Certification Resources
Ready to start on the path towards a certification? You have come to the right place! Collectively, we hold many different industry relevant certifications. This means we have been where you are. Below, we have our recommendations of video courses, books, practice tests, and more to help you pass your exam.
Why do we recommend these resources? As holders of the various of the below certifications, we have added links to the training and study materials we used to successfully pass the exams. Keep in mind, everyone is different and what materials work for some may not work for others. That is why we have many resources we recommend for each exam.
Please Note: We believe in transparency and building trust with our community. Some of the links on this page are affiliate links, meaning, at no additional cost to you, The GRID may earn a commission if you click through and make a purchase. Each recommended resource has been carefully selected based on its proven effectiveness and the value it offers. Your support helps us continue to provide valuable content and resources to the IT community.
Certifications
CCSP
Video Courses
Books
Practice Exams
CISSP
Video Courses
Books
Practice Exams
CSSLP
SSCP
Video Courses
Books
Practice Exams
CC
Currently, this exam (Certified in Cybersecurity) is completely free through ISC2. They provide training and the exam for no cost. If you have interest in starting a career in cybersecurity, we highly recommend checking out ISC2’s CC course
Additional Recommendations
The CISSP is the Gold Standard in the Cybersecurity industry. There are plenty of additional resources to assist in passing the exam. First, “Think Like A Manager” by Luke Ahmed is an excellent resource. This book helps readers learn to think big picture when answering questions instead of attempting to solve the problem. The CISSP is not a technical exam, instead it requires you to think like a manager. Check out Luke’s book here. To get you in the right mindset, check out Kelly Handerhan’s “Why you will pass the CISSP” video on YouTube here.
(ISC)² has additional certification paths and continuing education called CISSP Concentrations and Skill Builders respectively. See more detail below.
Skill Builders
(ISC)² Skill Builders are a suite of professional development courses designed to help cybersecurity professionals expand their knowledge and skills in specific areas. These offerings include:
- Self-Paced
Learning: Online courses that cover a wide range of cybersecurity
topics, allowing professionals to learn at their own pace.
- Lab
Exercises: Hands-on labs provide practical experience with
real-world scenarios, helping to deepen understanding and application of
cybersecurity principles.
- Express
Learning Courses: These are short courses focused on specific
cybersecurity topics, trends, or threats, designed for quick learning on
the go.
Skill Builders cover various topics, from foundational cybersecurity knowledge to advanced skills, ensuring that professionals at all levels can find resources to advance their careers.
CISSP Concentrations
For those who have already achieved the Certified Information Systems Security Professional (CISSP) certification, (ISC)² offers three concentrations to specialize further in specific areas of interest within the field of information security:
- CISSP-ISSAP
(Information Systems Security Architecture Professional): Focuses
on the architecture aspects of information security. Ideal for chief
security architects and analysts, it covers areas like identity and access
management, security operations architecture, and infrastructure security.
- CISSP-ISSEP
(Information Systems Security Engineering Professional): Developed
in conjunction with the U.S. National Security Agency (NSA), this
concentration focuses on the engineering aspects of information security.
It is designed for systems engineers, security engineers, and those
involved in the development and implementation of security systems and
architectures.
- CISSP-ISSMP
(Information Systems Security Management Professional): Targets
the management side of information security, including leadership, risk
management, and project management. This concentration is suited for chief
information officers, chief information security officers, and security
managers who are responsible for establishing, presenting, and governing
information security programs.