-
-
Notifications
You must be signed in to change notification settings - Fork 1
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
- Loading branch information
Showing
16 changed files
with
685 additions
and
0 deletions.
There are no files selected for viewing
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
68 changes: 68 additions & 0 deletions
68
src/content/certifications/ISC2/governance-risk-and-compliance-courses.mdx
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,68 @@ | ||
--- | ||
title: "ISC2 Governance, Risk and Compliance Courses" | ||
acronym: "GRC" | ||
last_updated_at: 2024-09-30 | ||
image: "../../../assets/ISC2-GRC.png" | ||
reference: "https://www.isc2.org/professional-development/courses/grc" | ||
aliases: | ||
- "GRC Certification" | ||
draft: false | ||
career_paths: | ||
- "Cybersecurity Manager" | ||
- "Risk Management Specialist" | ||
- "Security Operations Specialist" | ||
price: "32" | ||
currency: "$" | ||
--- | ||
|
||
# {frontmatter.title} ({frontmatter.acronym}) | ||
|
||
## Overview | ||
|
||
The **ISC2 Governance, Risk and Compliance Courses (GRC)** are designed to equip cybersecurity professionals with the | ||
necessary skills to assess risk and ensure regulatory compliance in an increasingly complex threat landscape. These | ||
courses provide insights into the latest strategies for managing governance, risk, and compliance effectively. | ||
|
||
The certification validates an individual’s ability to: | ||
|
||
- Implement governance frameworks to protect digital assets. | ||
- Assess and manage cybersecurity risks using established standards. | ||
- Ensure compliance with regulatory requirements. | ||
|
||
## Course Details | ||
|
||
The GRC bundle includes key courses focused on governance, risk management, and compliance: | ||
|
||
1. **NIST Cybersecurity Framework 2.0**: This one-hour on-demand course covers how the NIST Cybersecurity Framework can | ||
be utilized to prioritize and manage cybersecurity expectations. It reviews the non-prescriptive, risk-based approach | ||
of the framework, examining its components, activities, and functions. | ||
|
||
### Topics Covered: | ||
|
||
- Overview of the NIST Cybersecurity Framework. | ||
- Risk-based approaches to managing cybersecurity. | ||
- Implementation strategies for governance and compliance. | ||
|
||
## Exam Structure | ||
|
||
The GRC courses do not have a formal exam structure. Participants complete the modules at their own pace and earn CPE | ||
credits upon successful completion. | ||
|
||
### Key Exam Requirements: | ||
|
||
- Completion of course content. | ||
- Participation in learning activities and assessments. | ||
|
||
## Who Should Take GRC? | ||
|
||
The GRC courses are ideal for: | ||
|
||
- Cybersecurity managers looking to enhance their governance skills. | ||
- Risk management specialists aiming to implement effective compliance strategies. | ||
- Security operations specialists focused on aligning security practices with regulatory requirements. | ||
|
||
## Resources | ||
|
||
- **Course Offerings | ||
**: [ISC2 Governance, Risk and Compliance Courses](https://www.isc2.org/professional-development/courses/grc) | ||
- **Pricing Information**: Non-Member Price: $32 | Member Price: $19 |
92 changes: 92 additions & 0 deletions
92
src/content/certifications/ISC2/governance-risk-and-compliance-skill-builders.mdx
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,92 @@ | ||
--- | ||
title: "ISC2 Governance, Risk and Compliance Skill-Builders" | ||
acronym: "GRC-SB" | ||
last_updated_at: 2024-09-30 | ||
image: "../../../assets/ISC2-Governance-Risk-Compliance-Skill-Builder.png" | ||
reference: "https://www.isc2.org/professional-development/skill-builders/governance-risk-and-compliance" | ||
aliases: | ||
- "GRC Skill-Builders Certification" | ||
draft: false | ||
career_paths: | ||
- "Cybersecurity Manager" | ||
- "Risk Management Specialist" | ||
- "Security Operations Specialist" | ||
price: "205" | ||
currency: "$" | ||
--- | ||
|
||
# {frontmatter.title} ({frontmatter.acronym}) | ||
|
||
## Overview | ||
|
||
The **ISC2 Governance, Risk and Compliance Skill-Builders (GRC-SB)** are designed to enhance the skills of cybersecurity | ||
professionals in managing governance, risk, and compliance effectively. These on-demand courses provide essential | ||
insights into aligning IT objectives while managing cyber risks and meeting regulatory requirements. | ||
|
||
The certification validates an individual’s ability to: | ||
|
||
- Implement effective governance frameworks. | ||
- Assess and manage risks within an organization. | ||
- Ensure compliance with evolving regulations and standards. | ||
|
||
## Course Details | ||
|
||
The GRC-SB bundle includes several key modules: | ||
|
||
1. **Supply Chain Risk Management (SCRM) through Governance, Risk and Compliance**: This 15-minute module focuses on | ||
protecting supply chains from cyber threats through effective governance and compliance strategies. | ||
|
||
2. **Security Risk Management in a Small to Medium Business Environment**: This 15-minute module teaches how to analyze | ||
