
(133)
69 hours
Beginner

The School Of
Build expertise in security analysis, security engineering, enterprise security, security architecture, ethical hacking, and data privacy. With the skills you learn in our cybersecurity courses, you can launch or advance a successful career in the field.

Cybersecurity training helps learners identify, correct, and respond to security weaknesses and incidents through open-ended projects that mimic workplace security challenges. Plus, get hands-on experience monitoring network traffic, analyzing alert and log data, and following incident handling procedures.
Steps To Become A Security Analyst

(133)
69 hours
Beginner
Step 1

(133)
69 hours
Beginner
Skills Covered
Threat intelligence, Cryptography, Cybersecurity fluency, Security auditing, Cybersecurity grc, Cybersecurity business context, Security information and event management, Systems security, Cybersecurity compliance, Cybersecurity controls, Cybersecurity incident response playbooks, Security assessment, Identity and access management fundamentals, Patch management, Cybersecurity risk management, Security architecture fundamentals, Cybersecurity policy writing, Stakeholder management, Value-based security risk assessment, Security risk classification, Cybersecurity standards fluency, Security risk remediation, Cybersecurity training strategies, Offensive security, Intrusion protection systems, Nist 800-series, Firewalls, Data security fundamentals, Network security best practices, Intrusion detection systems, Did framework, Computer networking basics, Network security reports, Cybersecurity governance, Nist cybersecurity framework, Cybersecurity regulations and standards, Exploit detection, Data privacy regulations, Cis controls, Email security, Vulnerability management, Firewall rules
Learn More
(31)
58 hours
Intermediate
Step 2

(31)
58 hours
Intermediate
Skills Covered
Intrusion detection systems, Splunk, Security information and event management, Security risk classification, Did framework, Cybersecurity incident response playbooks, Security assessment, Snort ids, Cybersecurity incident remediation, Network traffic capture, Vulnerability lifecycle, Security risk mitigation, Penetration testing, Vulnerability mitigation, Technical communication, Threat actors, Internal threat mitigation, Cybersecurity fluency, Owasp top-10, Cybersecurity ttps, Patch management, External threat mitigation, Network attack vectors, Logging, Vulnerability assessment, Threat modeling, Cybersecurity controls
Learn More
(24)
37 hours
Advanced
Step 3

(24)
37 hours
Advanced
Skills Covered
Report writing, Cybersecurity reconnaissance, Open-source intelligence, Owasp wstg, Digital footprint removal, Password attacks, Osint tools, Vulnerability management, Exploit code execution, Metasploit, Link analysis, Open source vulnerability database, Digital footprint analysis, SQL injection, Cybersecurity pivoting, Web hacking, Cherrytree, Backdoors, Passive cybersecurity reconnaissance, Social engineering, Phishing, Gophish, Security risk classification, Nessus, Security assessment, On-premise cyber attacks, Service enumeration, Advanced persistent threat, Steganography, Owasp zap, Active cybersecurity reconnaissance, Data exfiltration, Nmap, Dig, Router hacking, Privilege escalation, Traceroute, Dirb, Netdiscover, Port scanning, Nslookup, John the ripper, Wpscan, Cyber attack persistence, Keystroke logging, Port forwarding, Web application vulnerability scanning, Vulnerability exploitation, Cvss, Hash cat, Vulnerability scanning, Exploitdb, Veil-evasion, Burp suite, Google hacking, Cybersecurity ttps, SQLmap, Maltego, Malware development, Automated penetration testing, Semi-automated penetration testing, Exploratory data analysis, Nikto, Vulnerability research, Red teaming, Vulnerability assessment
Learn MoreTake advantage of the growing need for skilled security professionals and learn cybersecurity skills to protect an organization’s computer networks and systems from security threats or attacks.
Steps To Become A Security Engineer

(133)
69 hours
Beginner
Step 1

(133)
69 hours
Beginner
Skills Covered
Threat intelligence, Cryptography, Cybersecurity fluency, Security auditing, Cybersecurity grc, Cybersecurity business context, Security information and event management, Systems security, Cybersecurity compliance, Cybersecurity controls, Cybersecurity incident response playbooks, Security assessment, Identity and access management fundamentals, Patch management, Cybersecurity risk management, Security architecture fundamentals, Cybersecurity policy writing, Stakeholder management, Value-based security risk assessment, Security risk classification, Cybersecurity standards fluency, Security risk remediation, Cybersecurity training strategies, Offensive security, Intrusion protection systems, Nist 800-series, Firewalls, Data security fundamentals, Network security best practices, Intrusion detection systems, Did framework, Computer networking basics, Network security reports, Cybersecurity governance, Nist cybersecurity framework, Cybersecurity regulations and standards, Exploit detection, Data privacy regulations, Cis controls, Email security, Vulnerability management, Firewall rules
Learn More
(31)
58 hours
Intermediate
Step 2

