Story image

Two of ISACA's top cybersecurity courses are now available on-demand

24 Aug 2017

ISACA has made two of its top training certifications available as on-demand, self-paced review courses. The first course, CISM, is for IT professionals who design and manage enterprise information security programs, while CRISC readies participants for future career growth by linking IT risk management to enterprise risk management.

According to an ISACA survey, 52% of respondents believe that traditional cybersecurity training options leave staff only moderately prepared – or not at all.  62% are trying to diagnose specific areas where they need to improve skills.

So far 34,000 professionals have completed the CISM certification; 20,000 professionals have received CRISC certification.

According to a recent Global Knowledge survey, 96% of professionals who have earned CRISC certification have kept it current.

The CISM and CRISC courses include core subject areas, self-assessment and interactive features including videos, workbooks, job aids, case studies and post-test assessment.

“The new CISM and CRISC online review course offerings are exciting tools to help any security professional looking to grow in their career,” comments ISACA’s director of Training and Education, Laureen Kaczmarek.

 “Not only will the review courses provide educational formats for exam preparation but they can also act as a resource after exam completion.”

Testing windows run from 1 August – 30 September and 1 November – 31 December.

Earlier this year ISACA launched its Cybersecurity Nexus (CSX) Training Platform and Assessment Tool, which enables administrators to gain clear insights into employee performance.

“We consistently hear from CISOs around the world that cost and accessibility are significant barriers to getting their employees the hands-on training they need to be effective and advance their capabilities,” comments Matt Loeb, ISACA CEO.

“As part of our mission to narrow the skills gap and help enterprises develop their cyber workforce, ISACA developed the CSX Training Platform as an affordable solution that gives cyber security professionals complex scenarios to handle and live incidents to detect and mitigate,” Loeb adds.

The CSX Training Platform was also designed to be tailored for practitioners at all skill levels.

“Each organization faces a unique set of threats, and the CSX Training Platform is designed to address those threats and test related skills. Our experts will constantly add to the platform, so we are able to build a training curriculum that supports the immediate and future needs of cyber security teams,” comments ISACA chief innovation officer Frank Schettini.

“A cybercriminal builds an attack based on his or her domain of expertise. So why wouldn’t organizations enable security professionals to build defenses the same way?”

Cloud application attacks in Q1 up by 65% - Proofpoint
Proofpoint found that the education sector was the most targeted of both brute-force and sophisticated phishing attempts.
Singapore firm to launch borderless open data sharing platform
Singapore-based Ocean Protocol, a decentralised data exchange that promotes data sharing, has revealed details of what could be the kickstart to a global and borderless data economy.
Huawei picks up accolades for software-defined camera ecosystem
"The company's software defined capabilities enable it to future-proof its camera ecosystem and greatly lower the total cost of ownership (TCO), as its single camera system is applicable to a variety of application use cases."
Tech community rocked by deaths of Atta Elayyan and Syed Jahandad Ali
Both men were among the 50 killed in the shooting in Christchurch last Friday when a gunman opened fire at two mosques.
NZ ISPs block internet footage of Christchurch shootings
2degrees, Spark, Vodafone and Vocus are now blocking any website that shows footage of the mosque shootings.
Barracuda expands MSP security offerings with RMM acquisition
Managed Workplace delivers an RMM platform with security tools and services, such as site security assessments, Office 365 account management, and integrated third-party antivirus.
Flashpoint: APAC companies must factor geopolitics in cyber strategies
The diverse geopolitical and economic interests of the states in the region play a significant role in driving and shaping cyber threat activity against entities operating in APAC.
Expert offers password tips to aid a stress-free sleep
For many cybersecurity professionals, the worries of the day often crawl into night-time routines - LogMeIn says better password practices can help.