InfoSec Institute’s Top Podcasts to Take Your Computer Skills to the Next Level

Are you interested in starting a career as an information security (infosec) professional? Today’s shortage of infosec pros causes many jobs to go unfilled. That provides a great opportunity to consider this field for individuals either starting out in the industry or looking to change their career path.

There are many opportunities for IT security-related professionals and other employees to further hone their skills. In particular, podcasts and webinars — Web-based platforms for learning — are available to cover specific topics under the direction of presenters and facilitators with extensive knowledge. Opportunities are widely available, and well-regarded vendors such as InfoSec Institute not only offer information security courses to help learn at different levels and for a variety of roles in an organization, but also to prepare for industry standard certifications and take a wide range of security-specific classes.

Podcasts and webinars offer the possibility to focus on a specific topic. IT practitioners can follow them anytime and anywhere, directly from an app or website. The possibility of choosing specific topics (like security awareness) is particularly attractive for professionals with a hectic schedule, as it gives them a chance to digest bite-sized information sessions on the go. InfoSec Institute has series of digital audio or video file episodes that users can download and view on their personal devices in order to listen to at their convenience or refer back to when needed.

Options are available also for those who value more traditional learning styles: virtual webinars, Web lectures and presentations held via the Internet in real time offer the conference/classroom feel while retaining flexibility and ease of participation from anywhere.

The Institute’s Must-See (and Hear) Podcasts and Webinars for the Modern-Day InfoSec Pro

InfoSec Institute offers a number of options in this area. The CyberSpeak Podcast series is a (Read more...)

*** This is a Security Bloggers Network syndicated blog from InfoSec Resources authored by Chris Sienko. Read the original post at: