RRecertHero
BrowseCertificationsProvidersPricing
Sign inGet started

Browse

Continuing education opportunities

6 certifications. Updated daily.

FiltersBrightTALKClear all

Certification

Activity type

Cost

Duration

Showing 52 opportunities

FreeWebinar
BrightTALKLive

Security Report Trends - Without the Reading

So many security reports, so little time! Join our experts as we cut through the noise to highlight the trends that truly matter. In this session, we’ll explore: - SIEM Re-evaluation: Why 75% of CISOs are rethinking their strategies - The Rise of AI: How artificial intelligence is reshaping security practices (because we can't have a conversation without AI in 2025) - Emerging Threats and Vital Capabilities: What security leaders must prioritize to stay ahead From practitioner to CISO, you’ll leave with a more clear understanding of the market shifts and actionable insights from the latest security reports.

Sep 3, 2025Scheduled
Free
RRecertHero

An independent aggregator and tracking tool for IT continuing education. Built for the professionals who keep things running.

Product

  • Browse
  • Certifications
  • Pricing

Company

  • About
  • Methodology
  • Contact

Legal

  • Terms
  • Privacy

© 2026 RecertHero. Not affiliated with (ISC)², CompTIA, ISACA, or Cisco.

Credit estimates are guidance only — verify with your certifying body.

Webinar
BrightTALKLive

Eat Well, Work Well: Nutrition for Cybersecurity and High-Stress Careers

Burnout is a growing concern in cybersecurity, but nutrition can be a powerful tool to combat it. The Center hosted a webinar with Melissa Majumdar, MS, RD, CSOWM, LDN, who shared science-backed strategies for sustaining energy, improving focus, and building healthy habits under pressure.

Sep 4, 2025Scheduled
FreeWebinar
BrightTALKLive

Managing Human Risk in an AI-Driven Threat Landscape: Are Your Defenses Evolving Fast Enough

Cybercriminals have moved beyond spray-and-pray phishing campaigns into the age of AI-powered precision attacks. Using generative AI, they're now creating hyper-personalized scams that mimic your colleagues' writing styles, clone your CEO's voice for vishing attacks, and craft multi-channel campaigns designed to slip past both technical controls and human intuition. In this eye-opening webinar at 1:00 p.m. Eastern/10:00 a.m. Pacific on September 2, 2025 KnowBe4 and ISC2 strip away the AI hype and exposes the stark reality of how artificial intelligence is transforming social engineering, making your people simultaneously your greatest vulnerability and your most critical defense. Join us and discover: • AI Threat Evolution: How attackers are using generative AI to scale sophisticated attacks that previously required weeks of research into automated campaigns launched in minutes • Deepfake Danger Zone: Real-world case studies of voice cloning, video manipulation and other AI-powered tactics that have successfully compromised organizations • Psychological Warfare 2.0: How AI allows attackers to exploit cognitive biases and emotional triggers with unprecedented precision • Human Risk Quantification: Practical frameworks for measuring your organization's human attack surface and tracking improvements over time • Next-Gen Defense Strategies: Actionable techniques to transform your security awareness program to counter AI-enhanced social engineering Whether you're securing a small business or a global enterprise, you'll walk away with concrete strategies to prepare your workforce for the AI threat revolution already underway.

CISSP~1Security+~1CISM~1
Sep 9, 2025Scheduled
FreeWebinar
BrightTALKLive

The Do's and Don'ts of Device Control Beyond USB Storage

Modern Device Control needs to support multiple data transfer channels, adapt to emerging business and compliance requirements, and provide detailed, context-aware protections without compromising productivity. Today, data leaves organizations not only through USB sticks, but also through wireless methods such as Bluetooth, local and network printers, peer-to-peer sharing tools like AirDrop, mobile devices, and specialized ports, such as FireWire. Managing these risks is further compounded by mixed OS environments that include Windows, macOS, and Linux. During this webinar on September 3, 2025, at 1:00 p.m. Eastern/10:00 a.m. Pacific, attendees will learn how to overcome challenges related to: - Device Control: Data loss via USB, Bluetooth, printers, mobile devices, and more - Ransomware Protection: Blocking unauthorized devices completely and eliminating risk at the hardware level - Enforcing Encryption: Encrypting files and devices to accommodate authorized data transfers while controlling access to decryption keys - DLP for Mixed OS Environments: Overcoming the unique device control and DLP challenges associated with environments that include Windows, macOS and Linux.

