
Becoming an Information Security Specialist
Become a Information Security Specialist Without Spending a Fortune on Your Training!
292649 Hours of video content
Beginner
Certificate of Completion Included
Buy this course now
$599.00Course Overview
What You Will Learn
- Understand the importance of Information Security.
- Learn how to approach and recognize threats and vulnerabilities.
- Learn the benefits of mastering ISO/IEC 27001 Information Security Management.
- Study the relationship between ISO/IEC 27001
- ISO/IEC 27002.
- Learn about Incident Response Plan.
- Learn about Disaster recovery and how to recover from security incidents.
- Learn about the importance of an Information Security Risk Management.
- Learn to measure the effectiveness of your risk management program.
Program Curriculum
- Chapter 1: Enterprise Incident Response
- Chapter 2: Cybersecurity Frameworks
- Chapter 3: How to Define Assets?
- Chapter 4: Security Operations and Other Security Teams
- Chapter 5: Preparations
- Chapter 6: Disaster Recovery
- Chapter 7: Insider Threats
- Chapter 8: Indicator of Compromise (IOC)
- Chapter 1: Introduction
- Chapter 2: Actions to Take Before Agreeing to an M&A Deal
- Chapter 3: Actions to Take During the M&A Deal
- Chapter 4: Actions to Take After the M&A Deal
- Chapter 1: Need for Project Management in Cybersecurity
- Chapter 2: Organization Structure and Resources
- Chapter 3: Project Planning Areas
- Chapter 4: Project Management Key Aspects
- Chapter 5: Main Models
- Chapter 6: Essential Soft Skills
- Chapter 7: Project Management Case Study for Penetration Testers
- Chapter 8: Project Management Case Study for Penetration Testers - Practical
- Chapter 1: ISO/IEC 27000 Series
- Chapter 2: What is ISO/IEC 27001?
- Chapter 3: What is ISO/IEC 27005?
- Chapter 4: ISO/IEC 27001 Annex A Controls
- Chapter 5: What is ISO/IEC 27002?
- Chapter 6: New Controls in ISO/IEC 27001:2022
- Chapter 7: Mapping ISO 27002:2013 Controls to ISO 27002:2022 and NIST Controls
- Chapter 8: ISO/IEC 27001:2022 Transitioning and Implementation Guide
Chapter 1: Introduction
- Chapter 1: Introduction to Information Security
- Chapter 2: Implementing ISO27001 – Information Security Standards
- Chapter 3: Establishing Information Security Roles, Responsibilities, and Governance
- Chapter 4: Best Practice Document Management and International Records Management Based on ISO15489
- Chapter 5: Data Protection, Data Privacy, and GDPR
- Chapter 6: Compliance and Regulations Including Cyber Security
- Chapter 7: Hybrid Cloud Computing Model
- Chapter 8: Conclusion
- Chapter 1: Introduction
- Chapter 2: Brief Overview of the DPO Role
- Chapter 3: Initiating the DPO Role
- Chapter 4: DPO Tasks - GDPR Compliance
- Chapter 5: DPO Tasks - Risks and DPIAs
- Chapter 6: DPO Tasks – Technical Assessments
- Chapter 7: DPO Tasks Outside the EU
- Chapter 1: Introduction
- Chapter 2: Introduction to Threat Detection as Part of the Defense In-Depth Strategy
- Chapter 3: Detecting Threats in On-Premises Environments
- Chapter 4: Detecting Threats in Hybrid Cloud Environments
- Chapter 5: Analyzing Threat Detection Solutions in Action
- Chapter 1: What is the ISO 27701?
