Course catalog
Showing 121-140 of 212 items.
Implementing the NIST Risk Management Framework
Learn how to manage your organization's security and privacy risks by implementing the National Institute of Standards and Technology (NIST) Risk Management Framework (RMF).
Incident Response Planning
Learn how to effectively create, provision, and operate a formal incident response capability within your organization to minimize the damage a cyberattack might cause.
Inside the Breach
Discover the inside story on headline-making, high-profile cybersecurity breaches, and find out how to protect your organization against similar attacks.
Insights from a Cybersecurity Professional
Interested in a career in IT security? Get insights from an expert. We interview Mike Chapple about the career path of the cybersecurity professional.
Introduction to Quantum Cryptography
Quantum cryptography is poised to shake up the world of information security. This course explains what it is, how it works, and the challenges and opportunities that lie ahead.
IT Security Careers and Certifications: First Steps
Interested in finding an IT security job? IT security expert Marc Menninger explains how to launch a successful career in information security.
IT Security Foundations: Network Security
Learn how to secure an organization's network to keep your interconnected systems and data safe and prepare for Microsoft Technology Associate (MTA) exam 98-367.
IT Security Foundations: Operating System Security
Learn how to secure a Windows operating system as you prepare to take and pass the Microsoft Technology Associate (MTA) exam 98-367, Security Fundamentals.
Kali Linux on Windows 10 First Look
Learn how to run Kali Linux— a security-focused Linux distribution—right on your Windows desktop using Windows Subsystem for Linux.
Learning AI for Security
Learn how to leverage artificial intelligence (AI) to solve complex problems in the field of information security. Along the way, explore the risks of using AI for security.
Learning Cloud Computing: Cloud Security
Understand the basics of cloud security. Review cloud security services from Amazon, Microsoft, and Google.
Learning Computer Forensics
Learn how to acquire and analyze data from computers or storage devices with computer forensics.
Learning Cryptography and Network Security
Understand the basics of cryptography to keep your networks, systems, and data secure.
Learning Cyber Incident Response and Digital Forensics
Be prepared for a cyberattack by learning real-world professional techniques and creating a basic digital forensic tool kit.
Learning Kali Linux
Explore Kali Linux, the OS for ethical hackers, digital forensics experts, and penetration testers. Learn how to use Kali for vulnerability scanning, password cracking, and more.
Learning Secure Payments and PCI
Get a high-level introduction to how payments get from merchants to banks, the risks associated with theft or compromise of credit card data, and PCI compliance standards.
Learning Security Frameworks
Boost your organization's security posture with a security framework. Learn about the top four security frameworks, how they compare, and how you can create a core security set.
Learning SSL/TLS
Learn the skills you need to plan, implement, and maintain a public key infrastructure (PKI) ecosystem that supports SSL/TLS security certificates.
Learning Supply Chain Cybersecurity
Learn how cybersecurity best practices, policies, and processes can made your supply chain more secure.
Learning the OWASP Top 10
Learn about the top ten software vulnerabilities, as described by the Open Web Application Security Project (OWASP).