Leadership Mastery: The Executive Information Security Manager - ITU Online

Leadership Mastery: The Executive Information Security Manager

4.6/5

Embark on an unparalleled journey into the heart of digital protection with our premier Information Security Manager Training Series. This meticulously crafted program stands as a beacon for IT professionals poised to ascend into the echelons of management within the vibrant realm of information security. Tailored for those already versed in IT security disciplines, this series is the cornerstone for transforming seasoned professionals into master architects of cybersecurity strategy and governance.

With a curriculum that intertwines theory with real-world application, our series is not just a course—it’s a transformative experience that will elevate your understanding of information security management to new heights. It’s designed for the ambitious, the forward-thinking, and the determined—those who not only seek to protect but to pioneer robust security infrastructures in an ever-evolving digital landscape. For the aspirant ready to take the reins and lead the charge against cyber threats, this advanced training series is your critical next step on the prestigious infosec career path.

Original price was: $129.00.Current price is: $51.60.

This Leadership Mastery: The Executive Information Security Manager Features

hours
95 Hrs 38 Min
Videos
346 On-demand Videos
Closed Captions

Closed Captions

Course Topics
41  Topics
Question & Answers
883 Prep Questions
Certificate of Completion

Certificate of Completion

Key Responsibilities of an Information Security Manager:

  • Developing Security Strategies: As an Information Security Manager, you’ll craft and enforce robust policies, standards, and procedures, forming a protective shield around the company’s data and technology assets.
  • Risk Assessment: Your expertise in identifying, evaluating, and strategizing against security risks will be indispensable. You’ll become adept at implementing cutting-edge risk management techniques to secure corporate environments.
  • Security Training Initiatives: Crafting and delivering comprehensive security awareness training will be central to your role, ensuring that all employees are equipped with best practices in data security.
  • Incident Management: In your information security manager career, you’ll be the first line of defense, developing incident response plans to counter security breaches and cyber threats effectively.
  • Security Architecture Oversight: You will oversee the security architecture, ensuring the integrity of firewalls, intrusion detection systems, and encryption protocols.
  • Compliance and Auditing: Your work will involve regular security audits and ensuring adherence to standards such as GDPR and HIPAA, reflecting your extensive information security manager resources.
  • Access and Vendor Management: You’ll manage access control systems to prevent unauthorized data breaches and assess third-party vendors to ensure they align with your organization’s stringent security standards.
  • Investigations and Communications: Your role will include investigating breaches, developing security awareness programs, and maintaining transparent communication during incidents.
  • Budgeting and Governance: As a steward of the information security manager work environment, you’ll manage budgets and govern security policies in line with organizational goals.

Course: 1 - Estimated 3 Week(s) To Complete
Project Management Professional (PMP) Course Content
21 Hours 47 Minutes 101 Videos 322 Prep Questions
This course provides a foundational understanding of project management principles, helping information security managers effectively plan and execute security projects. It contributes by ensuring participants have strong project management skills as a basis for their security management roles.

Module 1: Preparing for and Taking the Exam
   Preparing to Take the Exam and Instructor Introduction
   Getting Certified to take the Examination
   Examination Characteristics
   Test Taking Tips and Techniques
   Question Formats
   Post Certification Requirements

