Cyber Security Training Catalog (273 Courses)

**All courses listed below are included FREE with annual membership Become a Member Today!

To see a printable overview of the Cyber Security Catalog Click Here or check out our other training catalogs below:



Information Security Training

Certified Wireless Network Administrator (CWNA) Series
  • Course 01 - Overview of Wireless Communications
  • Course 02 - Fundamentals of RF
  • Course 03 - Components and Measurements of RF
  • Course 04 - RF Signal and Antenna Concepts
  • Course 05 - IEEE 802.11
  • Course 06 - Spread Spectrum Technologies
  • Course 07 - WLAN Topologies
  • Course 08 - Wi-Fi Access
  • Course 09 - MAC Architecture
  • Course 10 - WLAN Architecture
  • Course 11 - WLAN Deployment
  • Course 12 - Troubleshooting
  • Course 13 - Security
  • Course 14 - Types of Wireless Attacks
  • Course 15 - Fundamentals of Site Surveys
  • Course 16 - Site Survey Tools
  • Course 17 - PoE
  • Course 18 - High Throughput (HT)
  • Course 19 - Very High Throughput (VHT)
  • Course 20 - BYOD
Certified Wireless Security Professional (CWSP) Series
  • Course 01 - WLAN Security Overview
  • Course 02 - Legacy Security
  • Course 03 - Encryption Ciphers and Methods
  • Course 04 - 802.11 Authentication Methods
  • Course 05 - Dynamic Encryption Key Generation
  • Course 06 - SOHO 802.11 Security
  • Course 07 - Fast Secure Roaming
  • Course 08 - Wireless Security Risks
  • Course 09 - Wireless LAN Security Auditing
  • Course 10 - Wireless Security Monitoring
  • Course 11 - VPNs, Remote Access and Guest Access Services
  • Course 12 - WLAN Security Infrastructure
  • Course 13 - Wireless Security Policies
Certified Information Systems Auditor (CISA) Series
  • Course 01 - The Process of Auditing Information Systems
  • Course 02 - Governance and Management of IT
  • Course 03 - Information Systems Acquisition, Development and Implementation
  • Course 04 - Information Systems Operations, Maintenance and Support
  • Course 05 - Protection of Information Assets
Certified Information Security Manager (CISM) Series
  • Course 01 - Information Security Governance
  • Course 02 - Information Risk Management
  • Course 03 - Information Security Program Development
  • Course 04 - Information Security Incident Management
Certified Information Systems Risk Manager (CISRM) Series (Coming Soon)
  • Course 01 - The Big Picture
  • Course 02 - Risk Identification Assessment and Evaluation
  • Course 03 - Risk Response
  • Course 04 - Risk Monitoring
  • Course 05 - IS Control Design and Implementation
Certified Information Systems Security Officer (CISSO) Series*
  • *This entire course series is to be taken with CISSP for full certification exam prep
  • Course 01 - Risk Management
  • Course 02 - Security Management
  • Course 03 - Authentication
  • Course 04 - Access Control
  • Course 05 - Security Models
  • Course 06 - Operations Security
  • Course 07 - Symmetric Cryptography and Hashing
  • Course 08 - Asymmetric Cryptography and PKI
  • Course 09 - Network Connections
  • Course 10 - Network Protocols and Devices
  • Course 11 - Telephony, VPNs and Wireless
  • Course 12 - Security Architecture
  • Course 13 - Software Development Security
  • Course 14 - Database Security and System Development
  • Course 15 - Malware and Software Attacks
  • Course 16 - Business Continuity
  • Course 17 - Disaster Recovery
  • Course 18 - Incident Management, Law, and Ethics
  • Course 19 - Physical
