Top of Page
 

Build your skills + earn CPE credits

New! (ISC)² Skill-Builders

Stay in front of the hottest topics and trends impacting your current role and your cybersecurity career with (ISC)² Skill-Builders, created by industry experts and available now on demand. Grow what you know and earn CPE credits with short-format learning designed to fit your busy schedule.

(ISC)² Skill-Builders cover the following areas:

Cloud Security

  • An Orientation to Cloud Native
  • Zero Trust Architecture in the Cloud

Cloud Security

 

Cybersecurity Leadership

  • An Ethical Conundrum – The Rise of AI Chatbots
  • The What, Why, Who and How of Cybersecurity Strategy
  • Budget and Talent Shortfalls
  • Cyber Ethics Overview
  • Cybersecurity Strategies
  • Developing an API Security Strategy
  • Best Practices in Managing IoT Cybersecurity
  • Building an Organizational Culture
  • Implementing and Reviewing SETA Programs
  • Planning a SETA Program
  • Security in the IoT: Surveying IoT Security Challenges
  • Challenges Integrating Cyber Risk with Business Risk
  • Cybersecurity Burnout
  • Zero Trust for Identity: Strategies and Leadership to Protect Organizations
  • Translating Cyber Risk into Business Language for Effective Leadership

Cybersecurity Leadership

Entry-level Cybersecurity

  • Supply Chain Risk Management (SCRM) through Governance, Risk and Compliance (GRC)
  • Preventing and Mitigating API Data Breaches
  • Cybersecurity Strategies
  • Developing an API Security Strategy

Entry-level Cybersecurity

Governance, Risk and Compliance

  • Supply Chain Risk Management (SCRM) through Governance, Risk and Compliance (GRC)
  • Quantifying Risk Factors in Small to Medium Businesses
  • Complying with Regulations, Laws, Standards and Frameworks
  • ICS Standards, Regulations and Frameworks
  • Repairing Policies and Procedures
  • Cloud Governance, Risk and Compliance
  • Guidance to Maintaining GRC and Security Posture for Multicloud Infrastructures
  • Jumpstarting the Key Components of Your GRC Program
  • Data Privacy and Protection: Introduction to Compliance Requirements
  • Eight Steps to Establish a Successful Governance, Risk and Compliance Program

Governance, Risk and Compliance

Network Security

  • First Steps for Supply Chain Security
  • IT/OT Convergence: The Good, the Bad and the Ugly
  • Introduction to Denial of Service Attacks
  • Supply Chain Security

Network Security

 

Security Operations

  • Preventing and Mitigating API Data Breaches
  • Classification, Categorization and Security of Data
  • Cybersecurity of Industrial Control Systems
  • Foundations of Engaging SETA
  • ICS Convergence
  • Impact, Analysis and Management of Violations
  • Security in the IoT Ecosystem
  • Security in the IoT Ecosystem: What is IoT and the IoT Ecosystem?
  • Open Systems Intelligence

Security Operations

Software Security

  • The Future of API Security
  • Software Security: Fixing Forward at Scale in Real Life
  • Application Programming Interface Security Best Practices
  • Exploring the Impacts of Generative AI on Cybersecurity

Software Security

Why (ISC)² Skill-Builders?

  • Commit to maintaining your (ISC)² certification with continuing professional development
  • Stay current and demonstrate knowledge of emerging cybersecurity topics
  • Earn CPE credits

With (ISC)² Skill-Builders you get:

  • Access to self-paced cybersecurity education 24/7
  • Learning activities focused on real-world applications

Dive in and start building your skills today. Take advantage of exclusive introductory pricing, ending soon.

(ISC)² Candidate

Become an (ISC)² Candidate and join the world’s leading cybersecurity membership association. Access world-class educational resources, networking opportunities, events and exclusive discounts on online certification training. Get started today.

Ok