Training for every cybersecurity role. Delivered how you learn best.
Upskill and get certified with 100s of hands-on labs, boot camps and role-based learning paths delivered live online, on-demand or in-person. All Infosec training maps directly to the NICE Workforce Framework for Cybersecurity to guide you from beginner to expert across 52 Work Roles. Download our catalog to view the complete mapping.

Start with the right mindset and the right partner

Static and Dynamic Analysis

Summary and Conclusion

Summary and Tips

Supply Chain and Software Acquisition
Switches and wireless
System and Application Security
System and network architectures

System and Network Hardening

Target Identification and Application Mapping
TCI/IP, routing, and how to secure them
Techniques and tactics in the MITRE ATT&CK Framework
Technology and services

The ATT&CK Matrix and threat intel
The Command-line and scripting

The Importance of Data Privacy and Protection

The Importance of Frameworks, Policies, Procedures, and Controls

The Importance of Threat Data and Intelligence
The security document project and managing and executing it

The US Federal Government's Executive Branch and Information Privacy
Threat actors and tracking actors

Threat and Vulnerability Management
Threat hunting artifacts and types
Threat hunting data and technologies