Certified Information Systems Security Professional (CISSP) Series*
  • *This entire course series is to be taken with CISSO for full certification exam prep
  • Course 01 - Security and Risk Management
  • Course 02 - Asset Security
  • Course 03 - Security Engineering
  • Course 04 - Communication and Network Security
  • Course 05 - Identity and Access Management
  • Course 06 - Security Assessment and Testing
  • Course 07 - Security Operations
  • Course 08 - Software Development Security
Shon Harris Certified Information Systems Security Professional (CISSP) Series
  • Course 01 - Information Security and Risk Management
  • Course 02 - Access Control
  • Course 03 - Cryptography
  • Course 04 - Physical Security
  • Course 05 - Security Architecture and Design
  • Course 06 - Law, Investigation and Ethics
  • Course 07 - Telecommunications and Networking
  • Course 08 - Business Continuity
  • Course 09 - Application Security
  • Course 10 - Operations Security
Certified Disaster Recovery Engineer (CDRE) Series
  • Course 01 - Welcome to Disaster Recovery Training
  • Course 02 - Business Impact Analysis
  • Course 03 - Risk Analysis
  • Course 04 - BDP Strategies
  • Course 05 - IT Recovery Strategies
  • Course 06 - Implementation Phase
  • Course 07 - Testing and Exercise
  • Course 08 - Maintenance and Updating
  • Course 09 - Execution Phase
Certified Digital Forensics Examiner (CDFE) Series
  • Course 01 - Introduction
  • Course 02 - Computer Forensic Incidents
  • Course 03 - Investigation Process
  • Course 04 - Disk Storage Concepts
  • Course 05 - Digital Acquisition & Analysis
  • Course 06 - Forensic Examination Protocols
  • Course 07 - Digital Evidence Protocols
  • Course 08 - CFI Theory
  • Course 09 - Digital Evidence Presentation
  • Course 10 - Computer Forensic Laboratory Protocols
  • Course 11 - Computer Forensic Processing
  • Course 12 - Digital Forensics Reporting
  • Course 13 - Specialized Artifact Recovery
  • Course 14 - e-Discovery and ESI
  • Course 15 - Cell Phone Forensics
  • Course 16 - USB Forensics
  • Course 17 - Incident Handling
  • Course 18 - PDA Forensics
  • Course 19 - Investigating Harassment
Certified Incident Handling Engineer (CIHE) Series
  • Course 01 - Course Introduction
  • Course 02 - Threats, Vulnerabilities and Exploits
  • Course 03 - IH Preparation
  • Course 04 - Request Tracker for Incident Handling
  • Course 05 - Preliminary Response
  • Course 06 - Identification and Initial Response
  • Course 07 - Sysinternals
  • Course 08 - Containment
  • Course 09 - Eradication
  • Course 10 - Follow-up
  • Course 11 - Recovery
  • Course 12 - Virtualization Security
  • Course 13 - Malware Incident Handling
Ethical Hacker Series
  • Course 01 - Overview
  • Course 02 - Reconnaissance
  • Course 03 - Protocols
  • Course 04 - Windows Hacking
  • Course 05 - Attacking Web Technologies
  • Course 06 - Pen Testing Wireless Networks
Certified Professional Ethical Hacker (CPEH) Series
  • Course 01 - Security Fundamentals
  • Course 02 - Access Controls
  • Course 03 - Protocols
  • Course 04 - Cryptography
  • Course 05 - Why Vulnerability Assessments?
  • Course 06 - Vulnerability Tools of the Trade
  • Course 07 - Output Analysis and Reports
  • Course 08 - Reconnaisance, Enumeration and Scanning
  • Course 09 - Gaining Access
  • Course 10 - Maintaining Access
  • Course 11 - Covering Tracks
  • Course 12 - Malware
  • Course 13 - Buffer Overflows
  • Course 14 - Password Cracking

