-
Type
Type
Boot camp filters
-
Roles
Roles
-
Vendor/certification
Vendor/certification
-
Experience (in years)
Experience (in years)
-
Vendor/Certification
Vendor/Certification
Infosec recommends
-
Most popularBoot camp
CompTIA Security+ Training Boot Camp
Infosec’s CompTIA Security+ Boot Camp teaches you information security theory and reinforces that theory with hands-on exercises to help you learn by doing. You’ll learn how to configure and operate many different technical security controls — and leave prepared to pass your Security+ exam.
Learn More
-
#1 FOR BEGINNERSBoot camp
Cisco CCNA Associate & CyberOps Associate Training Boot Camp with Dual Certification
Infosec’s authorized CCNA Dual Certification Boot Camp helps you build your knowledge of networking and provides hands-on experience installing, configuring and operating network devices — all while preparing you to earn two Cisco certifications.
Learn More
-
Most requestedBoot camp
(ISC)² CISSP® Certification Training and Boot Camp
Take your career to the next level by earning one of the most in-demand cybersecurity certifications. Infosec’s CISSP training provides a proven method for mastering the broad range of knowledge required to become a Certified Information Systems Security Professional.
Learn More
All boot camps
-
Learning path
(ISC)² CCSP (2022 Update)
The Certified Cloud Security Professional (CCSP) course is an intense preparation for the CCSP certification exam. We focus on preparing you for the CCSP certification exam by reviewing of the entire Common Body of Knowledge (CBK) and practical question-and-answer scenarios which help you identify and evaluate security risks for an organization’s cloud environment, understand fundamentals of the cloud computing architecture framework, understand security challenges associated with different types of cloud services, select and implement appropriate controls to ensure secure cloud services and thoroughly understand the 6 essential core domains of the CCSP Common Body of Knowledge.
Learn More
-
Learning path
(ISC)² Certified in Governance, Risk and Compliance (CGRC) – Formerly known as Certified Authorization Professional (CAP)
This course will prepare you for the Certified in Governance, Risk and Compliance (CGRC) exam. There are seven domains that will be discussed in depth: information security risk management program, scope of the information system, selection and approval of security and privacy controls, implementation of security and privacy controls, assessment/audit of security and privacy controls, authorization/approval of information system and continuous monitoring.
Learn More
-
Learning path
(ISC)² Certified Information Systems Security Professional (CISSP) (2021 Update)
With this path, you’ll prepare to take the CISSP exam. You’ll review core relevant topics, including security and risk management, asset security, identity and access management, security operations, software development security and more. We conclude with helpful test-taking tips to prepare you for exam day.
Learn More
-
Learning path
(ISC)² CISSP-ISSAP
This learning path builds on your CISSP knowledge and experience prepares you to pass the prestigious Information Systems Security Architecture Professional (CISSP-ISSAP) exam. As you progress through eight courses, you’ll gain a deep understanding of security architecture topics, including approaches and frameworks, the system development lifecycle, concepts and methodologies related to identity and access management, how to design systems for GRC (governance, risk management and compliance), how to design continuous monitoring activities and incident response capabilities, and more. Upon completion, you’ll be prepared to earn your CISSP-ISSAP certification and further differentiate yourself as an expert in the security architecture field.
Learn More
-
Learning path
(ISC)² CISSP-ISSAP Fundamentals
The learning path is divided into 5 courses. Each course contains videos regarding the 5 domains contained in ISSAP.
Learn More
-
Learning path
(ISC)² CISSP-ISSEP (2021 Update)
Explore the ISSEP certification. CISSPs who are awarded this additional concentration have demonstrated their knowledge in the practical application of system and security engineering principles and the processes to develop a secure system. An ISSEP analyzes organizational needs, defines security requirements, designs security architectures, develops secure designs, implements system security and supports system security assessment and authorization for government and industry.
Learn More
-
Learning path
(ISC)² CISSP-ISSEP Fundamentals
The learning path is divided into 5 courses. Each course contains videos regarding the 5 domains contained in the ISSEP.
Learn More
-
Learning path
(ISC)² CISSP-ISSMP
You’ll learn the techniques and tools used by security management professionals and how to apply them to conduct security assessments, risk assessments, business impact analysis and to create and manage business continuity, and disaster recovery plans. This learning path teaches you the skills and methodology needed to manage a security practice in your organization. You’ll learn advanced security management techniques as you progress through six courses tied to the ISSMP exam objectives. Upon completion you’ll be prepared to earn your CISSP-ISSMP certification and have an established base of security management knowledge that can be leveraged to progress into the other advanced concentrations of the CISSP or open up new career roles.
