For a better view on Inspire Cayman Training, Update Your Browser.

Information Security - I (Online Courses)

Elevate your career trajectory with our premier online course, designed to sharpen your competitive edge. Explore our curated selection of top-tier digital programs to hone your skills and propel your professional journey forward. Experience transformative learning tailored to empower your career advancement in today's dynamic landscape.
Course Category
Price on Request
Start Learning
This Course Includes
  • 14 hours 55 minutes
    of self-paced video lessons
  • 18 Programs
    crafting your path to success
  • Completion Certificate
    awarded on course completion

A10 and A9: API and Component Attacks

Price on Request 50 minutes
OWASP Top 10 list items 10 and 9 are exploits of APIs and components of web applications.
Perks of Course
Certificate: Yes
CPD Points: 49
Compliance Standards: AICC

A4 and A2: Broken Applications

Price on Request 1 hour 5 minutes
OWASP Top 10 list items 4 and 2 involve applications with broken access controls and broken authentication and session management.
Perks of Course
Certificate: Yes
CPD Points: 66
Compliance Standards: AICC

A5 and A1: Security and Injection

Price on Request 1 hour 10 minutes
OWASP Top 10 list items 5 and 1 cover security misconfigurations and injection, two highly common attacks in modern web applications
Perks of Course
Certificate: Yes
CPD Points: 68
Compliance Standards: AICC

A7 and A6: Leaky and Unprepared Applications

Price on Request 1 hour
OWASP Top 10 list items 7 and 6 involve applications that expose sensitive data and are not protected from modern attacks.
Perks of Course
Certificate: Yes
CPD Points: 61
Compliance Standards: AICC

A8 and A3: Cross-Site Attacks

Price on Request 45 minutes
OWASP Top 10 list items 8 and 3 include cross-site attacks, which are very common exploits in modern web applications
Perks of Course
Certificate: Yes
CPD Points: 46
Compliance Standards: AICC

Access Control and Security Architecture Design

Price on Request 45 minutes
In this course, you'll learn about designing a secure access control architecture and updating a security architecture. First, you'll explore identity and access management, including the IAAA process and related entities. You'll move on to examine access control policies and models. You'll learn about centralized access control, as well as distributed access control, federated identity management frameworks, and supporting protocols. You'll explore the importance of access reviews, as well as access control considerations with bring your own device and Internet of Things. Next, you'll examine the impact of change on a security architecture and steps involved in life cycle management. Finally, you'll complete this course by learning about architecture change considerations and the importance of a change management policy.
Perks of Course
Certificate: Yes
CPD Points: 46
Compliance Standards: AICC

Access Controls

Price on Request 55 minutes
Access controls determine the level of access that a security principal has to a network and its resources. Explore authentication mechanisms, trust architectures, the identity management life cycle, and specific access controls.
Perks of Course
Certificate: Yes
CPD Points: 56
Compliance Standards: AICC

Account Changes & Attack Mitigation

Price on Request 35 minutes
When a security breach happens, it puts your customers, assets, and entire reputation at risk. Explore safe and secure policies for advanced user account management as well as best practices for handling user account security breaches.
Perks of Course
Certificate: Yes
CPD Points: 34
Compliance Standards: AICC

Authorization & Registration

Price on Request 1 hour 20 minutes
Without the ability to gain entry, hackers are powerless. Explore key authentication concepts and best practices like identification, user authentication, the user logon process, and how to effectively manage user account credentials.
Perks of Course
Certificate: Yes
CPD Points: 81
Compliance Standards: AICC

Benefits, Practices, & Business Application Systems

Price on Request 1 hour 5 minutes
IS auditing professionals must ensure that IS implementation meets organizational objectives and strategic goals. Explore best practices for IS development, project management, and business application systems best practices.
Perks of Course
Certificate: Yes
CPD Points: 64
Compliance Standards: AICC

