Discover a wide range of online cybersecurity classes to enhance your IT skills and protect against digital threats. Learn from expert instructors and gain the knowledge and confidence to safeguard sensitive data in today's digital world.
20 classes have spots left
Technical Institute of America @ Virtual Classroom
TIA is proud to present the world's first Ethical Hacking boot camp. This 12 week course will prepare students to enter the world of cyber security as a Certified Ethical Hacking. It will teach students from the bottom up all that they need to know about ethical hacking. Students will also earn over 8 of the industry's major certifications in the course. While most degree and diploma programs will focus on students how to secure networks, our...
Technical Institute of America @ Virtual Classroom
Take your expertise in IS/IT security to the next level with the Certified Information Security Manager (CISM) certification. Gain credibility and confidence as you transition from a team player to a manager. Enroll now and enhance your interactions with stakeholders, peers, and regulators.
Learn how to investigate, respond to, and hunt for threats using Microsoft Azure Sentinel, Azure Defender, and Microsoft 365 Defender in this hands-on course from TLG Learning. Develop the skills to mitigate cyber threats and configure Azure Sentinel while utilizing Kusto Query Language (KQL) for detection, analysis, and reporting. Prepare for the SC-200 exam and enhance your expertise in security operations.
Thousands of classes & experiences. No expiration. Gift an experience this holiday season and make it a memorable one. Lock in a price with the Inflation Buster Gift Card Price Adjuster™
Learn how to manage advanced threats. In this course, you will learn strategies in defense against advanced threats to better understand the threat landscape. You will learn the use of Palo Alto Networks next-generation firewalls, including the WildFire™ product. What You'll Learn Manage advanced threats using security policies, profiles, and signatures to protect networks against emerging threats Who Needs to Attend Firewall administrators...
Access Control, Authentication, and Public Key Infrastructure This course defines the components of access control, provides a business framework for implementation, and discusses legal requirements that impact access control programs. It looks at the risks, threats, and vulnerabilities prevalent in information systems and IT infrastructures and how to handle them. It provides learners a professional resource detailing how to put access control...
This course provides a unique, in-depth look at the major business challenges and threats that are introduced when an organization's network is connected to the public Internet. This course also provides a comprehensive explanation of network security basics, including how hackers access online networks and the use of Firewalls and VPNs to provide security countermeasures. In addition to premium instructional content from Jones & Bartlett Learning's...
In this course, you will learn about new risks, threats, and vulnerabilities associated with the transformation to a digital world, including a look at how business, government, and individuals operate today. You will also be provided with a high-level overview of each of the seven domains within the System Security Certified Practitioner certification. You will also be given additional material on information security standards, education, professional...
Investigate cybersecurity threats and master techniques needed to protect your network. In this cybersecurity course, you will gain a global perspective of the challenges of designing a secure system, touching on all the cyber roles needed to provide a cohesive security solution. Through lecture, labs, and breakout discussion groups, you will learn about current threat trends across the Internet and their impact on organizational security. You will...
Successful completion of this five-day, instructor-led course will enhance the student’s understanding of how to configure and manage Palo Alto Networks® next-generation firewalls. The student will learn and get hands-on experience configuring, managing, and monitoring a firewall in a lab environment. Intended Audience: Security engineers Security administrators Security operations specialists Security analysts Network engineers Support...
Certified Network Defender (CND) is a vendor-neutral, hands-on, instructor-led comprehensive network security certification training program. It is a skills-based, lab intensive program based on a job-task analysis and cybersecurity education framework presented by the National Initiative of Cybersecurity Education (NICE). CND has also received Department of Defense (DoD) Directive 8570 approval for several categories of baseline certifications....
This introductory course is the fastest way to get up to speed in information security. Written and taught by battle-scarred security veterans, this entry-level course covers a broad spectrum of security topics and is liberally sprinkled with real life examples. A balanced mix of technical and managerial issues makes this course appealing to attendees who need to understand the salient facets of information security basics and the basics of risk...
