Command Line Basics Cyber Range
Cyber range | 10 labs
Gain practical experience and develop your command line skills through 10 hands-on labs in the Command Line Basics Cyber Range.
Identification and AAA
Course | 16 minutes
Learn about one of the most important information security concepts related to access management: identification, authentication, authorization and accounting (IAAA).
Access Control Fundamentals
Course | 21 minutes
Explore the essential concepts of access control in this four-video course covering access control models, implementation, concepts and enforcement.
Secure Network Design
Course | 14 minutes
Lean the basics of designing secure networks, from an overview of network topologies to foundational security concepts such as segmentation and isolation.
Hardware and OS Security
Course | 16 minutes
Gain an entry-level understanding of essential hardware, firmware and operating system security concepts in this three-video introductory course.
Software and Application Security
Course | 23 minutes
Learn the basics of secure software and application development, including secure staging, secure coding techniques, and code quality and testing.
Physical Security
Course | 9 minutes
Discover how common physical and environment security controls relate to information security in this brief overview course.
Introduction to Cryptography
Course | 30 minutes
Build a baseline of cryptography knowledge as you progress through this nine-video course covering essential cryptography concepts and use cases.
Risk Management Concepts
Course | 23 minutes
Learn the key concepts related to risk management, including policies and procedures, business impact analysis, and threat and risk assessments.
Business Continuity and Disaster Recovery
Course | 12 minutes
Learn the planning, procedures and concepts that go into business continuity and disaster recovery in this introductory course.
Introduction to Security Controls
Course | 17 minutes
Get an overview of common security control categories and types, and learn about important concepts such as data sanitation and data sensitivity.
Threats and Threat Actors
Course | 1 hour
Build your knowledge of popular threats, including malware and social engineering as well as application, wireless and cryptographic attacks.
Introduction to Incident Response
Course | 56 minutes
Get on overview of incident response, including how to respond to security incidents and common incident response definitions and concepts.
Networking Fundamentals
Course | 31 minutes
Build a foundational knowledge of networking in this overview course covering key networking concepts and practices.
Command Line Basics Cyber Range
Cyber range | 10 labs
Gain practical experience and develop your command line skills through 10 hands-on labs in the Command Line Basics Cyber Range.
Identification and AAA
Course | 16 minutes
Learn about one of the most important information security concepts related to access management: identification, authentication, authorization and accounting (IAAA).
Access Control Fundamentals
Course | 21 minutes
Explore the essential concepts of access control in this four-video course covering access control models, implementation, concepts and enforcement.
Secure Network Design
Course | 14 minutes
Lean the basics of designing secure networks, from an overview of network topologies to foundational security concepts such as segmentation and isolation.
Hardware and OS Security
Course | 16 minutes
Gain an entry-level understanding of essential hardware, firmware and operating system security concepts in this three-video introductory course.
Software and Application Security
Course | 23 minutes
Learn the basics of secure software and application development, including secure staging, secure coding techniques, and code quality and testing.
Physical Security
Course | 9 minutes
Discover how common physical and environment security controls relate to information security in this brief overview course.
Introduction to Cryptography
Course | 30 minutes
Build a baseline of cryptography knowledge as you progress through this nine-video course covering essential cryptography concepts and use cases.
Risk Management Concepts
Course | 23 minutes
Learn the key concepts related to risk management, including policies and procedures, business impact analysis, and threat and risk assessments.
Business Continuity and Disaster Recovery
Course | 12 minutes
Learn the planning, procedures and concepts that go into business continuity and disaster recovery in this introductory course.
Introduction to Security Controls
Course | 17 minutes
Get an overview of common security control categories and types, and learn about important concepts such as data sanitation and data sensitivity.
Threats and Threat Actors
Course | 1 hour
Build your knowledge of popular threats, including malware and social engineering as well as application, wireless and cryptographic attacks.
Introduction to Incident Response
Course | 56 minutes
Get on overview of incident response, including how to respond to security incidents and common incident response definitions and concepts.
Networking Fundamentals
Course | 31 minutes
Build a foundational knowledge of networking in this overview course covering key networking concepts and practices.