Module 2: Process Domain
   Process Domain and Framework defined
   Predictive, Iterative, Incremental and Adaptive Project Life Cycles
   Framework Definitions
   Project Manager Skills
   Framework Key Points to Remember
   Framework Example Questions Review
   Project Integration Management Knowledge Area Defined
   Knowledge Area Process Mapping and Definitions
   Develop Project Charter and Develop Project Management Plan
   Direct and Manage Project Work, Manage Project Knowledge, and Monitor and Control Project Work
   Perform Integrated Change Control
   Close Project or Phase
   Integration Key Points to Remember
   Integration Example Questions Review
   Project Scope Management Knowledge Area Defined
   Plan Scope Management and Collect Requirements
   Nominal Group Technique (Delphi-Opinion Technique)
   Define Scope and Create WBS
   Breakdown Structures used in WBS Dictionary
   Validate Scope and Control Scope
   Defining Requirements in Agile
   Prioritizing requirements in Agile, Definition of Done and Rolling Wave Planning
   Scope Key Points to Remember
   Scope Example Questions Review
   Project Schedule Management Knowledge Area Defined
   Plan Schedule Management, Define Activities, and Sequence Activities
   Dependencies, Predecessors, Leads, and Lags
   Estimate Activity Durations
   Develop Schedule
   Critical Path Method
   Schedule Compression
   Resource Leveling, Schedule Format, and Control Schedule
   Agile Estimating
   Agile Schedule Planning and Reporting
   Schedule Key Points to Remember and Example Question review
   Project Cost Management Knowledge Area Defined
   Plan Cost Management and Estimate Cost
   Types of Cost, Expected Present Value, Sunk Costs, and Depreciation
   Life Cycle Costing, Status Reporting, and Determine Budget
   Control Costs, and Earned Value Management
   Earned Schedule, and Agile Cost Control
   Cost Key Points to Remember
   Cost Example Questions Review
   Project Quality Management Knowledge Area Defined
   Plan Quality Management
   Manage Quality
   Control Quality
   Continuous Improvement in Agile-Adaptive Life Cycles - Kaizen and Process Analysis
   Continuous Improvement in Agile-Adaptive Life Cycles - Retrospectives
   Quality Key Points to Remember
   Quality Example Questions Review
   Project Risk Management Knowledge Area Defined
   Risk Management Plan and Identify Risks
   Risk Register and Issues Vs Risk
   Perform Qualitative and Quantitative Risk Analysis
   Plan Risk Responses
   Implement Risk Responses and Monitor Risks
   Agile Risk Tools and Risk Key Points to Remember
   Risk Example Questions Review
   Project Procurement Management Knowledge Area Defined
   Plan Procurement Management and Conduct Procurements
   Contracts
   Share and Point of Total Assumption
   Procurement Documents
   Non-Competitive Awards and Control Procurements
   Agile Contracts
   Procurement Key Points to Remember and Example Questions Review

Module 3: People Domain
   People Domain and Project Communications Management Knowledge Area Defined
   Plan Communications Management
   Manage and Monitor Communications
   Agile Communications
   Communications Key Points to Remember
   Communications Example Question Review
   Project Stakeholder Management Knowledge Area Defined
   Stakeholder Position Descriptions
   Identify Stakeholders
   Plan Stakeholder Engagement and Manage Stakeholder Engagement
   Monitor Stakeholder Engagement and Agile Stakeholder Engagement Techniques
   Stakeholder Management Key Points to Remember
   Stakeholder Management Example Question Review
   Resource Management Knowledge Area Defined
   Plan Resource Management and Estimate Activity Resources
   Acquire Resources and Develop Team
   Manage Team
   Control Resources and Agile Teaming Concepts
   Other Agile Teaming Concepts
   Agile Team Roles and Troubleshooting Agile team issues
   Resources Key Points to Remember
   Resources Example Question Review

Module 4: Business Environment Domain
   Business Environment Domain Defined
   Project Selection Tools
   PMO, Organizational Structure, and Reports
   Agile in the Business Environment
   Business Environment Key Points to Remember and Example Question Review
   Course Closing

Course: 2 - Estimated 1 Week(s) To Complete
PMI Risk Management Professional (PMI-RMP) Course Content
08 Hours 45 Minutes 27 Videos 100 Prep Questions
Focused on risk management, this course equips information security managers with the skills to identify, assess, and mitigate risks in their organizations. It contributes by enhancing participants' ability to manage information security risk effectively.

Module 1: Risk Management Fundamentals
   Instructor Intro
   Course Intro
   Risk Management Fundamentals Pt 1
   Risk Management Fundamentals Pt 2

Module 2: Test Requirements
   Test Requirements

Module 3: Test Domains
   Test Domains Pt 1
   Test Domains Pt 2

Module 4: Risk Strategy and Planning
   Risk Strategy and Planning Pt 1
   Risk Strategy and Planning Pt 2

Module 5: Stakeholder Engagement
   Stakeholder Engagement Pt 1
   Stakeholder Engagement Pt 2
   Stakeholder Engagement Pt 3
   Stakeholder Engagement Pt 4

Module 6: Risk Process Facilitation
   Risk Process Facilitation Pt1
   Risk Process Facilitation Pt2
   Risk Process Facilitation Pt3

Module 7: Risk Monitoring and Reporting
   Risk Monitoring and Reporting Pt 1
   Risk Monitoring and Reporting Pt 2
   Risk Monitoring and Reporting Pt 3

