For a better view on Inspire Cayman Training, Update Your Browser.

Cybersecurity (Online Courses)

Elevate your career trajectory with our premier online course, designed to sharpen your competitive edge. Explore our curated selection of top-tier digital programs to hone your skills and propel your professional journey forward. Experience transformative learning tailored to empower your career advancement in today's dynamic landscape.
Course Category
Price on Request
Start Learning
This Course Includes
  • 15 hours 45 minutes
    of self-paced video lessons
  • 19 Programs
    crafting your path to success
  • Completion Certificate
    awarded on course completion

An Executive's Guide to Security: Protecting Your Information

Price on Request 45 minutes
This 13-video course explores data protection for businesses, including devices, social media, and good governance through security principles, policies, and programs. You will examine several types of security threats, the different types of network attacks, the role physical security plays in the protection of corporate data, and the human element of security threats. Next, learners examine the attack surface, including the total combined nodes, users, devices, and any entry points of software, a network, and a business environment. You will examine threats, vulnerabilities, and risks, and learn the importance of network hardening. This course uses real-world examples of several top security threats to businesses today, including malware, social engineering, unpatched software, BYOD (bring your own device), and IoT (Internet of things). You will examine clickjacking and URL spoofing. Finally, this course discusses the legal and financial ramifications of a major security breach, the importance of having a security policy, training personnel, password protection, and managing a company's security.
Perks of Course
Certificate: Yes
CPD Points: 45
Compliance Standards: AICC

An Executive's Guide to Security: Understanding Security Threats

Price on Request 45 minutes
Companies that do not understand threats facing their information are at risk of costly data breaches. In this 13-video course, learners can explore common security threats, types of network attacks, and the human element of security threats. Key concepts covered here include what an attack surface is, and how it must be understood to protect corporate information; and what network hardening is and how it relates to protection of corporate information. Next, learners will examine network demilitarized zones and how they protect corporate information; observe differences between threats, vulnerabilities, and risks in corporate environments; and study top kinds of security threats facing organizations today. Continue by learning the role that physical security plays in protecting corporate data; how social engineering is conducted and how it is mitigated through corporate policy; and the importance of corporate security policies, and why they should be strictly adhered to. Finally, explore the importance of password policies and why they should be adhered to; and learn reasons why IT administrators need to protect an organization by refusing to bend rules.
Perks of Course
Certificate: Yes
CPD Points: 44
Compliance Standards: AICC

Applying Research Methods for Trend & Impact Analysis

Price on Request 20 minutes
Discover why it is important to research industry trends to determine their impact on the enterprise. In this course, you will explore best practices to research new technologies, security systems, and services. See how to avoid threats and attacks; describe features and benefits of zero-day mitigation controls; research social media and integration methods; list the features and benefits of big data, machine-learning, and artificial intelligence; define the global Information Assurance (IA) industry; and list IA community groups. Finally, you will complete a review exercise that applies research methods to determine industry trends and their impact on the enterprise.
Perks of Course
Certificate: Yes
CPD Points: 21
Compliance Standards: AICC

Conducting Security Assessments

Price on Request 45 minutes
Discover enterprise security operations and explore numerous methods for conducting effective security assessments. In this course, you will review security assessment methods, reconnaissance, fingerprinting, social engineering, and open-source intelligence. Next, you will examine routing tables, DNS records, search engines, and security assessment types. You will then consider penetration testing and assessments and look at exercises and audits. Finally, you will be introduced to scanners, additional security assessment tools, and several types of host tools.
Perks of Course
Certificate: Yes
CPD Points: 45
Compliance Standards: AICC

Implementing Cryptographic Techniques

Price on Request 1 hour 30 minutes
Discover how to implement various cryptographic techniques in different scenarios. In this Computing Technology Industry Associate Advanced Security Practitioner course (CompTIA CASP+), you will explore different ways to implement cryptographic techniques and mechanisms; describe cryptographic data processing; use the OpenPuff steganography tool; implement cryptographic modules and processors; recognize various types of cryptographic implementations; implement SSH, S/MIME, SSL/TLS, cryptographic applications, and key components of Public Key Infrastructure (PKI); describe blockchain and mobile cryptography; and complete a review exercise to select cryptographic techniques based on requirements.
Perks of Course
Certificate: Yes
CPD Points: 51
Compliance Standards: AICC

Implementing Incident Response & Recovery

Price on Request 35 minutes
Incident response and recovery procedures are essential to enterprise security operations. In this course, you will learn about e-discovery, data breach detection, collection, and analytics, data breach isolation, recovery, and response. Other topics include incident detection and response, disaster recovery and order of volatility, incident response support tools, and post-incident response. Finally, as a scenario exercise, you will name the three phases of e-discovery, list the eight phases of EDRM, list the seven orders of volatility, and name three components to make hashed images in a forensic investigation.
Perks of Course
Certificate: Yes
CPD Points: 37
Compliance Standards: AICC

Implementing Security Activities across the Technology Life Cycle

Price on Request 35 minutes
Discover how to implement security activities across technology and software development life cycles. In this course, you will explore system DLC requirements, acquisition, testing, and evaluation. Review system DLC operations, monitoring, and maintenance. Study system DLC configuration and change management, asset management, and inventory control. Examine software DLC applications and software assurance, software DLC NX/XN bit, ASLR, and code quality. Consider software DLC testing and DevOps. Review agile, waterfall, and spiral software development. Identify security requirements for a traceability matrix and establish adequate solutions adaptation. Finally, you will complete an exercise to describe life cycle activities.
Perks of Course
Certificate: Yes
CPD Points: 35
Compliance Standards: AICC

