Free online cybersecurity classes, with certificates

Check out SearchSecurity's catalog of free online security courses led by information security experts on today's most popular security topics.

Choose from this catalog of free online cybersecurity courses from SearchSecurity. Our training courses, and supporting...

educational materials, cover an array of essential topics, from cloud security, data protection and identity access management to message security and

These cybersecurity courses are self-directed; you control the pace you learn, fitting instruction into your schedule where it works best for you.

Many of the lessons in the courses listed below feature a video seminar and review quizzes eligible for Continuing Professional Education (CPE) credits. The courses here are your source for the foundational and tactical information you need to keep your cybersecurity skills updated and your organization compliant and secure.

Information Security Magazine

The ezine issues listed here provide in-depth information to keep you current on cybersecurity developments as well as an opportunity to receive CPE credits.

For over two decades, ISM has kept cybersecurity pros informed as their field changes. Each issue covers contains in-depth features, expert opinion and interviews, and eye-catching infographics that convey quickly the information you need to stay attuned to critical cybersecurity situations. Linked in the editor's note is a link to a short quiz based on that issue's information. Pass the quiz and you can receive one CPE credit.

Check out the latest issues here, then follow the links to take the quizzes:

Cybersecurity Awareness (August 2020): Topics: 10 tips for your cybersecurity awareness program; developing internal security talent; how to build in software security; the 6 CISO types -- which are you? Take the quiz here.

Network Security (May 2020). Topics: Dealing with AI-enabled attacks on networks; coping with CISO stress and burnout; why nation-state attacks should concern every organization. Take the quiz here.

Threat Intelligence (February 2020). Topics: The promise and limitations of threat intelligence; CISO challenges for 2020; key components of detection and threat intel platforms. Take the quiz here.

AI in Cybersecurity (November 2019). Topics: AI uses for defense and attack; filling cybersecurity staff positions; privacy regulation preparations; intent-response planning needs. Take the quiz here

Identity and Access Management (August 2019). Topics: New tech for IAM; third-party security risks; fitting frameworks into cybersecurity strategies; cybersecurity literacy and skills for all levels of the organization.  Take the quiz here.

Cloud Security (May 2019). Topics: Cloud security risks experts worry about; raising IT security awareness; urgent 5G security issues. Take the quiz here.

Nation-State Attacks (February 2019). Topics: How to defense against nation-state attackers; CISOs' top concerns in 2019; banking cybersecurity; cutting breach response times. Take the quiz here.

CISSP Certification Essentials

Our exclusive CISSP Essentials trainings feature expert content from exam trainer Logical Security and (ISC)2, global information security educator and certification leader. Explore the fundamental concepts, technologies and practices of information systems security in the following domains. Each lesson corresponds to a subject domain in the exam's "Common Body of Knowledge" -- the essential elements each CISSP-certified practitioner must know.

Domain 1: Governance, risk management and compliance
Collect tips and strategies for addressing governance, risk management and compliance covered in the CISSP exam.

Domain 2: Data encryption methods
Learn about data encryption methods and what it means to practice good data management.  

Domain 3: Security systems engineering
Get an overview of security systems engineering topics tested in Domain 3, from security architectures to cryptanalysis to abstraction techniques.

Domain 4: Network security
Review network security fundamentals like segmentation and secure routing in this study guide for Domain 4 of the CISSP exam.

Domain 5: Identity and access management
Examine key concepts including cloud IAM and physical access control, and much more.

Domain 6: Security assessment and testing
Expand your knowledge of tools and techniques to identify vulnerabilities and possible attack surfaces.

Domain 7: Preventing data breaches
Find out what tools and practices help build up cyber defenses, detect suspicious behavior and respond to malicious activity.

Domain 8: Secure software development
Discover the basic principles behind securely designing, testing and building enterprise applications.

Integration of Networking and Security School

In these lessons, SearchSecurity and SearchNetworking offer an in-depth look at how security- and networking-related teams, products and processes affect enterprise network security.

Behavioral analytics and security go hand in hand
How behavioral analytics works to enhance security in today's businesses.

Securing IoT in the enterprise
Get advice on securing IoT devices, to ensure the connected devices that end users deploy do no harm to enterprise network.

Network perimeter security
Learn about the pressures transforming the enterprise network perimeter and how to adapt your strategy for network perimeter security.

Game-changing enterprise authentication technologies and standards
Learn about next-generation authentication methods and technologies, and how emerging new standards can enable more secure enterprise authentication.

Knock advanced malware out cold with network anomaly detection
Discover why the ability to detect network anomalies is so essential in the battle against advanced malware and learn how to employ anomaly-detecting tools.

Security analytics: The key to reliable security data, effective action
Learn how to develop a customized security analytics program that delivers insightful, actionable information.

Next-generation firewalls: Must-have NGFW features
Explore best practices for making a next-generation firewall evaluation.

Managing BYOD endpoint security
Get help developing an over-arching security strategy to combat mobile security woes.

Endpoint security controls: Moving beyond antivirus 
Learn which security controls are critical to ensuring successful threat protection.

This was last published in June 2020

Dig Deeper on Security industry certifications

Join the conversation

3 comments

Send me notifications when other members comment.

Please create a username to comment.

That is indeed an extensive list of options. I appreciate how they are separated into unique categories. I think I may have some fresh evening education materials to work with :).
Cancel
Thanks for providing us with the great list of options!
Cancel

Wow great resource. I'm new here thanks for the opportunity for me to join this amazing resource.
Share your comment
Cancel

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly.com

Close