CISSP~1.5Security+~1.5
Sep 9, 2025Scheduled
FreeWebinar
BrightTALKLive

Your Sneak Peek into Cybersecurity and Business Alignment at ISC2 Security Congress 2025- #3

ISC2 Security Congress 2025 is right around the corner, and we’re so excited about this year’s speaker line-up that we decided to bring a sample of this year’s content to you early! Join three of our esteemed conference speakers as they preview their upcoming presentations, all of which relate to aligning cybersecurity strategy with business needs. By joining this webinar you’ll get a snapshot of session content, which includes the following presentations: · Building Robust Enterprise-wide Business Information Security Officer (BISO) Programs: Key Elements for Success · Cybersecurity: From Cost Center to Competitive Advantage · Drop-Shipping a New Security Department into a Multibillion-Dollar Company Join us live Sept. 11, 2025 at 1:00 p.m. Eastern/10:00 a.m.Pacific to be among the first to gain valuable insights into these sessions, plus have an opportunity to as your questions. Like what you see? Register for ISC2 Security Congress 2025 to unlock access to even more great content this October: https://web.cvent.com/event/00885cdc-a7ef-4682-81d1-77950c2f3d07/websitePage:e3e1427f-5c48-423a-a0e5-60dcec1c4363?RefId=Attend&utm_campaign=GBL-SecurityCongress&utm_content=congress&utm_medium=bannerep&utm_source=isc2web&utm_term=eventpage

CISM1.5CISSP~1.5
Sep 17, 2025Scheduled
FreeWebinar
BrightTALKLive

Navigating Malware-Free Attacks

We started with a simple question: what do modern attackers do? After analyzing over 700,000 security incidents, one technique was almost universally present: a staggering 84% of major attacks incorporated Living Off The Land (LOTL) tactics, using the same native tools and utilities your administrators use every day. If the tools are the same, how do you tell an attacker from a user? To find out, we turned our focus to legitimate usage data. By comparing this legitimate activity side-by-side with the malicious activity, we found quite a lot of interesting patterns. Join the Bitdefender team and ISC2 at 1:00 p.m. Eastern/10:00 a.m. Pacific on September 16, 2025 to get actionable insights from real-world attacks to better detect threats hiding in plain sight.

CySA+1Security+~1CISSP~1
Sep 23, 2025Scheduled
FreeWebinar
BrightTALKLive

From Shield to Spear: How AI is Reshaping Cyber Defense and Offense

The rise of artificial intelligence in cybersecurity is both a blessing and a curse. AI is redefining the cybersecurity battlefield, offering unprecedented advantages for security teams and threat actors. Join Steve Piper, CEO of CyberEdge and Editor-in-Chief of Security Buzz, as he explores AI’s transformative impact on the IT security industry. On the defense side, AI is revolutionizing threat detection, automating incident response, and predicting vulnerabilities before they’re exploited. However, threat actors are also leveraging AI to enhance phishing attacks, create evasive malware, and orchestrate sophisticated social engineering campaigns. This webinar provides a balanced view of AI’s dual role in cybersecurity, showcasing both the opportunities and challenges it presents. Gain insights into how IT security teams can adopt AI to stay ahead, while understanding how adversaries may use it to their advantage. With expert commentary and real-world examples, this session equips attendees with the knowledge to navigate AI’s impact on the evolving threat landscape.

CySA+~1.5CISSP~1.5Security+~1.25
Sep 24, 2025Scheduled
FreeWebinar
BrightTALKLive

Ready to Launch Your Cybersecurity Career After Military or Government Service?

