Welcome to SearchSecurity.com's Security School Course Catalog. We offer a variety of free online information security training courses you can take on your own time at your own pace. These lessons, many of which feature full-length video seminars, arm you with the foundational and tactical information you need to keep your organization compliant and secure.
Select a course from the options below and get started today!
Featured lesson
Architectural
considerations for enterprise antimalware deployments
Early antivirus products were host-based agents that used
basic signature detection to scan hard drives for malicious code. Today’s antimalware is more
sophisticated with enterprises operating not only within the network perimeter, but on mobile
devices and in the cloud. In this lesson, you’ll learn how to effectively architect antimalware
systems for your enterprise.
Featuring Diana Kelley, partner, SecurityCurve
More lessons
Cloud Security
School
In this school, brought to you by SearchCloudSecurity.com, the industry's foremost cloud security
experts explain how to securely take advantage of the flexible infrastructure models and lower
operating costs that make the cloud an attractive alternative for many enterprise IT
organizations.
Understanding
cloud-specific security technologies
Featuring Joseph Granneman, MBA, CISSP
Cloud
application security best practices
Featuring Diana Kelley, partner, SecurityCurve
IAM
control in the cloud
IAM policy, process and technology options for the cloud.
Featuring Phil Cox, former partner, SystemExperts
Data Protection Security
School
Security
visibility: Honestly assessing your security posture
Featuring Aaron Turner, co-founder, N4Struct
Network content
monitoring must-haves
Featuring Mike Chapple, technical editor, SearchSecurity.com
Realigning
your data protection priorities
Featuring David Sherry, CISO, Brown University
Watching the
watchers
Featuring Andreas Antonopoulos, senior VP, Nemertes Research
Mobile
device policy: How to prevent data theft
Featuring Lisa Phifer, owner, Core Competence Inc.
Locking
down database applications
Featuring Andreas Antonopoulos, senior VP, Nemertes Research
How to build
secure applications
Featuring Diana Kelley, partner, SecurityCurve
Mitigating Web 2.0
threats
Featuring David Sherry, CISO, Brown University
Data loss
prevention
Featuring Rich Mogull, founder, Securosis LLC
E-discovery
and security in the enterprise
Featuring Frank Lagorio, JD, principal analyst, Contoural Inc.
Database defenses for a
new era of threats
Featuring Rich Mogull, founder, Securosis LLC
Executing a data
governance strategy
Featuring Russell L. Jones, partner AERS - Security & Privacy Services, Deloitte
& Touche
Data encryption
demystified
Featuring Tom Bowers, managing director, Security Constructs
Preventing data
leaks
Featuring Richard Bejtlich, founder, Tao Security
Enterprise
strategies for protecting data at rest
Featuring Perry Carpenter, security practitioner, major telco firm
Intrusion Defense
School
Developing
a defense-in-depth strategy for malware defense
Featuring Lenny Zeltser, SANS instructor, noted author
How
DAM can help detect and trace attacks
Featuring Adrian Lane, CTO, Securosis LLC
Reinventing
defense in depth
Featuring Mike Chapple, University of Notre Dame
Practical
strategies to mitigate insider threats
Featuring Dawn Cappelli, senior member of technical staff, CERT
Security-related
enhancements in Windows Server 2008
Featuring Elizabeth Quinlan, consultant, HynesITe
Anatomy
of an attack
Featuring Markus Jakobsson, principal scientist, Palo Alto Research Center
The
new threat landscape: Defending against next-gen attacks
Featuring Lenny Zeltser, SANS instructor, noted author
Intrusion
defense in the era of Windows Vista
Featuring Peter Gregory, author and infosec practitioner
Security
information management systems
Featuring Tom Bowers, managing director, Security Constructs
Web
attack prevention and defense
Featuring Michael Cobb, managing director, Cobweb Applications Ltd.
Getting
started with perimeter defense
Network
perimeter security
Network
content security
Defense
beyond the network perimeter
Featured
instructor
Joel Snyder, senior partner, Opus One
Compliance School
Compliance
metrics: Building a compliance scorecard
NEW
Featuring Eric Holmquist, president of Holmquist Advisory.
How to pass a PCI
assessment
Featuring Anton Chuvakin, principal of Security Warrior Consulting.
Compliance-driven
role management
Featuring Richard E. Mackey Jr., vice president, SystemExperts
Virtualization:
Balancing emerging technology with existing demands
Featuring David Mortman, CSO-in-Residence for Echelon One.
