What’s popular in security
Your source for what’s next
Popular books
See allPopular in live online training
See allJune 8, 2022
Combating Cyber Attacks
Presented by Ron Taylor
The Top 10 most effective defensive tactics to help you combat cyber attacks Nobody wants to be hit with ransomware or to find their name all over the media because they ...

June 1, 2022
Istio on Kubernetes: Enter the Service Mesh
Presented by Burr Sutter
For Kubernetes-experienced Developers, hands-on with Istio Service Mesh The first generation of microservices was primarily shaped by Netflix OSS and leveraged by numerous Spring Cloud annotations sprinkled all throughout your business ...

June 15 & 16, 2022
Hands-On Cybersecurity Operations Fundamentals
Presented by Ron Taylor
Demystifying CyberOps This course is a comprehensive two-day training for anyone interested in the field of Security Operations or CyberOps. It is meant to give you the core knowledge you need ...

July 5, 12, 19 & 26, 2022
CISSP Management Domains in 4 Weeks: Preparing for the 2021 exam
Presented by Dean Bushmiller
Preparing for the CISSP exam's management domains The Certified Information Systems Security Professional (CISSP) is the gold standard of vendor-neutral cybersecurity certifications. It proves you understand cybersecurity from a management viewpoint ...

May 31, 2022
Cybersecurity Frameworks in 90 Minutes
Presented by Harpreet Kohli
Learn to manage and reduce your cybersecurity risk A cybersecurity framework is a series of documents defining the best practices an organization should follow to manage and reduce its cybersecurity risk. ...

June 2 & 3, 2022
Modern Cybersecurity Fundamentals
Presented by Omar Santos
Cybersecurity is a growing field. The number of cyberattacks continues to rise and demand for safe and secure data, and other concerns means that both companies need professionals need to keep ...

Popular in interactive learning
See allSoftware Engineering Fundamentals: Spot the Bugs
By Nathaniel Schutta
Examining code for bugs ...
Ethical Hacking: Introducing Network and Port Scanning using Nmap
By Omar Santos, Derek Santos
The first step in any cyber-attack will always be reconnaissance. Reconnaissance and information gathering is essential when piecing together and formulating an attack. From an attacker's perspective, there are two major ...