Learn More
-
Learning path
(ISC)² CISSP-ISSMP Fundamentals
The learning path is divided into 6 courses. Each course contains videos and short quizzes on foundational topics (or sets of topics) within the course.
Learn More
-
Learning path
(ISC)² CSSLP Fundamentals
The learning path is divided into courses corresponding to the eight domains of the CSSLP CBK. Each course contains videos on foundational topics (or sets of topics) within the domain.
Learn More
-
Learning path
(ISC)² System Security Certified Practitioner (SSCP)
The System Security Certified Practitioner (SSCP) certification path will provide students with an overview of foundational information security concepts. The course will cover the seven domains that encompass the SSCP, with topics ranging from securing information systems and data to overall security operations. This training would benefit those looking to get started in the information security field, or those who want to reinforce and prove their information security knowledge.
Learn More
-
Learning path
Active Directory with Windows Server 2016
This learning path teaches you all about managing identities in Active Directory. As you progress through five courses, you’ll learn how Active Directory simplifies requirements to meet security policies and interconnection management, how to configure a secure system, how to set up and use Certificate Services and Federation Services, how Active Directory uses authorization and authentication for external system interactions, how to apply policies and organizational units for a quick response to resource or security issues, and how to manage Active Directory with the Users and Computers console and PowerShell. Upon completion, you’ll have the in-depth knowledge about Active Directory required to pass the Microsoft Identity with Windows Server 2016 certification exam.
Learn More
-
Learning path
Advanced Adversary Tactics
The Advanced Adversary Tactics path will be updated regularly to include new content. Completing the path will give you hands-on experience with a wide variety of different techniques that will allow you to identify and understand adversarial tactics and techniques. By carrying out attack methods, you’ll be able to identify how attackers think and move through networks. By the end you’ll know how attackers set up cloned websites, establish persistence with trojanized binaries, pivot through networks, and much more.
Learn More
-
Learning path
Advanced Cybersecurity Concepts
This learning path gives you an overview of several advanced security concepts. As you progress through four courses, you’ll learn about assembly language, system-level reversing, penetration testing methodologies, working with Linux, common Web application threats, popular security frameworks and how they help manage risk, and more. Upon completion, you’ll have a general understanding of some of the key security concepts needed to take your career and skills to the next level.
Learn More
-
Learning path
Advanced Intrusion Detection
This learning path begins with an overview of intrusion detection and then dives into the data required to build various detection use cases and various open-source tools and frameworks for building and tuning your detections. Throughout the path, we will review the various aspects and frameworks that comprise intrusion detection techniques (network- and host-based) and explore real world use-cases and examples of detection methodology. At the end of this path, you will have the necessary skills to craft meaningful detections that can aid in identifying malicious activity within your organization’s environment.
Learn More
-
Learning path
Advanced Python Scripting for Cybersecurity
Python is one of the most popular and widely-used programming languages in the world, due to its high usability and large collection of libraries. This learning path provides an application-driven introduction to using advanced Python features for offensive and defense cybersecurity. This path demonstrates how some of the advanced functionality in Python packages can be applied to cybersecurity and how to automate multi-stage attack chains and defensive operations using Python.
Learn More
-
Learning path
Advanced Splunk Core
You will learn how to use Splunk as a real-time monitoring console to identify, analyze and report data across your organization.
Learn More
-
Learning path
AWS Certified Security Specialist
In this learning path, we will not only review key items of every exam domain but go hands-on with the AWS services that you must know to pass the exam. This course is meant to reinforce the material the exam expects you to know to pass. The exam is scenario-based and we incorporate that into the learning path, as well with exam-similar questions that prepare you to earn your AWS Security Specialty Certification.
Learn More
-
Learning path
AWS Certified Solutions Architect – Associate
You’ll learn the foundations of AWS security as you progress through 15 courses. Upon completion, you’ll be prepared to earn your AWS Certified Solutions Architect – Associate certification, and to take on the role of architect for your AWS instances.
