Most popular
PECB Certified ISO/IEC 27001 Lead Auditor eLearning Training Course
23 Lessons
Intermediate
What you'll learn
Understand the operations of an Information Security Management System based on ISO/IEC 27001
Acknowledge the correlation between ISO/IEC 27001, ISO/IEC 27002, and other standards and regulatory frameworks
Understand an auditor’s role to plan, lead, and follow-up on a management system audit in accordance with ISO 19011
Learn how to lead an audit and audit team
Learn how to interpret the requirements of ISO/IEC 27001 in the context of an ISMS audit
Acquire the competencies of an auditor to plan an audit, lead an audit, draft reports, and follow-up on an audit in compliance with ISO 19011
C)IHE – Certified Incident Handling Engineer eLearning
26 Lessons
40 hours
Intermediate
CISM eLearning
17 Lessons
Intermediate
What you'll learn
Establish and/or maintain an information security governance framework and supporting processes to ensure that the information security strategy is aligned with organizational goals and objectives.
Manage information risk to an acceptable level based on risk appetite to meet organizational goals and objectives.
Develop and maintain an information security program that identifies, manages and protects the organization’s assets while aligning to information security strategy and business goals, thereby supporting an effective security posture.
Plan, establish and manage the capability to detect, investigate, respond to and recover from information security incidents to minimize business impact.
Certified Ethical Hacker | CEH eLearning
20 Lessons
16 hours
All Levels
What you'll learn
Information security controls, laws, and standards.
Various types of footprinting, footprinting tools, and countermeasures.
Network scanning techniques and scanning countermeasures
Enumeration techniques and enumeration countermeasures
Vulnerability analysis to identify security loopholes in the target organization’s network, communication infrastructure, and end systems.
System hacking methodology, steganography, steganalysis attacks, and covering tracks to discover system and network vulnerabilities.
Different types of malware (Trojan, Virus, worms, etc.), system auditing for malware attacks, malware analysis, and countermeasures.
Packet sniffing techniques to discover network vulnerabilities and countermeasures to defend against sniffing.
Social engineering techniques and how to identify theft attacks to audit human-level vulnerabilities and social engineering countermeasures.
DoS/DDoS attack techniques and tools to audit a target and DoS/DDoS countermeasures.
Session hijacking techniques to discover network-level session management, authentication/authorization, and cryptographic weaknesses and countermeasures.
Webserver attacks and a comprehensive attack methodology to audit vulnerabilities in webserver infrastructure, and countermeasures.
Web application attacks, comprehensive web application hacking methodology to audit vulnerabilities in web applications, and countermeasures.
SQL injection attack techniques, injection detection tools to detect SQL injection attempts, and countermeasures.
Wireless encryption, wireless hacking methodology, wireless hacking tools, and Wi-Fi security tools.
Mobile platform attack vector, android vulnerability exploitations, and mobile security guidelines and tools.
Firewall, IDS and honeypot evasion techniques, evasion tools and techniques to audit a network perimeter for weaknesses, and countermeasures.
Cloud computing concepts (Container technology, serverless computing), the working of various threats and attacks, and security techniques and tools.
Penetration testing, security audit, vulnerability assessment, and penetration testing roadmap.
Threats to IoT and OT platforms and defending IoT and OT devices.
Cryptography ciphers, Public Key Infrastructure (PKI), cryptography attacks, and cryptanalysis tools.
C)PEH – Certified Professional Ethical Hacker eLearning
17 Lessons
40 hours
Intermediate
What you'll learn
Upon completion, the Certified Professional Ethical Hacker candidate will be able to competently take the C)PEH exam.
C)DRE – Certified Disaster Recovery Engineer eLearning
10 Lessons
32 hours
Intermediate
What you'll learn
Upon completion, Certified Disaster Recovery Engineer students will be able to establish industry acceptable DR & BCP standards with current best practices and policies.
Students will also be prepared to competently take the C)DRE exam.
CISSP (Certified Information Systems Security Professional) Exam Prep
Intermediate
What you'll learn
Understand and apply fundamental concepts and methods related to the fields of information technology and security.
Align overall organizational operational goals with security functions and implementations.
Understand how to protect assets of the organization as they go through their lifecycle.
Understand the concepts, principles, structures, and standards used to design, implement, monitor, and secure operating systems, equipment, networks, applications, and those controls used to enforce various levels of confidentiality, integrity, and availability.
Implement system security through the application of security design principals and the application of appropriate security control mitigations for vulnerabilities present in common information system types and architectures.
Understand the importance of cryptography and the security services it can provide in today’s digital and information age.
Understand the impact of physical security elements on information system security and apply secure design principals to evaluate or recommend appropriate physical security protections.
Understand the elements that comprise communication and network security coupled with a thorough description of how the communication and network systems function.
List the concepts and architecture that define the associated technology and implementation systems and protocols at Open Systems Interconnection (OSI) model layers 1–7.
Identify standard terms for applying physical and logical access controls to environments related to their security practice.
Appraise various access control models to meet business security requirements.
Name primary methods for designing and validating test and audit strategies that support business requirements.
Enhance and optimize an organization’s operational function and capacity by applying and utilizing appropriate security controls and countermeasures.
Recognize risks to an organization’s operational endeavors, and assess specific threats, vulnerabilities, and controls.
Understand the System Lifecycle (SLC) and the Software Development Lifecycle (SDLC) and how to apply security to it, and identify which security control(s) are appropriate for the development environment, and assess the effectiveness of software security.