Making the move from military or government roles to the civilian cybersecurity workforce can feel like a big shift. The good news: your discipline, leadership, and technical expertise are in high demand — if you know how to showcase them. That’s where ISC2 comes in. Join us for an exclusive webinar featuring two of our own accomplished veterans: · Timothy Campo – Former Navy Information Warfare Naval Officer, now leading Security and Technical Operations at ISC2. · William Orr – USMC veteran and current ISC2 Standards Development Manager. Together, they’ll share first-hand insights on: · Translating your military experience into language that resonates with employers. · Leveraging your transferable skills to stand out in the corporate world. · Unlocking the career growth, flexibility, and opportunities unique to civilian cybersecurity. Don’t miss this chance to gain practical tools, resources, and insider advice to position yourself for success — and land your next role with confidence.

Oct 7, 2025Scheduled
FreeWebinar
BrightTALKLive

Securing the Future: AI, Resilience, and Evolving Cyber Roles (#3)

As AI reshapes job functions and workflows across cybersecurity, professionals face new questions: Which roles will grow or disappear? What skills will matter most? And how can we stay resilient amid constant change? In this forward-looking session, we explore ISC2 data on AI’s workforce impact alongside real-world insights from hiring trends and resilience research. Speakers will discuss how to prepare for the evolving landscape—from emerging AI-related security roles to the enduring value of human skills like judgment, adaptability, and emotional regulation. Attendees will leave with a clearer view of how to future-proof their careers—and their well-being—in an AI-driven world.

CISSP~1.5CISM~1.5
Oct 20, 2025Scheduled
FreeWebinar
BrightTALKLive

The Workforce Under Pressure: Burnout, Skills Gaps and Organizational Risk (#1)

Cybersecurity professionals are under more pressure than ever—with 90% of teams reporting skills gaps, 67% facing staffing shortages, and burnout rising across roles. In this opening session, we reveal the latest workforce data from ISC2, CyberSN and Cybermindz to unpack the human and operational impacts of today’s talent crisis. Speakers will explore how stress, role ambiguity, and unsustainable workloads are accelerating risk—both personal and organizational—and introduce the concept of mental resilience as an essential component of operational readiness. Attendees will gain insights into identifying burnout risks in themselves and their teams, along with practical guidance for setting healthier boundaries at work.

CISM~1CISA~1
Oct 20, 2025Scheduled
FreeWebinar
BrightTALKLive

Level Up Your Strategies in Cybersecurity Awareness Month and Beyond!

We’re already into Cybersecurity Awareness Month and that may have you asking: How do you turn mandatory security awareness into a fun and engaging campaign that actually reduces human risk and keeps momentum going for months to come? On Tuesday, October 14, 2025 at 1:00 p.m., Eastern/10:00 a.m. Pacific join sponsor KnowBe4 and host ISC2 to discover how to leverage engaging campaign ideas. This webinar will include KnowBe4's free ready-to-use kit, to run a complete themed campaign all year long. We've done the heavy lifting so you can focus on what matters most: building a stronger security culture that lasts. In this fun and practical session, you'll learn: -How to explain cyber threats to users in ways they can relate to and understand in their daily work -Real examples and creative campaign ideas showing how admins have created wildly successful cybersecurity awareness campaigns -Simple gamification techniques that transform passive learning into competitive fun -How to select the right training modules that entertain while they educate and why it matters -How to maintain momentum and engagement long after Cybersecurity Awareness Month ends Join us to get practical tools and creative ideas that will make your Cybersecurity Awareness Month campaign the talk of the organization while dramatically reducing your human risk.