Module 8: Specialized Risk Analyses
   Specialized Risk Analyses Pt 1
   Specialized Risk Analyses Pt 2
   Specialized Risk Analyses Pt 3

Module 9: RMP Recap
   RMP Recap

Module 10: RMP Review Questions
   RMP Review Questions Pt 1
   RMP Review Questions Pt 2
   RMP Review Questions Pt 3
   RMP Review Questions Pt 4
   RMP Review Questions Pt 5

Course: 3 - Estimated 3 Week(s) To Complete
Certified Information Security Manager (CISM) Course Content
17 Hours 18 Minutes 48 Videos 100 Prep Questions
The CISM certification course covers information security management, including the development and maintenance of Information Security Management Systems (ISMS). It's a cornerstone of the series, providing comprehensive knowledge for security managers.

Module 1: Introduction
   Instructor Introduction
   Course Introduction
   Exam Overview

Module 2: Information Security Governance
   Module Overview
   InfoSec Strategic Context Part 1
   InfoSec Strategic Context Part 2
   GRC Strategy and Assurance
   Roles and Responsibilities
   GMA Tasks Knowledge and Metrics
   IS Strategy Overview
   Strategy Implemenation
   Strategy Development Support
   Architecture and Controls
   Considerations and Action Plan
   InfoSec Prog Objectives and Wrap-Up

Module 3: Information Security Risk Management
   Module Overview
   Risk Identification Task and Knowledge
   Risk Management Strategy
   Additional Considerations
   Risk Analysis and Treatment Tasks & Knowledge
   Leveraging Frameworks
   Assessment Tools and Analysis
   Risk Scenario Development
   Additional Risk Factors
   Asset Classification and Risk Management
   Risk Monitoring and Communication
   Information Risk Management Summary

Module 4: InfoSec Prog Development and Management
   Module Overview
   Alignment and Resource Management - Task and Knowledge
   Key Relationships
   Standards Awareness and Training - Tasks and Knowledge
   Awareness and Training
   Building Security into Process and Practices - Tasks and Knowledge
   Additional Technology Infrastructure Concerns
   Security monitoring and reporting Overview Tasks and Knowledge
   Metrics and Monitoring
   Summary

Module 5: Information Security Incident Management
   Module Overview
   Planning and Integration Overview Task and Knowledge
   Incident Response Concepts and Process
   Forensics and Recovery
   Readiness and Assessment - Overview Tasks and Knowledge
   Identification and Response Overview Tasks and Knowledge
   Incident Processes

Module 6: Exam Prep
   Case Study - Security On a Shoestring Budget
   Case Study - APT In Action
   Summary
   Exam Prep

Course: 4 - Estimated 2 Week(s) To Complete
Certified Information Systems Auditor (CISA) Course Content
12 Hours 37 Minutes 74 Videos 55 Prep Questions
This course focuses on the auditing aspect of information security, essential for ensuring compliance and governance. It equips learners with the skills to assess an organization's information systems and manage vulnerabilities, making it a key component for a well-rounded security skill set.

Module 1 - The Audit Process
   Introduction
   Audit Process
   Auditing Standards
   Auditing Guidelines
   Cobit Model
   Audit Management
   Internal Control Classifications
   Planning
   Program
   Evidence
   Audit Control Evaluation
   CSA Control Self-Assessment

Module 2 - Audit Governance and Compliance
   IT Governance
   Governance & Security Policies
   Outsourcing & Governance
   Outsourcing & Globalization
   Organizational Compliance
   IT Strategy
   IT Performance

Module 3 - System Infrastructure, Project Management, and Testing
   System & Infrastructure
   Requirements
   Project Management Tools - Part 1
   Project Management Tools - Part 2
   Applications
   Agile Development
   Monitoring & Controlling
   Acquisition Process
   Testing Process
   Information Systems Maintenance Practices
   Data Conversion Tools

Module 4 - Media Disposal, Reviews, and System Maintenance
   Media Disposal Process
   Post Implementation Review
   Periodic Review
   System Maintenance

Module 5 - IT Service Level Management
   IT Service Delivery and Support
   How to Evalutate Service Level Management Practices
   Operations Management
   Databases
   Structured Query Language (SQL)
   Monitoring Performance
   Source Code and Perfomance Monitoring
   Patch Management
   Incident Management
   Hardware Component Types
   Network Component Types