(31)
58 hours
Intermediate
Skills Covered
Intrusion detection systems, Splunk, Security information and event management, Security risk classification, Did framework, Cybersecurity incident response playbooks, Security assessment, Snort ids, Cybersecurity incident remediation, Network traffic capture, Vulnerability lifecycle, Security risk mitigation, Penetration testing, Vulnerability mitigation, Technical communication, Threat actors, Internal threat mitigation, Cybersecurity fluency, Owasp top-10, Cybersecurity ttps, Patch management, External threat mitigation, Network attack vectors, Logging, Vulnerability assessment, Threat modeling, Cybersecurity controls
Learn More
(33)
90 hours
Intermediate
Step 3

(33)
90 hours
Intermediate
Skills Covered
Static application security testing, Software development lifecycle, Owasp top-10, Access management, Cybersecurity business context, Hashing, Cybersecurity risk management, It asset management, Vulnerability assessment, Cybersecurity strategy, Data encryption, Cvss, Owasp, Firewall configuration, Application security best practices, Vulnerability management, Security risk classification, Cybersecurity reconnaissance, Report writing, Cross-functional collaboration, Cybersecurity framework implementation, Microservices security, Security auditing, Security information and event management, Credential management, Adversarial simulation, Public key certificate management, Vulnerability scanning, Backup strategy, Golden images, Ipv6 security, Vulnerability patching, Firewalls, Network segmentation, VPN, Nmap, Network access control lists, Tcp/ip, Disaster recovery plans, Network monitoring, Multi-factor authentication, Security patch management, Cybersecurity standards fluency, Host-based idss, Yara rules, Cve, Server hardening strategy, Vulnerability exploitation, Operating system hardening, File integrity monitoring, Cybersecurity controls, Authentication, Cybersecurity fluency, Cybersecurity compliance, Cybersecurity resource fluency, Threat modeling, Cryptography, Fuzzing, Shift-left testing, Brute force attacks, Microsoft domain isolation policy design, Remote access management, Web application firewalls, Mandatory access control, Role-Based Access Control, Wireshark, Perimeter security, Principle of least privilege, Virtual lan, Packet analysis, Access control models, Endpoint security, Threat mitigation, Cybersecurity segregation of duties, Chroot jails, Threat hunting, Intrusion detection systems, Advanced persistent threat, Osquery, Data security fundamentals, Cybersecurity advisories, Unix os hardening, Intrusion prevention, Security architecture fundamentals, Authorization, Cybersecurity grc, Cia triad, Non-repudiation, Public key certificates, Public key infrastructure, Logging
Learn More
(24)
37 hours
Advanced
Step 4

(24)
37 hours
Advanced
Skills Covered
Report writing, Cybersecurity reconnaissance, Open-source intelligence, Owasp wstg, Digital footprint removal, Password attacks, Osint tools, Vulnerability management, Exploit code execution, Metasploit, Link analysis, Open source vulnerability database, Digital footprint analysis, SQL injection, Cybersecurity pivoting, Web hacking, Cherrytree, Backdoors, Passive cybersecurity reconnaissance, Social engineering, Phishing, Gophish, Security risk classification, Nessus, Security assessment, On-premise cyber attacks, Service enumeration, Advanced persistent threat, Steganography, Owasp zap, Active cybersecurity reconnaissance, Data exfiltration, Nmap, Dig, Router hacking, Privilege escalation, Traceroute, Dirb, Netdiscover, Port scanning, Nslookup, John the ripper, Wpscan, Cyber attack persistence, Keystroke logging, Port forwarding, Web application vulnerability scanning, Vulnerability exploitation, Cvss, Hash cat, Vulnerability scanning, Exploitdb, Veil-evasion, Burp suite, Google hacking, Cybersecurity ttps, SQLmap, Maltego, Malware development, Automated penetration testing, Semi-automated penetration testing, Exploratory data analysis, Nikto, Vulnerability research, Red teaming, Vulnerability assessment
Learn MoreThe goal of the Security Architect Nanodegree program is to equip learners with the necessary core skills and strategies to implement elements of security infrastructure design and management at an enterprise level.
Steps To Become a Security Architect