CISM~1CISSP~1
Oct 22, 2025Scheduled
FreeWebinar
BrightTALKLive

Security Industry 101: What Every Newcomer Needs to Know

New to the security industry? Or thinking about transitioning into an information security role? If so, this webinar is for you. Join Steve Piper, CEO of CyberEdge and Editor-in-Chief of Security Buzz, as he provides a one-hour ‘crash course’ on the entire security industry, including: - Size and growth of the security industry - Useful vocabulary terms and buzz words - Five types of cyberthreat actors - Modern cyberthreats and tactics - Categories of security defenses - Common security job roles - Security industry ecosystem

Security+~1CISSP~1
Oct 27, 2025Scheduled
FreeWebinar
BrightTALKLive

From Technicians to Professionals: The Duty of Care in Cybersecurity (#2)

What does it mean to treat cybersecurity as a true profession—not just a discipline? This session challenges practitioners, leaders, and hiring managers to rethink professional standards in cyber, highlighting the role of credentialing, clear career pathways, and people-centric leadership in retaining and growing talent. Speakers will explore how human factors such as stress and burnout can impact performance, and why self-awareness, empathy, and communication are essential leadership skills in today’s environment. Drawing from workforce insights and neuroscience, this session helps attendees understand how to position themselves for advancement—by building a foundation of professional efficacy, emotional insight, and resilience.

CISM~1CISSP~1
Oct 28, 2025Scheduled
FreeWebinar
BrightTALKLive

How to Modernize Threat Protection in the Age of AI

The surge in generative AI and increasingly sophisticated social engineering tactics has given cybercriminals powerful new tools to exploit human vulnerabilities—especially through email. These attacks are no longer just technical; they’re psychological, targeting your employees to gain access, steal data, and inflict financial and reputational damage. Join sponsor, Proofpoint and host, ISC2 on October 21, 2025 at 1:00 p.m. Eastern/10:00 a.m. Pacific for a live 60-minute webinar. During this session we’ll explore actionable approaches for strengthening your human firewall. Discover how to empower your workforce, reduce risk, and build a resilient defense against today’s AI-enhanced threats. Don’t miss it!

CySA+~1CISSP~1Security+~1
Oct 28, 2025Scheduled
FreeWebinar
BrightTALKLive

The Road Ahead: Top Five Cybersecurity Predictions for 2026

The cybersecurity landscape is evolving rapidly. As cyberthreats grow in complexity, organizations must stay ahead of the curve by anticipating what’s next. So, what’s in store for our industry in the coming year? Join Steve Piper, CEO of CyberEdge and Editor-in-Chief of Security Buzz, as he recaps the good, the bad, and the ugly cybersecurity events of 2025 and shares his top five cybersecurity predictions for 2026. This webinar provides a forward-looking perspective, equipping attendees with the insights and strategies needed to stay ahead of emerging threats and capitalize on new opportunities.

CISM~1CISSP~1
Nov 19, 2025Scheduled
FreeWebinar
BrightTALKLive

AI-Powered SOCs: Automate Smarter, Defend Better

AI-driven SOCs promise efficiency gains, but how much automation is too much? While AI-powered security tools enhance SIEM, SOAR, and threat detection, adversaries are exploiting automation blind spots, manipulating AI models, and evading AI-driven defenses. This session dissects real-world adversarial AI attacks, including a case study on Microsoft Copilot’s AI vulnerabilities—where attackers exploited indirect prompt injection and adversarial inputs to manipulate security workflows. Attendees will learn how AI can be both a force multiplier and a security risk, gaining: - An understanding of how attackers bypass AI-powered security automation - A breakdown of adversarial AI tactics and AI-specific SOC vulnerabilities - A hybrid AI-human SOC model that reduces false positives while maintaining resilience This session offers a practical roadmap to securely integrate AI in SOC operations without increasing attack surfaces.

