Training for every cybersecurity role. Delivered how you learn best.
Upskill and get certified with 100s of hands-on labs, boot camps and role-based learning paths delivered live online, on-demand or in-person. All Infosec training maps directly to the NICE Workforce Framework for Cybersecurity to guide you from beginner to expert across 52 Work Roles. Download our catalog to view the complete mapping.
Post-exploitation, command-and-control and SOCKS proxying with Metasploit

Preventing and Mitigating Network Attacks

Printers and Multifunction Devices

Prioritization and Risk Assessment

Privacy and Security in Health Care and Public Health

Process and Module Management

Protecting secrets and reducing information leakage

Protecting software and system integrity

Protecting software and system integrity

Python for command-and-control

Recognizing and collecting digital evidence
Recon and footprinting

Recon and footprinting
Recon and footprinting

Reconnaissance and Resource Development

Remediation and Mitigation

Remote Access and Field Site Security
Reporting and communication

Reporting and mitigation

Risk and Control Analysis
Risk Culture and Communication
Risk Identification Frameworks and Methods