-
Type
Type
Boot camp filters
-
Roles
Roles
-
Vendor/certification
Vendor/certification
-
Experience (in years)
Experience (in years)
-
Vendor/Certification
Vendor/Certification
Infosec recommends
-
Most popularBoot camp
CompTIA Security+ Training Boot Camp
Infosec’s CompTIA Security+ Boot Camp teaches you information security theory and reinforces that theory with hands-on exercises to help you learn by doing. You’ll learn how to configure and operate many different technical security controls — and leave prepared to pass your Security+ exam.
Learn More
-
#1 FOR BEGINNERSBoot camp
Cisco CCNA Associate & CyberOps Associate Training Boot Camp with Dual Certification
Infosec’s authorized CCNA Dual Certification Boot Camp helps you build your knowledge of networking and provides hands-on experience installing, configuring and operating network devices — all while preparing you to earn two Cisco certifications.
Learn More
-
Most requestedBoot camp
(ISC)² CISSP® Certification Training and Boot Camp
Take your career to the next level by earning one of the most in-demand cybersecurity certifications. Infosec’s CISSP training provides a proven method for mastering the broad range of knowledge required to become a Certified Information Systems Security Professional.
Learn More
All boot camps
-
Boot camp
CompTIA Data+ Training Boot Camp
With data playing an ever-increasing role in today’s business and technology landscape, the demand for skilled data professionals is higher than ever. Upon completion of this course, you’ll have the knowledge needed to pass the CompTIA Data+ exam as well as valuable data skills for nearly any industry or role. This in-depth boot camp aligns with the five exam domains, covering topics ranging from high-level concepts and principles to specific technical practices and tools.
Learn More
-
Learning path
Cybersecurity Data Science
This hands-on, comprehensive skill path covers everything from the fundamentals of cybersecurity data science to the state of the art. Among many other practical lessons, you will be setting up a cybersecurity lab, constructing classifiers to detect malware, utilizing deep learning technology and even hacking security systems with the help of machine learning — all taught by an award-winning expert in the field of cybersecurity data science.
Learn More
-
Course
Domain 2: Cloud data security
This course covers the essentials of cloud data security. You will learn about data classification and categorization, data retention, data audits and data destruction and disposal.
Learn More
-
Course
Securing data
IoT technologies may provide a vast increase in the quality and volume of data available to users and organizations, and with this comes an even greater need to ensure that data is secure when it is stored, processed and transferred.
Learn More
-
Course
Data management, network and vulnerability scanning
This course explores Metasploit and data organization during a pentest. We will cover network and vulnerability scanning via auxiliary modules that identify open ports and listening services, run a Nessus vulnerability scan via Metasploit and how to import data from third-party tools like Nmap into the Database. We will also show basic database usage and some time-saving tips and tricks along the way.
Learn More
-
Project
Cybersecurity Data Science Project
In this project, you’ll analyze a malware sample using classifiers provided in the project files — or with ones you build yourself. You’ll begin by creating a virtual machine for the project and exporting its image in the OVA format, then extract the list of imports and identify the most commons 4-grams in the binary sequence in the Jigsaw ransomware sample. You’ll recognize images created with deepfakes and determine text in a large number of CAPTCHA images.
Learn More
-
Course
Why is database security necessary
This course explains why database security is necessary. It goes over some type of threats to an organization’s data, including cyber threats and human error. This course also describes the impact of those threats and vulnerabilities and some preventative methods.
Learn More
-
Course
When is database security important
Having insight into the three states of data assists in knowing when data security is important. Data should be protected at each state of data. This course defines the three states.
Learn More
-
Course
What data requires elevated security
Knowing what data requires elevated security due to data sensitivity will influence how an organization needs to go about protecting data. This course covers data classification and NIST categorization. In addition, several laws and regulations that will impact data security are discussed as well.
Learn More
-
Course
Who’s responsible for data security?
Understanding who is responsible for data security within an organization and what role each employee plays is key to creating an overall strategy. This course discusses the duties of key groups, as well as giving an environment overview.
Learn More
-
Course
Understand how to add data to the platform
In this course, you’ll examine the various method for getting data into the Splunk platform. Understand the options and features associated with data ingestion and indexing, such as forwarders.
Learn More
-
Course
The Importance of Data Privacy and Protection
Learn More
-
Course
The Importance of Threat Data and Intelligence
Learn More
-
Course
Normalize and enrich your data using knowledge objects such as field extractions, lookups and tags
Explore the Splunk knowledge objects used for data normalization and enrichment. View quick and detailed demonstrations on how to perform data normalization and enrichment.
Learn More
-
Course
Origins and Historical Context of Data Protection Law
In this course, you’ll explore the details of privacy and data protection. You’ll look at why privacy is important, possible risks to individuals, different privacy laws around the globe and more.
Learn More
-
Course
Metadata, EXIF data and file compression
This course explains what EXIF and file metadata are and how to locate them. A specialized tool is used by the student to extract the EXIF data so that the student can review and interpret the data. This course also explores the importance of metadata to a case and how to interpret the metadata accurately.
