What’s popular in security
Your source for what’s next
Popular in live online training
See allMay 1 & 2, 2023
Modern Cybersecurity Fundamentals
Presented by Omar Santos
Learn the fundamentals of the major cybersecurity concentrations such as incident response, digital forensics, ethical hacking, governance, compliance, and risk management Communicate with confidence regarding cybersecurity topics, terms, and concepts Learn ...

May 12, 2023
Cybersecurity Career Builder Unfiltered
Presented by Joseph Muniz
Building a Rewarding Career in Cybersecurity That You Love Learn about different roles related to Cybersecurity, from Penetration Testing to working in a Security Operations Center Review skillsets, training, and other ...

May 10 & 11, 2023
Certified in Cybersecurity (ISC)2 Crash Course
Presented by Omar Santos
Your Ultimate Guide to Passing the Certified in Cybersecurity Exam Prepare for the (ISC)2 Certified in Cybersecurity certification Get a comprehensive review of all current exam topic areas Learn with real-world ...

April 11 & 13, 2023
CISSP Bootcamp
Presented by Dean Bushmiller
Preparing for the exam Every job that touches a computer has a cybersecurity component. Every business owner must make informed decisions and choices in cybersecurity computing. The Certified Information Systems Security ...

April 19, 2023
Expert Transport Layer Security (TLS)
Presented by Michael Pound
A guide through the ins and outs of the internet's most important protocol There are few protocols more central to the modern world than Transport Layer Security (TLS)âthe powerful end-to-end encryption ...

March 29, 2023
Build Your Own Cybersecurity Lab and Cyber Range
Presented by Omar Santos
Practice and Enhance Ethical Hacking and Defensive Security Skills Numerous cybersecurity and penetration testing tools and techniques have the potential to damage or destroy the target system or the underlying network. ...

Popular in interactive learning
See allSoftware Engineering Fundamentals: Spot the Bugs
By Nathaniel Schutta
Examining code for bugs ...
Ethical Hacking: Introducing Network and Port Scanning using Nmap
By Omar Santos, Derek Santos
The first step in any cyber-attack will always be reconnaissance. Reconnaissance and information gathering is essential when piecing together and formulating an attack. From an attacker's perspective, there are two major ...