For a better view on Inspire Cayman Training, Update Your Browser.

Information Security -II (Online Courses)

Elevate your career trajectory with our premier online course, designed to sharpen your competitive edge. Explore our curated selection of top-tier digital programs to hone your skills and propel your professional journey forward. Experience transformative learning tailored to empower your career advancement in today's dynamic landscape.
Course Category
Price on Request
Start Learning
This Course Includes
  • 19 hours 35 minutes
    of self-paced video lessons
  • 16 Programs
    crafting your path to success
  • Completion Certificate
    awarded on course completion

Development, Maintenance, & Auditing

Price on Request 1 hour 10 minutes
It's important to ensure your IS implementation meets organizational objectives and strategic goals. Explore IS maintenance practices, system development activities, and application controls auditing.
Perks of Course
Certificate: Yes
CPD Points: 71
Compliance Standards: AICC

Discovery and Attack Vectors

Price on Request 45 minutes
The discovery phase includes performing different types of reconnaissance on a target. To accomplish this, attackers can use a series of techniques, exploits, and tools. In this course, learn about common attack vectors such as malware, social engineering, and session hijacking. Discover how to collect legacy and archived web page content using discovery tools, and learn how to identify domains and IP addresses using the Netcraft website. Explore how to maximize command-line tools to discover shares and local network configurations, and learn the importance of checking to see if targets are using default passwords. You'll also discover how footprinting can be used to extract details of a website, how to disable NetBIOS, how to use kali to perform banner grabbing. Lastly, discover countermeasure techniques such as using generic domain names, hardening systems, and turning off unnecessary protocols and services. This course was originally created by Global Knowledge (GK).
Perks of Course
Certificate: Yes
CPD Points: 45
Compliance Standards: AICC

Encryption Use & Analysis

Price on Request 35 minutes
Cryptography is far more than just selecting an algorithm and calling the encrypt or decrypt method. Explore secure communications using SSH, disk encryption, key strength considerations, cryptanalysis, and side-channel attacks.
Perks of Course
Certificate: Yes
CPD Points: 33
Compliance Standards: AICC

Environment Monitoring, Retention, and Data Logging

Price on Request 50 minutes
Logging is used to record events that occur within an organization's systems and networks. Oftentimes, logging information can help with the identification and isolation of any intruder or malware. In this course, explore acceptable use policies (AUP) and how they apply to employee monitoring. Discover how monitoring as a service can benefit an organization, and explore devices that can be monitored on a network including routers, switches, laptops, and wireless access points. Explore how retention policies can identify how long different types of data are maintained and discover when to implement a centralized enterprise logging service. Lastly, explore how keystroke loggers can capture and track what is typed on a keyboard and learn the importance of protecting log information. This course was originally created by Global Knowledge (GK).
Perks of Course
Certificate: Yes
CPD Points: 52
Compliance Standards: AICC

Executive's Guide to DevSecOps Replay

Price on Request 1 hour
This is a recorded Replay of the Executive's Guide to Secure DevOps Live session that ran on June 2nd at 11 AM ET. In this session Ed Adams discusses DevOps vs. Traditional Approaches, DevSecOps in Practice, and Managing / Making Room for DevOps.
Perks of Course
Certificate: Yes
CPD Points: 58
Compliance Standards: AICC

Exploring SecOps Tools: Network Scanning Using Nmap

Price on Request 55 minutes
The Network Mapper (Nmap) utility is a free, open-source network discovery and security auditing tool. Nmap is one of the industry's leading network scanning tools and is commonly used to discover hosts and services on a computer network. In this course, you'll explore the history of Nmap, its features and benefits, and the potential limitations and considerations of the Nmap tool. Discover how to download, install, and explore the Nmap utility user interface and how to perform Nmap TCP connect and Nmap stealth scans. Lastly, explore when to use Nmap to perform inverse scans, and discover situations that warrant using Nmap to perform an ACK scan.
Perks of Course
Certificate: Yes
CPD Points: 57
Compliance Standards: AICC

Exploring SecOps Tools: Web Application Hardening via Burp Suite

Price on Request 1 hour 25 minutes
Burp Suite is a common set of proxy-based tools used for penetration testing and security evaluation of web-based applications. It has become one of the industry-standard toolkits used by information security professionals. Explore the Burp Suite of tools and products and discover common Burp Suite solutions such as application security testing, DevSecOps, compliance, and penetration testing. Find out how Burp Suite can help integrate security into software development and investigate potential limitations and disadvantages of the suite. Learn the Burp Suite installation process and how to navigate the common features of the Burp Suite user interface. Lastly, explore how to perform API security testing and how to scan a website for vulnerabilities using Burp Suite. When you have finished this course, you will be able to confidently use Burp Suite for web application hardening.
Perks of Course
Certificate: Yes
CPD Points: 84
Compliance Standards: AICC

Fearless Penetration Testing Bootcamp: Session 1 Replay

Price on Request 3 hour 25 minutes
This is a recorded Replay of the Fearless Penetration Testing Live session that ran on June 28th at 11 AM ET. In this session William MacDonald discusses the rules of engagement and OSINT.
Perks of Course
Certificate: Yes
CPD Points: 204
Compliance Standards: AICC

