Training for every cybersecurity role. Delivered how you learn best.
Upskill and get certified with 100s of hands-on labs, boot camps and role-based learning paths delivered live online, on-demand or in-person. All Infosec training maps directly to the NICE Workforce Framework for Cybersecurity to guide you from beginner to expert across 52 Work Roles. Download our catalog to view the complete mapping.

Computer Maintenance and Management

Configuration and management testing

Configuring Network and Internet Connectivity
Control Design and Implementation
Corporate Security Policies
Corporate security policy foundations - a framework for better results

Course summary and next steps

Covert channels and exfiltration
Covert channels and exfiltration

Covert Channels and IDS Evasion

Create a Plan of Action and Milestones for unimplemented controls

Create and Configure File Systems

Create and Manage Group Policy
CRISC Domain 3: Risk response and reporting
CRISC Domain 4: Information technology and security

Cryptography and Cryptanalysis Project

CSP roles and responsibilities


Cyber Threat Hunting Definition and Goals

Cyber Threat Hunting Process and Techniques

Cyber Threat Hunting Technologies and Tools
Cybersecurity configuration change management and vulnerability assessments
Cybersecurity incident reporting and response planning
Cybersecurity infrastructure and communication systems