Training for every cybersecurity role. Delivered how you learn best.
Upskill and get certified with 100s of hands-on labs, boot camps and role-based learning paths delivered live online, on-demand or in-person. All Infosec training maps directly to the NICE Workforce Framework for Cybersecurity to guide you from beginner to expert across 52 Work Roles. Download our catalog to view the complete mapping.

Jobs and process in Linux
Key Risk Indicators and Key Performance Indicators

Law, ethics and security compliance management

Law, Ethics, and Security Compliance Management

Laws, Ethics, and Legal issues
Laws, policies and regulations
Layer 2 security and loop prevention
Layer 2 switching and VLANs
Leadership and business management

Leadership and Business Management
Legal and regulatory organizations

Legal considerations and search authority

Legal jurisdictions and global data flows

Limits on private-sector collection and use of data (BoK II)

Linux and open ports with daemons
Linux+ path summary and next steps

Local Group and Security Policy


Maintaining and Optimizing Operating Systems
Malware and Certificates

Malware and Certificates
Malware detection and mitigation

Malware Functionality and Behavior