Fearless Penetration Testing Bootcamp: Session 2 Replay

Price on Request 3 hour 25 minutes
This is a recorded Replay of the Fearless Penetration Testing Live session that ran on June 29th at 11 AM ET. In this session William MacDonald discusses social engineering, penetration testing, and documentation.
Perks of Course
Certificate: Yes
CPD Points: 206
Compliance Standards: AICC

Frameworks, Life Cycles, and Architecture

Price on Request 45 minutes
Organizations require people with the skills to make decisions to secure information systems based on best practices, standards, and industry recommendations. Security architects fill this need. In this course, you'll learn about common IT life cycles and life cycle management, including the system development and security life cycles. You'll explore the importance of frameworks, including enterprise architecture frameworks. You'll then examine various stakeholders and the roles they play in architecture development. Next, you'll learn about the need for and types of security policies. Finally, you'll explore aspects of secure network architecture design, including network segmentation and components, applying industry best practices, and team member roles and responsibilities.
Perks of Course
Certificate: Yes
CPD Points: 43
Compliance Standards: AICC

Fundamentals of Malware Analysis and Remediation

Price on Request 55 minutes
Malware is any software with the intention to wreak destruction or gain access to sensitive information. Malware is often used as a blanket term for common computer worms, viruses, and trojans. In this course, you'll learn how to protect systems from malware by implementing and managing anti-malware software. Explore different malware infection methods and learn how to differentiate between different types of malware. Explore how viruses can attach themselves to system applications and learn about common virus threats. Discover how to differentiate between worms, trojans, rootkits, and bots, and explore how spyware and adware spyware can be embedded into applications that look free and interesting to use. Lastly, explore how ransomware works and discover countermeasures to protect against threats including user awareness programs, scanning systems, and monitoring network activity. This course was originally created by Global Knowledge (GK).
Perks of Course
Certificate: Yes
CPD Points: 56
Compliance Standards: AICC

Governance and Corporate Culture

Price on Request 20 minutes
Corporate culture relates to the enterprise-wide attitudes towards security and risk. In this course, you'll learn about governance and corporate culture. First, you'll explore corporate security culture and associated concerns, before moving on to look at the concept of fear, uncertainty, and doubt and why it should be avoided. Next, you'll examine why enterprise-wide support is required, the differences between top-down and bottom-up, and various security roles. You'll learn about the importance of having an acceptable use policy, consequences of not having an appropriate policy in place, and having consequences for individuals who violate this policy. Finally, you'll examine methods of improving corporate culture and governance, like training, rewards and consequences, and hiring practices, and also learn about the importance of ongoing assessments.
Perks of Course
Certificate: Yes
CPD Points: 21
Compliance Standards: AICC

Governance and Policy

Price on Request 45 minutes
Governance helps shape the current and future strategy of an organization and aligns IT solutions with corporate strategy. In this course, you'll learn about the role of governance and policy. First, you'll explore the purpose and importance of governance and how it relates to policy. You'll move on to examine Business Continuity Plans and the four steps involved in the process. You'll explore updating governance policies and also governance tools like Business Impact Analysis, Disaster Recovery Plan, public relations strategies, and RACI charts. Finally, you'll explore common characteristics of eGRC tools and examine specific tools like IBM OpenPages and RSA Archer.
Perks of Course
Certificate: Yes
CPD Points: 47
Compliance Standards: AICC

Governance, Risk Management, and Compliance

Price on Request 1 hour 15 minutes
In this course, you'll explore governance, risk management, and compliance - commonly known as GRC. You'll examine why it matters, what it is, and its increasing importance. You'll learn about who needs it and the role it plays for various parties. Next, you'll examine industry compliance, external authorities, non-compliance consequences, and reporting. You'll also learn about industry standards like PCI, laws and regulations, and compliance and company policy. Finally, you'll complete this course by learning about privacy compliance, including private data, how data architectures address privacy information, the Health Insurance Portability and Accountability Act, the Health Information Technology for Economic and Clinical Health act, the Gramm-Leach-Bliley Act, the General Data Protection Regulation, and privacy best practices.
Perks of Course
Certificate: Yes
CPD Points: 76
Compliance Standards: AICC

Governance, Strategy, Value, & Policies

Price on Request 45 minutes
Information system (IS) audits determine if the organization has an effective governance framework. Explore governance best practices, including IS governance, responsible IT governance committees, and enterprise architecture.
Perks of Course
Certificate: Yes
CPD Points: 47
Compliance Standards: AICC

Identity Management, Directory Services, and Federation

Price on Request 1 hour 20 minutes
Identity management is a framework used to ensure appropriate access controls are in place to grant authenticated users access to enterprise assets. In this course, you will learn about the key fundamentals of identity management, including privilege administration, access control, and system scalability. Explore identification, authentication, authorization, accountability (IAAA) services and discover how personally identifiable information (PII) can be used to identify a subject. Explore the three main types of authentication factors: something you know, something you have, and something you are, and discover how to choose appropriate and accurate biometric criteria. You'll also learn about directory services and how they can be used to organize network resources. Explore password cracking techniques and tools, and discover when to use same sign-on and single sign-on authentication schemes. Lastly, explore how federation can be used to link together different authentication systems. This course was originally created by Global Knowledge (GK).
Perks of Course
Certificate: Yes
CPD Points: 79
Compliance Standards: AICC