risk factors in small to medium businesses and prepare for potential data breaches. | ||
|
||
3. **Data Protections: Complying with Regulations, Laws, Standards and Frameworks**: A one-hour course that explores | ||
evolving privacy regulations and how to ensure compliance through practical scenarios. | ||
|
||
4. **ICS Standards, Regulations and Frameworks**: This one-hour module covers the importance of implementing standards | ||
for industrial control systems (ICS) to ensure security and reliability. | ||
|
||
5. **Data Protection: Repairing Policies and Procedures**: Learn how to refine organizational policies after a breach in | ||
this one-hour course focused on risk ranking and prioritization. | ||
|
||
6. **Cloud Governance, Risk and Compliance**: A 30-minute module that explores cloud compliance reports and their | ||
implications for organizational security. | ||
|
||
7. **Guidance to Maintaining GRC and Security Posture for Multicloud Infrastructures**: This 15-minute module provides | ||
strategies for managing risk across multicloud environments. | ||
|
||
8. **Jumpstarting the Key Components of Your GRC Program**: A foundational course that discusses essential elements for | ||
developing or improving a GRC program. | ||
|
||
9. **Data Privacy and Protection: Introduction to Compliance Requirements**: This 15-minute module introduces key | ||
compliance requirements related to data privacy. | ||
|
||
10. **Eight Steps to Establish a Successful GRC Program**: Walk through steps for implementing an effective GRC program | ||
in this 15-minute course. | ||
|
||
11. **Global Approaches to Cyber Policy, Legislation and Regulation**: A one-hour interactive tour discussing cyber | ||
policies across various global regions. | ||
|
||
### Key Benefits: | ||
|
||
- Stay current with emerging governance, risk, and compliance topics. | ||
- Quick, on-demand learning that fits your busy schedule. | ||
- Earn CPE credits for maintaining your ISC2 certifications. | ||
|
||
## Exam Structure | ||
|
||
The GRC-SB modules do not have a formal exam structure. Participants complete the modules at their own pace and earn CPE | ||
credits upon successful completion. | ||
|
||
## Who Should Take GRC-SB? | ||
|
||
The GRC-SB is ideal for: | ||
|
||
- Cybersecurity managers looking to enhance their governance skills. | ||
- Risk management specialists aiming to implement effective compliance strategies. | ||
- Security operations specialists focused on aligning security practices with regulatory requirements. | ||
|
||
## Resources | ||
|
||
- **Module Offerings | ||
**: [ISC2 Governance, Risk and Compliance Skill-Builders](https://www.isc2.org/professional-development/skill-builders/governance-risk-and-compliance) | ||
- **Pricing Information**: Non-Member Price: $19 | Free for Members |
90 changes: 90 additions & 0 deletions
90
src/content/certifications/ISC2/network-security-skill-builders.mdx
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,90 @@ | ||
--- | ||
title: "ISC2 Network Security Skill-Builders" | ||
acronym: "NSSB" | ||
last_updated_at: 2024-09-30 | ||
image: "../../../assets/ISC2-Network-Security-Skill-Builder.png" | ||
reference: "https://www.isc2.org/professional-development/skill-builders/network-security" | ||
aliases: | ||
- "Network Security Certification" | ||
draft: false | ||
career_paths: | ||
- "Cybersecurity Manager" | ||
- "Risk Management Specialist" | ||
- "Security Operations Specialist" | ||
price: "61" | ||
currency: "$" | ||
--- | ||
|
||
# {frontmatter.title} ({frontmatter.acronym}) | ||
|
||
## Overview | ||
|
||
The **ISC2 Network Security Skill-Builders (NSSB)** are designed to enhance your skills in protecting the | ||
confidentiality, integrity, and availability of information across networks. Created by industry experts, these | ||
on-demand courses provide short-format learning tailored to fit your busy schedule, enabling you to stay at the | ||
forefront of network security. | ||
|
||
The certification validates an individual’s ability to: | ||
|
||
- Manage access controls and network security. | ||
- Operate and configure network-based security devices. | ||
- Understand emerging trends in network security. | ||
|
||
## Course Details | ||
|
||
The NSSB bundle includes several key modules: | ||
|
||
1. **First Steps for Supply Chain Security** | ||
- **Delivery Method**: On-Demand | ||
- **Duration**: 30 Minutes | ||
- **CPE**: 0.50 | ||
- **Proficiency Level**: Foundational | ||
- This module covers the importance of mapping your supply chain and integrating risk management processes to | ||
control risks effectively. | ||
|
||
2. **IT/OT Convergence: The Good, the Bad and the Ugly** | ||
- **Delivery Method**: On-Demand | ||
- **Duration**: 30 Minutes | ||
- **CPE**: 0.50 | ||
- **Proficiency Level**: Foundational | ||
- Explore how the convergence of IT and operational technology creates new attack vectors and requires a different | ||
cybersecurity approach. | ||
|
||
3. **Introduction to Denial of Service Attacks** | ||
- **Delivery Method**: On-Demand | ||
- **Duration**: 15 Minutes | ||
