Study any time, from any device.

The bad guys are getting smarter, are you?

300+ courses  //   100+ labs  //   500+ hours of training

Infosec Skills

As you grow in your cybersecurity career, Infosec Skills is the platform to ensure your skills are scaled to outsmart the latest threats. With courses mapped directly to the NICE Cybersecurity Workforce Framework, you’ll be able to take control of your career, get a step ahead of cybercriminals and learn to build defenses to counter tomorrow’s threats.

300+ courses

Cloud-hosted cyber ranges

100+ hands-on labs

Certification practice exams

40+ learning paths

Plans & Pricing

Monthly

  

$34

Billed monthly

Yearly

  

$299

Billed annually

Cybersecurity roles

Infosec Skills is mapped to the NICE Cybersecurity Workforce Framework, which contains entry, mid and advanced cybersecurity roles backed by research into the actual skills requested by employers. With Infosec Skills and NICE, you have the roadmap necessary to identify what employers want and the tools needed to follow that career path, whether you’re brand new to information security or an established infosec professional.

Hands-on learning with cyber ranges

Practice your skills and verify your knowledge with in-depth cyber ranges. Each cyber range contains dozens of hands-on labs ranging from basic networking to penetration testing. With four cyber ranges containing 100+ hands-on labs, you’ll gain the confidence that comes with real-world experience — and carry that confidence to your next job or project.

Featured learning paths

Build your cybersecurity knowledge across more than 40 skill and certification learning paths. Each learning path contains a collection of courses structured to progress you knowledge and close any skill gaps — along with hands-on cyber ranges and certification practice exams to build your confidence.

Skill paths

Certification paths

Cisco Certified Network Associate Routing & Switching (CCNA)
Course
Cisco Certified Network Associate Routing & Switching (CCNA)

Cisco Certified Network Associate Routing & Switching (CCNA)

The Cisco Certified Network Associate Routing & Switching (CCNA) certification path builds on the CCENT and prepares you for a career as a networking professional. You'll learn about installing, operating and troubleshooting more complex networks.

Cisco Certified Network Associate Security (CCNA Security)
Course
Cisco Certified Network Associate Security (CCNA Security)

Cisco Certified Network Associate Security (CCNA Security)

The Cisco Certified Network Associate Security (CCNA Security) certification path is an excellent starting point for a career in cybersecurity. You'll learn the skills required to install, troubleshoot and monitor Cisco networks, as well as recognize vulnerabilities and mitigate security threats.

EC-Council Certified Ethical Hacker (CEH)
Course
EC-Council Certified Ethical Hacker (CEH)

EC-Council Certified Ethical Hacker (CEH)

The Certified Ethical Hacker (CEH) certification path teaches you the hacking skills necessary to successfully perform a penetration test. You’ll learn the techniques and tools used by cybercriminals and how to apply them to conduct security assessments and report your findings.

CompTIA Security+
Course
CompTIA Security+

CompTIA Security+

The CompTIA Security+ certification path introduces you to a variety of information security concepts and technical controls. You'll learn about network and application security, compliance, different types of cyber threats and more.

CompTIA PenTest+
Course
CompTIA PenTest+

CompTIA PenTest+

The CompTIA PenTest+ certification path teaches you how to successfully plan, carry out and report the results of a penetration test. You'll learn the process behind penetration testing, tools and techniques used by pentesters, legal and compliance issues and more.

CompTIA CySA+
Course
CompTIA CySA+

CompTIA CySA+

The CompTIA CySA+ (Cybersecurity Analyst) certification path teaches you how to use behavioral analytics to prevent, detect and combat cyber threats. You'll learn how to configure and use threat detection tools, perform data analysis to identify threats and secure applications and systems.

ISACA Certified Information Systems Auditor (CISA)
Course
ISACA Certified Information Systems Auditor (CISA)

ISACA Certified Information Systems Auditor (CISA)

The Certified Information Systems Auditor (CISA) certification path builds your knowledge of auditing information systems. You'll learn the tools and guidelines involved in the IT auditing process as well as concepts such as business continuity, enterprise IT governance, common security controls and more.

ISACA Certified Information Security Manager (CISM)
Course
ISACA Certified Information Security Manager (CISM)

ISACA Certified Information Security Manager (CISM)

The Certified Information Security Manager (CISM) certification path is designed for individuals that oversee, design or assess an enterprise's information security. You'll learn about information security governance, risk management, program development and incident management.

Certified Computer Forensics Examiner (CCFE)
Course
Certified Computer Forensics Examiner (CCFE)

Certified Computer Forensics Examiner (CCFE)

The Certified Computer Forensics Examiner (CCFE) certification path teaches you the skills needed to investigate computer threats. You'll learn about performing forensics on hard drives, file systems and networks as well as the legal and ethical issues of investigating cybercrime.

Certified Reverse Engineering Analyst (CREA)
Course
Certified Reverse Engineering Analyst (CREA)

Certified Reverse Engineering Analyst (CREA)

The Certified Reverse Engineering Analyst (CREA) certification path teaches you the analysis skills needed to reverse engineer and analyze malware. You'll learn about how malware works, reversing different types of malware, common tools and more.

Featured courses

Security Technologies and Tools
Course
Security Technologies and Tools

Security Technologies and Tools

Explore the uses of common information security technology and tools as you progress through this nine-video introductory course.

9 videos
59 minutes of training

Threats and Threat Actors
Course
Threats and Threat Actors

Threats and Threat Actors

Build your knowledge of popular threats, including malware and social engineering as well as application, wireless and cryptographic attacks.

6 videos
61 minutes of training

Common Malware Behavior
Course
Common Malware Behavior

Common Malware Behavior

Improve your malware-hunting skills with a course on injection types, network functions and other fundamentals of malware behavior.

15 videos
56 minutes of training

Introduction to Cryptography
Course
Introduction to Cryptography

Introduction to Cryptography

Build a baseline of cryptography knowledge as you progress through this nine-video course covering essential cryptography concepts and use cases.

9 videos
31 minutes of training

Introduction to Reverse Engineering
Course
Introduction to Reverse Engineering

Introduction to Reverse Engineering

Take a closer look at the art and science of reverse-engineering with a course on machine code, assembly language, system-level reversing and more.

5 videos
47 minutes of training

Computer Forensics Investigations
Course
Computer Forensics Investigations

Computer Forensics Investigations

Take a deep dive into the process of conducting computer forensics investigations, including procedures, methodology, tools and reporting.

14 videos
142 minutes of training

Digital Evidence and Legal Issues
Course
Digital Evidence and Legal Issues

Digital Evidence and Legal Issues

Explore potential legal issues related to digital evidence, review citizens' rights and gain insight into real-world cases in this computer forensics course.

11 videos
112 minutes of training

Fundamentals of Exploitation
Course
Fundamentals of Exploitation

Fundamentals of Exploitation

Build your knowledge of exploitation, including types of exploits, overflows and privilege escalation, as well as tools and techniques related to ethical hacking.

7 videos
49 minutes of training

Post-Exploitation Techniques
Course
Post-Exploitation Techniques

Post-Exploitation Techniques

Learn about taking advantage of a system after it's been compromised, including leveraging post-exploitation techniques, using malware and exfiltrating data.

6 videos
44 minutes of training

Obfuscation, Encoding and Encryption
Course
Obfuscation, Encoding and Encryption

Obfuscation, Encoding and Encryption

Reintroduce yourself to three ways malware disguises itself: obfuscation, encoding and encryption.

8 videos
41 minutes of training