Explore our detailed course listings to build a robust cybersecurity culture in your organization.
Empower your team with essential cybersecurity knowledge to combat evolving threats.
Fundamental skills for recognizing and responding to cyber threats.
In-depth training for IT professionals to stay ahead of sophisticated threats.
Tailored insights for leadership on managing organizational cyber risks.
Quizzes and practical scenarios for engaging learning.
Specialized training for managing supply chain risks.
Stay compliant with global privacy standards and protect sensitive data.
Comprehensive training on Europe's standard for privacy protection.
Understand and comply with California's landmark privacy law.
Key insights into privacy compliance for Australian businesses.
A comprehensive overview of the UK’s privacy regulations.
Data protection essentials for businesses operating in Canada.
The cornerstone of privacy compliance in Brazil.s
The cornerstone of privacy compliance in Singapore.
Ensure adherence to New Zealand’s modern privacy standards.
Define and enhance the responsibilities of key cybersecurity roles in your organization.
Define strategic security priorities for your organization.
Oversee and implement organization-wide security policies, strategies, and compliance initiatives.
Implement and manage IT security measures to protect organizational assets.
Ensure adherence to industry regulations and internal compliance standards.
Learn effective incident detection, analysis, and response techniques.
Develop and implement strategies to minimize organizational risks.
Design and maintain secure network infrastructures to prevent breaches.
Secure software applications by addressing vulnerabilities during development.
Oversee data protection strategies and ensure compliance with privacy laws.
Manage user permissions and ensure secure access to critical systems.
Develop and deliver cybersecurity training programs across the organization.
Plan and manage business continuity strategies to minimize downtime during crises.
Assess and mitigate cybersecurity risks posed by external vendors and partners.
Secure cloud environments by implementing effective controls and monitoring.
Conduct security audits to identify vulnerabilities and ensure compliance.
Design and implement IAM systems to protect against unauthorized access.
Identify vulnerabilities by simulating cyberattacks to strengthen defenses.
Design robust security architectures to protect organizational systems and data.
Investigate cyber incidents and collect evidence for threat analysis.
Enhance your development team's security practices with courses aligned to the OWASP Top 10.
Learn secure coding practices for Python to prevent common vulnerabilities.
Master secure development techniques to safeguard Java applications.
Protect your web applications by adopting secure coding practices in JavaScript.
Secure your Kotlin applications with strategies aligned to OWASP Top 10.
Implement secure coding principles to mitigate vulnerabilities in C#.
Learn to protect C++ applications against critical security threats.
Enhance the security of your Ruby code with best practices for modern development.
Mitigate vulnerabilities in PHP applications with secure coding strategies.
Adopt secure coding practices for Go to build resilient applications.
Learn to secure iOS and macOS applications with Swift programming techniques.
Strengthen your TypeScript applications with OWASP-aligned security principles.
Prevent SQL injection attacks and secure database interactions with best practices.
Explore our comprehensive collection of policy documents to strengthen your organization’s security posture.
Establishes the foundation for all security practices.
Defines how risks are identified and mitigated.
Manages user access to systems and data.
Outlines proper use of company systems and resources.
Defines how data is classified and handled securely within the organization.
Establishes processes for managing changes to systems and configurations.
Details procedures for identifying, managing, and resolving security incidents.
Outlines plans for maintaining operations during disruptions and recovering quickly.
Establishes standards for secure software development practices.
Guidelines for retaining and securely disposing of sensitive information.
Mandates encryption for protecting sensitive data in transit and at rest.
Provides guidance on responsible use of social media platforms.
Defines methods and tools for securely sharing files within and outside the organization.
Guidelines for managing information assets effectively.
Establishes standards for data encryption and protection.
Ensures strong password practices and security.
Protects physical assets and ensures secure environments.
Defines how data is classified and handled securely within the organization.
Establishes processes for managing changes to systems and configurations.
Details procedures for identifying, managing, and resolving security incidents.
Outlines plans for maintaining operations during disruptions and recovering quickly.
Establishes processes for identifying, assessing, and mitigating vulnerabilities through regular patching.
Defines standards and practices for protecting the organization’s network infrastructure.
Provides guidelines for creating and managing backups to ensure rapid recovery during disruptions.
Sets standards for securely managing personal devices used for organizational work.
Establishes procedures to prevent, detect, and respond to malware threats.
Defines standards for securely acquiring, developing, and maintaining IT systems.
Provides guidelines for secure email usage and communication practices.
Outlines acceptable use of internet resources within the organization.
Specifies processes for logging and monitoring activities to detect anomalies.
Defines guidelines for securing cloud-based systems and services.
Establishes standards for managing risks associated with third-party services.
Details procedures for regularly updating systems to address vulnerabilities.
Provides guidelines for securing physical facilities and equipment.
Outlines adherence to industry and legal standards.
Defines processes for regular audits and monitoring.
Ensures employees are aware of security practices.
Establishes measures to safeguard personal data.
Outlines measures to prevent, detect, and respond to fraudulent activities.
Defines procedures for ensuring adherence to legal and regulatory requirements.
Establishes guidelines for conducting internal audits to evaluate compliance and controls.
Details the process for assessing privacy risks and implementing safeguards.
Explore training on key regulations and standards to ensure compliance and robust security practices.
U.S. regulation for protecting health information (PHI).
Strengthens HIPAA rules and addresses security breaches.
EU regulations for secure health data sharing.
Focuses on protecting cardholder data for entities accepting card payments.
Requires financial institutions in the U.S. to protect customer data.
U.S. regulation for financial reporting and data security for publicly traded companies.
Includes IT and data security rules for financial institutions.
International standard for information security management systems (ISMS).
U.S. voluntary framework providing best practices for cybersecurity risk management.
Focuses on protecting controlled unclassified information (CUI) for U.S. DoD contractors.
U.S. regulation for securing federal government systems.
EU-wide measures for cybersecurity in critical infrastructure.
Governs critical infrastructure cybersecurity and reporting.
Governs data collection practices for children under 13 in the U.S.
EU rules for fair practices in the digital marketplace.
Focuses on transparency and accountability for online platforms.
Governs the safe use and deployment of AI in the EU.
Focuses on regulations for crypto assets and blockchain-related activities.
Includes secure software development and critical supply chain security.