(ISC)2 offers comprehensive certification exam prep for every type of learner. Whether you’re studying for the CISSP, CCSP, SSCP or another industry leading (ISC)2 certification, we have exam prep solutions to help you prepare with confidence. Many successful candidates move forward with Official (ISC)2 Online Instructor-Led Training, believing it delivers the best of both worlds – live expert instruction and online convenience for complete flexibility. And now this popular training is being offered at a new lower price. Perfect for distance learning, this hands-on training format offers the structure of real-time class in a virtual setting, with the option to access course recording. As you develop your personal study plan, consider the advantages of (ISC)2 Online Instructor-Led Training. As long
- Apr 07,
The number of people working from home is skyrocketing as the COVID-19 pandemic forces companies to close offices and practice social distancing. The sudden explosion of makeshift home office environments is adding to the burden of already overtaxed cybersecurity workers, who now face the massive task of trying to protect a remote workforce against cyber threats. While cybersecurity professionals put in extra hours to handle the situation, the increasing ranks of remote workers are catching the attention of another group – cyber attackers. Cyber criminals are betting that many of these hastily outfitted work-from-home environments will not have the same level of protection as office environments, while still connecting to their corresponding corporate networks. For cybercriminals, that spells opportunity. And
Apr 06,Earlier this week, (ISC)2 announced that nominations are now being accepted for the 2020 (ISC)2 Global Achievement Awards. This awards program replaces the former (ISC)2 Awards Program, which had included the Information Security Leadership Awards (ISLA). The new program creates a unified, global platform for recognition of the most outstanding annual achievements in the field of cybersecurity. For years, (ISC)2 has honored and celebrated deserving cybersecurity professionals from around the world with its awards program, highlighting best practices and those who have gone above and beyond to inspire a safe and secure cyber world. The four categories now open for nominations within the (ISC)² Global Achievement Awards program are outlined below. Up to one winner from each region (Asia-Pacific, North
Apr 03,By Javvad Malik, CISSP Can You Explain Encryption to Me? From: Thomas, Kevin Sent: 24 August 2019 10:43 To: Malik, Javvad Subject: Encryption Jav I’m updating the presentation pack for this months management meeting. Can you send me a short description of encryption so the SLT can better understand the solution. Kev From: Malik, Javvad Sent: 24 August 2019 11:03 To: Thomas, Kevin Subject: Encryption Hi Kevin, Encryption is the process of transforming information using an algorithm to make it unreadable to anyone except those possessing special knowledge, usually referred to as a key. The result of the process is encrypted information. In many contexts, the word encryption also implicitly refers to the reverse process, decryption to make the encrypted
Apr 02,The cloud today has become what Forrester calls “a turbocharged engine powering digital transformation around the world.” Digital transformation is propelling worldwide cloud service market projected growth from $182.4B in 2018 to $331.2B in 2022. Yet the cybersecurity skills shortage threatens safe cloud adoption and cloud security is the number one technology area most impacted by the shortfall. Because of this, many cybersecurity experts are finding themselves pushed by their employers to expand their expertise to the cloud. That was certainly the case for Nanditha Rao, Information Security Senior Advisor and Olayinka “Olay” Ladeji, Senior Principal Program Manager, Cloud Operations. Demand for cloud security expertise drove both to achieve the Certified Cloud Security Professional (CCSP) certification, Rao in 2017 and
Apr 01,