(133)
69 hours
Beginner
Step 1

(133)
69 hours
Beginner
Skills Covered
Threat intelligence, Cryptography, Cybersecurity fluency, Security auditing, Cybersecurity grc, Cybersecurity business context, Security information and event management, Systems security, Cybersecurity compliance, Cybersecurity controls, Cybersecurity incident response playbooks, Security assessment, Identity and access management fundamentals, Patch management, Cybersecurity risk management, Security architecture fundamentals, Cybersecurity policy writing, Stakeholder management, Value-based security risk assessment, Security risk classification, Cybersecurity standards fluency, Security risk remediation, Cybersecurity training strategies, Offensive security, Intrusion protection systems, Nist 800-series, Firewalls, Data security fundamentals, Network security best practices, Intrusion detection systems, Did framework, Computer networking basics, Network security reports, Cybersecurity governance, Nist cybersecurity framework, Cybersecurity regulations and standards, Exploit detection, Data privacy regulations, Cis controls, Email security, Vulnerability management, Firewall rules
Learn More
(33)
90 hours
Intermediate
Step 2

(33)
90 hours
Intermediate
Skills Covered
Static application security testing, Software development lifecycle, Owasp top-10, Access management, Cybersecurity business context, Hashing, Cybersecurity risk management, It asset management, Vulnerability assessment, Cybersecurity strategy, Data encryption, Cvss, Owasp, Firewall configuration, Application security best practices, Vulnerability management, Security risk classification, Cybersecurity reconnaissance, Report writing, Cross-functional collaboration, Cybersecurity framework implementation, Microservices security, Security auditing, Security information and event management, Credential management, Adversarial simulation, Public key certificate management, Vulnerability scanning, Backup strategy, Golden images, Ipv6 security, Vulnerability patching, Firewalls, Network segmentation, VPN, Nmap, Network access control lists, Tcp/ip, Disaster recovery plans, Network monitoring, Multi-factor authentication, Security patch management, Cybersecurity standards fluency, Host-based idss, Yara rules, Cve, Server hardening strategy, Vulnerability exploitation, Operating system hardening, File integrity monitoring, Cybersecurity controls, Authentication, Cybersecurity fluency, Cybersecurity compliance, Cybersecurity resource fluency, Threat modeling, Cryptography, Fuzzing, Shift-left testing, Brute force attacks, Microsoft domain isolation policy design, Remote access management, Web application firewalls, Mandatory access control, Role-Based Access Control, Wireshark, Perimeter security, Principle of least privilege, Virtual lan, Packet analysis, Access control models, Endpoint security, Threat mitigation, Cybersecurity segregation of duties, Chroot jails, Threat hunting, Intrusion detection systems, Advanced persistent threat, Osquery, Data security fundamentals, Cybersecurity advisories, Unix os hardening, Intrusion prevention, Security architecture fundamentals, Authorization, Cybersecurity grc, Cia triad, Non-repudiation, Public key certificates, Public key infrastructure, Logging
Learn More
57 hours
Intermediate
Step 3

57 hours
Intermediate
Skills Covered
Access control matrices, Network security fundamentals, Cybersecurity business context, Did framework, Cybersecurity risk management, Cybersecurity incident response playbooks, Togaf framework, Cybersecurity APIs, Cloud security in AWS, AWS config, Secure application architecture design, Cybersecurity standards fluency, Cybersecurity alerts, Business continuity planning for cloud, It asset inventories, Cybersecurity incident containment, Business continuity playbooks, Incident response planning for cloud, Cybersecurity incident response automation, Cloud asset isolation, Business continuity automation, Antivirus definition update pipelines, Intelligence-driven security, Clam antivirus, Threat modeling, Security services integration, Threat-driven security, Stride framework, Cybersecurity alert enrichment, Webhook security alerts, Scalable security services, Mitre att&ck, Cyber kill chain model, Threat profiling, Iam roles, Principle of least privilege, Iam policies, Access control models, Iam restrictions, Attribute-based access control, Draw.io, Security risk classification, Gdpr, Pci-dss, Cybersecurity trust models, Ccpa, Iso 27001, Nist cybersecurity framework, Cybersecurity framework implementation, Hipaa, Cybersecurity grc, Logging, Zachman framework, Role-Based Access Control
Learn More
(24)
37 hours
Advanced
Step 4

