Start building the foundational knowledge that will help guide you on your cyber career path.
Entry-level Cybersecurity Learning
If you’re entering the field for the first time, use these introductory learning resources to explore the cybersecurity areas of focus that fit your interests and professional goals.
AI Courses
AI for Cybersecurity
DELIVERY METHOD: ON-DEMAND | TIME: 2 HOURS | CPE: 2 | EXPERIENCE: VIDEO AND TEXT-BASED CONTENT + CASE STUDIES + KNOWLEDGE CHECKS | PROFICIENCY LEVEL: FOUNDATIONAL | LANGUAGE: ENGLISH | KNOWLEDGE AREA: OPERATIONS
Develop a foundational understanding of cybersecurity applications of AI by exploring the evolving implications of both traditional and AI-specific security approaches for AI attacks, mitigation and threat tools.
Non-member $46.00 Member Pricing
Foundations of AI
DELIVERY METHOD: ON-DEMAND | TIME: 2 HOURS | CPE: 2 | EXPERIENCE: VIDEO AND TEXT-BASED CONTENT + CASE STUDIES + KNOWLEDGE CHECKS | PROFICIENCY LEVEL: FOUNDATIONAL | LANGUAGE: ENGLISH | KNOWLEDGE AREA: OPERATIONS
Learn to define and articulate a comprehensive definition of AI, become familiar with various AI terminologies and technologies, and understand the applications and implementation impacts of AI.
Non-member $46.00 Member Pricing
Non-Technical Career Development Express Courses
Building Your Personal Brand and Digital Presence
DELIVERY METHOD: ON-DEMAND | TIME: 1 HOUR | EXPERIENCE: VIDEO | CPE: 1 | PROFICENCY LEVEL: FOUNDATIONAL | LANGUAGE: ENGLISH | KNOWLEDGE AREA: NON-TECHNICAL
Stand out in the digital landscape and advance your cybersecurity career with confidence. We’ll explore how to develop a compelling personal brand statement, leverage social media and create a consistent and authentic online presence.
Non-Member $23.00 Member Pricing
Identifying and Building Your Network
DELIVERY METHOD: ON-DEMAND | TIME: 1 HOUR | EXPERIENCE: VIDEO | CPE: 1 | PROFICENCY LEVEL: FOUNDATIONAL | LANGUAGE: ENGLISH | KNOWLEDGE AREA: NON-TECHNICAL
Learn how to leverage professional networking to enhance your cybersecurity career trajectory and achieve lasting success. Get connected to the hidden job market, insider industry trends and potential collaborators by maintaining a proactive, authentic approach.
Non-Member $23.00 Member Pricing
Identifying Your Cyber Path and Industry
DELIVERY METHOD: ON-DEMAND | TIME: 1 HOUR | EXPERIENCE: VIDEO | CPE: 1 | PROFICENCY LEVEL: FOUNDATIONAL | LANGUAGE: ENGLISH | KNOWLEDGE AREA: NON-TECHNICAL
Whether you’re a recent graduate, a tech enthusiast or a professional seeking a career shift, discover your place in the world of cybersecurity and unlock your potential. Explore a wide range of roles, specializations and emerging trends in cybersecurity as you chart your course.
Non-Member $23.00 Member Pricing
Managing the Offer and Negotiation Process
DELIVERY METHOD: ON-DEMAND | TIME: 1 HOUR | EXPERIENCE: VIDEO | CPE: 1 | PROFICENCY LEVEL: FOUNDATIONAL | LANGUAGE: ENGLISH | KNOWLEDGE AREA: NON-TECHNICAL
Learn how to evaluate job offers, develop effective negotiation strategies and facilitate a seamless integration into new positions. Empower your career decisions and unlock your full potential in the cybersecurity job market.
