LX Labs content roadmap

The cyber experts, learning specialists and creative ninjas at LX Labs are dedicated to delivering the learning experiences you and your organization need to defend critical assets and reduce business risk. Like all roadmaps, plans shared here are subject to change. Read on to learn what LX Labs is building for your team next.

Cybersecurity skill development

Hands-on skill development in the cyber range. Immersive, instructor-led boot camps. Guided learning paths aligned to your business objectives. If you need training for your IT, security or engineering teams, LX Labs published it or is building it right now.

Security awareness and training

Netflix-style awareness videos. Modern, animated computer-based training. Realistic phishing simulations. LX Labs publishes new resources monthly to help you educate and empower employees to outsmart cybercrime.

Cybersecurity skill development roadmap

70+ learning paths
100+ labs
400+ courses
70+ assessments & practice exams

Planned certification and skill learning paths

A typical Infosec Skills learning path contains 5-15 courses, plus hands-on labs and projects, totaling 10-20 hours of training.

Security architecture, engineering and management

  • IAPP CIPP/E: This path prepares for the IAPP Certified Information Privacy Practitioner Europe exam
  • Information Privacy Essentials: This path provides students with a foundational knowledge of important information privacy concepts and topics
  • (ISC)² CISSP-ISSAP: Update to cover CBK changes going in effect on 10/14/2020
  • ISACA CGEIT: This path helps prepare for the ISACA Certified in Governance of Enterprise IT (CGEIT) exam
  • NERC CIP: Overview of the North American Electric Reliability Corporation Critical Infrastructure Protection (NERC CIP) standards and best practices for compliance
  • IAPP CIPT: This path helps prepare for the IAPP Certified Information Privacy Technologist (CIPT) certification exam
  • Information Security Management Practices: This advanced path discusses critical information security management practices
  • ISACA COBIT 2019 Foundation: This path prepares you for the COBIT 19 Foundation certificate exam
  • IAPP CIPP/US: This path prepares for the IAPP Certified Information Privacy Practitioner US exam
  • CCSK: This path prepares you to earn a Certificate of Cloud Security Knowledge
  • (ISC)² CISSP: Update to align with the CBK changes going in effect on May 1, 2021
  • Corporate Security Policies: Definition, Implementation and Maintenance: This path provides guidelines and best practices for managing corporate IT security policies throughout their lifecycle

Threat intelligence, incident response and forensics

  • Paraben Mobile Operator Certification: This introductory certification is designed for those just getting started with Paraben’s E3:DS or E3:Universal
  • Paraben Computer Operator Certification: This introductory certification is designed for those just getting started with Paraben’s E3:P2C
  • CSP Security Features: This path provides an overview and comparison of security features of major Cloud Service Providers (CSPs)
  • Threat Intelligence: Learn about the concept of threat intelligence and best practices for integrating threat intelligence into security functions
  • Advanced Splunk Enterprise Administration: This path is created for Splunk Enterprise administrators and covers topics related to Splunk Enterprise system and data administration
  • Windows OS Forensics: This hands-on path covers finding and examining forensic artifacts on Windows computers
  • Digital Forensics Concepts: This path introduces digital forensics and provides an overview of the key concepts related to finding, collecting, preserving and examining digital evidence
  • Forensic File System Artifacts: This path covers different types of digital forensic evidence, including email and browser artifacts, metadata and volatile data
  • CertNexus CyberSec First Responder: This path prepares for the CertNexus CyberSec First Responder (CFR) certification exam
  • Advanced Splunk Core: This hands-on learning path covers some of the advanced Splunk Core functionality
  • Anti-Forensics: This path covers different anti-forensic techniques an investigator may encounter, including encryption, steganography, bit shifting and others
  • Linux OS Forensics: This hands-on path covers finding and examining forensic artifacts on Linux computers
  • Information Security Intelligence And Compliance Analytics: This advanced path explains the role of data analytics in creating proactive security measures
  • IoT Forensics: Understand architecture and communication sources and methods of IoT devices, IoT-related crime, and tools and techniques for collecting and analyzing evidence
  • Advanced Python Scripting for Cybersecurity: Practice writing advanced Python scripts for various cybersecurity tasks aligned with the MITRE ATT&CK framework
  • MacOS Forensics: This hands-on path covers finding and examining forensic artifacts on Apple computers

Pentesting and vulnerability management

  • Cloud Pentesting: This project-based path includes a pre-configured virtual machine to practice pentesting of Microsoft Azure and Amazon AWS
  • Advanced Web Application Pentesting: This path focuses on tools and techniques for attacking complex Web architectures and circumventing Web application-specific defensive technologies
  • Python for Cybersecurity: Learn the essential Python concepts and practice writing scripts for various cybersecurity tasks aligned with the MITRE ATT&CK framework
  • Pentesting with Metasploit Framework: This hands-on path covers the structure and functionality of Metasploit Framework and how to effectively use it in various stages of a pentesting engagement
  • Passive intelligence and OSINT: Learn how to quickly find useful data for your investigation and pentesting needs using open-source intelligence (OSINT) tools and resources

IT and security fundamentals

  • Programming Fundamentals for Cybersecurity: This introductory path provides an overview of basic programming constructs and components and teaches how to identify and understand programming code
  • IoT Security: This path covers common security risks associated with the Internet of Things (IoT) and effective approaches to researching and mitigating these risks
  • Reverse Engineering: Learn how to reverse engineer malicious applications to identify their architecture, behavior and protection mechanisms
  • CompTIA Security+: Update include the coverage of the SY0-601 exam objectives
  • CompTIA Linux+: This path prepares for the CompTIA Linux+ exam
  • ISO 27001 Lead Auditor: This path provides an overview of the ISO/IEC 27001 standard and prepares for the Lead Auditor certification exam
  • SELinux Administration: This path explains SELinux and type enforcement concepts and walks through the process of writing SELinux policies
  • Soft Skills for Cybersecurity: Get practical recommendations for developing and enhancing non-technical skills critical for your success in cybersecurity