Automated
compliance in the enterprise
Featuring Eric Holmquist, president of Holmquist Advisory
How
to meet HIPAA compliance requirements
Featuring Richard E. Mackey Jr., vice president, SystemExperts
Building
a risk-based compliance program
Featuring Richard E. Mackey, vice president, SystemExperts
PCI DSS
compliance: Two years later
Featuring Diana Kelley, vice president, Burton Group
Must-have
compliance technologies
Featuring Trent Henry, senior analyst, Burton Group
Ensuring
compliance across the extended enterprise
Compliance
improvement: Get better as you go forward
Gauging your SOX
progress
SOX
compliance basics: Taking action
Understanding
compliance-related technology
Featured
instructor
Richard Mackey, vice president,
SystemExperts
UK Security School
LESSONS:
Virtualisation
security for enterprise servers
NEW
Featuring Ben Chai, Founding Director, Incoming Thought Limited
Identity and Access Management Services, Systems and
Technologies Security School
The
new school of enterprise authentication
Featuring Mark Diodati, identity/privacy analyst, Burton Group
Future
authentication technologies: How to choose the right product
Featuring Mark Diodati, identity/privacy analyst, Burton Group
Using
IAM, password and provisioning management tools for compliance
Featuring Tom Bowers, managing director, Security Constructs
Endpoint
security protection: Polices for endpoint control
Featuring Ben Rothke, CISSP
VPNs
and remote access: Secure deployment, setup and strategies
Featuring Lisa Phifer, vice president, Core Competence Inc.
Automated
provisioing of hardware and Active Directory
Featuring Laura Hunter, CISSP, MCSE: Security, MCDBA, Microsoft MVP
How
to build an identity and access management architecture
Featuring Richard E. Mackey Jr., ISACA, CISM, SystemsExperts
Secure
user authentication: Regulations, implementation and methods
Featuring Tom Bowers, managing director, Security Constructs
Building
network security: Evolution and vendor consolidation
Featuring Mike Rothman, president, Security Incite
Integration of Networking and Security
School
Strengthening
policies for endpoint control
Featuring Lisa Phifer, president, Core Competence Inc.
How
IDS/IPS enables business objectives
Featuring Jennifer Jabbusch, CISO with Carolina Advanced Digital Inc.
Application
log management program planning
Featuring Diana Kelley, partner with consulting firm SecurityCurve.
Securing the
application layer
Featuring Cory Scott, regional consulting director, Matasano Security.
Back
to basics: Endpoint security on a budget
Featuring Mike Chapple, University of Notre Dame
Getting
the most out of your SIM deployment
Featuring Adrian Lane, senior security strategist, Securosis
Using
NAC to create a strong endpoint security strategy
Featuring Mike Chapple, University of Notre Dame
Marrying
security and network management
Featuring Sasan Hamidi, CISO, Interval International
Securing
the converged infrastructure
Featuring John Burke, principal research analyst, Nemertes Research
Integrating
security and network fabric
Featuring David Piscitello, president, Core Competence Inc.
Using
the network to secure the application layer
Featuring Michael Cobb, managing director, Cobweb Applications
Locking
down the endpoint: How network access control (NAC) can boost host security
Featuring Joel Snyder, senior partner, Opus One
Securing
your first remote office: Solutions for less than $10k
Featuring David Strom, noted network security expert/writer/speaker
Fitting security into your
network
Featuring Lisa Phifer, vice president, Core Competence Inc.
Mitigating
wireless security threats
Featuring Lisa Phifer, vice president, Core Competence Inc.
Messaging Security
School
Counterintelligence
strategies for a new era of threats
Featuring Sandra Kay Miller, technical editor, Information Security
Spam
2.0: New threats and new strategies
Featuring Michael Cobb, managing director, Cobweb Applications
Essential
practices for securing mobile devices
Featuring Lisa Phifer, vice president, Core Competence Inc.
Secure
instant messaging
Featuring Michael Cobb, managing director, Cobweb Applications
Countermeasures
for malicious email code
Featuring Tom Bowers, managing director, Security Constructs
Securing
Microsoft Exchange
Featuring Lee Benjamin, Microsoft MVP, ExchangeGuy Consulting
Email
security tools, systems and threats
Featuring Joel Snyder, senior partner, Opus One
Financial Information Security
School
Biometrics:
Banking on secure identity management
Featuring Joel Dubin, CISSP, independent computer security consultant
Data
leak prevention: Controlling financial services threats
Featuring Pete Lindstrom, senior analyst, Burton Group
Wireless Security Lunchtime Learning
Security School
How
to counter wireless threats and vulnerabilities
How
to build a secure wireless infrastructure
How
to implement secure access
How to
use wireless IDS/IPS
About
the instructor
Featuring Lisa Phifer, vice president, Core Competence Inc.
CISSP Certification Training
School
Lesson/Domain
1: Security management practices
Lesson/Domain
2: Access control
Lesson/Domain
3: Cryptography
Lesson/Domain
4: Security models and architecture
Lesson/Domain
5: Telecommunications and networking
Lesson/Domain
6: Applications and system development
Lesson/Domain
7: Business continuity
Lesson/Domain
8: Law, investigations and ethics
Lesson/Domain
9: Physical security
Lesson/Domain
10: Operations security
About the
instructor
Featuring Shon Harris, president, Logical Security
Requires Free Membership to View
This was first published in March 2011
Security Management Strategies for the CIO
Join the conversationComment
Share
Comments
Results
Contribute to the conversation