + KNOWLEDGE CHECKS | CPE: 1 | PROFICENCY LEVEL: INTERMEDIATE | LANGUAGE: ENGLISH | KNOWLEDGE AREA: OPERATIONS
Securing the IoT ecosystem is crucial to protect sensitive data, ensure privacy and mitigate potential risks. Learn how to identify threats, vulnerabilities and risks in IoT deployment, and what distinguishes direct and indirect safety hazards.
Non-Member $35.00 Free for Members
Security in the IoT Ecosystem: What is IoT and the IoT Ecosystem?
DELIVERY METHOD: ON-DEMAND | TIME: 1 HOUR | EXPERIENCE: VIDEO + APPLIED SCENARIOS + KNOWLEDGE CHECKS | CPE: 1 | PROFICENCY LEVEL: FOUNDATIONAL | LANGUAGE: ENGLISH | KNOWLEDGE AREA: OPERATIONS
IoT is a complex ecosystem of technologies, products and services applied across industries. This course explores IoT reference architectures and real-life examples, focusing on security vulnerabilities within IoT layers.
Non-Member $35.00 Free for Members
Open Source Intelligence
DELIVERY METHOD: ON-DEMAND | TIME: 30 MINUTES | EXPERIENCE: VIDEO | CPE: 0.50 | PROFICENCY LEVEL: INTERMEDIATE | LANGUAGE: ENGLISH | KNOWLEDGE AREA: OPERATIONS
Find out what open source intelligence (OSINT) means, where to get started when using it and examples of what it looks like from a malicious actor's point of view. You'll be able to determine if OSINT being used against you, as well as where you might want to use it yourself.
Non-Member $19.00 Free for Members
Why ISC2 Skill-Builders?
- Stay current and demonstrate knowledge of emerging cybersecurity topics
- Receive quick, on-demand learning that fits your busy schedule
- Earn CPE credits
With ISC2 Skill-Builders you get:
- Access to self-paced cybersecurity education 24/7
- Content created by leading minds in the field
- Learning activities focused on real-world applications
Dive in and start building your skills today. Take advantage of exclusive bundle pricing and receive 20% off when you bundle all Security Operations Skill-Builders. Get the bundle.