sb-nz logo
Story image

Two of ISACA's top cybersecurity courses are now available on-demand

24 Aug 2017

ISACA has made two of its top training certifications available as on-demand, self-paced review courses. The first course, CISM, is for IT professionals who design and manage enterprise information security programs, while CRISC readies participants for future career growth by linking IT risk management to enterprise risk management.

According to an ISACA survey, 52% of respondents believe that traditional cybersecurity training options leave staff only moderately prepared – or not at all.  62% are trying to diagnose specific areas where they need to improve skills.

So far 34,000 professionals have completed the CISM certification; 20,000 professionals have received CRISC certification.

According to a recent Global Knowledge survey, 96% of professionals who have earned CRISC certification have kept it current.

The CISM and CRISC courses include core subject areas, self-assessment and interactive features including videos, workbooks, job aids, case studies and post-test assessment.

“The new CISM and CRISC online review course offerings are exciting tools to help any security professional looking to grow in their career,” comments ISACA’s director of Training and Education, Laureen Kaczmarek.

 “Not only will the review courses provide educational formats for exam preparation but they can also act as a resource after exam completion.”

Testing windows run from 1 August – 30 September and 1 November – 31 December.

Earlier this year ISACA launched its Cybersecurity Nexus (CSX) Training Platform and Assessment Tool, which enables administrators to gain clear insights into employee performance.

“We consistently hear from CISOs around the world that cost and accessibility are significant barriers to getting their employees the hands-on training they need to be effective and advance their capabilities,” comments Matt Loeb, ISACA CEO.

“As part of our mission to narrow the skills gap and help enterprises develop their cyber workforce, ISACA developed the CSX Training Platform as an affordable solution that gives cyber security professionals complex scenarios to handle and live incidents to detect and mitigate,” Loeb adds.

The CSX Training Platform was also designed to be tailored for practitioners at all skill levels.

“Each organization faces a unique set of threats, and the CSX Training Platform is designed to address those threats and test related skills. Our experts will constantly add to the platform, so we are able to build a training curriculum that supports the immediate and future needs of cyber security teams,” comments ISACA chief innovation officer Frank Schettini.

“A cybercriminal builds an attack based on his or her domain of expertise. So why wouldn’t organizations enable security professionals to build defenses the same way?”

Story image
IDC survey: Nearly 1/3 of data-ransomed businesses pay up
A Rubrik-commissioned A/NZ survey by IDC finds that despite only 6% saying they would pay ransomware attackers, the reality is quite different.More
Story image
Gigamon and Zscaler release cloud-first network detection for fluid workforces
“Our customers have significantly accelerated their digital transformation journeys during the pandemic, and this integration will help them better respond to threats.”More
Story image
Cisco report: Remote working is here to stay, making cybersecurity a top priority
"With this new way of working here to stay and organisations looking to increase their investment in cybersecurity, there’s a unique opportunity to transform the way we approach security as an industry to better meet the needs of our customers and end-users.”More
Story image
Video: 10 Minute IT Jams - Who is LogRhythm?
LogRhythm VP of sales for Asia Pacific Simon Howe, who discusses the company's primary offerings and services, what products the company is focused on for the future, and the infrastructure it has in the A/NZ market.More
Story image
Entrust launches cloud-based ID issuance solution
The Sigma instant ID solution uses encryption, trusted HSM technology and secure boot to issue highly secure physical and mobile identities.More
Story image
Women in cybersecurity – what is holding us back?
A robust and diverse workforce with wide-ranging skills and depth of experience is essential for providing balance, safety and continuity to both the industry and countries at large. More