LX Labs content roadmap

The cyber experts, learning specialists and creative ninjas at LX Labs are dedicated to delivering the learning experiences you and your organization need to defend critical assets and reduce business risk. Like all roadmaps, plans shared here are subject to change. Read on to learn what LX Labs is building for your team next.

Cybersecurity skill development

Hands-on skill development in the cyber range. Immersive, instructor-led boot camps. Guided learning paths aligned to your business objectives. If you need training for your IT, security or engineering teams, LX Labs published it or is building it right now.

Security awareness and training

Netflix-style awareness videos. Modern, animated computer-based training. Realistic phishing simulations. LX Labs publishes new resources monthly to help you educate and empower employees to outsmart cybercrime.

2020 cybersecurity skill development roadmap

77 learning paths
8 cyber ranges, 137 labs
695 courses
77 assessments & practice exams

Planned certification and skill learning paths

A typical Infosec Skills learning path contains 5-15 courses, plus hands-on labs and projects, totaling 10-20 hours of training.

IT and security fundamentals

  • Securing Linux/UNIX: This path covers the most important Linux/UNIX security topics, including user and group privileges, file permissions, network and process security, and more
  • ICS/SCADA Security Fundamentals: This path provides you with foundational knowledge about SCADA systems and security, including protocols, access controls, physical security, cybersecurity tools and more
  • CertNexus CIoTSP certification: This path prepares for the CertNexus Certified IoT Security Practitioner (CIoTSP) certification exam, designed to validate the knowledge, skills and abilities to secure network environments for IoT devices, analyze vulnerabilities and determine reasonable controls against threats, and effectively monitor IoT devices and respond to incidents

Security architecture, engineering and management

  • CSP Security Features Overview: This path provides an overview and comparison of security features of major Cloud Service Providers (CSPs): Amazon AWS, Microsoft Azure and Google Cloud Platform, including encryption, IAM and business continuity
  • CMMC-AB Certified Professional (CP): This path offers a deep dive into the requirements of the new Cybersecurity Maturity Model Certification (CMMC) and provides practical recommendations for achieving the desired maturity levels
  • (ISC)² CISSP-ISSAP certification (update): Update to cover CBK changes going in effect on 10/14/2020
  • Information Privacy Essentials: This learning path provides students with a foundational knowledge of important information privacy concepts and topics, privacy-related frameworks, and U.S. federal and state and global privacy laws and regulations
  • IAPP CIPP/E certification: This path prepares for the IAPP Certified Information Privacy Practitioner Europe exam
  • (ISC)² CISSP-ISSEP certification (update): Update to cover CBK changes going in effect on 11/13/2020

Threat intelligence, incident response and forensics

  • Paraben Mobile Operator Certification: This introductory certification is designed for those just getting started with Paraben’s E3:DS or E3:Universal; you will learn the basics of the premiere forensic tool for mobile devices and become proficient in its use for your investigations by completing a sample E3:DS practical case file
  • Paraben Computer Operator Certification: This introductory certification is designed for those just getting started with Paraben’s E3:P2C. This course is designed to focus on the skills used with hard drive, email and media examination
  • Threat Intelligence: Learn about the concept of threat intelligence and best practices for integrating threat intelligence into security functions
  • CertNexus CyberSec First Responder certification: This path prepares for the CertNexus CyberSec First Responder (CFR) certification exam, designed to validate the knowledge and skills required to protect these critical information systems before, during, and after an incident
  • CompTIA CySA+ (update): Update to cover the exam objectives of the new version (CS0-002) of the CompTIA CySA+ exam

Pentesting and vulnerability management

  • Python for Pentesters: Learn how use Python to build powerful sniffers and packet injectors, automate attack tasks, write exploits and more
  • AWS Pentesting: Learn how to conduct penetration tests on AWS cloud services