The Implementing Automation for Cisco Security Solutions (SAUI) v1.0 course teaches you how to design advanced automated security solutions for your network. Through a combination of lessons and hands-on labs, you will master the use of modern programming concepts, RESTful Application Program Interfaces (APIs), data models, protocols, firewalls, web, Domain Name System (DNS), cloud, email security, and Cisco Identity Services Engine (ISE) to strengthen...
This four-day information security training course teaches security professionals how to identify business requirements and turn those requirements into a highly functional, cost-effective information security management system. Led by an expert instructor, you will dive into the intricacies of managed security solutions. Examination of actual security incidents and real-word scenarios are used to understand how to apply those solutions and how to...
SonicWall Network Security Administration course provides students the required background, knowledge and hand-on experience to begin designing, implementing and troubleshooting SonicWall Network Security. Appliances running SonicOS firmware. The SNSA course and certification replaces the NSBA course and the CSSA certification. The NSBA course will End-of-Life on June 30th, 2018. The CSSA certification will continue to be valid for 2 years after...
The CEH (v10) has updated the modules from CEH (v9) on various important aspects of Cybersecurity- Vulnerability analysis, IoT devices, Attack vectors and Malware analysis. There is also added emphasis on penetration testing tools. Throughout the course, you’ll essentially use the same techniques that the “bad guys” use, including social engineering practices and even evaluating physical security to gain access. Gain knowledge in the methodologies...
Palo Alto Panorama 9.0: Managing Firewalls at Scale (EDU-220) In this course, you will learn how to configure and manage the Palo Alto Networks Panorama Management Server. You will learn about Panorama's aggregated reporting, which will provide you with a holistic view of a network of Palo Alto Networks next-generation firewalls. Upon completion of this course, you will understand the Panorama server's role in managing and securing your overall...
Palo Alto Firewall 9.0: Essentials, Configuration and Management This course enhances the student’s understanding of how to configure and manage Palo Alto Networks next-generation firewalls. The student will learn and get hands-on experience configuring, managing, and monitoring a firewall in a lab environment. Course Objectives Configure and manage the essential features of Palo Alto Networks next-generation firewalls Configure and manage...
The Palo Alto Networks Firewall: Troubleshooting course is three days of instructor-led training that will help you: Use firewall tools, including the CLI, to investigate networking issues Follow proven troubleshooting methodologies that are specific to individual features Analyze advanced logs to resolve various real-life scenarios Solve advanced, scenario-based challenges Course Objectives Successful completion of this three-day,...
New Horizons Computer Learning
The Web Application Penetration Testing Boot Camp focuses on preparing students for the real world of Web App Pen Testing through extensive lab exercises, thought provoking lectures led by an expert instructor. We review of the entire body of knowledge as it pertains to web application pen testing through a high-energy seminar approach. Who Should Attend This course is a technical security course targeted at IT Security Professionals, Security...
New Horizons Computer Learning
In this course, students will learn EC-Council's Licensed Penetrations Tester (LPT), a natural evolution and extended value addition to its series of security related professional certifications. Course Outline: 1 - Security Analysis and Penetration Testing Methodologies 2 - TCP IP Packet Analysis 3 - Pre-penetration Testing Steps 4 - Information Gathering Methodology 5 - Vulnerability Analysis 6 - External Network Penetration Testing Methodology...
Try removing some filters.
Cybersecurity Training Online are rated 4.2 stars based on 678 verified reviews from actual CourseHorse.com purchasers.
Secure your booking now and we'll match any price drop within 48 hours across all booking platforms, ensuring you never miss out on savings!
Maximize your savings with every purchase. Unlock rewards on every transaction, ensuring you get the most value out of your experience!
Enjoy hassle-free transactions without worrying about additional charges. With us, what you see is what you pay - no surprises!
Discover a curated selection of courses handpicked by experts in the field. Dive into quality content that suits your learning needs and interests!
More in IT
Get special date and rate options for your group. Submit the form below and we'll get back to you within 2 business hours with pricing and availability.