Story image

Two of ISACA's top cybersecurity courses are now available on-demand

24 Aug 17

ISACA has made two of its top training certifications available as on-demand, self-paced review courses. The first course, CISM, is for IT professionals who design and manage enterprise information security programs, while CRISC readies participants for future career growth by linking IT risk management to enterprise risk management.

According to an ISACA survey, 52% of respondents believe that traditional cybersecurity training options leave staff only moderately prepared – or not at all.  62% are trying to diagnose specific areas where they need to improve skills.

So far 34,000 professionals have completed the CISM certification; 20,000 professionals have received CRISC certification.

According to a recent Global Knowledge survey, 96% of professionals who have earned CRISC certification have kept it current.

The CISM and CRISC courses include core subject areas, self-assessment and interactive features including videos, workbooks, job aids, case studies and post-test assessment.

“The new CISM and CRISC online review course offerings are exciting tools to help any security professional looking to grow in their career,” comments ISACA’s director of Training and Education, Laureen Kaczmarek.

 “Not only will the review courses provide educational formats for exam preparation but they can also act as a resource after exam completion.”

Testing windows run from 1 August – 30 September and 1 November – 31 December.

Earlier this year ISACA launched its Cybersecurity Nexus (CSX) Training Platform and Assessment Tool, which enables administrators to gain clear insights into employee performance.

“We consistently hear from CISOs around the world that cost and accessibility are significant barriers to getting their employees the hands-on training they need to be effective and advance their capabilities,” comments Matt Loeb, ISACA CEO.

“As part of our mission to narrow the skills gap and help enterprises develop their cyber workforce, ISACA developed the CSX Training Platform as an affordable solution that gives cyber security professionals complex scenarios to handle and live incidents to detect and mitigate,” Loeb adds.

The CSX Training Platform was also designed to be tailored for practitioners at all skill levels.

“Each organization faces a unique set of threats, and the CSX Training Platform is designed to address those threats and test related skills. Our experts will constantly add to the platform, so we are able to build a training curriculum that supports the immediate and future needs of cyber security teams,” comments ISACA chief innovation officer Frank Schettini.

“A cybercriminal builds an attack based on his or her domain of expertise. So why wouldn’t organizations enable security professionals to build defenses the same way?”

Businesses too slow on attack detection – CrowdStrike
The 2018 CrowdStrike Services Cyber Intrusion Casebook reveals IR strategies, lessons learned, and trends derived from more than 200 cases.
Proofpoint launches feature to identify most targeted users
“One of the largest security industry misconceptions is that most cyberattacks target top executives and management.”
McAfee named Leader in Magic Quadrant an eighth time
The company has been once again named as a Leader in the Gartner Magic Quadrant for Security Information and Event Management.
Symantec and Fortinet partner for integration
The partnership will deliver essential security controls across endpoint, network, and cloud environments.
Is Supermicro innocent? 3rd party test finds no malicious hardware
One of the larger scandals within IT circles took place this year with Bloomberg firing shots at Supermicro - now Supermicro is firing back.
25% of malicious emails still make it through to recipients
Popular email security programmes may fail to detect as much as 25% of all emails with malicious or dangerous attachments, a study from Mimecast says.
Google Cloud, Palo Alto Networks extend partnership
Google Cloud and Palo Alto Networks have extended their partnership to include more security features and customer support for all major public clouds.
Using blockchain to ensure regulatory compliance
“Data privacy regulations such as the GDPR require you to put better safeguards in place to protect customer data, and to prove you’ve done it."