Learn More
-
Course
International data transfer
In this course, you’ll learn why data transfers are an issue. You’ll see how to justify international data transfers across the globe and how to apply each mechanism correctly, focusing on the EU-US relationship.
Learn More
-
Course
File carving, and carving data from unallocated space
This course defines what unallocated space is. The student examiner learns how to carve data from unallocated space and explores the importance of file headers when doing so.
Learn More
-
Course
Health Care Data Breaches
Incident versus breach: what’s the difference? Why is it such a big deal? This course will help you understand the main differences between an incident and a breach. You’ll take a look at why breaches and incidents are important, and why the difference between them matters.
Learn More
-
Course
HIPAA Data Privacy and Data Regulation
In this course, we explore helpful suggestions on how HIPAA businesses should comply not only to HIPAA regulations but also to be more familiar with the state laws within their jurisdiction. It helps businesses understand how to be compliant with both HIPAA and state laws.
Learn More
-
Course
Domain 2: Cloud data security
In this course, we discuss key elements found in Domain 2 of the CCSP Common Body of Knowledge (CBK). The goal is to inform you of the types of controls necessary to administer various levels of availability, integrity and confidentiality (AIC) to secure data in the cloud.
Learn More
-
Course
Explain the purpose and use of macros, data models and pivot tables
Learn about macros, data models and pivot tables. View easy-to-understand explanations and demonstrations about macros, data models and pivot tables and their use.
Learn More
-
Course
Database Types
People outside of the tech industry don’t realize that there can be different types of databases. In this course, you’ll dive into the details of database types. Beginning with a review of the various types, the course will explore relational databases, database hosting methods, high availability solutions, scalability solutions, database security and specific databases.
Learn More
-
Course
Data Centers
Learn More
-
Course
Data governance
A look at data governance and data privacy. We’ll talk in-depth about data governance, a few representative privacy laws and how compliance and technology intertwine. We’ll also cover the principles of privacy by design, which help us put our users and their privacy needs front and center when we are creating and maintaining our apps and systems.
Learn More
-
Course
Database and Eloquent
The Laravel database access layer has a lot of built-in protection from common attacks. However, when you need to customize functionality it can be easy to undo that layer and allow for attacks like SQL injection. In this course, we’ll discuss how Laravel protects your database and look at ways to extend functionality without compromising security. Then, we’ll pivot to performance and reducing the chance of denial of service attacks. Finally, concentrating on a layered approach of security in your app, we’ll focus on the security of properties in an Eloquent model.
Learn More
-
Course
Data protection in AWS
In this course, we will review methods of data protection in AWS and the best way to use native AWS services to increase security.
Learn More
-
Course
Data Analysis in Security Monitoring Activities
Learn More
-
Course
Analyzing volatile data
A forensic examiner only has one shot at collecting volatile data. This course covers volatile data, the structure of this data, why it’s essential and the tools that are needed to obtain it. This course also covers how to examine the data and what an examiner should expect to find.
Learn More
-
Learning path
Database Security
The Database Security learning path gives a high-level view of rules and regulations, the NIST Framework and threats and vulnerabilities. This learning path also includes a more detailed view of database protection methods and labs for both a relational and a non-relational (NoSQL) cloud database, with labs and demos on data masking, column-level encryption, least privilege access management, auditing and more.
Learn More
-
Course
Data privacy & security by design
In this course, we bring the disciplines of data privacy and information Security together. We show how GDPR and comparable global legislation define privacy requirements, and also outline technical and organizational policies and measures to protect private information.
Learn More
-
Course
Limits on private-sector collection and use of data (BoK II)
Laws and regulations limit how the private sector can collect, store, share and use data. Some rules apply broadly, some to specific sectors. We will review the role of the Federal Trade Commission (FTC) and rules for organizations in fields of healthcare (medical), financial, education, telecommunications, marketing and more.
Learn More
-
Course
US State Data Breach Notification Laws
Students will learn about several US state data breach notification laws. They will review California’s data breach notification law, which was the first of its kind in the US. They’ll explore other laws in Texas, New York, Massachusetts, Puerto Rico and the District of Columbia. Students will also review individual definitions of breaches, notification requirements, safe harbor requirements and more.
Learn More
-
Course
US State Data Privacy and Data Security Laws
Students will learn about several US state-level data privacy and data security laws. They will review the CCPA and the proposed CPRA, Vermont’s Data Broker Regulation, the Illinois Biometric Information Privacy Act and more. Students will learn about CCPA and CPRA business requirements and learn the definition of ‘brokered personal information.’
Learn More
-
Course
Global Data Protection and Information Privacy Laws
This course introduces students to several global data protection and information privacy laws. They will learn about data protection requirements in the EU GDPR, the UK Data Protection Act, LGDP, PIPEDA and more. Students will also review the concept of data protection principles, children’s online protection and special processing activities requirements.
Learn More
-
Course
Protecting data
In addition to encryption, there are a number of other mechanisms you can employ to protect data. In this course, you will learn about common risks to data. You will also learn about how to protect files, how ensure that data is transmitted over a network securely and how to protect data shared and transmitted between processes within an Android app. You will learn about the risks of data leakage and how to mitigate those risks. Finally, you will learn how to protect data that is viewed online by a user.
Learn More