CySA+1CISSP~1CISM~0.75
Dec 9, 2025Scheduled
FreeWebinar
BrightTALKLive

Building a Post-Quantum Tech Stack: From Readiness to Implementation

Preparing for the post-quantum era requires more than awareness - it demands a modern cryptographic foundation built for agility, visibility, and compliance. Organizations must be able to discover and manage their cryptographic assets, modernize and consolidate their infrastructure, and confidently test and implement post-quantum cryptography (PQC). On December 2, 2025 at 1:00 p.m. Eastern/10:00 a.m. Pacific, Sponsor Entrust and host ISC2 explore practical steps for aligning your PQC readiness journey with execution - including cryptographic asset management, PKI, and HSMs. We’ll discuss how crypto discovery, agility, and modernization strategies - supported by automation, compliance management, and integrated visibility - can help organizations strengthen security now and through migration. Join us to learn how you can move from planning to deploying PQC, building a tech stack ready to secure your organization against quantum threats today and tomorrow.

CISSP1CCSP~1CISM~0.75
Dec 9, 2025Scheduled
FreeWebinar
BrightTALKLive

5 Key Learnings from the Frontlines: Enterprise Passkey Deployment Realities in 2026

In the first half of 2025, over 16 billion passwords were leaked—highlighting the urgent need for stronger, phishing-resistant authentication methods. Despite growing awareness, many organizations still hesitate to adopt passkeys due to perceived complexity, cost concerns, and a lack of clear guidance, as noted in recent research by the FIDO Alliance and HID. On December 11, 2025 at 1:00 p.m. Eastern/10:00 a.m Pacific, Sponsor HID Global and Host ISC2 share practical, field-tested insights into accelerating enterprise passkey adoption. Learn how to: * Navigate common deployment challenges * Align authentication strategies with evolving security goals * Drive user adoption and organizational buy-in Join us to stay ahead of the passwordless curve and prepare your enterprise for a more secure, streamlined authentication future in 2026.

CISSP~1Security+~1CISM~1
Dec 16, 2025Scheduled
FreeWebinar
BrightTALKLive

The Invisible Threat: How Polymorphic Malware is Outsmarting Your Email Security

Approximately $350 million in preventable losses stem from polymorphic malware, malicious software that constantly changes its code to evade detection. With 18% of new malware using adaptive techniques that challenge traditional defenses, now is the time to enhance your organization's security posture. Join us December 9, 2025 at 1:00 p.m. Eastern/10:00 a.m. Pacific for this webinar where Sponsor, KnowBe4 and Host, ISC2 share valuable insights and proactive strategies to strengthen your security framework against sophisticated attacks. In this session, you'll discover: - Enhanced detection strategies that go beyond traditional signature-based approaches to identify polymorphic threats before they impact your systems - Proactive defense frameworks specifically designed to counter the most sophisticated shape-shifting malware - Success stories from organizations that effectively neutralized advanced threats through strategic security improvements - Communication templates for building stakeholder support for security enhancements - Practical implementation roadmaps to strengthen your security posture against adaptive threats drawing from real-world scenarios and emerging threat intelligence, You'll leave with a practical toolkit of strategies you can be implemented immediately to enhance your organization's resilience.

Security+1CySA+1CISSP~1
Dec 16, 2025Scheduled
FreeWebinar
BrightTALKLive

Darwinian Offense: Generative Curricula for Autonomous Red Teaming- a Security Congress Encore

AI has historically struggled to assist in offensive security due to a critical shortage of real-world training data. This session takes a deep dive into the methodology behind recently published research designed to overcome this limitation through adversarial self-learning. Following up on her popular Security Congress 2025 keynote, researcher Alissa Knight will dissect a novel architecture where an AI teaches itself to hack not by studying past attacks, but by engaging in a continuous, high-stakes war game against itself. Attendees will learn the mechanics of this "survival of the fittest" loop, where two competing agents—one constructing defensive puzzles and the other evolving breaking strategies—force the emergence of increasingly sophisticated API attacks without human intervention. The session will move from research theory to validation with a live demonstration against a banking API using Ares, a prototype implementation of this autonomous framework.