Module 6 - Auditor Technical Overview
   IS Auditor Technical Overview
   Security Design
   Monitoring Systems
   Types of Attacks
   Cryptography
   Encryption
   Asymmetric Encryption
   Digital Certificate
   Different Kinds of Attacks
   Access Controls
   Identification and Authenication
   Physical Access Exposure
   Environmental Security
   Network Security Devices and Network Components
   Network Address Translation
   Virtual Private Networks (VPNs)
   Voice System Risks
   Intrusion Detection
   Firewalls
   Firewall Implementation
   Network Access Protection
   HoneyPot
   Risks to Portable and Wireless Devices
   Bluetooth
   OSI Networking
   Managing Data

Module 7 - Business Continuity and Disaster Recovery
   Business Continuity and Disaster Recovery
   Fault Tolerance
   Business Continuity and Disaster Recovery Regulations

Course: 6 - Estimated 3 Week(s) To Complete
Certified Information Systems Security Pro (CISSP) Course Content
19 Hours 18 Minutes 44 Videos 60 Prep Questions
While more advanced, this course is important for network administrators aiming for senior roles. It covers in-depth topics in security management and best practices, essential for overseeing and securing large network infrastructures.

Module 1: Security and Risk Management
   Introduction
   CIA Triad Security Governance - Part 1
   CIA Triad Security Governance - Part 2
   Compliance Legal And Regulatory Issues - Part 1
   Compliance Legal And Regulatory Issues - Part 2
   Understanding Professional Ethics - Part 1
   Understanding Professional Ethics - Part 2
   Risk Management - Part 1
   Risk Management - Part 2
   Threat Modeling Acquisition Strategy And Practice Security Awareness And Training - Part 1
   Threat Modeling Acquisition Strategy And Practice Security Awareness And Training - Part 2

Module 2: Asset Security
   Asset Security - Part 1
   Asset Security - Part 2

Module 3: Security Engineering
   Engineering And Management Of Security - Part 1
   Engineering And Management Of Security - Part 2
   Engineering And Management Of Security - Part 3
   Engineering And Management Of Security - Part 4
   Engineering And Management Of Security - Part 5
   Engineering And Management Of Security - Part 6

Module 4: Communication and Network Security
   Apply Secure Design Principles To Networks - Part 1
   Apply Secure Design Principles To Networks - Part 2
   Apply Secure Design Principles To Networks - Part 3
   Apply Secure Design Principles To Networks - Part 4
   Apply Secure Design Principles To Networks - Part 5
   Apply Secure Design Principles To Networks - Part 6
   Securing Network Components - Part 1
   Securing Network Components - Part 2
   Design And Establish Secure Communication Channels - Part 1
   Design And Establish Secure Communication Channels - Part 2
   Design And Establish Secure Communication Channels - Part 3

Module 5: Identity and Access Management
   Controlling Access And Managing Identity - Part 1
   Controlling Access And Managing Identity - Part 2
   Controlling Access And Managing Identity - Part 3
   Controlling Access And Managing Identity - Part 4

Module 6: Security Assessment Testing
   Designing Performing And Analyzing Security Testing

Module 7: Security Operations
   Foundational Concepts And Investigations - Part 1
   Foundational Concepts And Investigations - Part 2
   Incident Management And Preventative Measures - Part 1
   Incident Management And Preventative Measures - Part 2
   Disaster Recovery Process - Part 1
   Disaster Recovery Process - Part 2

Module 8: Software Development Security
   Understanding Applying And Enforcing Software Security - Part 1
   Understanding Applying And Enforcing Software Security - Part 2
   Conclusion

Course: 7 - Estimated 2 Week(s) To Complete
Certified Cloud Security Professional - CCSP Course Content
15 Hours 51 Minutes 52 Videos 246 Prep Questions
Recognizing the importance of security in DevOps, this course focuses on cloud security knowledge and best practices. It's vital for ensuring that DevOps processes and cloud environments are secure against various cyber threats and comply with industry standards.