- **CPE**: 0.50 | ||
- **Proficiency Level**: Intermediate | ||
- Learn to identify denial of service attacks, their methods, and protective measures for your organization. | ||
|
||
4. **Supply Chain Security** | ||
- **Delivery Method**: On-Demand | ||
- **Duration**: 30 Minutes | ||
- **CPE**: 0.50 | ||
- **Proficiency Level**: Foundational | ||
- Gain strategies for assessing and mitigating supply chain risks effectively. | ||
|
||
### Key Benefits: | ||
|
||
- Stay current with emerging network security topics. | ||
- Quick, on-demand learning that fits your busy schedule. | ||
- Earn CPE credits for maintaining your ISC2 certifications. | ||
|
||
## Exam Structure | ||
|
||
The NSSB modules do not have a formal exam structure. Participants complete the modules at their own pace and earn CPE | ||
credits upon successful completion. | ||
|
||
## Who Should Take NSSB? | ||
|
||
The NSSB is ideal for: | ||
|
||
- Cybersecurity managers looking to enhance their network security skills. | ||
- Risk management specialists aiming to understand supply chain risks. | ||
- Security operations specialists focused on managing network security effectively. | ||
|
||
## Resources | ||
|
||
- **Module Offerings | ||
**: [ISC2 Network Security Skill-Builders](https://www.isc2.org/professional-development/skill-builders/network-security) | ||
- **Pricing Information**: Non-Member Price: $19 | Free for Members |
84 changes: 84 additions & 0 deletions
84
src/content/certifications/ISC2/protecting-data-using-zero-trust-courses.mdx
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,84 @@ | ||
--- | ||
title: "ISC2 Protecting Data Using Zero Trust Courses" | ||
acronym: "ZTC" | ||
last_updated_at: 2024-09-30 | ||
image: "../../../assets/ISC2-Sec-Ops-Courses.png" | ||
reference: "https://www.isc2.org/professional-development/courses/protecting-data-using-zero-trust" | ||
aliases: | ||
- "Zero Trust Certification" | ||
draft: false | ||
career_paths: | ||
- "Cybersecurity Manager" | ||
- "Risk Management Specialist" | ||
- "Security Operations Specialist" | ||
price: "73" | ||
currency: "$" | ||
--- | ||
|
||
# {frontmatter.title} ({frontmatter.acronym}) | ||
|
||
## Overview | ||
|
||
The **ISC2 Protecting Data Using Zero Trust Courses (ZTC)** are designed to equip cybersecurity professionals with the | ||
knowledge and skills necessary to transition from traditional perimeter-based security to a zero trust security model. | ||
These courses provide critical insights into granular trust relationships and data-centric security practices. | ||
|
||
The certification validates an individual’s ability to: | ||
|
||
- Implement zero trust principles within their organization. | ||
- Manage vulnerabilities in a zero trust architecture. | ||
- Conduct continuous monitoring and incident response effectively. | ||
|
||
## Course Details | ||
|
||
The ZTC bundle includes three key courses: | ||
|
||
1. **Defining the Boundaries of Zero Trust** | ||
- **Delivery Method**: On-Demand | ||
- **Duration**: 2 Hours | ||
- **CPE**: 2 | ||
- **Proficiency Level**: Foundational | ||
- This course reviews the principles necessary for transitioning to a zero trust model, emphasizing continual | ||
analysis of the security ecosystem. | ||
|
||
2. **Vulnerability Management in Zero Trust** | ||
- **Delivery Method**: On-Demand | ||
- **Duration**: 1 Hour | ||
- **CPE**: 1 | ||
- **Proficiency Level**: Foundational | ||
- Explore best practices for managing vulnerabilities within a zero trust framework, including risk-based trust | ||
assessments and remediation strategies. | ||
|
||
3. **Continuous Monitoring and Incident Response for Zero Trust** | ||
- **Delivery Method**: On-Demand | ||
- **Duration**: 1 Hour | ||
- **CPE**: 1 | ||
- **Proficiency Level**: Foundational | ||
- Understand how to implement continuous monitoring and incident response processes tailored for zero trust | ||
environments. | ||
|
||
### Key Benefits: | ||
|
||
- Act as a pathway to ISC2 SSCP certification. | ||
- Demonstrate commitment to maintaining your ISC2 certification through professional development. | ||
- Stay ahead of the curve by gaining expertise in emerging cybersecurity topics. | ||
- Earn CPE credits for maintaining your certifications. | ||
|
||
## Exam Structure | ||
|
||
The ZTC courses do not have a formal exam structure. Participants complete the modules at their own pace and earn CPE | ||
credits upon successful completion. | ||
|
||
## Who Should Take ZTC? | ||
|
||
The ZTC is ideal for: | ||
|
||
- Cybersecurity managers looking to enhance their operational knowledge of zero trust principles. | ||
- Risk management specialists aiming to improve their organization's security posture. | ||
- Security operations specialists focused on implementing effective security measures. | ||
|
||
## Resources | ||
|
||
- **Course Offerings | ||
**: [ISC2 Protecting Data Using Zero Trust Courses](https://www.isc2.org/professional-development/courses/protecting-data-using-zero-trust) | ||
- **Bundle Pricing**: Purchase all three courses and save 20%! |
Oops, something went wrong.