Explore the dynamic cybersecurity landscape. Learn about key concepts, including vulnerabilities, threats, and the OWASP Top 10 security standard. Find out about identity and access management, supply chain risks, essential policies and resources, cyber resilience practices, and safeguarding digital assets. Plus, get guidance on transitioning to a career in cybersecurity.
-
Analyze web app risks and identify access management needs.
-
List supply-chain cyber threats and plan risk mitigation.
-
Implement policies and practices for cyber resilience.
-
Describe ways to transition into a cybersecurity career.
Courses
-
1
The Cybersecurity Threat Landscape1h 7mThe Cybersecurity Threat Landscape
By: Marc Menninger
Learn how to protect your organization’s data from even the most devious cybersecurity threats. Examine the most common security concerns as well as newer attack vectors.
-
2
Demystifying Advanced and Complex Security Topics35mDemystifying Advanced and Complex Security Topics
By: Jerich Beason
Get an approachable, engaging overview of some of the most important and most complex topics in today’s cybersecurity landscape.
-
3
Learning the OWASP Top 1035mLearning the OWASP Top 10
By: Caroline Wong
Explore the ten most critical software vulnerabilities for 2021, as described by the Open Web Application Security Project (OWASP).
-
4
Introduction to Identity and Access Management57mIntroduction to Identity and Access Management
By: Mandy Huth
Explore the basic concepts of identity and access management, a critical component of your company’s security framework that controls access to your systems and resources.
-
5
Supply Chain Cybersecurity: Preventing Supply Chain Attacks41mSupply Chain Cybersecurity: Preventing Supply Chain Attacks
By: Nicole Dove
Explore security frameworks and practical strategies to prevent supply chain attacks on your organization.
-
6
Cybersecurity: Key Policies and Resources41mCybersecurity: Key Policies and Resources
By: Gregory Michaelidis
Learn about cybersecurity policies, related resources, and how cybersecurity fits in with public policies and laws.
-
7
Cyber Resilience: An Overview1h 2mCyber Resilience: An Overview
By: Tia Hopkins
Learn about the concept of cyber resilience as a cybersecurity program and prepare for the latest threats in the rapidly evolving threat landscape.
-
8
Transitioning to a Career in Cybersecurity1h 19mTransitioning to a Career in Cybersecurity
By: Marc Menninger
Learn how to leverage the skills and experience you already have to transition from your current career to a lucrative and successful career in cybersecurity.
Instructors
Marc Menninger
Information Security Officer | Transformational Security Leader "I Build Security Programs" | Cybersecurity LinkedIn Learning Course Instructor
Jerich Beason
Chief Information Security Officer | Board Advisor | Author | Husband | Dad | Keynote Speaker | Instructor
Caroline Wong
Mandy Huth
Nicole Dove
Gregory Michaelidis
Cybersecurity Communicator
Tia Hopkins
The Cyber Equalizer™ | Cybersecurity & AI Strategy Executive | Platform, Product & Business Transformation | P&L, Revenue Growth & GTM | Board Director & Advisor | Keynote Speaker | 2x Best-Selling Author