Course catalog

Categories

Showing 121-140 of 212 items.

Implementing the NIST Risk Management Framework

Learn how to manage your organization's security and privacy risks by implementing the National Institute of Standards and Technology (NIST) Risk Management Framework (RMF).

Incident Response Planning

Learn how to effectively create, provision, and operate a formal incident response capability within your organization to minimize the damage a cyberattack might cause.

Inside the Breach

Discover the inside story on headline-making, high-profile cybersecurity breaches, and find out how to protect your organization against similar attacks.

Insights from a Cybersecurity Professional

Interested in a career in IT security? Get insights from an expert. We interview Mike Chapple about the career path of the cybersecurity professional.

Introduction to Quantum Cryptography

Quantum cryptography is poised to shake up the world of information security. This course explains what it is, how it works, and the challenges and opportunities that lie ahead.

IT Security Careers and Certifications: First Steps

Interested in finding an IT security job? IT security expert Marc Menninger explains how to launch a successful career in information security.

IT Security Foundations: Network Security

Learn how to secure an organization's network to keep your interconnected systems and data safe and prepare for Microsoft Technology Associate (MTA) exam 98-367.

IT Security Foundations: Operating System Security

Learn how to secure a Windows operating system as you prepare to take and pass the Microsoft Technology Associate (MTA) exam 98-367, Security Fundamentals.

Kali Linux on Windows 10 First Look

Learn how to run Kali Linux— a security-focused Linux distribution—right on your Windows desktop using Windows Subsystem for Linux.

Learning AI for Security

Learn how to leverage artificial intelligence (AI) to solve complex problems in the field of information security. Along the way, explore the risks of using AI for security.

Learning Cloud Computing: Cloud Security

Understand the basics of cloud security. Review cloud security services from Amazon, Microsoft, and Google.

Learning Computer Forensics

Learn how to acquire and analyze data from computers or storage devices with computer forensics.

Learning Cryptography and Network Security

Understand the basics of cryptography to keep your networks, systems, and data secure.

Learning Cyber Incident Response and Digital Forensics

Be prepared for a cyberattack by learning real-world professional techniques and creating a basic digital forensic tool kit.

Learning Kali Linux

Explore Kali Linux, the OS for ethical hackers, digital forensics experts, and penetration testers. Learn how to use Kali for vulnerability scanning, password cracking, and more.

Learning Secure Payments and PCI

Get a high-level introduction to how payments get from merchants to banks, the risks associated with theft or compromise of credit card data, and PCI compliance standards.

Learning Security Frameworks

Boost your organization's security posture with a security framework. Learn about the top four security frameworks, how they compare, and how you can create a core security set.

Learning SSL/TLS

Learn the skills you need to plan, implement, and maintain a public key infrastructure (PKI) ecosystem that supports SSL/TLS security certificates.

Learning Supply Chain Cybersecurity

Learn how cybersecurity best practices, policies, and processes can made your supply chain more secure.

Learning the OWASP Top 10

Learn about the top ten software vulnerabilities, as described by the Open Web Application Security Project (OWASP).