- Chapter 2: Video Understanding the Organization and its Context
- Chapter 3: PIMS: Specific Requirements Related to ISO/IEC 27002
- Chapter 4: Additional ISO/IEC 27002 Guidance for PII Controllers
- Chapter 5: Additional ISO/IEC 27002 Guidance for PII Processors
- Chapter 6: Conclusion
- Chapter 1: Cybersecurity Operations Management Approaches
- Chapter 2: Outsourcing Security Services
- Chapter 3: Decision-making Process for Managing Cybersecurity Operations
- Chapter 4: Engaging an MSSP
- Chapter 5: Managing and Monitoring the MSSP
- Chapter 6: Terminating an MSSP Relationship
- Chapter 7: Some Service Specific Use Cases for Outsourcing
- Chapter 8: Tracking Overall Outsourcing Procedure
- Chapter 9: Outsourcing Virtual Private Network Services
Chapter 1: Introduction
- Chapter 1: Getting Started with Information Security Compliance
- Chapter 2: Network Security
- Chapter 3: Endpoint Security
- Chapter 4: Patch Management
- Chapter 5: Encryption
- Chapter 6: Identity Governance and Administration
- Chapter 7: Getting the Audit Right
- Chapter 8: Course Summary
- Chapter 1: Information Security 101
- Chapter 2: Introduction to ISO/IEC 27001
- Chapter 3: 10 Clauses of ISO 27001
- Chapter 4: Risk Management
- Chapter 5: ISO 27001 Annex A
- Chapter 6: Conclusion
- Chapter 7: Bonus
- Chapter 1: Lab Setup
- Chapter 2: Enterprise Security Operations
- Chapter 3: Hacker Tactics, Techniques, and Procedures
- Chapter 4: Defensive Tools for the Modern Enterprise
- Chapter 5: Event Monitoring and Threat Hunting
- Chapter 6: Vulnerability Management
- Chapter 7: Incident Response
- Chapter 8: Course Conclusion and Final Comments
- Chapter 1: Introduction to Information Security
- Chapter 2: Information Systems Security
- Chapter 3: Human Security
- Chapter 4: Cryptography Basics
- Chapter 5: Introduction to Security Policy Compliance
- Chapter 6: Conclusion
- Chapter 1: Introduction to NIST SP 800-53
- Chapter 2: Key Control Families
- Chapter 3: Risk Management and Assessment
- Chapter 1: Introduction
- Chapter 2: Psychology Behind Effective Communication
- Chapter 3: The Fundamentals of Communication
- Chapter 4: So, You Want to Get into Cybersecurity?
- Chapter 5: Tips and Tricks for Early to Mid-career
- Chapter 6: Senior Cybersecurity Professional and Communication
- Chapter 7: Pathway to EC-Council’s Certified Security Specialist (ECSS) Certification
- Chapter 1: ISO 27001 vs ISO 27701 vs GDPR
- Chapter 2: Information Security and ISO 27001
- Chapter 3: Data Protection, Data Privacy, and PIMS
- Chapter 4: PIMS Project Roadmap
- Chapter 5: Risk Management
- Chapter 6: PIMS Implementation
- Chapter 7: Monitoring and Measurement of a PIMS
- Chapter 8: ISO 27701 Certification
- Chapter 1: Introduction
- Chapter 2: Types and Phases of the Information Security Risk Management Process
- Chapter 3: Phases of the Information Security Risk Management Process
- Chapter 4: Information Security Controls
- Chapter 5: Third-party Information Security Risk Management
- Chapter 6: Vulnerability Management, Penetration Testing, and Red Teams
- Chapter 7: Conclusion
Instructor
Karen Walsh
Karen Walsh is a lawyer and former internal auditor turned cybersecurity and privacy regulatory compliance subject matter expert. She worked in financial services for 12 years and spent 11 years teaching at the college level. She’s worked with leadership teams as a contract compliance manager, developing programs and guiding staff to establish best practices. During her time teaching at the University of Hartford, she received the “Sustained Excellence in Teaching Award for Part-Time Faculty.” She’s been published by the ISACA Journal, Dark Reading, HelpNet Security, Nextgov, Security Boulevard, Security Magazine, TechAeris, and Techspective. She also writes for GeekMom where she discusses her passion for Star Wars, Marvel, and LEGO.
Luciano Ferrari
Luciano Ferrari is an information security leader and IoT hacking expert. He holds multiple security certifications, including CISSP, CISM, CRISC, and PCIP, and has worked at Fortune 500 companies in both technical and leadership roles. He drives progress at his own company, LufSec, where he works on security-related issues and projects. Luciano has conducted hundreds of IT security audits and penetration tests, including audits and tests on IoT devices for cable companies. He has also leveraged his IT security expertise in manufacturing, semiconductor, financial, and educational institutions. With his background in electronics and microelectronics, his distinct specialization is definitely on hardware hacking. Luciano is passionate about sharing his knowledge with others and teaching. His other areas of expertise include IT infrastructure, networking, penetration testing, risk, vulnerability, and threat management. In private, he enjoys researching new technologies and participating at security conferences and in bug bounty programs.