Cloud Concepts, Architecture and Design
   Course Intro
   Cloud Concepts, Architecture and Design - Part 1
   Cloud Concepts, Architecture and Design - Part 2
   Cloud Concepts, Architecture and Design - Part 3
   Cloud Concepts, Architecture and Design - Part 4
   Cloud Concepts, Architecture and Design - Part 5
   Cloud Concepts, Architecture and Design - Part 6
   Cloud Concepts, Architecture and Design - Part 7
   Cloud Concepts, Architecture and Design - Part 8
   Cloud Concepts, Architecture and Design - Part 9

Legal, Risk and Compliance
   Legal, Risk and Compliance Part 1
   Legal, Risk and Compliance Part 2
   Legal, Risk and Compliance Part 3
   Legal, Risk and Compliance Part 4
   Legal, Risk and Compliance Part 5
   Legal, Risk and Compliance Part 6
   Legal, Risk and Compliance Part 7

Cloud Data Security
   Cloud Data Security - Part 1
   Cloud Data Security - Part 2
   Cloud Data Security - Part 3
   Cloud Data Security - Part 4
   Cloud Data Security - Part 5
   Cloud Data Security - Part 6
   Cloud Data Security - Part 7

Cloud Platform and Infrastructure Security
   Cloud Platform and Infrastructure Security - Part 1
   Cloud Platform and Infrastructure Security - Part 2
   Cloud Platform and Infrastructure Security - Part 3
   Cloud Platform and Infrastructure Security - Part 4
   Cloud Platform and Infrastructure Security - Part 5
   Cloud Platform and Infrastructure Security - Part 6
   Cloud Platform and Infrastructure Security - Part 7
   Cloud Platform and Infrastructure Security - Part 8

Cloud Application Security
   Cloud Application Security - Part 1
   Cloud Application Security - Part 2
   Cloud Application Security - Part 3
   Cloud Application Security - Part 4
   Cloud Application Security - Part 5
   Cloud Application Security - Part 6
   Cloud Application Security - Part 7
   Cloud Application Security - Part 8
   Cloud Application Security - Part 9

Cloud Security Operations
   Cloud Security Operations - Part 1
   Cloud Security Operations - Part 2
   Cloud Security Operations - Part 3
   Cloud Security Operations - Part 4
   Cloud Security Operations - Part 5
   Cloud Security Operations - Part 6
   Cloud Security Operations - Part 7
   Cloud Security Operations - Part 8
   Cloud Security Operations - Part 9
   Cloud Security Operations - Part 10
   Cloud Security Operations - Part 11
   Course Outro

Embark on a tailored learning path designed to propel you to the forefront of information security management. Our Information Security Manager Training Series is the ultimate blueprint for those seeking to carve out a successful career in information security. Here’s how you can navigate your journey:

  • Foundation Courses: Begin with fundamental courses that lay the groundwork for your information security career path. Dive into Project Management Professional (PMP) and PMI Risk Management Professional (PMI-RMP) certifications to establish a strong base in project management and risk assessment. These are crucial stepping stones for an aspiring Information Security Manager.
  • Advanced Information Security Management: Progress to the Certified Information Security Manager (CISM) course, which delves into the development and maintenance of Information Security Management Systems (ISMS). This advanced training is pivotal for those on infosec career paths, ensuring you can design and enforce comprehensive security policies and protocols.
  • Audit and Compliance Mastery: Enhance your career trajectory with the Certified Information Systems Auditor (CISA) course. This is vital for Information Security Managers focusing on security controls auditing and regulatory compliance, such as ISO 27001 and GDPR.
  • Integrative Security Expertise: Further your expertise with the Certified Information Systems Security Professional (CISSP) course. This program will expand your proficiency across various security domains, blending technical know-how with managerial acumen—key competencies for an Information Security Manager.
  • Specialization in Cloud Security: In response to the increasing reliance on cloud technologies, our Certified Cloud Security Professional (CCSP) course prepares Information Security Managers to address cloud-related security challenges effectively. This specialized knowledge is critical for managing the information security manager work environment in the modern digital landscape.
  • Practical Experience and Resources: Supplement your learning with hands-on experience and access a wealth of information security manager resources. Engage with real-world scenarios to apply your skills in risk management, incident response, and strategic security governance.
  • Beginner-Friendly Modules: For those new to the field, we provide information security manager resources for beginners, ensuring that you can start your journey with confidence, regardless of your previous experience.

