OnDemand Includes 4 Months Access to Course Content - Special Offers Available Now!

Upcoming Course RSS Feeds


Security Courses
SEC450: Blue Team Fundamentals: Security Operations and Analysis
SEC455: SIEM Design & implementation
SEC460: Enterprise Threat and Vulnerability Assessment
SEC474: Building A Healthcare Security & Compliance Program
SEC487: Open-Source Intelligence (OSINT) Gathering and Analysis
SEC488: Cloud Security Essentials
SEC510: Public Cloud Security: AWS, Azure, and GCP
SEC511: Continuous Monitoring and Security Operations
SEC530: Defensible Security Architecture and Engineering
SEC534: Secure DevOps: A Practical Introduction
SEC537: Practical OSINT Analysis and Automation
SEC540: Cloud Security and DevOps Automation
SEC541: Cloud Security Monitoring and Threat Hunting
SEC545: Cloud Security Architecture and Operations
SEC552: Bug Bounties and Responsible Disclosure
SEC554: Blockchain and Smart Contract Security
SEC555: SIEM with Tactical Analytics
SEC557: Continuous Automation for Enterprise and Cloud Compliance
SEC564: Red Team Exercises and Adversary Emulation
SEC573: Automating Information Security with Python
SEC582: Mastering TShark Packet Analysis
SEC583: Crafting Packets
SEC584: Defending Cloud Native Infrastructure
SEC588: Cloud Penetration Testing
SEC599: Defeating Advanced Adversaries - Purple Team Tactics & Kill Chain Defenses
SEC699: Purple Team Tactics - Adversary Emulation for Breach Prevention & Detection
SEC760: Advanced Exploit Development for Penetration Testers
SEC401: Security Essentials Bootcamp Style
SEC504: Hacker Tools, Techniques, Exploits, and Incident Handling
SEC560: Network Penetration Testing and Ethical Hacking
SEC542: Web App Penetration Testing and Ethical Hacking
SEC503: Intrusion Detection In-Depth
SEC660: Advanced Penetration Testing, Exploit Writing, and Ethical Hacking
SEC505: Securing Windows and PowerShell Automation
SEC501: Advanced Security Essentials - Enterprise Defender
SEC566: Implementing and Auditing the Critical Security Controls - In-Depth
SEC617: Wireless Penetration Testing and Ethical Hacking
SEC575: Mobile Device Security and Ethical Hacking
SEC301: Introduction to Cyber Security
SEC522: Defending Web Applications Security Essentials
SEC440: Critical Security Controls: Planning, Implementing and Auditing
SEC580: Metasploit Kung Fu for Enterprise Pen Testing
SEC642: Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques
Forensics Courses
FOR308: Digital Forensics Essentials
FOR498: Battlefield Forensics & Data Acquisition
FOR518: Mac and iOS Forensic Analysis and Incident Response
FOR572: Advanced Network Forensics: Threat Hunting, Analysis, and Incident Response
FOR578: Cyber Threat Intelligence
FOR585: Smartphone Forensic Analysis In-Depth
FOR500: Windows Forensic Analysis
FOR610: Reverse-Engineering Malware: Malware Analysis Tools and Techniques
FOR508: Advanced Incident Response, Threat Hunting, and Digital Forensics
Management Courses
MGT415: A Practical Introduction to Cyber Security Risk Management
MGT516: Managing Security Vulnerabilities: Enterprise and Cloud
MGT520: Leading Cloud Security Design and Implementation
MGT521: Leading Cybersecurity Change: Building a Security-Based Culture
MGT551: Building and Leading Security Operations Centers
MGT512: Security Leadership Essentials for Managers
MGT414: SANS Training Program for the CISSP Certification
MGT525: IT Project Management, Effective Communication, and PMP® Exam Prep
MGT514: Security Strategic Planning, Policy, and Leadership
MGT433: SANS Security Awareness: How to Build, Maintain, and Measure a Mature Awareness Program
Audit Courses
AUD507: Auditing & Monitoring Networks, Perimeters & Systems
LEG523: Law of Data Security and Investigations
Industrial Control Systems Courses
ICS410: ICS/SCADA Security Essentials
ICS456: Essentials for NERC Critical Infrastructure Protection
ICS515: ICS Active Defense and Incident Response
Hosted Courses
HOSTED: Assessing and Exploiting Control Systems