(24)
37 hours
Advanced
Skills Covered
Report writing, Cybersecurity reconnaissance, Open-source intelligence, Owasp wstg, Digital footprint removal, Password attacks, Osint tools, Vulnerability management, Exploit code execution, Metasploit, Link analysis, Open source vulnerability database, Digital footprint analysis, SQL injection, Cybersecurity pivoting, Web hacking, Cherrytree, Backdoors, Passive cybersecurity reconnaissance, Social engineering, Phishing, Gophish, Security risk classification, Nessus, Security assessment, On-premise cyber attacks, Service enumeration, Advanced persistent threat, Steganography, Owasp zap, Active cybersecurity reconnaissance, Data exfiltration, Nmap, Dig, Router hacking, Privilege escalation, Traceroute, Dirb, Netdiscover, Port scanning, Nslookup, John the ripper, Wpscan, Cyber attack persistence, Keystroke logging, Port forwarding, Web application vulnerability scanning, Vulnerability exploitation, Cvss, Hash cat, Vulnerability scanning, Exploitdb, Veil-evasion, Burp suite, Google hacking, Cybersecurity ttps, SQLmap, Maltego, Malware development, Automated penetration testing, Semi-automated penetration testing, Exploratory data analysis, Nikto, Vulnerability research, Red teaming, Vulnerability assessment
Learn MoreMeet the growing demand for cybersecurity professionals by gaining the offensive security skills to protect an organization’s computer networks and systems. Learn how to find and exploit vulnerabilities, design and execute penetration testing plans, and report on test findings.
Steps To Become An Ethical Hacker

(133)
69 hours
Beginner
Step 1

(133)
69 hours
Beginner
Skills Covered
Threat intelligence, Cryptography, Cybersecurity fluency, Security auditing, Cybersecurity grc, Cybersecurity business context, Security information and event management, Systems security, Cybersecurity compliance, Cybersecurity controls, Cybersecurity incident response playbooks, Security assessment, Identity and access management fundamentals, Patch management, Cybersecurity risk management, Security architecture fundamentals, Cybersecurity policy writing, Stakeholder management, Value-based security risk assessment, Security risk classification, Cybersecurity standards fluency, Security risk remediation, Cybersecurity training strategies, Offensive security, Intrusion protection systems, Nist 800-series, Firewalls, Data security fundamentals, Network security best practices, Intrusion detection systems, Did framework, Computer networking basics, Network security reports, Cybersecurity governance, Nist cybersecurity framework, Cybersecurity regulations and standards, Exploit detection, Data privacy regulations, Cis controls, Email security, Vulnerability management, Firewall rules
Learn More
(31)
58 hours
Intermediate
Step 2

(31)
58 hours
Intermediate
Skills Covered
Intrusion detection systems, Splunk, Security information and event management, Security risk classification, Did framework, Cybersecurity incident response playbooks, Security assessment, Snort ids, Cybersecurity incident remediation, Network traffic capture, Vulnerability lifecycle, Security risk mitigation, Penetration testing, Vulnerability mitigation, Technical communication, Threat actors, Internal threat mitigation, Cybersecurity fluency, Owasp top-10, Cybersecurity ttps, Patch management, External threat mitigation, Network attack vectors, Logging, Vulnerability assessment, Threat modeling, Cybersecurity controls
Learn More
(24)
37 hours
Advanced
Step 3

(24)
37 hours
Advanced
Skills Covered
Report writing, Cybersecurity reconnaissance, Open-source intelligence, Owasp wstg, Digital footprint removal, Password attacks, Osint tools, Vulnerability management, Exploit code execution, Metasploit, Link analysis, Open source vulnerability database, Digital footprint analysis, SQL injection, Cybersecurity pivoting, Web hacking, Cherrytree, Backdoors, Passive cybersecurity reconnaissance, Social engineering, Phishing, Gophish, Security risk classification, Nessus, Security assessment, On-premise cyber attacks, Service enumeration, Advanced persistent threat, Steganography, Owasp zap, Active cybersecurity reconnaissance, Data exfiltration, Nmap, Dig, Router hacking, Privilege escalation, Traceroute, Dirb, Netdiscover, Port scanning, Nslookup, John the ripper, Wpscan, Cyber attack persistence, Keystroke logging, Port forwarding, Web application vulnerability scanning, Vulnerability exploitation, Cvss, Hash cat, Vulnerability scanning, Exploitdb, Veil-evasion, Burp suite, Google hacking, Cybersecurity ttps, SQLmap, Maltego, Malware development, Automated penetration testing, Semi-automated penetration testing, Exploratory data analysis, Nikto, Vulnerability research, Red teaming, Vulnerability assessment
Learn More
(133)
69 hours
Beginner

(24)
37 hours
Advanced

(33)
90 hours
Intermediate

57 hours
Intermediate

(31)
58 hours
Intermediate
Finance
Retail
Technology
Defense

Get Started Today