Product Catalog

The training platform features a library of self-paced, virtual courses combining instructional lecture with hands-on lab work. Each course offers a focused, deep dive into a specialized area of cybersecurity and ranges in length from 2 to 16 hours. Courses are available at varying levels of complexity: Beginner, Practitioner, Advanced and Bridge to Security Management.

Additional Firewall Setup

Add rules to protect your specific network devices from potential threats.

intermediate

Protect

Chrome Extension Testing

Test Chrome extensions for security flaws!

intermediate

Detect

Cleaning Up After an Attack

Learn how to ensure no backdoors or additional compromises exist on a system after an attack.

intermediate

Recover

Cyber Hunt

Test your red team and blue team skills in this capture-the-flag style challenge.

intermediate

All domains

Data Leakage

Students will interact with a username and password leak from a web app.

intermediate

Identify

Generating and Analyzing Logs

Generate nefarious logs and use tools to analyze.

intermediate

Respond

Implementing Database Management

Learn to manage and create SQL databases.

intermediate

Identify

Initializing Honeypots

Learn about honeypot implementation.

intermediate

Detect

Introduction to Forensics Recovery

Investigate a possible data breach in your company.

intermediate

Recover

Intrusion Detection System Implementation and Testing

Get familiar with Security Onion and its functions!

intermediate

Detect

Linux Baseline with Lynis

Conduct audits of Linux systems!

intermediate

Identify

Man-in-the-Middle Detection

Students taking this course will learn how to detect when a potential MitM attack is occurring.

intermediate

Detect

Mobile Forensics

Mobile forensics is similar to computer forensics but there are a few nuances to the task.

intermediate

Recover

Packet Construction and Kernel Hardening

Analyze a flood script built with Scapy

intermediate

Protect

Passive Computer Forensics

Identify critical data using passive computer forensic techniques!

intermediate

All domains

Script Construction and Execution

Gain an understanding of bash scripting and batch file execution!

intermediate

Identify

Spectre and Meltdown Mitigation

Learn how to spot and mitigate the Spectre and Meltdown!

intermediate

Detect

Testing Intrusion Detection Systems

This lab will teach students how to create Snort rules for web-based attacks and how to manage alerts in Sguil.

intermediate

Protect

Threat Detection

Implement typical network diagnostic tools to determine the type of issue an end user is having.

intermediate

Detect

Threat Identification and Detection

Students will experience a situation where a former employee poses a serious threat to the company network.

intermediate

Detect

Triaging Incidents

Categorize network security incidents!

intermediate

Respond

Updating Firewall Rules

In this course, students learn how to change firewall rules to block unacceptable traffic.

intermediate

Protect