What’s popular in security
Your source for what’s next
Popular books
See allPopular in live online training
See allJune 8, 2022
Combating Cyber Attacks
Presented by Ron Taylor
The Top 10 most effective defensive tactics to help you combat cyber attacks Nobody wants to be hit with ransomware or to find their name all over the media because they ...

June 15 & 16, 2022
Hands-On Cybersecurity Operations Fundamentals
Presented by Ron Taylor
Demystifying CyberOps This course is a comprehensive two-day training for anyone interested in the field of Security Operations or CyberOps. It is meant to give you the core knowledge you need ...

July 5, 12, 19 & 26, 2022
CISSP Management Domains in 4 Weeks: Preparing for the 2021 exam
Presented by Dean Bushmiller
Preparing for the CISSP exam's management domains The Certified Information Systems Security Professional (CISSP) is the gold standard of vendor-neutral cybersecurity certifications. It proves you understand cybersecurity from a management viewpoint ...

July 5, 12, 19 & 26, 2022
The Ultimate Offensive Security and Hacker Bootcamp in 4 Weeks
Presented by Omar Santos
Bug Hunting, Recon, Cloud and DevOps Automation, and More Taught by experienced author and trainer Omar Santos Real-world cyber labs in every section Learn how to defend in the cloud and ...

June 7, 2022
Introduction to encryption
Presented by Michael Pound
A hands-on course on applying symmetric and asymmetric encryption Encryption is arguably the most important privacy-preserving technology available today, protecting our data and our intellectual property. In this hands-on three-hour course, ...

June 30, 2022
Web Application Security Fundamentals
Presented by Ming Chow
With the advent of web application frameworks, the cloud, and containers, web app development has never been more accessible. Yet web applications have become more complexâoffering a much larger attack surface. ...

Popular in interactive learning
See allSoftware Engineering Fundamentals: Spot the Bugs
By Nathaniel Schutta
Examining code for bugs ...
Ethical Hacking: Introducing Network and Port Scanning using Nmap
By Omar Santos, Derek Santos
The first step in any cyber-attack will always be reconnaissance. Reconnaissance and information gathering is essential when piecing together and formulating an attack. From an attacker's perspective, there are two major ...