Basic Security Training

Digital Security Awareness Training for Business and Home Users Series
  • Course 00 - Course Overview
  • Course 01 - Types of Security Threats
  • Course 02 - Social Engineering
  • Course 03 - Identity Theft
  • Course 04 - Data Classification
  • Course 05 - Protecting Your Digital Information
  • Course 06 - Malware
  • Course 07 - Security from End-to-End
  • Course 08 - Piracy
  • Course 09 - Security Policies
  • Course 10 - Moving Forward


Information Security Training (Cont.)

Certified Penetration Testing Consultant (CPTC) Series
  • Course 01 - Packet Capturing
  • Course 02 - Layer 2 Attacks
  • Course 03 - Layer 3 Attacks on Cisco Based Infrastructures
  • Course 04 - Pivoting and Relays
  • Course 05 - IPv6 Attacks
  • Course 06 - VPN Attacks
  • Course 07 - Defeating SSL
  • Course 08 - IDS/IPS Evasion
Certified Penetration Testing Engineer (CPTE) Series
  • Course 01 - Logistics of Pen Testing
  • Course 02 - Linux Fundamentals
  • Course 03 - Information Gathering
  • Course 04 - Detecting Live Systems
  • Course 05 - Enumeration
  • Course 06 - Vulnerability Assessments
  • Course 07 - Malware Goes Undercover
  • Course 08 - Windows Hacking
  • Course 09 - Hacking UNIX/Linux
  • Course 10 - Advanced Exploitation Techniques
  • Course 11 - Pen Testing Wireless Networks
  • Course 12 - Networks, Sniffing and IDS
  • Course 13 - Injecting the Database
  • Course 14 - Attacking Web Technologies
  • Course 15 - Project Documentation
Certified Secure Web Application Engineer (CSWAE) Series
  • Course 01 - Web Application Security
  • Course 02 - Secure SDLC
  • Course 03 - OWASP TOP 10
  • Course 04 - Risk Management
  • Course 05 - Threat Modeling
  • Course 06 - Authentication and Authorization Attacks
  • Course 07 - Session Management
  • Course 08 - Security Architecture
  • Course 09 - Input Validation and Data Sanitization
  • Course 10 - AJAX Security
  • Course 11 - Insecurity Code Discovery and Mitigation
  • Course 12 - Application Mapping
  • Course 13 - Cryptography
  • Course 14 - Testing Methodologies
Certified Security Leadership Officer (CSLO) Series
  • Course 01 - Security Management
  • Course 02 - Risk Management
  • Course 03 - Encryption
  • Course 04 - Information Security - Access Control Concepts
  • Course 05 - Incident Handling and Evidence
  • Course 06 - Operations Security
  • Course 07 - Knowing Network Security
Certified Security Sentinel (CSS) Series
  • Course 01 - Basic Security
  • Course 02 - User Awareness
  • Course 03 - Implementing Countermeasures
  • Course 04 - Certified Security Sentinel
  • Course 05 - Using the Internet at Work
  • Course 06 - Accessing the Company's Network Through Your Assigned Computer
  • Course 07 - Accessing the Corporate Network Remotely
  • Course 08 - Social Engineering
  • Course 09 - Understanding and Manipulating our Target
  • Course 10 - Researching Our Target
Certified Vulnerability Assessor (CVA) Series
  • Course 01 - Why Vulnerability Assessment
  • Course 02 - Vulnerability Types
  • Course 03 - Assessing the Network
  • Course 04 - Assessing Web Servers & Applications
  • Course 05 - Assessing Remote & VPN Services
  • Course 06 - Vulnerability Assessment Tools of the Trade
  • Course 07 - Output Analysis
IS20 Controls Series
  • Course 01 - Inventory of Authorized and Unauthorized Devices
  • Course 02 - Inventory of Authorized and Unauthorized Software
  • Course 03 - Secure Configurations for Hardware and Software on Laptops, Workstations and Servers
  • Course 04 - Secure Configurations for Hardware Network Devices such as Firewalls, Routers and Switches
  • Course 05 - Boundary Defense
  • Course 06 - Maintenance, Monitoring, and Analysis of Audit Logs
  • Course 07 - Application Software Security
  • Course 08 - Controlled Use of Administrative Privileges
  • Course 09 - Controlled Access Based on Need to Know
  • Course 10 - Continuous Vulnerability Assessment and Remediation
  • Course 11 - Account Monitoring and Control
  • Course 12 - Malware Defenses
  • Course 13 - Limitation and Control of Network Ports, Protocols and Services
  • Course 14 - Wireless Device Control
  • Course 15 - Data Loss Prevention
  • Course 16 - Secure Network Engineering
  • Course 17 - Penetration Tests and Red Team Exercises
  • Course 18 - Incident Response Capability
  • Course 19 - Data Recovery Capability
  • Course 20 - Security Skills Assessment and Appropriate Training to Fill Gaps
ISCAP Series
  • Course 01 - Introduction to the Risk Management Framework
  • Course 02 - The Software Development Life Cycle
  • Course 03 - Categorize Information System
  • Course 04 - Select Security Controls
  • Course 05 - Implement Security Controls
  • Course 06 - Assess Security Controls
  • Course 07 - Authorize Information System
  • Course 08 - Monitor Security Controls
RESILIA™ Foundation Series
  • Course 01 - Introduction to RESILIA™ Foundation
  • Course 02 - Introduction to Cyber Resilience
  • Course 03 - Risk Management
  • Course 04 - Managing Cyber Resilience
  • Course 05 - RESILIA™ Foundation Summary
RESILIA™ Practitioner Series
  • Course 01 - Introduction to RESILIA™ Practitioner
  • Course 02 - Think Different
  • Course 03 - Risk Management
  • Course 04 - CSI Approach to Becoming Cyber Resilient
  • Course 05 - RESILIA™ Practitioner Summary


CompTIA Security Training

CompTIA Security+ Certification Series
  • Course 01 - Security Fundamentals
  • Course 02 - Identifying Security Threats and Vulnerabilities
  • Course 03 - Managing Data, Application, and Host Security
  • Course 04 - Implementing Network Security
  • Course 05 - Implementing Access Control, Authentication, and Account Management
  • Course 06 - Managing Certificates
  • Course 07 - Implementing Compliance and Operational Security
  • Course 08 - Risk Management
  • Course 09 - Troubleshooting and Managing Security Incidents
  • Course 10 - Business Continuity and Disaster Recovery Planning
CompTIA Advanced Security Practitioner (CASP) Series
  • Course 01 - The Enterprise Security Architecture
  • Course 02 - The Enterprise Security Technology
  • Course 03 - Enterprise Resource Technology
  • Course 04 - Security Design and Solutions
  • Course 05 - Managing Risk in Projects
  • Course 06 - Integrating Advanced Authentication and Authorization Techniques
  • Course 07 - Implementing Cryptographic Techniques
  • Course 08 - Integrating Hosts, Storage, Networks, and Applications in a Secure Enterprise Architecture
  • Course 09 - Security Research and Analysis
  • Course 10 - Disaster Recovery and Business Continuity
  • Course 11 - Responding to and Recovering from Incidents
  • Course 12 - Legal Issues
  • Course 13 - Judgment and Decision-Making


Return to Top

Legal