Donald Tevault
Donald A. Tevault—but you can call him Donnie—got involved with Linux way back in 2006 and has been working with it ever since. He holds the Linux Professional Institute Level 3—Security certification, and the GIAC Incident Handler certification. Donnie is a professional Linux trainer, and thanks to the magic of the internet, teaches Linux classes globally from the comfort of his living room. He's also a Linux security researcher for an IoT security company.
Toulu Akerele
Toulu Akerele is a multilingual data privacy expert and security consultant who has worked in Paris, London, Tel Aviv, and Lagos, across diverse cultures, languages and environments, including think tanks and consultancy firms. Toulu is a CIPP/E and CIPM holder, in addition to a Lead Implementer in ISO 27001 (ISMS), ISO 27701 (PIMS), and ISO 22301 (BCMS). She also holds an array of OneTrust certifications such as Certified Privacy Professional, Expert Data Mapping Automation amongst others. Toulu has conducted Data Protection Compliance Audits for over ten globally renowned companies, implemented a Privacy Program Framework. Her wealth of knowledge in data privacy and information security led her to become the global Data Protection Officer and ISMS Manager at a leading fintech. Toulu has been invited to speak as a panelist on data protection in multiple countries, and her company is a licenced Data Protection Compliance Organisation. Toulu is passionate about data privacy and compliance to data protection laws, which leads her to share her knowledge in a bid to Train-the-Trainer. She has led numerous training programs – for her own internal staff, external clients, and DPOs (Data Protection Officers). She is known for the clarity of her presentations and ability to simplify the subject into digestible bite sized formats.
Skylar Simmons
Skylar Simmons is a U.S. Army veteran with over 10 years of security experience supporting various types of organizations, including, government, financial sector, and Fortune 500 companies. He holds a Bachelor’s of Science degree in Cyber Security from University of Maryland University College, along with OSCP, CISSP, and numerous other security and IT certifications.
Tino Sokic
Tino Sokic is a Cyber Security Professional with an emphasis on users’ privacy who has been in the IT field for over ten years. The combination of law school and IT certifications with a Systems Engineer background has produced a need to raise awareness of the technologies that surround people’s lives. As a Cyber Security Awareness and an Open Source Intelligence trainer, Tino has the ability to provide easy-to-follow curriculums consisting of hands-on examples and real-life stories. His focus is on the human side of technology. Tino is a co-founder of the Croatian regional biggest website that provides free tutorials and how to’s about technology and attends various Cyber Security conferences across Europe as a Guest Speaker. Also, he is a column writer for one of the first Croatian IT magazines and a regular guest on Cyber Security questions on the National TV.
Tino Sokic
Tino Sokic is a Cyber Security Professional with an emphasis on users’ privacy who has been in the IT field for over ten years. The combination of law school and IT certifications with a Systems Engineer background has produced a need to raise awareness of the technologies that surround people’s lives. As a Cyber Security Awareness and an Open Source Intelligence trainer, Tino has the ability to provide easy-to-follow curriculums consisting of hands-on examples and real-life stories. His focus is on the human side of technology. Tino is a co-founder of the Croatian regional biggest website that provides free tutorials and how to’s about technology and attends various Cyber Security conferences across Europe as a Guest Speaker. Also, he is a column writer for one of the first Croatian IT magazines and a regular guest on Cyber Security questions on the National TV.
Roland Costea
Roland is a cybersecurity, privacy, and cloud leader and strategist with a demonstrated experience in running cybersecurity & cloud business units, practices, divisions from zero to maturity with year over year quality growth and quota over-achievement (projects of more >50 million euro/year). Roland has the following certifications: CISSP, CIPM, CIPT, CIPP/E, CRISC, CISM, CCSK v4, CCSP, LPT, CEH, ISO 27001LA, TOGAF.
Anand Rao Nednur
Anand Rao is a senior technical instructor and cloud consultant. He has worked with large enterprises for about 15 years and has a wide range of technologies in his portfolio. Anand is adept at not just cloud platforms (Azure, AWS and GCP) but also well-versed with IAM, security and automation with PowerShell and python. In addition, he has been developing and updating the content for various courses. He has been assisting many engineers in the lab examinations and securing certifications. Anand Rao has delivered instructor led trainings in several states in India as well as several countries like USA, Bahrain, Kenya and UAE. He has worked as a Microsoft Certified Trainer globally for Corporate Major Clients. Anand is also a Certified seasoned professional holding certifications in following platforms: • Microsoft Certified Trainer (MC) • SY0-401: CompTIA Security + • Scrum Certified master (SCRUM) • ITIL V3 • Certified Network Defender (CND – EC-Council) • Certified Ethical hacker (CEH – EC-Council) • 70-640 MS Active Directory • 70-533 MS Azure Administration • 70-534 MS Azure Architecture • AWS certified solutions Architect – Associate • AWS certified sysops administrator – Associate • Google Cloud Platform-Cloud Architect (GCP) • Certified Cloud Security Knowledge (CCSK) Anand also manages channel "AWS Blackboard" in YouTube. Feel free to subscribe to AWS and Azure. Share, Learn, Subscribe.
