Skip to content

Commit

Permalink
feat: certs batch upload
Browse files Browse the repository at this point in the history
  • Loading branch information
ebalo55 committed Sep 30, 2024
1 parent fad2921 commit e754f1a
Show file tree
Hide file tree
Showing 16 changed files with 685 additions and 0 deletions.
Binary file added src/assets/ISC2-GRC.png
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Binary file added src/assets/ISC2-Risk-Management-Certificates.png
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Binary file added src/assets/ISC2-Sec-Ops-Courses.png
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Original file line number Diff line number Diff line change
@@ -0,0 +1,68 @@
---
title: "ISC2 Governance, Risk and Compliance Courses"
acronym: "GRC"
last_updated_at: 2024-09-30
image: "../../../assets/ISC2-GRC.png"
reference: "https://www.isc2.org/professional-development/courses/grc"
aliases:
- "GRC Certification"
draft: false
career_paths:
- "Cybersecurity Manager"
- "Risk Management Specialist"
- "Security Operations Specialist"
price: "32"
currency: "$"
---

# {frontmatter.title} ({frontmatter.acronym})

## Overview

The **ISC2 Governance, Risk and Compliance Courses (GRC)** are designed to equip cybersecurity professionals with the
necessary skills to assess risk and ensure regulatory compliance in an increasingly complex threat landscape. These
courses provide insights into the latest strategies for managing governance, risk, and compliance effectively.

The certification validates an individual’s ability to:

- Implement governance frameworks to protect digital assets.
- Assess and manage cybersecurity risks using established standards.
- Ensure compliance with regulatory requirements.

## Course Details

The GRC bundle includes key courses focused on governance, risk management, and compliance:

1. **NIST Cybersecurity Framework 2.0**: This one-hour on-demand course covers how the NIST Cybersecurity Framework can
be utilized to prioritize and manage cybersecurity expectations. It reviews the non-prescriptive, risk-based approach
of the framework, examining its components, activities, and functions.

### Topics Covered:

- Overview of the NIST Cybersecurity Framework.
- Risk-based approaches to managing cybersecurity.
- Implementation strategies for governance and compliance.

## Exam Structure

The GRC courses do not have a formal exam structure. Participants complete the modules at their own pace and earn CPE
credits upon successful completion.

### Key Exam Requirements:

- Completion of course content.
- Participation in learning activities and assessments.

## Who Should Take GRC?

The GRC courses are ideal for:

- Cybersecurity managers looking to enhance their governance skills.
- Risk management specialists aiming to implement effective compliance strategies.
- Security operations specialists focused on aligning security practices with regulatory requirements.

## Resources

- **Course Offerings
**: [ISC2 Governance, Risk and Compliance Courses](https://www.isc2.org/professional-development/courses/grc)
- **Pricing Information**: Non-Member Price: $32 | Member Price: $19
Original file line number Diff line number Diff line change
@@ -0,0 +1,92 @@
---
title: "ISC2 Governance, Risk and Compliance Skill-Builders"
acronym: "GRC-SB"
last_updated_at: 2024-09-30
image: "../../../assets/ISC2-Governance-Risk-Compliance-Skill-Builder.png"
reference: "https://www.isc2.org/professional-development/skill-builders/governance-risk-and-compliance"
aliases:
- "GRC Skill-Builders Certification"
draft: false
career_paths:
- "Cybersecurity Manager"
- "Risk Management Specialist"
- "Security Operations Specialist"
price: "205"
currency: "$"
---

# {frontmatter.title} ({frontmatter.acronym})

## Overview

The **ISC2 Governance, Risk and Compliance Skill-Builders (GRC-SB)** are designed to enhance the skills of cybersecurity
professionals in managing governance, risk, and compliance effectively. These on-demand courses provide essential
insights into aligning IT objectives while managing cyber risks and meeting regulatory requirements.

The certification validates an individual’s ability to:

- Implement effective governance frameworks.
- Assess and manage risks within an organization.
- Ensure compliance with evolving regulations and standards.

## Course Details

The GRC-SB bundle includes several key modules:

1. **Supply Chain Risk Management (SCRM) through Governance, Risk and Compliance**: This 15-minute module focuses on
protecting supply chains from cyber threats through effective governance and compliance strategies.

