Infosec Skills release: Improved dashboard and new learning paths

March 26, 2021

Skills Homepage Redesign

Cybersecurity professionals need current, accurate and thorough training to stay ahead of threat actors. To help learners more quickly and efficiently connect to these resources, we’ve conducted a significant overhaul of the Infosec Skills homepage.

In order of how sections appear, here’s a summary of the new layout:

  • Assigned: Teams learners will see any learning paths assigned to them at the top of their homepage. If they’ve been assigned multiple items, the most-recently assigned path will show up first.
  • In Progress: In Progress learning is simultaneously more focused — it shows learning paths and cyber ranges only — and more prominently displayed.
  • Completed: Easily view any 100% completed learning paths and cyber ranges, directly next to the In Progress section.
  • Boot Camps: Students will see every boot camp they’ve started or completed enrollment in, in order of recency.
  • Recommended: Learners who picked learning paths in the Skills sign-up process will now see them here.
  • Featured: This is a great starting point for folks who aren’t sure where to begin. The experts at LX Labs custom curate new learning content and drop it right here for easy viewing.

Applying to all of these pages is an…

  • Improved pane display: For fields with more than 12 tiles, learners will now see a “View All” link and arrow-button to load more tiles.

and…

  • Direct access to completion certificates: Show employers, colleagues and friends the new skills you’ve learned by accessing completion certificates from the Infosec Skills homepage. Quickly view and download these certificates to help you submit CPE requests.

New Team Functionality

In addition to improving the Infosec Skills UI, we added new functionality for Teams admins and users:

  • Teams admins can now filter completion data by Assigned Content in the Learning Path Progress dashboard.
  • Admins and learners can now see full page titles in reports by hovering over them.
  • User Roles are displayed in the Learner Management interface.

New Infosec Skills Learning Paths

Python for Cybersecurity

Howard Poston earned his Masters of Science in Cyber Operations from the U.S. Air Force Institute of Technology. He brings this impressive education and subsequent experience as a training consultant to his newest learning path, in which you’ll learn how to:

  • Understand the MITRE ATTA&CK® and Shield frameworks
  • Develop custom Python scripts to automate cybersecurity tasks
  • Apply Python code to Active Defense
  • And more

This is a great course for penetration testers, SOC analysts and incident responders.

Python for Cybersecurity

Digital Forensics Concepts

For 25 years, Denise Duffy served the people of Connecticut as forensics expert and detective. In her newest Infosec Skills learning path, she melds technical, operational and legal principles into a primer on digital forensics. Learn how to:

  • Understand the legal considerations and search authority involved in digital forensics
  • Properly preserve digital evidence
  • Use — and understand the limitations of — keyword and grep searches.
  • And more

Forensics examiners, security professionals interested in law enforcement, system administrators and incident responders should all consider this learning path.

Digital Forensics Concepts

Reverse Engineering

Completing our trifecta of new materials is another instructor who has defended our country. Carolyn Ahlers spent over seven years in the U.S. Navy specializing in malware and forensic analysis, supervising a team of 20 people for much of that time. Her Reverse Engineering learning path will show you how to:

  • Identify malware characteristics and functionality
  • Monitor files and registry using dynamic malware analysis
  • Produce analysis results through advanced static malware analysis
  • And more

This path is ideal for malware analysts, IT/cybersecurity professionals in the defense sector and anyone with a basic understanding of Linux and Windows operating systems.

Reverse Engineering