
Build your skills + earn CPE credits
New! (ISC)² Skill-Builders
Stay in front of the hottest topics and trends impacting your current role and your cybersecurity career with (ISC)² Skill-Builders, created by industry experts and available now on demand. Grow what you know and earn CPE credits with short-format learning designed to fit your busy schedule.
(ISC)² Skill-Builders cover the following areas:

Cloud Security
- An Orientation to Cloud Native
- Zero Trust Architecture in the Cloud

Cybersecurity Leadership
- An Ethical Conundrum – The Rise of AI Chatbots
- The What, Why, Who and How of Cybersecurity Strategy
- Budget and Talent Shortfalls
- Cyber Ethics Overview
- Cybersecurity Strategies
- Developing an API Security Strategy
- Best Practices in Managing IoT Cybersecurity
- Building an Organizational Culture
- Implementing and Reviewing SETA Programs
- Planning a SETA Program
- Security in the IoT: Surveying IoT Security Challenges
- Challenges Integrating Cyber Risk with Business Risk
- Cybersecurity Burnout
- Zero Trust for Identity: Strategies and Leadership to Protect Organizations
- Translating Cyber Risk into Business Language for Effective Leadership

Entry-level Cybersecurity
- Supply Chain Risk Management (SCRM) through Governance, Risk and Compliance (GRC)
- Preventing and Mitigating API Data Breaches
- Cybersecurity Strategies
- Developing an API Security Strategy

Governance, Risk and Compliance
- Supply Chain Risk Management (SCRM) through Governance, Risk and Compliance (GRC)
- Quantifying Risk Factors in Small to Medium Businesses
- Complying with Regulations, Laws, Standards and Frameworks
- ICS Standards, Regulations and Frameworks
- Repairing Policies and Procedures
- Cloud Governance, Risk and Compliance
- Guidance to Maintaining GRC and Security Posture for Multicloud Infrastructures
- Jumpstarting the Key Components of Your GRC Program
- Data Privacy and Protection: Introduction to Compliance Requirements
- Eight Steps to Establish a Successful Governance, Risk and Compliance Program

Network Security
- First Steps for Supply Chain Security
- IT/OT Convergence: The Good, the Bad and the Ugly
- Introduction to Denial of Service Attacks
- Supply Chain Security

Security Operations
- Preventing and Mitigating API Data Breaches
- Classification, Categorization and Security of Data
- Cybersecurity of Industrial Control Systems
- Foundations of Engaging SETA
- ICS Convergence
- Impact, Analysis and Management of Violations
- Security in the IoT Ecosystem
- Security in the IoT Ecosystem: What is IoT and the IoT Ecosystem?
- Open Systems Intelligence

Software Security
- The Future of API Security
- Software Security: Fixing Forward at Scale in Real Life
- Application Programming Interface Security Best Practices
- Exploring the Impacts of Generative AI on Cybersecurity
Why (ISC)² Skill-Builders?
- Commit to maintaining your (ISC)² certification with continuing professional development
- Stay current and demonstrate knowledge of emerging cybersecurity topics
- Earn CPE credits
With (ISC)² Skill-Builders you get:
- Access to self-paced cybersecurity education 24/7
- Learning activities focused on real-world applications
Dive in and start building your skills today. Take advantage of exclusive introductory pricing, ending soon.
(ISC)² Candidate
Become an (ISC)² Candidate and join the world’s leading cybersecurity membership association. Access world-class educational resources, networking opportunities, events and exclusive discounts on online certification training. Get started today.