(ISC)2 offers Lab courses to help build technical skills in cybersecurity

(ISC)2 – the world’s largest nonprofit membership association of certified cybersecurity professionals – announced that its Professional Development Institute (PDI) now offers five Lab courses designed to help build technical skills in cybersecurity.

Part of the overall PDI portfolio, which also offers Immersive and Express Learning courses, the five Labs represent $1,200 USD in training value. These courses can be accessed by (ISC)2 members and associates via My Courses at no additional cost.

Lab content within four of the courses leverages Architecture Technology Corporation (ATCorp)’s CYRIN lab environment, a next-generation cyber-range where students use real tools, real attacks and realistic scenarios to hone their skills in a virtual space.

Each Lab begins with an instructional video to guide learners through the relevant content and reviews background information needed to complete the Lab assignment.

Learners who successfully complete all Lab activities, submit a course evaluation and score 70% or higher on the final assessment can earn continuing professional education (CPE) credits to support their (ISC)2 certifications.

“Our Labs offer the kind of hands-on learning opportunities that help professionals retain and own the techniques they practice,” said (ISC)2 Education Director Mirtha Collin.

“When it comes to topics like forensics, memory analysis and application security, this type of interactive training can be a critical tool for building technical skills that are needed to defend today’s modern IT infrastructures.”

(ISC)2 Lab courses

Currently available Lab courses include:

  • Introductory file system forensics – introduces learners to the process of imaging and forensically analyzing disks, including finding artifacts such as deleted files.
  • Live forensics using GRR – Google Rapid Response (GRR) assists in live forensics and investigation to allow for remote analysis permitting investigators to collect data about running systems on a network. This course provides a deeper understanding of how to extract evidence from a hard drive.
  • Introduction to memory analysis with Rekall – introduces learners to the Rekall framework, both for extracting evidence from memory images and for analyzing the current live state of a system.
  • Introduction to memory analysis with Volatility – introduces learners to the process of capturing a live RAM image and analyzing it using Volatility.
  • Assessing application security – explores the foundations of how to assess an application’s security. This course was created by (ISC)2 and is delivered on the Learn on Demand platform.

Share this post

Share on facebook
Share on linkedin
Share on print
Share on email

Subscribe to our Monthly Cyber Security Digest

Get monthly content to keep you up to date on the latest news and tips