Most popular
PECB Certified ISO/IEC 27001 Lead Auditor eLearning Training Course
23 Lessons
Intermediate
What you'll learn
Understand the operations of an Information Security Management System based on ISO/IEC 27001
Acknowledge the correlation between ISO/IEC 27001, ISO/IEC 27002, and other standards and regulatory frameworks
Understand an auditor’s role to plan, lead, and follow-up on a management system audit in accordance with ISO 19011
Learn how to lead an audit and audit team
Learn how to interpret the requirements of ISO/IEC 27001 in the context of an ISMS audit
Acquire the competencies of an auditor to plan an audit, lead an audit, draft reports, and follow-up on an audit in compliance with ISO 19011
Certified Chief Information Security Officer | CCISO eLearning
16 Lessons
All Levels
What you'll learn
Domain 1: Governance and Risk Management
Domain 2: Information Security Controls, Compliance, and Audit Management
Domain 3: Security Program Management & Operations
Domain 4: Information Security Core Competencies
Domain 5: Strategic Planning, Finance, Procurement and Vendor Management
PECB Certified ISO 31000 Risk Manager eLearning Training Course
14 Lessons
Intermediate
What you'll learn
Understand the risk management concepts, approaches, methods, and techniques
Learn how to establish a risk management framework in the context of an organization
Learn how to apply the ISO 31000 risk management process in an organization
Understand the basic approaches, methods, and practices used to integrate risk management in an organization
C)ISSM – Certified Information Systems Security Manager eLearning
5 Lessons
32 hours
Intermediate
What you'll learn
Upon completion, Certified IS Security Manager students will have a strong foundation in Cyber Security & IS management standards with current best practices.
Student will be prepared to competently take the C)ISSM exam.
CompTIA Cybersecurity Analyst (CySA+) eLearning Bundle
23 Lessons
Intermediate
Certified Penetration Testing Professional | CPENT eLearning
14 Lessons
24 hours
All Levels
C)ISRM – Certified IS Risk Manager eLearning
5 Lessons
32 hours
Intermediate
What you'll learn
Upon completion, Certified Information Systems Risk Manager students will be prepared to pass the C)ISRM exam.
Trending
Certified Network Defender | CND eLearning
20 Lessons
All Levels
Certified Encryption Specialist | ECES eLearning
5 Lessons
24 hours
Intermediate
What you'll learn
Types of Encryption Standards and their differences
How to select the best standard for your organization
How to enhance your pen-testing knowledge in encryption
Correct and incorrect deployment of encryption technologies
Common mistakes made in implementing encryption technologies
Best practices when implementing encryption technologies
C)ISSA – Certified Information Systems Security Auditor eLearning
12 Lessons
40 hours
Intermediate
What you'll learn
Upon completion, Certified Information Systems Security Auditor students will be able to establish industry acceptable Cyber Security & IS management standards with current best practices.
Students will be prepared to competently take the C)ISSA exam.
CISA eLearning
48 Lessons
Intermediate
What you'll learn
Gain a better understanding of IS audit and assurance guidelines and standards.
Develop a working knowledge of the five domains of CISA.
Certified Incident Handler | CIH eLearning
9 Lessons
24 hours
All Levels
C)IHE – Certified Incident Handling Engineer eLearning
26 Lessons
40 hours
Intermediate
CISM eLearning
17 Lessons
Intermediate
What you'll learn
Establish and/or maintain an information security governance framework and supporting processes to ensure that the information security strategy is aligned with organizational goals and objectives.
Manage information risk to an acceptable level based on risk appetite to meet organizational goals and objectives.
Develop and maintain an information security program that identifies, manages and protects the organization’s assets while aligning to information security strategy and business goals, thereby supporting an effective security posture.
Plan, establish and manage the capability to detect, investigate, respond to and recover from information security incidents to minimize business impact.
Certified Ethical Hacker | CEH eLearning
20 Lessons
16 hours
All Levels
What you'll learn
Information security controls, laws, and standards.
Various types of footprinting, footprinting tools, and countermeasures.
Network scanning techniques and scanning countermeasures
Enumeration techniques and enumeration countermeasures
Vulnerability analysis to identify security loopholes in the target organization’s network, communication infrastructure, and end systems.
System hacking methodology, steganography, steganalysis attacks, and covering tracks to discover system and network vulnerabilities.
Different types of malware (Trojan, Virus, worms, etc.), system auditing for malware attacks, malware analysis, and countermeasures.
Packet sniffing techniques to discover network vulnerabilities and countermeasures to defend against sniffing.
Social engineering techniques and how to identify theft attacks to audit human-level vulnerabilities and social engineering countermeasures.
DoS/DDoS attack techniques and tools to audit a target and DoS/DDoS countermeasures.
Session hijacking techniques to discover network-level session management, authentication/authorization, and cryptographic weaknesses and countermeasures.
Webserver attacks and a comprehensive attack methodology to audit vulnerabilities in webserver infrastructure, and countermeasures.
Web application attacks, comprehensive web application hacking methodology to audit vulnerabilities in web applications, and countermeasures.
SQL injection attack techniques, injection detection tools to detect SQL injection attempts, and countermeasures.
Wireless encryption, wireless hacking methodology, wireless hacking tools, and Wi-Fi security tools.
Mobile platform attack vector, android vulnerability exploitations, and mobile security guidelines and tools.
Firewall, IDS and honeypot evasion techniques, evasion tools and techniques to audit a network perimeter for weaknesses, and countermeasures.
Cloud computing concepts (Container technology, serverless computing), the working of various threats and attacks, and security techniques and tools.
Penetration testing, security audit, vulnerability assessment, and penetration testing roadmap.
Threats to IoT and OT platforms and defending IoT and OT devices.
Cryptography ciphers, Public Key Infrastructure (PKI), cryptography attacks, and cryptanalysis tools.
All Cybersecurity Courses
Cybersecurity Online Training Courses - E-Learning
Filter by category
Filter by Vendor
We found 3 courses available for you
CompTIA Server+ eLearning Bundle
52 Lessons
Expert
CertMaster Learn+Labs Details What is CertMaster Learn integrated with CertMaster …
$1,349.00
CompTIA CASP+ eLearning Bundle
40 Lessons
Expert
CertMaster Learn+Labs Details What is CertMaster Learn integrated with CertMaster …
$1,749.00
CompTIA PenTest+ eLearning Bundle
42 Lessons
Expert
CertMaster Learn+Labs Details What is CertMaster Learn integrated with CertMaster …
$1,299.00