2. **Security Risk Management in a Small to Medium Business Environment**: This 15-minute module teaches how to analyze
risk factors in small to medium businesses and prepare for potential data breaches.

3. **Data Protections: Complying with Regulations, Laws, Standards and Frameworks**: A one-hour course that explores
evolving privacy regulations and how to ensure compliance through practical scenarios.

4. **ICS Standards, Regulations and Frameworks**: This one-hour module covers the importance of implementing standards
for industrial control systems (ICS) to ensure security and reliability.

5. **Data Protection: Repairing Policies and Procedures**: Learn how to refine organizational policies after a breach in
this one-hour course focused on risk ranking and prioritization.

6. **Cloud Governance, Risk and Compliance**: A 30-minute module that explores cloud compliance reports and their
implications for organizational security.

7. **Guidance to Maintaining GRC and Security Posture for Multicloud Infrastructures**: This 15-minute module provides
strategies for managing risk across multicloud environments.

8. **Jumpstarting the Key Components of Your GRC Program**: A foundational course that discusses essential elements for
developing or improving a GRC program.

9. **Data Privacy and Protection: Introduction to Compliance Requirements**: This 15-minute module introduces key
compliance requirements related to data privacy.

10. **Eight Steps to Establish a Successful GRC Program**: Walk through steps for implementing an effective GRC program
in this 15-minute course.

11. **Global Approaches to Cyber Policy, Legislation and Regulation**: A one-hour interactive tour discussing cyber
policies across various global regions.

### Key Benefits:

- Stay current with emerging governance, risk, and compliance topics.
- Quick, on-demand learning that fits your busy schedule.
- Earn CPE credits for maintaining your ISC2 certifications.

## Exam Structure

The GRC-SB modules do not have a formal exam structure. Participants complete the modules at their own pace and earn CPE
credits upon successful completion.

## Who Should Take GRC-SB?

The GRC-SB is ideal for:

- Cybersecurity managers looking to enhance their governance skills.
- Risk management specialists aiming to implement effective compliance strategies.
- Security operations specialists focused on aligning security practices with regulatory requirements.

## Resources

- **Module Offerings
**: [ISC2 Governance, Risk and Compliance Skill-Builders](https://www.isc2.org/professional-development/skill-builders/governance-risk-and-compliance)
- **Pricing Information**: Non-Member Price: $19 | Free for Members
Original file line number Diff line number Diff line change
@@ -0,0 +1,90 @@
---
title: "ISC2 Network Security Skill-Builders"
acronym: "NSSB"
last_updated_at: 2024-09-30
image: "../../../assets/ISC2-Network-Security-Skill-Builder.png"
reference: "https://www.isc2.org/professional-development/skill-builders/network-security"
aliases:
- "Network Security Certification"
draft: false
career_paths:
- "Cybersecurity Manager"
- "Risk Management Specialist"
- "Security Operations Specialist"
price: "61"
currency: "$"
---

# {frontmatter.title} ({frontmatter.acronym})

## Overview

The **ISC2 Network Security Skill-Builders (NSSB)** are designed to enhance your skills in protecting the
confidentiality, integrity, and availability of information across networks. Created by industry experts, these
on-demand courses provide short-format learning tailored to fit your busy schedule, enabling you to stay at the
forefront of network security.

The certification validates an individual’s ability to:

- Manage access controls and network security.
- Operate and configure network-based security devices.
- Understand emerging trends in network security.

## Course Details

The NSSB bundle includes several key modules:

1. **First Steps for Supply Chain Security**
- **Delivery Method**: On-Demand
- **Duration**: 30 Minutes
- **CPE**: 0.50
- **Proficiency Level**: Foundational
- This module covers the importance of mapping your supply chain and integrating risk management processes to
control risks effectively.

2. **IT/OT Convergence: The Good, the Bad and the Ugly**
- **Delivery Method**: On-Demand
- **Duration**: 30 Minutes
- **CPE**: 0.50
- **Proficiency Level**: Foundational
- Explore how the convergence of IT and operational technology creates new attack vectors and requires a different
cybersecurity approach.

3. **Introduction to Denial of Service Attacks**
- **Delivery Method**: On-Demand
- **Duration**: 15 Minutes
- **CPE**: 0.50
- **Proficiency Level**: Intermediate
- Learn to identify denial of service attacks, their methods, and protective measures for your organization.