Configuring Cloud Security

Price on Request 25 minutes
Systems and applications running in the cloud are subject to malicious attacks. Explore best practices for cloud security, including operation and service models, virtualization, legal and privacy concerns, data storage, and outsourcing.
Perks of Course
Certificate: Yes
CPD Points: 26
Compliance Standards: AICC

Configuring Enterprise-level Security

Price on Request 1 hour 10 minutes
Mobile Device Management (MDM) platforms can lock down all aspects of mobile device usage in the enterprise in COD and BYOD scenarios. Explore a model for enterprise mobile security, including Intune and System Center Configuration Manager.
Perks of Course
Certificate: Yes
CPD Points: 72
Compliance Standards: AICC

Containers & Wrappers

Price on Request 25 minutes
Once you've identified mobile security threats, the next step in the mobile-aware enterprise enforcing mitigation strategies. Explore containers and wrappers from a Bring Your Own Device (BYOD) and Company-owned Device (COD) perspective.
Perks of Course
Certificate: Yes
CPD Points: 23
Compliance Standards: AICC

Control Self-assessment (CSA) & Finalizing an Audit

Price on Request 1 hour
A successful information system audit requires proper assessment and reporting. Explore best practices for finalizing an audit, compiling results, and effectively communicating pertinent outcomes.
Perks of Course
Certificate: Yes
CPD Points: 58
Compliance Standards: AICC

Cryptographic Methods

Price on Request 25 minutes
Cryptography uses different methods to protect data. Explore different methods used to protect or transmit data securely, and some of the components that ensure data can be protected.
Perks of Course
Certificate: Yes
CPD Points: 27
Compliance Standards: AICC

Cybersecurity and Networking Fundamentals

Price on Request 40 minutes
The goal of cybersecurity is to protect systems, networks, data, and programs from digital attacks. As cyber-attacks continue to increase in frequency and sophistication, it is imperative that cybersecurity professionals learn how to quickly identify and mitigate vulnerabilities. In this course, you will learn common security terminology including threats, vulnerabilities, attacks, exploits, controls, and countermeasures. Discover the fundamentals of the confidentiality, integrity, and availability (CIA) triad, and explore the five elements of the AAA framework; identification, authentication, authorization, auditing, and accountability. You'll then explore risk considerations and management strategies, and discover how risks can be mitigated, accepted, transferred, and rejected. Lastly, explore core networking components and discover how information flow models are used to prevent unauthorized information flow in any direction. This course was originally created by Global Knowledge (GK).
Perks of Course
Certificate: Yes
CPD Points: 42
Compliance Standards: AICC

Cybersecurity Awareness and Threat Vectors

Price on Request 40 minutes
Cybersecurity is often defined as the protection of computer systems and networks from unauthorized or unwanted information disclosure, theft or damage. In this course, explore the potential impacts of a personal or business security breach, and discover the fundamentals of the confidentiality, integrity, and availability triad. Explore how baselining can be used to better understand an IT environment and learn to differentiate between natural, malicious human, chemical, and non-malicious threats. Explore security concerns as they relate to internal and external human activity, and discover how to identify drivers for security controls. Explore common functions and purposes of security controls and discover the importance of testing corrective controls in place. Lastly, explore how to differentiate between quantitative and qualitative risk analysis, as well as between data in motion and data at rest. This course was originally created by Global Knowledge (GK).
Perks of Course
Certificate: Yes
CPD Points: 42
Compliance Standards: AICC

Defensive CyberOps: Defensive Cyberspace Operations

Price on Request 40 minutes
A well-planned and properly executed DCO mission will enable the cyber warrior to repel attacks and rapidly prepare for offensive action. In this course, you'll learn the principles of Defensive Cyber Operations, including measures and responses. You'll explore cybersecurity and cyberspace operations in DCO. Next, you'll look at DCO analytics, missions, and operating domains. You'll explore the role of the mission owner and network owner in DCO, as well as planning considerations. Finally, you'll learn about cyberspace threats that may occur during the course of maneuver operations and common security and system tools used in DCO.
Perks of Course
Certificate: Yes
CPD Points: 42
Compliance Standards: AICC