By completing this diverse and comprehensive training series, you’ll be well-equipped to assume the role of an Information Security Manager. You will gain the expertise needed to craft effective security strategies, assess and mitigate risks, and ensure compliance within any organization. Whether you are just starting on your information security career path or looking to solidify your standing as a seasoned professional, this training series is your strategic roadmap to becoming a resilient and resourceful Information Security Manager.

Our training caters to a variety of professionals at different stages of their information security career path, from seasoned IT managers to cybersecurity enthusiasts. If you’re pondering, “Would I make a good Information Security Manager?” or are seeking information security manager resources for beginners, this series is your gateway to mastering the domain.

Whether you’re stepping into the realm of information security or advancing in your current role, our program offers the expertise needed to thrive as a security leader, ensuring that you’re well-versed in the latest security practices and compliance mandates.

Here’s a list of individuals who would benefit from this training series, considering the prior experience needed for success:

  1. Information Security Managers: Information security managers looking to enhance their knowledge and skills in various aspects of information security management, risk assessment, and compliance.
  2. IT Managers and Directors: IT professionals in leadership roles seeking to deepen their understanding of information security to better oversee security-related initiatives within their organizations.
  3. Security Analysts and Specialists: Security analysts and specialists aiming to advance their careers by gaining expertise in security management, risk assessment, and compliance.
  4. Auditors and Compliance Officers: Professionals responsible for auditing and ensuring compliance with security standards and regulations, such as ISO 27001, HIPAA, or GDPR.
  5. Risk Managers: Individuals involved in risk management who want to focus on information security risk assessment and mitigation strategies.
  6. Network and Systems Administrators: IT professionals responsible for maintaining the security of an organization’s network and systems, seeking a broader understanding of information security.
  7. Consultants and Security Advisors: Security consultants and advisors looking to expand their knowledge and credentials to better serve their clients.
  8. Cybersecurity Enthusiasts: Individuals passionate about cybersecurity and eager to transition into information security management roles, provided they have some foundational knowledge.
  9. IT Project Managers: Project managers handling IT or security-related projects who want to ensure successful project execution while adhering to security best practices.
  10. Security Compliance Analysts: Professionals involved in ensuring regulatory and compliance requirements are met within an organization.
  11. Cloud Security Professionals: Those responsible for securing cloud environments and services who need specialized knowledge in cloud security practices.
  12. Experienced IT Professionals: IT professionals with several years of experience in areas like system administration, network security, or application development, looking to pivot their careers towards information security management.

While prior experience is beneficial for success in this training series, the courses are designed to cater to a range of skill levels, with foundational courses like PMP and PMI-RMP providing the necessary groundwork. However, individuals with some prior exposure to information security or related domains will likely find the content more accessible and relevant.


What does an Information Security Manager do?

An Information Security Manager is responsible for protecting an organization’s data, systems, and networks from security threats and breaches. They develop and implement security policies, manage risk, conduct audits, and ensure compliance with security standards and regulations.

What qualifications and certifications are typically required for the role of an Information Security Manager?

Qualifications often include a bachelor’s or master’s degree in a relevant field, such as computer science or cybersecurity. Common certifications for Information Security Managers include Certified Information Security Manager (CISM), Certified Information Systems Security Professional (CISSP), and Certified Information Systems Auditor (CISA).

What are the main challenges faced by Information Security Managers in their role?

Information Security Managers face challenges such as keeping up with evolving cyber threats, balancing security with usability, securing cloud environments, managing limited resources, and ensuring that employees and stakeholders adhere to security policies and practices.

How does an Information Security Manager contribute to an organization’s overall success?

Information Security Managers play a crucial role in an organization’s success by protecting sensitive data, reducing security risks, ensuring compliance with regulations, and maintaining the trust of customers and stakeholders. Their efforts help prevent costly data breaches and downtime.

What skills and qualities are essential for someone aspiring to become an effective Information Security Manager?

Effective Information Security Managers should possess strong leadership, communication, and problem-solving skills. They should have a deep understanding of security technologies, risk management, and compliance. Additionally, adaptability, attention to detail, and the ability to stay current with cybersecurity trends are vital qualities for success in this role.

Add a review
Currently, we are not accepting new reviews
4.8
Based on 81 reviews
1-5 of 81 reviews
  1. SJ

    good

  2. AA
  3. K
  4. BO
  5. A

    Smooth delivery and easy access to LMS. Good to see that the LMS offers progress tracking. Would be great if badges were offered on completion of courses to share via Credly to future employers.