Cristian Calinescu
Cristian Calinescu is a Microsoft certified Senior Infrastructure Engineer and Infrastructure Security Operations Manager. His areas of expertise are Microsoft Windows Server 2008 R2, 2012 R2, 2016, 2019, Microsoft Active Directory, Azure Active Directory, Microsoft Exchange (2003 - 2019), Virtualization (Hyper-V, VMWare), Linux OS, PowerShell (including scripting). Cristian has been involved in various maintenance and/or implementation projects based on the technologies mentioned above. He has also participated in network design and implementations projects as well as assisting customers migrating to the latest technologies.
May Ladd
May Ladd has 20 Years experience as Senior Consultant, Trainer and Director in the field of Information Security, Data Protection, eDiscovery, Data Governance, Enterprise Content Management (ECM) including Records Management and Document Management. He has worked for a complete cross range of companies within the public and private sectors including: Government, Education, Finance, Legal, Health, Oil/Gas, Professional Services, Charity and Not for Profit. Supported the Implementation of ISO27001 compliance for several organizations. He has 10+ years training experience across UK, Europe, Middle East and SE Asia covering information security, document management, records management and data protection. His qualifications include: • MSc Advanced Software Engineering - Aston University, Birmingham (UK) – Chartered Engineer Accreditation • BSc Mathematical Sciences with Computer Science – City, University of London (UK) • HND Mathematics, Statistics and Computing - Manchester Metropolitan University (UK)
Mark Murphy
Mark Murphy works as a Security Engineer at Cyderes. Before that, he spent years in various analyst and consultant roles. He has experience developing enterprise incident response plans for Fortune 500 companies, investigating global incidents, and leading global incident response efforts. He has a bachelor’s degree in IT Network Management and two master's Degrees: one in Information Security management and the other in Digital Forensics. He also holds a number of professional certifications and has experience teaching at different colleges and universities.
Soner Celik
Soner Celik, PhD is currently leading the SOC of Turkish Ministry of Energy and Natural Resources. He is the director of Project Management Institute (PMI) Ankara Chapter and board member of ISACA Ankara Chapter. He has experience for more than ten years in cybersecurity domain and published academic papers in respected journals, as well. He holds PMP, CISA, OSCP, CDPSE, CEH, ISO 27001 LA certifications and gives courses workshops as a freelancer.
Deyan T Tsanov
Deyan Tsanov has worked for large organizations over the last 10+ years. His experience includes technical support, cyber security operational activities, data risk analysis and evaluation, information security risk management, security controls implementation, and others. Graduated within the Information Security subject, he has additionally gained a variety of industry certifications to contribute to his subject matter expertise including Certified Ethical Hacker (CEH), Information System Security Management Professional (ISSMP), Certified Cloud Security Professional (CCSP), Certified Information System Security Professional (CISSP), Practitioner Certificate in Information Risk Management (PCiIRM), Security+ and others. Deyan sees Information Security Risk Management (ISRM) as an ever-evolving process that is key to preserving data, establishing successful information security programs, and being an inevitable pillar in each decision related to organizations’ strategy.
Mohamad Mahjoub
Mohamad Mahjoub is a highly accomplished author, trainer, speaker, and esteemed expert in the field of cyber security. Holding a prestigious array of licenses and certifications, including CISSP, ISO 27005 Risk Manager, ISO 27001 Lead Implementer, CISA, PMP, ITIL, and Data Protection Officer (GDPR), he brings a wealth of knowledge and experience to the realm of information security. Mohamad earned his Master's Degree in Computer Science with magna cum laude distinction from the Lebanese American University, a testament to his dedication to academic excellence. He is notably recognized as the author of the influential book "Ethical Hacking with Kali and More" and has been a featured speaker at prominent cyber security events. With an unwavering commitment to professionalism, Mohamad leverages his extensive training and certifications to provide expert cyber security services to both individuals and organizations. Since 2012, he has conducted numerous cyber security courses and seminars, catering to a diverse audience, including recent graduates, IT professionals, senior executives, and business owners. Additionally, he has reached a global audience through his multilingual online cyber security courses, boasting an enrolment of over 100,000 students worldwide. Currently serving as the Chief Information Security Officer (CISO) for a multinational corporation, Mohamad oversees the security of IT and OT operations across the Middle East region. With a remarkable 17-year career in the field of cyber security, he has earned a reputation as a trusted authority, consistently achieving success in the domain. In an era dominated by pervasive technology, Mohamad's steadfast belief underscores the critical importance of cyber security in safeguarding our digital world.