Secure coding and DevSecOps

  • HTML5 Security: Learn how to recognize and address security concerns when building advanced Web browser experiences with HTML5
  • Securing Cloud-Based Applications: This path covers security considerations specific to cloud-based applications
  • (ISC)² CSSLP certification: This path prepares you for the (ISC)² Certified Secure Software Lifecycle Professional exam
  • Secure Coding in Angular: This path teaches the methodologies and techniques for secure coding in Angular, a popular open-source web application framework
  • .NET Core Security: This path focuses on identifying and mitigating vulnerabilities in microservices and service-oriented architectures developed with .Net core
  • (ISC)² CSSLP certification: This path prepares for the (ISC)² Certified Secure Software Lifecycle Professional exam
  • .NET Core Security: This path focuses on identifying and mitigating vulnerabilities in microservices and service-oriented architectures developed with .Net Core
  • API Security (OWASP API Security Top 10): Learn about common security risks associated with Application Programming Interfaces (APIs) and how to protect them
  • Ruby on Rails Security: This learning path covers methodologies for secure web application developing using Ruby on Rails
  • Complying with Privacy Regulations for Developers (GDPR, CCPA): This path covers the requirements of major privacy regulations and discusses best practices for developing privacy-focused applications
  • Secure Coding in Vue.js: This hands-on path covers best security practices for working with Vue.js, a popular JavaScript framework
  • Secure Coding in Django: This learning path introduces security methodologies and techniques for developing applications using Django framework
  • Secure Coding in Laravel: This hands-on path covers security practices of working with Laravel, a popular PHP web framework
  • Secure Coding in React: This hands-on path covers security practices of working with React, a popular PHP web framework
  • PCI-DSS for Developers: This language-agnostic path teaches best practices for application developers working on applications that have to comply with PCI-DSS requirements
  • Java Spring Security: This path introduces best security practices for developing applications in Java Spring Framework
  • Common Criteria for Developers: This learning path provides an overview of Common Criteria v3.1 and explains the responsibilities of developers in an evaluation process
  • Protecting JSP: Learn how to implement security features for use by J2EE Web modules to protect JavaServer Pages (JSP) and Servlets

Planned cyber ranges and projects

A typical cyber range or project includes 5-20 hands-on labs or exercises.

  • Initial Access and Execution
  • Credential Access
  • Discovery
  • Lateral Movement
  • Collection
  • Command and Control
  • Exfiltration
  • Impact
  • Honeypot
  • Active Defense
  • Advanced Ethical Hacking update
  • CCNA update
  • CompTIA CASP+
  • CompTIA CySA+
  • CompTIA PenTest+
  • Cyber Forensics update
  • Cyber Threat Hunting update
  • Machine Learning
  • Malware Analysis
  • Mobile and Web App Pentesting
  • Mobile Forensics
  • Python for Hackers
  • Reverse Engineering with Ghidra
  • SCADA update
  • Slickwraps Data Breach
  • Social Engineering Range
  • Vulnerability Hunting/Exploit Development

Planned boot camps

Infosec boot camps typically span 3-7 days and feature live, instructor-led training.

  • CMMC-AB CP: This path helps prepare for the CMMC-AB Certified Professional exam
  • CMMC-AB CA-1: This path helps prepare for the CMMC-AB Certified Assessor Level 1 exam
  • CMMC-AB CA-3: This path helps prepare for the CMMC-AB Certified Assessor Level 3 exam
  • CMMC-AB CA-5: This path helps prepare for the CMMC-AB Certified Assessor Level 5 exam
  • CompTIA Security+: Update of the boot camp materials to cover the SY0-601 exam objectives
  • (ISC)² CISSP: Update to align with the CBK changes going in effect on May 1, 2021

Security awareness training roadmap

50+ awareness & compliance modules
30+ assessments
100+ phishing templates
50+ translations

Planned security awareness, compliance & phishing training

Planned training series & program plans

  • Live-action training series
  • Improved & expanded compliance training
  • Cybersecurity Awareness Month Toolkit

Planned phishing training & translations

  • Topical, in-the-news phishing templates added weekly
  • Power Up with Need to Know training module & assessment translations
  • Live action series training module & assessment translations

Planned Choose Your Own Adventure Security Awareness Games

  • Phishing
  • Removable media
  • Password security
  • Physical security
  • Mobile security
  • Safe web browsing
  • Internet of things

Ready for an LX Labs Watch Party?

Infosec Skills learning paths

Upskill and reskill cyber teams with 1,200+ on-demand courses and hands-on labs inside Infosec Skills.

Infosec IQ security awareness content

Access our collection security awareness modules, assessments and supplemental resources to prepare every member of your organization.

Award-winning training you can trust

Technical Skills Development, Online Course Providers & eLearning Content

Technical Skills Development, Online Course Providers & eLearning Content

Infosec Skills

eLearning Content

eLearning Content

Infosec Skills

Best Product - Cybersecurity Training for Infosec Professionals

Best Product - Cybersecurity Training for Infosec Professionals

Infosec Skills

Security Education & Platform

Security Education & Platform

Infosec Skills

Ranked #52 in Top 100 Global Software Sellers

Ranked #52 in Top 100 Global Software Sellers

Infosec