Learn More
-
Learning path
AWS Essentials & Solutions Architect Associate
This certification path teaches you all you need to get started using Amazon Web Services (AWS), including the AWS Management Console, S3 buckets, EC2 instances, database services, security in the cloud and the costs associated with AWS. The first two courses cover the essentials of AWS. The remaining 16 courses build your knowledge and skills around the five domain areas related to the AWS Certified Solutions Architect – Associate exam, including designing high-availability architectures, designing for elasticity and scalability, using secure application tiers and more. Upon completion, you’ll have the knowledge and skills needed to implement AWS and pass the AWS Certified Solutions Architect – Associate exam.
Learn More
-
Learning path
Azure Security Engineer Associate
Students will learn how to implement security controls and threat protection, managing identity and access and protecting data, applications and networks in cloud and hybrid environments as part of an end-to-end infrastructure. They will learn how to maintain security posture, identifying and remediating vulnerabilities by using a variety of security tools, implementing threat protection and responding to security incident escalations.
Learn More
-
Learning path
Blockchain Security
This learning path introduces blockchain security, including a description of how the blockchain works at each level of the blockchain ecosystem. Security discussions include everything from the fundamental cryptographic primitives to the nodes and networks that make up the blockchain ecosystem to the security of smart contracts.
Learn More
-
Learning path
CCFE Fundamentals
The content of the learning path is divided into Courses corresponding to four domains of CCFE. The Courses focus on the foundation topics within the domains. Each Course has streaming content for the designated topics.
Learn More
-
Learning path
Certificate of Cloud Security Knowledge (CCSK)
The CSA CCSK exam covers six domains: cloud computing fundamentals, data security, infrastructure security, application security, managing cloud security and cloud security operations. This learning path will cover each in depth.
Learn More
-
Learning path
Certified Computer Forensics Examiner (CCFE)
This learning path builds your computer forensics skills and prepares you to earn your Certified Computer Forensics Examiner (CCFE) certification. You’ll learn the foundations of computer forensics as you progress through 16 courses tied to the primary CCFE certification exam objectives. Upon completion, you’ll be prepared to earn your CCFE certification and have a proven base of knowledge around conducting computer forensics investigations.
Learn More
-
Learning path
Certified Expert Penetration Tester (CEPT)
This learning path builds on your ethical hacking knowledge and skills by teaching you how to write and create exploits. As you progress through six courses, you’ll learn advanced reconnaissance techniques and stealth strategies, manual and automated techniques for discovering vulnerabilities, how to write exploits, how to use Metasploit’s interchangeable payloads and remote commands, and more. Upon completion, you’ll have increased confidence in your penetration testing skills and the knowledge of exploit creation needed to take your cybersecurity career to the next level.
Learn More
-
Learning path
Certified Mobile and Web App Penetration Tester (CMWAPT)
This learning path builds your penetration testing skills and prepares you to earn your Certified Mobile and Web App Penetration Tester (CMWAPT) certification. As you progress through nine courses tied to the CMWAPT exam domains, you’ll build your skills around using pentesting methodologies and tools to conduct tests on Web and mobile apps and assess their security. Upon completion, you’ll be prepared to earn your CMWAPT certification and validate your pentesting knowledge.
Learn More
-
Learning path
Certified Mobile Forensics Examiner (CMFE)
This learning path builds your mobile forensics skills and prepares you to earn your Certified Mobile Forensics Examiner (CMFE) certification. You’ll learn the foundations of mobile forensics as you progress through five courses tied to the primary CMFE certification exam objectives, including discovering different types of evidence, analyzing and extracting evidence from different types of mobile devices, and reporting on your forensics findings. Upon completion, you’ll be prepared to earn your CMFE certification and have a proven base of knowledge around conducting mobile forensics investigations.
Learn More
-
Learning path
Certified Reverse Engineering Analyst (CREA)
This learning path builds your reverse engineering skills and prepares you to earn your Certified Reverse Engineering Analyst (CREA) certification. You’ll take a deep dive into reverse engineering, including different malware types, tools and techniques, as you progress through 14 courses tied to the primary CREA certification exam objectives. Upon completion, you’ll be prepared to earn your CREA certification and validate your knowledge around reverse engineering malware.
Learn More
-
Learning path
Certified SCADA Security Architect (CSSA)
This learning path teaches you how to defend the Supervisory Control and Data Acquisition (SCADA) and Industrial Control Systems (ICS) that manage our nation’s critical infrastructure. Fourteen courses build your SCADA security knowledge around the eight Certified SCADA Security Architect (CSSA) domains. You’ll learn about defending against common SCADA threats and vulnerabilities, conducting risk assessments, implementing remote access and physical controls, and more. Upon completion, you’ll be prepared to earn your CSSA certification and validate your SCADA security knowledge.
