Course catalog
Showing 181-200 of 212 items.
Securing Cryptocurrencies
Explore some of the basic security requirements for cryptocurrencies, as well as some tools that can help you reduce your own exposure to risk.
Securing the IoT: Introduction
Secure the Internet of Things. Explore the types of IoT devices designed to improve the quality of life in homes and businesses, discover how to design IoT security, and more.
Securing the IoT: Privacy
Explore the relationship between security, privacy, and the IoT. Learn about IoT vulnerabilities, privacy concerns, attacks and glitches, and more.
Security Awareness: Social Engineering
Defend your organization from social engineering by learning to recognize and thwart the most common types of attacks.
Security for the SMB: Implementing the NIST Cybersecurity Framework
Learn how to secure the assets, systems, and networks of small and medium business (SMB) using the NIST Cybersecurity Framework.
Security Outsourcing: Vendor Selection and Management
Learn how and why to outsource your cybersecurity program. Find out how to select manage vendors for maximum value.
Security Testing Essential Training
Learn about security testing. Learn how to set up a test environment, plan assessments, identify targets, and execute security tests with popular tools like Nmap and Wireshark.
Security Testing: Nmap Security Scanning
Learn how to use Nmap for port scanning of systems and network devices. Discover how to install Nmap, configure scans, and interpret the output.
Security Testing: Vulnerability Management with Nessus
Fix the flaws in your network before attackers can find them. Learn how to use Nessus, the network automated vulnerability scanner, to detect and resolve system vulnerabilities.
Security Tips Weekly
Want to broaden your knowledge of security? Get tips that can help you take steps to protect your information—no technical pedigree required.
Selling Security to Your Business Leaders
Learn about the top security issues impacting modern companies, how to prevent them, and how to articulate those threats and get buy-in from your team, stakeholders, or clients.
Soft Skills for Information Security Professionals
Information security isn’t all ones and zeros. Learn how to communicate security concepts and proposals in terms that will resonate with audiences of all technical abilities.
SSCP Cert Prep: 1 Access Controls
Prepare for Systems Security Certified Practitioner certification (SSCP). Review the Access Controls domain objectives including identification, authorization, and authentication.
SSCP Cert Prep: 2 Security Operations and Administration
Prepare for the Systems Security Certified Practitioner certification (SSCP). Review the objectives from the Security Operations and Administration domain.
SSCP Cert Prep: 3 Risk Identification, Monitoring, and Analysis
In this installment of the SSCP Cert Prep series, learn about the objectives of Risk Identification, Monitoring, and Analysis—the third domain of the SSCP exam.
SSCP Cert Prep: 4 Incident Response and Recovery
Prepare for the Systems Security Certified Practitioner (SSCP) certification. Review the objectives from the Incident Response and Recovery domain.
SSCP Cert Prep: 5 Cryptography
Prepare for the Systems Security Certified Practitioner certification (SSCP). Review the objectives from the Cryptography domain of the SSCP exam.
SSCP Cert Prep: 6 Networks and Communications Security
Prepare for the Systems Security Certified Practitioner (SSCP) certification. Review the objectives from the Networks and Communications domain of the exam.
SSCP Cert Prep: 7 Systems and Application Security
Prepare for the Systems Security Certified Practitioner (SSCP) certification exam. Review the objectives from Domain 7, Systems and Application Security.
SSCP Cert Prep: The Basics
Get an overview of the 2018 Systems Security Certified Practitioner (SSCP) certification exam.