Continuing and Professional Education

Risk Communications (coming soon)

Course Description

Learn how risk management is a fundamental function of information security, how to communicate its importance to a client organization, how to determine what metrics are most important to individual organizations, and use a real-life example pulled from the experience of Cybersecurity Education Consortium director Kim Jones to understand how these fundamentals are put into action by cybersecurity professionals.


Security Technologies

Course Description

Security Technologies is one piece of the ‘how to be a cyber security analyst’ puzzle. This course was originally created as a part of a semester-long course called ‘Security Operations’ and is intended to help the student better understand what various security technologies are common in business environments and how to make the best use of them as a part of working in a Security Operations Center (SOC). This material will help any facet of the cyber security profession (audit, governance, compliance, engineering, architecture) to better understand security technologies.


Understanding Data Sources

Course Description

Understanding Data Sources is one piece of the ‘how to be a cyber security analyst’ puzzle.  This course was originally created as a part of a semester long course called ‘Security Operations’ and is intended to help the student better understand where security data originates from and how to make the best use of it as a part of working in a Security Operations Center (SOC).   This material will help any facet of the cyber security profession (audit, governance, compliance, engineering, architecture) to better understand security data.