Non-Member $23.00 Member Pricing
Nailing the Interview Process
DELIVERY METHOD: ON-DEMAND | TIME: 1 HOUR | EXPERIENCE: VIDEO | CPE: 1 | PROFICENCY LEVEL: FOUNDATIONAL | LANGUAGE: ENGLISH | KNOWLEDGE AREA: NON-TECHNICAL
Excel in every stage of the interview process and in any interview scenario, no matter where you are in your career. Learn actionable strategies and insider tips that will help you stand out from the competition and secure your ideal cybersecurity job.
Non-Member $23.00 Member Pricing
Resume/CV/Portfolio Building and Management
DELIVERY METHOD: ON-DEMAND | TIME: 1 HOUR | EXPERIENCE: VIDEO | CPE: 1 | PROFICENCY LEVEL: FOUNDATIONAL | LANGUAGE: ENGLISH | KNOWLEDGE AREA: NON-TECHNICAL
Identify the critical components of standout documents that showcase your unique strengths and value to employers. Learn the key differences between resumes and CVs, how to optimize each for specific opportunities and how to craft a professional portfolio with impact.
Non-Member $23.00 Member Pricing
Network Security Express Courses
IT/OT Convergence: The Good, the Bad and the Ugly
DELIVERY METHOD: ON-DEMAND | TIME: 30 MINUTES | EXPERIENCE: VIDEO | CPE: 0.50 | PROFICENCY LEVEL: FOUNDATIONAL | LANGUAGE: ENGLISH | KNOWLEDGE AREA: OPERATIONS
The lines between information technology (IT) and operational technology (OT) are becoming increasingly blurred. Previously these technology categories operated separately, but today they are intertwined and many OT systems rely on IT technology. This convergence creates new attack vectors that bad actors can exploit, requiring a different approach to cybersecurity than traditional IT security. To mitigate these risks, cyber professionals need to understand the technologies and control systems in use across their organizations. Hear from an industry expert about IT/OT convergence and the technologies and systems to consider when securing devices and processes that impact the physical world.
Non-Member $19.00 Member Pricing
Protecting Data Using Zero Trust Courses
Continuous Monitoring and Incident Response for Zero Trust
DELIVERY METHOD: ON-DEMAND | TIME: 1 HOUR | EXPERIENCE: VIDEO | CPE: 1 | PROFICENCY LEVEL: FOUNDATIONAL | LANGUAGE: ENGLISH | KNOWLEDGE AREA: OPERATIONS
Understand the necessity for real-time collection, analysis and assessment of data from various sources to identify potential security incidents, anomalies and threats. Learn key aspects of implementing continuous monitoring and incident response within a zero trust framework, including the integration of security information and event management (SIEM) systems, automated threat intelligence feeds and orchestrated incident response workflows.
Non-Member $23.00 Member Pricing
Defining the Boundaries of Zero Trust
DELIVERY METHOD: ON-DEMAND | TIME: 2 HOURS | EXPERIENCE: VIDEO | CPE: 2 | PROFICENCY LEVEL: FOUNDATIONAL | LANGUAGE: ENGLISH | KNOWLEDGE AREA: OPERATIONS
Review the principles and requirements necessary to transition from the traditional approach of perimeter-based security to a security operating model focused on granular trust relationships that are business-enabling and data-centric. Throughout your learning, you will identify the importance of continual and vigilant analysis of the entire ecosystem; the requirements of specific models, business needs and use cases; and the necessary components to implement in the context of zero trust.
Non-Member $46.00 Member PricingVulnerability Management in Zero Trust
DELIVERY METHOD: ON-DEMAND | TIME: 1 HOUR | EXPERIENCE: VIDEO | CPE: 1 | PROFICENCY LEVEL: FOUNDATIONAL | LANGUAGE: ENGLISH | KNOWLEDGE AREA: OPERATIONS
Explore vulnerability management as a crucial component in cybersecurity operations, specifically in zero trust architecture (ZTA). You’ll learn essential principles and best practices, such as asset discovery, risk-based trust assessment and integration with zero trust policy enforcement mechanisms. This course also reviews the identification, assessment, prioritization and remediation of vulnerabilities unique to zero trust implementation to maintain a robust security posture.