4. **Supply Chain Security**
- **Delivery Method**: On-Demand
- **Duration**: 30 Minutes
- **CPE**: 0.50
- **Proficiency Level**: Foundational
- Gain strategies for assessing and mitigating supply chain risks effectively.

### Key Benefits:

- Stay current with emerging network security topics.
- Quick, on-demand learning that fits your busy schedule.
- Earn CPE credits for maintaining your ISC2 certifications.

## Exam Structure

The NSSB modules do not have a formal exam structure. Participants complete the modules at their own pace and earn CPE
credits upon successful completion.

## Who Should Take NSSB?

The NSSB is ideal for:

- Cybersecurity managers looking to enhance their network security skills.
- Risk management specialists aiming to understand supply chain risks.
- Security operations specialists focused on managing network security effectively.

## Resources

- **Module Offerings
**: [ISC2 Network Security Skill-Builders](https://www.isc2.org/professional-development/skill-builders/network-security)
- **Pricing Information**: Non-Member Price: $19 | Free for Members
Original file line number Diff line number Diff line change
@@ -0,0 +1,84 @@
---
title: "ISC2 Protecting Data Using Zero Trust Courses"
acronym: "ZTC"
last_updated_at: 2024-09-30
image: "../../../assets/ISC2-Sec-Ops-Courses.png"
reference: "https://www.isc2.org/professional-development/courses/protecting-data-using-zero-trust"
aliases:
- "Zero Trust Certification"
draft: false
career_paths:
- "Cybersecurity Manager"
- "Risk Management Specialist"
- "Security Operations Specialist"
price: "73"
currency: "$"
---

# {frontmatter.title} ({frontmatter.acronym})

## Overview

The **ISC2 Protecting Data Using Zero Trust Courses (ZTC)** are designed to equip cybersecurity professionals with the
knowledge and skills necessary to transition from traditional perimeter-based security to a zero trust security model.
These courses provide critical insights into granular trust relationships and data-centric security practices.

The certification validates an individual’s ability to:

- Implement zero trust principles within their organization.
- Manage vulnerabilities in a zero trust architecture.
- Conduct continuous monitoring and incident response effectively.

## Course Details

The ZTC bundle includes three key courses:

1. **Defining the Boundaries of Zero Trust**
- **Delivery Method**: On-Demand
- **Duration**: 2 Hours
- **CPE**: 2
- **Proficiency Level**: Foundational
- This course reviews the principles necessary for transitioning to a zero trust model, emphasizing continual
analysis of the security ecosystem.

2. **Vulnerability Management in Zero Trust**
- **Delivery Method**: On-Demand
- **Duration**: 1 Hour
- **CPE**: 1
- **Proficiency Level**: Foundational
- Explore best practices for managing vulnerabilities within a zero trust framework, including risk-based trust
assessments and remediation strategies.

3. **Continuous Monitoring and Incident Response for Zero Trust**
- **Delivery Method**: On-Demand
- **Duration**: 1 Hour
- **CPE**: 1
- **Proficiency Level**: Foundational
- Understand how to implement continuous monitoring and incident response processes tailored for zero trust
environments.

### Key Benefits:

- Act as a pathway to ISC2 SSCP certification.
- Demonstrate commitment to maintaining your ISC2 certification through professional development.
- Stay ahead of the curve by gaining expertise in emerging cybersecurity topics.
- Earn CPE credits for maintaining your certifications.

## Exam Structure

The ZTC courses do not have a formal exam structure. Participants complete the modules at their own pace and earn CPE
credits upon successful completion.

## Who Should Take ZTC?

The ZTC is ideal for:

- Cybersecurity managers looking to enhance their operational knowledge of zero trust principles.
- Risk management specialists aiming to improve their organization's security posture.
- Security operations specialists focused on implementing effective security measures.

## Resources

- **Course Offerings
**: [ISC2 Protecting Data Using Zero Trust Courses](https://www.isc2.org/professional-development/courses/protecting-data-using-zero-trust)
- **Bundle Pricing**: Purchase all three courses and save 20%!
Loading

0 comments on commit e754f1a

Please sign in to comment.