Choose from this catalog of free online cybersecurity courses from SearchSecurity. Our training courses, and supporting...
educational materials, cover an array of essential topics, from cloud security, data protection and identity access management to message security and
These cybersecurity courses are self-directed; you control the pace you learn, fitting instruction into your schedule where it works best for you.
Many of the lessons in the courses listed below feature a video seminar and review quizzes eligible for Continuing Professional Education (CPE) credits. The courses here are your source for the foundational and tactical information you need to keep your cybersecurity skills updated and your organization compliant and secure.
Information Security Magazine
The ezine issues listed here provide in-depth information to keep you current on cybersecurity developments as well as an opportunity to receive CPE credits.
For over two decades, ISM has kept cybersecurity pros informed as their field changes. Each issue covers contains in-depth features, expert opinion and interviews, and eye-catching infographics that convey quickly the information you need to stay attuned to critical cybersecurity situations. Linked in the editor's note is a link to a short quiz based on that issue's information. Pass the quiz and you can receive one CPE credit.
Check out the latest issues here, then follow the links to take the quizzes:
AI in Cybersecurity (November 2019). Topics: AI uses for defense and attack; filling cybersecurity staff positions; privacy regulation preparations; intent-response planning needs. Take the quiz here.
Identity and Access Management (August 2019). Topics: New tech for IAM; third-party security risks; fitting frameworks into cybersecurity strategies; cybersecurity literacy and skills for all levels of the organization. Take the quiz here.
CISSP Certification Essentials
Our exclusive CISSP Essentials trainings feature expert content from exam trainer Logical Security and (ISC)2, global information security educator and certification leader. Explore the fundamental concepts, technologies and practices of information systems security in the following domains. Each lesson corresponds to a subject domain in the exam's "Common Body of Knowledge" -- the essential elements each CISSP-certified practitioner must know.
Domain 1: Governance, risk management and compliance
Collect tips and strategies for addressing governance, risk management and compliance covered in the CISSP exam.
Domain 2: Data encryption methods
Learn about data encryption methods and what it means to practice good data management.
Domain 3: Security systems engineering
Get an overview of security systems engineering topics tested in Domain 3, from security architectures to cryptanalysis to abstraction techniques.
Domain 4: Network security
Review network security fundamentals like segmentation and secure routing in this study guide for Domain 4 of the CISSP exam.
Domain 5: Identity and access management
Examine key concepts including cloud IAM and physical access control, and much more.
Domain 6: Security assessment and testing
Expand your knowledge of tools and techniques to identify vulnerabilities and possible attack surfaces.
Domain 7: Preventing data breaches
Find out what tools and practices help build up cyber defenses, detect suspicious behavior and respond to malicious activity.
Domain 8: Secure software development
Discover the basic principles behind securely designing, testing and building enterprise applications.
Integration of Networking and Security School
In these lessons, SearchSecurity and SearchNetworking offer an in-depth look at how security- and networking-related teams, products and processes affect enterprise network security.
Behavioral analytics and security go hand in hand
How behavioral analytics works to enhance security in today's businesses.
Securing IoT in the enterprise
Get advice on securing IoT devices, to ensure the connected devices that end users deploy do no harm to enterprise network.
Network perimeter security
Learn about the pressures transforming the enterprise network perimeter and how to adapt your strategy for network perimeter security.
Game-changing enterprise authentication technologies and standards
Learn about next-generation authentication methods and technologies, and how emerging new standards can enable more secure enterprise authentication.
Knock advanced malware out cold with network anomaly detection
Discover why the ability to detect network anomalies is so essential in the battle against advanced malware and learn how to employ anomaly-detecting tools.
Security analytics: The key to reliable security data, effective action
Learn how to develop a customized security analytics program that delivers insightful, actionable information.
Next-generation firewalls: Must-have NGFW features
Explore best practices for making a next-generation firewall evaluation.
Managing BYOD endpoint security
Get help developing an over-arching security strategy to combat mobile security woes.
Endpoint security controls: Moving beyond antivirus
Learn which security controls are critical to ensuring successful threat protection.