C)PTE – Certified Penetration Testing Engineer eLearning
28 Lessons
40 hours
Intermediate
Trending
C)IHE – Certified Incident Handling Engineer eLearning
26 Lessons
40 hours
Intermediate
CISM eLearning
17 Lessons
Intermediate
What you'll learn
Establish and/or maintain an information security governance framework and supporting processes to ensure that the information security strategy is aligned with organizational goals and objectives.
Manage information risk to an acceptable level based on risk appetite to meet organizational goals and objectives.
Develop and maintain an information security program that identifies, manages and protects the organization’s assets while aligning to information security strategy and business goals, thereby supporting an effective security posture.
Plan, establish and manage the capability to detect, investigate, respond to and recover from information security incidents to minimize business impact.
Certified Ethical Hacker | CEH eLearning
20 Lessons
16 hours
All Levels
What you'll learn
Information security controls, laws, and standards.
Various types of footprinting, footprinting tools, and countermeasures.
Network scanning techniques and scanning countermeasures
Enumeration techniques and enumeration countermeasures
Vulnerability analysis to identify security loopholes in the target organization’s network, communication infrastructure, and end systems.
System hacking methodology, steganography, steganalysis attacks, and covering tracks to discover system and network vulnerabilities.
Different types of malware (Trojan, Virus, worms, etc.), system auditing for malware attacks, malware analysis, and countermeasures.
Packet sniffing techniques to discover network vulnerabilities and countermeasures to defend against sniffing.
Social engineering techniques and how to identify theft attacks to audit human-level vulnerabilities and social engineering countermeasures.
DoS/DDoS attack techniques and tools to audit a target and DoS/DDoS countermeasures.
Session hijacking techniques to discover network-level session management, authentication/authorization, and cryptographic weaknesses and countermeasures.
Webserver attacks and a comprehensive attack methodology to audit vulnerabilities in webserver infrastructure, and countermeasures.
Web application attacks, comprehensive web application hacking methodology to audit vulnerabilities in web applications, and countermeasures.
SQL injection attack techniques, injection detection tools to detect SQL injection attempts, and countermeasures.
Wireless encryption, wireless hacking methodology, wireless hacking tools, and Wi-Fi security tools.
Mobile platform attack vector, android vulnerability exploitations, and mobile security guidelines and tools.
Firewall, IDS and honeypot evasion techniques, evasion tools and techniques to audit a network perimeter for weaknesses, and countermeasures.
Cloud computing concepts (Container technology, serverless computing), the working of various threats and attacks, and security techniques and tools.
Penetration testing, security audit, vulnerability assessment, and penetration testing roadmap.
Threats to IoT and OT platforms and defending IoT and OT devices.
Cryptography ciphers, Public Key Infrastructure (PKI), cryptography attacks, and cryptanalysis tools.
C)PEH – Certified Professional Ethical Hacker eLearning
17 Lessons
40 hours
Intermediate
What you'll learn
Upon completion, the Certified Professional Ethical Hacker candidate will be able to competently take the C)PEH exam.
C)DRE – Certified Disaster Recovery Engineer eLearning
10 Lessons
32 hours
Intermediate
What you'll learn
Upon completion, Certified Disaster Recovery Engineer students will be able to establish industry acceptable DR & BCP standards with current best practices and policies.
Students will also be prepared to competently take the C)DRE exam.
CISSP (Certified Information Systems Security Professional) Exam Prep
Intermediate
What you'll learn
Understand and apply fundamental concepts and methods related to the fields of information technology and security.
Align overall organizational operational goals with security functions and implementations.
Understand how to protect assets of the organization as they go through their lifecycle.
Understand the concepts, principles, structures, and standards used to design, implement, monitor, and secure operating systems, equipment, networks, applications, and those controls used to enforce various levels of confidentiality, integrity, and availability.
Implement system security through the application of security design principals and the application of appropriate security control mitigations for vulnerabilities present in common information system types and architectures.
Understand the importance of cryptography and the security services it can provide in today’s digital and information age.
Understand the impact of physical security elements on information system security and apply secure design principals to evaluate or recommend appropriate physical security protections.
Understand the elements that comprise communication and network security coupled with a thorough description of how the communication and network systems function.
List the concepts and architecture that define the associated technology and implementation systems and protocols at Open Systems Interconnection (OSI) model layers 1–7.
Identify standard terms for applying physical and logical access controls to environments related to their security practice.
Appraise various access control models to meet business security requirements.
Name primary methods for designing and validating test and audit strategies that support business requirements.
Enhance and optimize an organization’s operational function and capacity by applying and utilizing appropriate security controls and countermeasures.
Recognize risks to an organization’s operational endeavors, and assess specific threats, vulnerabilities, and controls.
Understand the System Lifecycle (SLC) and the Software Development Lifecycle (SDLC) and how to apply security to it, and identify which security control(s) are appropriate for the development environment, and assess the effectiveness of software security.
C)PTE – Certified Penetration Testing Engineer eLearning
28 Lessons
40 hours
Intermediate
C)SWAE – Certified Secure Web Applications Engineer eLearning
13 Lessons
40 hours
Intermediate
What you'll learn
Upon completion, Certified Secure Web Application Engineer students will be able to establish industry acceptable auditing standards with current best practices and policies.
Students will also be prepared to competently take the C)SWAE exam.
All Cybersecurity Courses
Cybersecurity Online Training Courses - E-Learning
Filter by Vendor
We found 42 courses available for you
CompTIA Cybersecurity Analyst (CySA+) eLearning Bundle
23 Lessons
Intermediate
CertMaster Learn+Labs Details What is CertMaster Learn integrated with CompTIA …
$1,299.00
CompTIA Security+ eLearning Bundle
59 Lessons
Beginner
CertMaster Learn Details What is CertMaster Learn? CertMaster Learn is …
$1,299.00