Arun Pillai
Arun Pillai is Senior DevSecOps Architect with 17 years' experience working with a variety of government departments, banking institutions, telecoms companies and Healthcare small/medium scale enterprise. He has deep experience in IT Security Consulting with focus on DevSecOps Consulting, Risk Assessment, Privacy Assessment (NIST 800-53), Threat and Vulnerability Management, Vulnerability Assessment Penetration Testing (VAPT), Secure Code Review, Security Architecture Review, IT Security Governance, Risk & Compliance, Cloud Security and Migrations. Arun is Certified Information Systems Security Professional (CISSP), Certified in Risk and Information Systems Control (CRISC) and TOGAF professional. He holds a master's degree in information technology and is pursuing doctor program from the Swiss School of Business and Management (SSBM).
Christy Kushner
Christy Kushner is a seasoned Cybersecurity Leader, Mentor, and Master Trainer with over 10+ years of experience helping others attain new levels of personal and professional success. Focused heavily on people, growth and progression, Christy brings with her an extensive background involving (but not limited to) cross-functional communications, immutable security development, risk forecasting, and the art of creating industry learning and working environments that are as positive as they are productive. Even more, she is passionate about not just helping businesses rectify weaknesses and attain sustainable protection, but doing so all while ensuring next-gen cybersecurity leaders feel confident as they navigate their careers within this transient space. Prior to cybersecurity management, Christy initially began her career as a sheep farmer and later blended her integrity, accountability, and strong work ethic values to join the US Army in 2004. Here, Christy worked as an ER Technician in Germany and later became a Critical Care Air Ambulance Medic in 2006. With this as her foundation, it set the trajectory for Christy to scale as an IT/technology professional upon being honorably discharged in 2012. Since then, Christy has become an accoladed cybersecurity expert who has built, worked for, and networked with various acclaimed organizations – the most recent being Truist. To date, Christy is also respected for her continuous support for community organizations such as Raleigh ISSA (former VP Board Member) and for her ongoing cybersecurity mentorship approaches strategically designed for career-advancing success. Academically, Christy holds a BS in Cyber and Network Security from ECPI, an AA in General Studies from Central Texas College, and more recently, studied the intricacies of Organizational Leadership from Truist Leadership Institute. This is in conjunction with industry-specific certifications, including a CISSP. Overall, Christy values continuous education, is a firm believer that successful community and business futures start by instilling positive impacts today and understands that the most beneficial outcomes are the ones that come from the formation of strong, shared-value teams. Christy currently resides in North Carolina with her husband and children and is an avid global traveler. Thus far, Christy has been to 13 countries, including Afghanistan where she was deployed twice for a total of 24 months.
Theodore Panagacos
For almost 20 years my career has largely been invested in management consulting where I have worked with C-suite Executives and have led large-scale IT strategy, enterprise architecture and cyber security projects for global commercial and government clients across industries such as banking, defense, mining, utilities and retail. I have also designed and executed numerous digital strategies, cloud migration reviews, cyber security roadmaps, enterprise architecture, business optimization, infrastructure and service delivery strategies that improved organization processes and created competitive advantage. My book "The Ultimate Guide to Business Process Management" is an Amazon dot com best-seller and has sold more than 25,000 copies world wide.
