What’s popular in security
Your source for what’s next
Popular in live online training
See allMarch 1, 2023
Linux, Python, and Bash Scripting for Cybersecurity Professionals
Presented by Omar Santos
Numerous cybersecurity jobs require a solid background in programming, Linux, and scripting languages. In this fast-paced and hands-on course you will learn several fundamental skills that you need to master to ...
January 25, 2023
Expert Transport Layer Security (TLS)
Presented by Michael Pound
A guide through the ins and outs of the internet's most important protocol There are few protocols more central to the modern world than Transport Layer Security (TLS)âthe powerful end-to-end encryption ...
January 20, 2023
Build Your Own Cybersecurity Lab and Cyber Range
Presented by Omar Santos
Practice and Enhance Ethical Hacking and Defensive Security Skills Numerous cybersecurity and penetration testing tools and techniques have the potential to damage or destroy the target system or the underlying network. ...
March 7, 2023
Application security in Azure
Presented by Reza Salehi
Protect your applications in the cloud If your company plans to migrate its mission-critical web applications to Microsoft Azure, you need to make sure the application code and data is as ...
March 15 & 16, 2023
CISSP Crash Course
Presented by Sari Greene
Acing the CISSP Certification Exam CISSP is the premier information security certification. The certification examination requires an in-depth understanding of eight security domains as defined by the ISC2 Common Body of ...
March 2 & 3, 2023
Modern Cybersecurity Fundamentals
Presented by Omar Santos
Learn the fundamentals of the major cybersecurity concentrations such as incident response, digital forensics, ethical hacking, governance, compliance, and risk management Communicate with confidence regarding cybersecurity topics, terms, and concepts Learn ...
Popular in interactive learning
See allSoftware Engineering Fundamentals: Spot the Bugs
By Nathaniel Schutta
Examining code for bugs ...
Ethical Hacking: Introducing Network and Port Scanning using Nmap
By Omar Santos, Derek Santos
The first step in any cyber-attack will always be reconnaissance. Reconnaissance and information gathering is essential when piecing together and formulating an attack. From an attacker's perspective, there are two major ...