Learn More
-
Learning path
Certified Security Awareness Practitioner
Not all training and awareness programs are alike. Building a robust security awareness program is important, but it can be in vain in your employees don’t buy into what you’re selling and actually change their security behavior. Go “beyond compliance” to learn about sales and marketing techniques that can take a training and awareness program to the next level: engagement and behavior change. This course also includes security basics for soft-skilled professionals new to the security field, as well as how to leverage brain chemistry to be more effective. This learning path is designed for established security practitioners with existing security expertise who are new to the practice of security training and awareness and people with existing marketing and communications experience who are entering the field of security training and awareness. Any hacker will tell you that the easiest target isn’t a system or a technology; it’s people. In this learning path, you’ll learn how to engage your audience and create “pull” for your training and awareness. You’ll learn how to assess the security culture of your organization and map out a plan to improve it. You’ll learn how align your program to your organization’s goals and get executive support. You’ll learn how people learn, and how they consume media. You’ll learn how to create marketing personas and how to get the right message to the right person at the right time, increasing the likelihood of behavioral change.
You’ll also learn about: the awareness maturity model, measuring impact and engagement, integrating existing technology with your training and awareness program, and evaluating human risk.
Learn More
-
Learning path
CertNexus Certified IoT Security Practitioner
Securing IoT systems can be a complicated proposition, involving hazards that many IT workers have never had to deal with. Solutions may involve resource-constrained IoT devices and technologies from many different vendors. IoT devices may be installed in vulnerable locations, and new network devices and protocols add complexity to the overall network architecture.
Ready to take the CertNexus Certified IoT Security Practitioner (CIoTSP) exam? Save 10% by using code VXH93HF4A when purchasing their CertNexus exam voucher here. After purchasing the exam voucher, you will receive an email with info regarding how to register for and schedule your exam at a Pearson VUE testing center or virtual proctoring platform, OnVUE.
Learn More
-
Learning path
CertNexus Cyber Secure Coder
You will identify the need for security in your software projects, eliminate vulnerabilities within software, use a Security by Design approach to design a secure architecture for your software, implement common protections to protect users and data, apply various testing methods to find and correct security defects in your software, and maintain deployed software to ensure ongoing security. Finally, you will put concepts into practice with numerous hands-on activities examining files and code, using both developer and penetration tester techniques to discover and correct vulnerabilities.
Ready to take the CertNexus Cyber Secure Coder (CSC) exam? Save 10% by using code VXH93HF4A when purchasing their CertNexus exam voucher here. After purchasing the exam voucher, you will receive an email with info regarding how to register for and schedule your exam at a Pearson VUE testing center or virtual proctoring platform, OnVUE.
Learn More
-
Learning path
CertNexus CyberSec First Responder
This learning path covers network defense and incident response methods, tactics, and procedures in alignment with industry frameworks such as NIST 800-61 r.2 (Computer Security Incident Handling), US-CERT’s NCIRP (National Cyber Incident Response Plan), and Presidential Policy Directive (PPD) 41 on Cyber Incident Coordination Policy. It is ideal for candidates who have been tasked with the responsibility of monitoring and detecting security incidents in information systems and networks, and for executing standardized responses to such incidents. The path introduces tools, tactics, and procedures to manage cybersecurity risks, identify various types of common threats, evaluate the organization’s security, collect and analyze cybersecurity intelligence and remediate and report incidents as they occur.
Ready to take the CertNexus Cyber First Responder® CFR-310 exam? Save 10% by using code VXH93HF4A when purchasing their CertNexus exam voucher here.
After purchasing the exam voucher, you will receive an email with info regarding how to register for and schedule your exam at a Pearson VUE testing center or virtual proctoring platform, OnVUE.
Learn More
-
Learning path
Cisco CCNA Associate Fundamentals
The content of the learning path is divided into Courses corresponding to the six domains of CCNA. The Courses focus on the foundation topics within the domains. Each Course has streaming content for the designated topics.
Learn More
-
Learning path
Cisco Certified CyberOps Associate
The Cisco Certified CyberOps Associate Learning Path prepares you to begin a career working with associate-level cybersecurity analysts within security operations centers. You’ll gain an understanding of cybersecurity’s basic principles, foundational knowledge and core skills needed to grasp the more advanced associate-level materials in the second required exam.
Learn More