Non-Member $23.00 Member PricingSecurity Operations Express Courses
Cybersecurity in Industrial Control Systems (ICS)
DELIVERY METHOD: ON-DEMAND | TIME: 2 HOURS | EXPERIENCE: VIDEO + APPLIED SCENARIOS + KNOWLEDGE CHECKS | CPE: 2 | PROFICENCY LEVEL: FOUNDATIONAL | LANGUAGE: ENGLISH | KNOWLEDGE AREA: OPERATIONS
Cybersecurity in industrial control systems (ICS) refers to the measures and practices implemented to protect critical infrastructure. It encompasses the hardware, software and networked systems used to monitor and control industrial processes. This course explores IT and OT perspectives, the inverted CIA triad and ICS devices, enabling you to support critical infrastructure and the need for ICS security.
Non-Member $45.00 Member PricingICS Convergence
DELIVERY METHOD: ON-DEMAND | TIME: 1 HOUR | EXPERIENCE: VIDEO + APPLIED SCENARIOS + KNOWLEDGE CHECKS | CPE: 0.50 | PROFICENCY LEVEL: FOUNDATIONAL | LANGUAGE: ENGLISH | KNOWLEDGE AREA: OPERATIONS
Industrial control systems (ICS) convergence refers to the merging of traditionally isolated operational technology networks and systems with information technology networks and systems. This merging poses unique security challenges that can be addressed through leveraging emerging technologies and hazard analysis and control protocols.
Non-Member $19.00 Member PricingPreventing and Mitigating API Data Breaches
DELIVERY METHOD: ON-DEMAND | TIME: 15 MINUTES | EXPERIENCE: ARTICLE + SKILL APPLICATION EXERCISE | CPE: 0.50 | PROFICENCY LEVEL: FOUNDATIONAL | LANGUAGE: ENGLISH | KNOWLEDGE AREA: OPERATIONS
More organizations are adopting APIs and connecting to other systems, including healthcare, financial services and other industries that handle sensitive personal information. APIs have consequently become a common target for attackers, providing an easy entry point into an organization’s systems. This course explores the circumstances behind several widely publicized API breaches and the most common threats and vulnerabilities that can expose APIs to attack. You’ll learn steps your organization can take to protect your APIs.
Non-Member $19.00 Member PricingSecurity in the IoT Ecosystem: What is IoT and the IoT Ecosystem?
DELIVERY METHOD: ON-DEMAND | TIME: 1 HOUR | EXPERIENCE: VIDEO + APPLIED SCENARIOS + KNOWLEDGE CHECKS | CPE: 1 | PROFICENCY LEVEL: FOUNDATIONAL | LANGUAGE: ENGLISH | KNOWLEDGE AREA: OPERATIONS
IoT connects billions of objects and devices to the internet, enabling data collection and sharing for data-driven decisions. It empowers businesses to innovate through remote access and control of devices. IoT is a complex ecosystem of technologies, products and services applied across various industries. This course explores IoT reference architectures and real-life examples, focusing on security vulnerabilities within IoT layers.
Non-Member $35.00 Member PricingSoftware Security Express Courses
Software Security: Fixing Forward at Scale in Real Life
DELIVERY METHOD: ON-DEMAND | TIME: 30 MINUTES | EXPERIENCE: VIDEO | CPE: 0.50 | PROFICENCY LEVEL: FOUNDATIONAL | LANGUAGE: ENGLISH | KNOWLEDGE AREA: OPERATIONS
In our ever-evolving digital landscape, safeguarding your software against malicious attacks is paramount. This course explains how testing, tools and human ingenuity can work together to safeguard systems and data. By investing in software security, you can build trust with users, ensure compliance with industry standards and stay ahead of potential threats.
Non-Member $19.00 Member Pricing