CISSP~1.5CySA+~1.5
Dec 24, 2025Scheduled
FreeWebinar
BrightTALKLive

Systems Security Certified Practitioner (SSCP) Info Session

Join us for a deep dive into Systems Security Certified Practitioner (SSCP), the security operations and network security credential from ISC2, creator of the CISSP. As organizations continue to pursue digital transformation initiatives, the threat landscape is always expanding. Yet cybersecurity leadership talent is scarce. That’s where SSCP from ISC2 comes in — to help fill the gap. Once certified, the opportunities for certified professionals are near limitless. The SSCP is ideal for IT administrators, managers, directors and network security professionals responsible for the hands-on operational security of their organization’s critical assets. It shows you have the advanced technical skills and knowledge to implement, monitor and administer IT infrastructure using security best practices, policies and procedures. In this 60-minute live virtual session, you’ll learn: - If SSCP is right for you - How Official ISC2 Training flexes with your learning style - What to expect on exam day - How to become endorsed and maintain your certification Plus! Get answers to your SSCP questions during the Q&A section. Register now and begin your SSCP certification journey today!

Security+~1CISSP~1
Jan 16, 2026Scheduled
FreeWebinar
BrightTALKLive

Modernizing PKI for the Post-Quantum Transition

Preparing for the post-quantum era isn’t as simple as swapping algorithms. Organizations face growing complexity across certificates, identities and encrypted data — all while standards, timelines and risks continue to evolve. On January 15, 2026, at 1:00 p.m. Eastern/10:00 a.m. Pacific, sponsor Entrust and host ISC2 will explore why PKI (public key infrastructure) plays a central role in post-quantum readiness, the practical trade-offs between pure post-quantum and hybrid approaches, and how building crypto agility today helps reduce future disruption, risk and operational strain.

CISSP1Security+~1
Jan 29, 2026Scheduled
FreeWebinar
BrightTALKLive

Cybersecurity: From Cost Center to Competitive Advantage

Security professionals often focus solely on defense. But what if we viewed cybersecurity as a strategic asset that drives sales and builds customer trust? This session on January 27, 2026 at 1:00 p.m. Eastern/10:00 a.m. Pacific will explore the untapped potential of cybersecurity to become a key enabler for revenue generation and enhanced customer relationships. We will delve into practical strategies for proactively integrating security considerations into the sales cycle, leveraging security as competitive differentiators, and effectively communicating your security posture to build unwavering customer confidence. This session will demonstrate how a shift in mindset can position cybersecurity as a vital contributor to business growth while upholding ethical responsibilities in data protection, offering actionable insights for security professionals across all levels.

CISM~1CISSP~1
Feb 5, 2026Scheduled
FreeWebinar
BrightTALKLive

AI and Quantum Attacks Exposed: Your Survival Guide for the Next-Gen Threat Era

Two technological forces are converging to reshape cybersecurity forever: AI and quantum computing. Most organizations are dangerously unprepared for what's coming next. These aren't just buzzwords—they're fundamentally changing how attacks happen, who can launch them, and which defenses will fail under pressure. While most security guidance offers surface-level awareness, attackers are already weaponizing these technologies against specific vulnerabilities in YOUR environment—from social engineering to ransomware to password cracking. Join Sponsor KnowBe4 and Host ISC2 February 12, 2026 at 1:00 p.m. Eastern/10:00 a.m. Pacific for a no-nonsense deep dive into the specific threats you're facing and the exact defenses you need now. KnowBe4 CISO Advisor Roger Grimes cuts through the hype to deliver actionable intelligence on how AI and quantum will impact each attack vector in your organization. Discover: -What AI actually is (and isn't) and why that distinction matters for your security strategy -The real quantum threats emerging now and which defenses become obsolete overnight -Exactly how AI and quantum amplify social engineering, password cracking, ransomware and vulnerability exploitation against your systems -How to protect against threats coming from AI and quantum while securing the AI and quantum tools you’re already deploying -Specific changes to implement in your security program to counter these advanced threats effectively Stop preparing for yesterday's threats. Arm yourself with the precise intelligence and practical defenses that will actually protect your organization in the AI and quantum era.

CISSP1.5Security+~1.5CISM~1.25
Feb 23, 2026Scheduled

Showing 24 of 52

Load more →