(ISC)²

(ISC)² is an international nonprofit membership association focused on inspiring a safe and secure cyber world. Best known for the acclaimed Certified Information Systems Security Professional (CISSP®) certification, (ISC)2 offers a portfolio of credentials that are part of a holistic, programmatic approach to security.

Sort options

Risk Management: Use of Access Controls to Protect Assets (Coursera)

Course 2: Understanding Risk Management Options and the Use of Access Controls to Protect Assets. In this course, we will focus on understanding risk management options and the use of access controls to protect assets.

Introducing Security: Aligning Asset and Risk Management (Coursera)

Course 1 - Introducing Security and Aligning Asset Management to Risk Management. In this course, we're going to start by discussing the security concepts, identifying corporate assets, and discussing the risk management process.

Cloud and Wireless Security (Coursera)

Course 6: Cloud and Wireless Security. Welcome to course six. This course applies to security concepts, ideas, and considerations to two major changes that we have experienced in recent years. It's regarding the way we use the data.

Incident Detection and Response (Coursera)

Dec 5th 2022
Incident Detection and Response (Coursera)
Course Auditing
Categories
Effort
Languages
Course 7: Incident Detection and Response. Welcome to course seven, Incident Detection and Response. Having an intruder inside your systems for months unnoticed by your systems, administrators, security specialists, and end-users is tantamount to giving the intruder, the keys to your business or organization. In many cases, organizations discover [...]

Maturing Risk Management (Coursera)

Dec 5th 2022
Maturing Risk Management (Coursera)
Course Auditing
Categories
Effort
Languages
Course 8: Maturing Risk Management. In management science terms, maturing a process or practice means taking positive steps over time to make it more reliable, repeatable and efficient. In practice, this means getting better every day, while showing the measurements that demonstrate improvement and suggest other opportunities to improve. [...]

Securing Software, Data and End Points (Coursera)

Dec 5th 2022
Securing Software, Data and End Points (Coursera)
Course Auditing
Categories
Effort
Languages
Welcome to Course Four. As we know, most attacks against systems involve exploiting vulnerabilities in software that powers hardware. Additionally, attackers may exploit vulnerabilities in the underlying hardware, especially when that hardware is for the protected against being stolen or accessed with unauthorized use, but their real target and [...]

Security Awareness Training (Coursera)

Nov 28th 2022
Security Awareness Training (Coursera)
Free Course
Categories
Effort
Languages
The security of an organization is of the utmost importance and every member of the organization's staff plays a vital role in defending against cyber threats. One of the best ways to protect the organization is to institute a company-wide security-awareness training initiative.