Secure coding and DevSecOps

  • Container Security (Docker and Kubernetes): Learn concepts, technologies and practical approaches to securing containers and container orchestration systems
  • Writing Secure Code in Node.js: Learn how to defend your Node.js applications from common attacks and analyze your code for security
  • Writing Secure Code for Android: This path covers Android security technology and services and common vulnerabilities related to Android native code and Java
  • .NET Core Security: This path focuses on identifying and mitigating vulnerabilities in microservices and service-oriented architectures developed with .Net core
  • (ISC)² CSSLP certification: This path prepares for the (ISC)² Certified Secure Software Lifecycle Professional exam
  • HTML5 Security: Learn how to recognize and address security concerns, such as cross-document messaging and local storage, when building advanced Web browser experiences with HTML5
  • Writing Secure Code for iOS: Learn how to build secure iOS applications by leveraging built-in security features and using tools to test your code
  • JavaScript Security: Learn how to leverage JavaScript and browser security features and use best practices to address cross-site scripting, improper client-server trust relationships and other common security issues
  • DevSecOps: Learn the fundamentals of building security into application development process and the impact on the organization’s development efforts
  • Securing Cloud-based Applications: This path covers security considerations specific to cloud-based applications, such as building IAM into the code, securing APIs and security testing
  • API Security (OWASP API Security Top 10): Learn about common security risks associated with Application Programming Interfaces (APIs) and how to protect them using tokens, quotas, signatures and other effective techniques
  • Writing Secure Code in ASP.NET: Learn how to avoid common security pitfalls and how to make websites built with ASP.NET more secure than is possible simply by following Microsoft’s guidance

Planned cyber ranges

A typical cyber range includes 5-20 browser-based virtual labs.

  • Bash Scripting: Practice creating Bash shell scripts for automation and performing various offensive and defensive security tasks
  • Threat Analysis: Practice using advance features of network and vulnerability scanners and packet analyzers to identify and analyze threats new content and address feedback

Planned boot camps

Infosec boot camps typically span 3-7 days and feature live, instructor-led training.

  • (ISC)² CISSP-ISSAP: Update to cover CBK changes going in effect on 10/14/2020
  • Cyber Threat Hunting (update): Refresh of the boot camp materials to include new content and address feedback
  • (ISC)² CISSP-ISSEP: Update to cover CBK changes going in effect on 11/13/2020
  • CMMC-AB Certified Assessor Level 3 (CA-3): Training for the new Cybersecurity Maturity Model Certification
  • CMMC-AB Certified Assessor Level 5 (CA-5): Training for the new Cybersecurity Maturity Model Certification

2020 security awareness and training roadmap

42 awareness modules
20 compliance modules
300 phishing simulations
341 translated modules

Planned awareness training modules

  • Need to Know Season 2
    • Creating Strong Passwords
    • Unauthorized Cloud Services
    • Clean Desk Policy
    • Replying to Suspicious Emails
    • Additional topics: malware, removable media, mobile security, working remotely, social engineering
    • 12 month program plan
  • Need to Know Season 2 translations
  • Live-action training series

Planned compliance training modules

  • PCI DSS compliance series
    • New Employee Introduction
    • Protecting Cardholder Data
    • Access Control
    • Information Security Policy
  • Need to Know Season 2 compliance modules
    • HIPAA
    • GDPR
    • Tampering with Devices (PCI DSS)
    • CCPA
  • CCPA compliance series
    • CCPA – 1798.130
    • CCPA – 1798.125
    • CCPA – 1798.110
    • CCPA – 1798.115
  • FISMA compliance series

Ready for an LX Labs Watch Party?

2020 releases: Security awareness and training

Award-winning training you can trust

Best Software - Highest Satisfaction

Best Software - Highest Satisfaction

Infosec Skills

Best IT Security-related Training Program

Best IT Security-related Training Program

Infosec Skills

Best Cybersecurity Education Provider & Best Security Education Platform

Best Cybersecurity Education Provider & Best Security Education Platform

Infosec Skills

Most Innovative Product - Cybersecurity Training for Infosec Professionals

Most Innovative Product - Cybersecurity Training for Infosec Professionals

Infosec Skills

Global Excellence - Cyber Security Education & Training

Global Excellence - Cyber Security Education & Training

Infosec Skills