Integrating & Troubleshooting Advanced AAA Technologies

Price on Request 35 minutes
Explore various scenarios to integrate and troubleshoot advanced authentication and authorization technologies in support of enterprise security initiatives and goals. In this Computing Technology Industry Associate Advanced Security Practitioner course (CompTIA CASP+), you will recognize the different components of advanced authentication; specify various types of access management; identify the different types of advanced authorization; compare attestation, proofing, and propagation; list characteristics of SAML and OpenID federation; describe Shibboleth and WAYF and how they work; list the features of several types of trust models; and complete a review exercise.
Perks of Course
Certificate: Yes
CPD Points: 34
Compliance Standards: AICC

Integrating Cloud & Virtualization Technologies in the Enterprise

Price on Request 35 minutes
Discover how to integrate cloud and virtualization technologies into a secure enterprise architecture. In this Computing Technology Industry Associate Advanced Security Practitioner course (CompTIA CASP+), you will describe technical models for cloud and virtualization and cloud service models; compare the pros and cons of hypervisors and virtualization; specify cloud augmented security services and CASB and sec-as-a-service offerings; define and describe host comingling vulnerabilities; define resource provisioning and de-provisioning; and complete a review exercise to describe enterprise cloud and virtualization technologies.
Perks of Course
Certificate: Yes
CPD Points: 36
Compliance Standards: AICC

Integrating Controls for Mobile & Small Form Factor Devices

Price on Request 45 minutes
Analyze ways to integrate security controls for mobile and small form factor devices to meet security requirements.
Perks of Course
Certificate: Yes
CPD Points: 43
Compliance Standards: AICC

Integrating Hosts, Storage , & Applications in the Enterprise

Price on Request 45 minutes
Explore how to integrate hosts, storage, networks, and applications into a secure enterprise. In this Computing Technology Industry Associate Advanced Security Practitioner course (CompTIA CASP+), you will see how to adapt a data flow security initiative to your organization; identify data flow security standards, interoperability issues, and resilience issues; review data security considerations; define resource provisioning and de-provisioning; consider merger and acquisition design; diagram and segment logical and physical networks; identify application integration security issues; and complete a review exercise.
Perks of Course
Certificate: Yes
CPD Points: 43
Compliance Standards: AICC

Integrating Network and Security Components, Concepts, and Architectures

Price on Request 1 hour 20 minutes
Discover integration of network and security components, concepts, and architectures.
Perks of Course
Certificate: Yes
CPD Points: 79
Compliance Standards: AICC

Integrating Security Controls for Host Devices

Price on Request 40 minutes
Discover enterprise security architecture and examine integration of security controls for host devices to meet security requirements. In this course, you will learn how to implement trusted operating systems, explain least functionality, and describe endpoint security software. You will then review host-based IDS and IPS, and see how to harden host systems, wireless peripherals, and physical host peripherals. You will also examine scripting and replication, boot loader programs, terminal services, and application delivery services. Finally, you will see how to integrate controls for host devices.
Perks of Course
Certificate: Yes
CPD Points: 40
Compliance Standards: AICC

Interacting across Diverse Business Units

Price on Request 25 minutes
Discover the importance of interaction across diverse business units to achieve security goals. In this course, you will learn how to interact with Sales and HR stakeholders and interpret goals with programmers and administrators. You will spot ways to communicate goals with stakeholders and express goals with disaster recovery stakeholders. Next, you will see how to provide objective guidance and recommendations and establish effective collaboration. You will also be able to observe the importance of the governance, risk, and compliance committee. Finally, as an exercise, you will practice how to interact professionally with various business units.
Perks of Course
Certificate: Yes
CPD Points: 25
Compliance Standards: AICC

Organizational Security and Privacy Policies

Price on Request 1 hour 30 minutes
Explore various critical security and privacy policies and procedures that represent the organizational requirements.
Perks of Course
Certificate: Yes
CPD Points: 33
Compliance Standards: AICC

Risk Metric Scenarios for Enterprise Security

Price on Request 30 minutes
Analyzing risk metric situations is important to help improve enterprise security. Explore different risk metric scenarios.
Perks of Course
Certificate: Yes
CPD Points: 28
Compliance Standards: AICC

Risk Mitigation Strategies and Controls

Price on Request 1 hour 30 minutes
Discover how to execute risk mitigation strategies and controls in a given scenario.
Perks of Course
Certificate: Yes
CPD Points: 50
Compliance Standards: AICC

Secure Communication & Collaboration Solutions

Price on Request 25 minutes
Discover how to choose the appropriate controls to secure communications and collaboration solutions. In this Computing Technology Industry Associate Advanced Security Practitioner course (CompTIA CASP+), you will learn to specify remote access resources and services. You will see how to describe desktop and application sharing, remote assistance, conferencing, web services, video services, and audio services. You will also see how to specify storage and document collaboration tools, IM and presence, e-mail, telephony, social media, and cloud services. Finally, you will complete a review exercise that describes secure collaboration.
Perks of Course
Certificate: Yes
CPD Points: 23
Compliance Standards: AICC

Selecting Software Security Controls

Price on Request 1 hour 30 minutes
Discover how to choose the appropriate security controls in various application vulnerability scenarios.
Perks of Course
Certificate: Yes
CPD Points: 33
Compliance Standards: AICC