Felipe Costa
Felipe is an ICS (Industrial Control System) Cybersecurity Expert with more than + 16 years inside the industry dealing with different technologies. He is the cybersecurity director of ISA (International Society of Automation) in Brazil. ISA is responsible for the industrial cybersecurity standard IEC-62443 to protect critical systems. Felipe is also the current Technical Cybersecurity Responsible in LATAM at Moxa. He is in charge of the cybersecurity projects providing secure topologies, technology recommendations to smart grid applications in more than 20 countries and cooperating with US cybersecurity experts. Felipe is also an international speaker & author of technical articles published globally in the field of cybersecurity and artificial intelligence, and more recently, in how to enhance cybersecurity with artificial intelligence usage. He had the opportunity to present in different countries and events, including the artificial intelligence and cybersecurity event to NASA experts in the US. He has more than +20 Cybersecurity certifications in different US universities including the US homeland security department training for protecting industrial control systems, besides a Master Science in Industrial Cybersecurity in Spain.
Buy this learning path now
$599.00Couldn't load pickup availability
Get Immediate access for one year today!
Upgrade to Pro Plans and Get Full Access Today!
Get this course, along with 700+ courses and 50+ learning paths and more in one subscription. Learn more
Unlock All AccessPlans start from $33/mo. Cancel anytime.
Join over 1 Million professionals from the most renowned Companies in the world!










Empower Your Learning with Our Flexible Plans
Invest in your future with our flexible subscription plans. Whether you're just starting out or looking to enhance your expertise, there's a plan tailored to meet your needs. Gain access to in-demand skills and courses for your continuous learning needs.
Pro
Ideal for continuous learning, offering video-based learning with 840+ courses and diverse Learning Paths to enhance your skills.
What is included
- 840+ Premium Short Courses
- 70+ Structured Learning Paths
- Validation of Completion with all courses and learning paths
- New Courses added every month
Pro +
Experience immersive learning with Practice Labs and CTF Challenges for comprehensive skill-building.
Everything in Pro and
- 1400+ Practice Lab exercises with guided instructions
- 150+ CTF Challenges with detailed walkthroughs
- New Practice Labs and Challenges added every month
Pro
Ideal for continuous learning, offering extensive resources with 840+ courses and diverse Learning Paths to enhance your skills.
What is included
- 840+ Premium Short Courses
- 70+ Structured Learning Paths
- Validation of Completion with all courses and learning paths
- New Courses added every month
Pro +
Experience immersive learning with Practice Labs and CTF Challenges for comprehensive skill-building.
Everything in Pro and
- 1400+ Practice Lab exercises with guided instructions
- 150+ CTF Challenges with detailed walkthroughs
- New Practice Labs and Challenges added every month
Related Learning Paths
-
Skill Path
Detect and backtrack cyber criminals and hackers with digital forensics
3 Premium Courses
10 hr 33 m
Detect and backtrack cyber criminals and hackers with digital...
$199.00Hello
-
Skill Path
Learn to perform scanning and attacking effectively
2 Premium Courses
11 hr 53 m
Learn to perform scanning and attacking effectively
$99.00Hello
-
Skill Path
Become a High-level Programmer Equipped with Secure Software Development Skills in C, C++, Java, and Python
5 Premium Courses
42 hr 47 m
Become a High-level Programmer Equipped with Secure Software ...
$149.00Hello
-
Skill Path
Learn about the various cyber-threats that revolve around the IoT and smart city world, and how to defend against them.
6 Premium Courses
27 hr 52 m
Learn about the various cyber-threats that revolve around the...
$199.00Hello
-
Skill Path
Learn security coding practices and defensive measures needed to design and build a secure Java application.
6 Premium Courses
33 hr 14 m
Learn security coding practices and defensive measures needed...
$99.00Hello
-
Career Path
Begin DevOps Career as an Absolute Beginner | Linux, AWS, Scripting, Jenkins, Ansible, Azure, Docker, K8s, N-Tier Projects
5 Premium Courses
84 hr 29 m
Begin DevOps Career as an Absolute Beginner | Linux, AWS, Scr...
$199.00Hello
-
Skill Path
Gain expertise in one of the most underrated but useful skill in ethical hacking.
10 Premium Courses
49 hr 21 m
Gain expertise in one of the most underrated but useful skill...
$199.00Hello
-
Skill Path
Arm yourself with essential cybersecurity skills to protect the ever-critical healthcare infrastructure.
4 Premium Courses
13 hr 26 m
Arm yourself with essential cybersecurity skills to protect t...
$199.00Hello
Quick View
Becoming an Information Security Specialist
What's included
- Full Video Access
- Self-Paced Study Guide
- 6 months of access to virtual labs
- Once redeemed, this bundle will be valid for 12 months
- Self-Paced Study Guide
- Exam Voucher + Retake
Couldn't load pickup availability
