Ending Soon! Get an iPad Air with Smart Keyboard, or Surface Go, or $300 Off with Online Training through Aug 21!

Upcoming Course RSS Feeds


Security Courses
SEC450: Blue Team Fundamentals: Security Operations and Analysis
SEC455: SIEM Design & implementation
SEC460: Enterprise Threat and Vulnerability Assessment
SEC487: Open-Source Intelligence Gathering and Analysis
SEC511: Continuous Monitoring and Security Operations
SEC530: Defensible Security Architecture
SEC534: Secure DevOps: A Practical Introduction
SEC540: Secure DevOps and Cloud Application Security
SEC545: Cloud Security Architecture and Operations
SEC555: SIEM with Tactical Analytics
SEC564: Red Team Operations and Threat Emulation
SEC573: Automating Information Security with Python
SEC599: Defeating Advanced Adversaries - Implementing Kill Chain Defenses
SEC760: Advanced Exploit Development for Penetration Testers
SEC401: Security Essentials Bootcamp Style
SEC504: Hacker Tools, Techniques, Exploits and Incident Handling
SEC560: Network Penetration Testing and Ethical Hacking
SEC542: Web App Penetration Testing and Ethical Hacking
SEC503: Intrusion Detection In-Depth
SEC660: Advanced Penetration Testing, Exploit Writing, and Ethical Hacking
SEC505: Securing Windows and PowerShell Automation
SEC501: Advanced Security Essentials - Enterprise Defender
SEC566: Implementing and Auditing the Critical Security Controls - In-Depth
SEC617: Wireless Ethical Hacking, Penetration Testing, and Defenses
SEC575: Mobile Device Security and Ethical Hacking
SEC301: Introduction to Cyber Security
SEC440: Critical Security Controls: Planning, Implementing and Auditing
SEC506: Securing Linux/Unix
SEC580: Metasploit Kung Fu for Enterprise Pen Testing
SEC642: Advanced Web App Penetration Testing and Ethical Hacking
Forensics Courses
FOR498: BATTLEFIELD FORENSICS & DATA ACQUISITION
FOR518: Mac Forensic Analysis
FOR572: Advanced Network Forensics and Analysis
FOR578: Cyber Threat Intelligence
FOR585: Advanced Smartphone Forensics
FOR500: Windows Forensic Analysis
FOR610: Reverse-Engineering Malware: Malware Analysis Tools and Techniques
FOR508: Advanced Digital Forensics and Incident Response
FOR526: Advanced Memory Forensics & Threat Detection
Management Courses
MGT415: A Practical Introduction to Cyber Security Risk Management
MGT516: Managing Security Vulnerabilities: Enterprise and Cloud
MGT512: SANS Security Leadership Essentials For Managers with Knowledge Compression™
MGT414: SANS Training Program for CISSP® Certification
MGT525: IT Project Management, Effective Communication, and PMP® Exam Prep
MGT514: IT Security Strategic Planning, Policy and Leadership
MGT433: Securing The Human: How to Build, Maintain and Measure a High-Impact Awareness Program
Developer Courses
DEV522: Defending Web Applications Security Essentials
DEV541: Secure Coding in Java/JEE: Developing Defensible Applications
DEV544: Secure Coding in .NET: Developing Defensible Applications
Audit Courses
AUD507: Auditing & Monitoring Networks, Perimeters & Systems
LEG523: Law of Data Security and Investigations
Team Based Training Courses
TBT570: Team Based Training - Incident Response Blue Team and Red Team Dynamic Workshop
Industrial Control Systems Courses
ICS410: ICS/SCADA Security Essentials
ICS456: Essentials for NERC Critical Infrastructure Protection
ICS515: ICS Active Defense and Incident Response
ICS612: ICS Cyber Security In-Depth
Hosted Courses
HOSTED: Physical Security Specialist - Full Comprehensive Edition
HOSTED: ICS Cybersecurity for Managers
HOSTED: Assessing and Exploiting Control Systems
Special Courses
SPECIAL: The Essentials of Automating Information Security with Python