Skip to main content

Start building the foundational knowledge that will help guide you on your cyber career path.

Entry-level Cybersecurity Learning

If you’re entering the field for the first time, use these introductory learning resources to explore the cybersecurity areas of focus that fit your interests and professional goals.

AI Courses

AI for Cybersecurity

DELIVERY METHOD: ON-DEMAND | TIME: 2 HOURS | CPE: 2 | EXPERIENCE: VIDEO AND TEXT-BASED CONTENT + CASE STUDIES + KNOWLEDGE CHECKS | PROFICIENCY LEVEL: FOUNDATIONAL | LANGUAGE: ENGLISH | KNOWLEDGE AREA: OPERATIONS

Develop a foundational understanding of cybersecurity applications of AI by exploring the evolving implications of both traditional and AI-specific security approaches for AI attacks, mitigation and threat tools.

Foundations of AI

DELIVERY METHOD: ON-DEMAND | TIME: 2 HOURS | CPE: 2 | EXPERIENCE: VIDEO AND TEXT-BASED CONTENT + CASE STUDIES + KNOWLEDGE CHECKS | PROFICIENCY LEVEL: FOUNDATIONAL | LANGUAGE: ENGLISH | KNOWLEDGE AREA: OPERATIONS

Learn to define and articulate a comprehensive definition of AI, become familiar with various AI terminologies and technologies, and understand the applications and implementation impacts of AI.


Non-Technical Career Development Express Courses

Building Your Personal Brand and Digital Presence

DELIVERY METHOD: ON-DEMAND | TIME: 1 HOUR | EXPERIENCE: VIDEO | CPE: 1 | PROFICENCY LEVEL: FOUNDATIONAL | LANGUAGE: ENGLISH | KNOWLEDGE AREA: NON-TECHNICAL

Stand out in the digital landscape and advance your cybersecurity career with confidence. We’ll explore how to develop a compelling personal brand statement, leverage social media and create a consistent and authentic online presence.

Identifying and Building Your Network

DELIVERY METHOD: ON-DEMAND | TIME: 1 HOUR | EXPERIENCE: VIDEO | CPE: 1 | PROFICENCY LEVEL: FOUNDATIONAL | LANGUAGE: ENGLISH | KNOWLEDGE AREA: NON-TECHNICAL

Learn how to leverage professional networking to enhance your cybersecurity career trajectory and achieve lasting success. Get connected to the hidden job market, insider industry trends and potential collaborators by maintaining a proactive, authentic approach.

Identifying Your Cyber Path and Industry

DELIVERY METHOD: ON-DEMAND | TIME: 1 HOUR | EXPERIENCE: VIDEO | CPE: 1 | PROFICENCY LEVEL: FOUNDATIONAL | LANGUAGE: ENGLISH | KNOWLEDGE AREA: NON-TECHNICAL

Whether you’re a recent graduate, a tech enthusiast or a professional seeking a career shift, discover your place in the world of cybersecurity and unlock your potential. Explore a wide range of roles, specializations and emerging trends in cybersecurity as you chart your course.

Managing the Offer and Negotiation Process

DELIVERY METHOD: ON-DEMAND | TIME: 1 HOUR | EXPERIENCE: VIDEO | CPE: 1 | PROFICENCY LEVEL: FOUNDATIONAL | LANGUAGE: ENGLISH | KNOWLEDGE AREA: NON-TECHNICAL

Learn how to evaluate job offers, develop effective negotiation strategies and facilitate a seamless integration into new positions. Empower your career decisions and unlock your full potential in the cybersecurity job market.

Nailing the Interview Process

DELIVERY METHOD: ON-DEMAND | TIME: 1 HOUR | EXPERIENCE: VIDEO | CPE: 1 | PROFICENCY LEVEL: FOUNDATIONAL | LANGUAGE: ENGLISH | KNOWLEDGE AREA: NON-TECHNICAL

Excel in every stage of the interview process and in any interview scenario, no matter where you are in your career. Learn actionable strategies and insider tips that will help you stand out from the competition and secure your ideal cybersecurity job.

Resume/CV/Portfolio Building and Management

DELIVERY METHOD: ON-DEMAND | TIME: 1 HOUR | EXPERIENCE: VIDEO | CPE: 1 | PROFICENCY LEVEL: FOUNDATIONAL | LANGUAGE: ENGLISH | KNOWLEDGE AREA: NON-TECHNICAL

Identify the critical components of standout documents that showcase your unique strengths and value to employers. Learn the key differences between resumes and CVs, how to optimize each for specific opportunities and how to craft a professional portfolio with impact.


Protecting Data Using Zero Trust Courses

Continuous Monitoring and Incident Response for Zero Trust

DELIVERY METHOD: ON-DEMAND | TIME: 1 HOUR | EXPERIENCE: VIDEO | CPE: 1 | PROFICENCY LEVEL: FOUNDATIONAL | LANGUAGE: ENGLISH | KNOWLEDGE AREA: OPERATIONS

Understand the necessity for real-time collection, analysis and assessment of data from various sources to identify potential security incidents, anomalies and threats. Learn key aspects of implementing continuous monitoring and incident response within a zero trust framework, including the integration of security information and event management (SIEM) systems, automated threat intelligence feeds and orchestrated incident response workflows.

Defining the Boundaries of Zero Trust

DELIVERY METHOD: ON-DEMAND | TIME: 2 HOURS | EXPERIENCE: VIDEO | CPE: 2 | PROFICENCY LEVEL: FOUNDATIONAL | LANGUAGE: ENGLISH | KNOWLEDGE AREA: OPERATIONS

Review the principles and requirements necessary to transition from the traditional approach of perimeter-based security to a security operating model focused on granular trust relationships that are business-enabling and data-centric. Throughout your learning, you will identify the importance of continual and vigilant analysis of the entire ecosystem; the requirements of specific models, business needs and use cases; and the necessary components to implement in the context of zero trust.

Vulnerability Management in Zero Trust

DELIVERY METHOD: ON-DEMAND | TIME: 1 HOUR | EXPERIENCE: VIDEO | CPE: 1 | PROFICENCY LEVEL: FOUNDATIONAL | LANGUAGE: ENGLISH | KNOWLEDGE AREA: OPERATIONS

Explore vulnerability management as a crucial component in cybersecurity operations, specifically in zero trust architecture (ZTA). You’ll learn essential principles and best practices, such as asset discovery, risk-based trust assessment and integration with zero trust policy enforcement mechanisms. This course also reviews the identification, assessment, prioritization and remediation of vulnerabilities unique to zero trust implementation to maintain a robust security posture.