Online (OnDemand)

FedVTEAdvanced Computer Forensics
EC-CouncilAdvanced Network Defense
FedVTEAdvanced Network Flow Analysis
FedVTEAdvanced PCAP Analysis and Signature Development (APA)
EC-CouncilAdvanced Penetration Testing
FedVTEAdvanced Windows Scripting
Arsenal ReconAIM Online Training
FedVTEAnalysis of a Cyber Incident
myosintAnalyzing Domains and IP Addresses
EC-CouncilApplication Security Engineer - .NET
EC-CouncilApplication Security Engineer - JAVA
FedVTEArtificial Intelligence (AI) and Machine Learning (ML) for Cyber
SANSAUD507: Auditing & Monitoring Networks, Perimeters & Systems
Basis TechnologyAutopsy Basics and Hands On
Magnet ForensicsAX100 Forensic Fundamentals Online Self Paced
Magnet ForensicsAX200 Magnet AXIOM Examination Online Self Paced
Magnet ForensicsAX250 Magnet AXIOM Advanced Computer Forensics Online Self Paced
BelkasoftBelkasoft Mobile Device Investigations Course
FedVTECDM 210 – CDM Enabled Threat Hunting (CETH) Course
EC-CouncilCEH (Master) Practical
EC-CouncilCertifed Cloud Security Engineer (C | CSE)
EC-CouncilCertified Chief Security Officer
EC-CouncilCertified Cybersecurity Technician
EC-CouncilCertified Ethical Hacker (CEH)
FedVTECertified Ethical Hacker Version 10 (CEHv10) Prep
EC-CouncilCertified Ethical Hacking
Mile2Certified Ethical Hacking (CEHv11)
Mile2Certified Ethical Hacking + Certification Exam Bundle
Mile2Certified Incident Handling Engineer (CIHE)
EC-CouncilCertified Network Defender
EC-CouncilCertified Penetration Testing Professional
EC-CouncilCertified SOC Analyst (CSA)
EC-CouncilCertified Threat Intelligence Analyst
Mile2Certified Virtualization Forensics Examiner (C)VFE)
Mile2CFR) CyberSec First Responder: Threat Detection and Response (Exam CFR-210) (CFR)
Mile2CompTIA Cybersecurity Analyst (CompTIA CYSA+)
Mile2CompTIA CySA+ Cybersecurity Analyst (CS0-002) + Certification Exam Bundle
EC-CouncilComputer Hacking Forensic Investigator (CHFI)
FedVTECreating a Computer Security Incident Response Team (CSIRT)
myosintCreating an OSINT Investigation Platform
myosintCreating and Using Sock Puppets
FedVTECryptocurrency for Law Enforcement
FedVTECyber Awareness Challenge 2019
FedVTECyber Dark Arts
FedVTECyber Fundamentals for Law Enforcement Investigations
FedVTECyber Security Investigations
FedVTECyber Supply Chain Risk Management
FedVTECybersecurity Analyst
FedVTECybersecurity for Technical Staff
FedVTECyberStat Workshops
FedVTECyberStat Workshops
ADF SolutionsDigital Evidence Investigator
ADF SolutionsDigital Evidence Investigator Certified Operator Training
ADF SolutionsDigital Evidence Investigator Pro Certified Training
FedVTEDon't Wake Up to a Ransomware Attack
FedVTEEmerging Cyber Security Threats
EC-CouncilEncryption Specialist
FedVTEEnterprise Cybersecurity Operations
EC-CouncilEthical Hacking Essentials
myosintFacebook - How to find interesting information
myosintFacebook - How to search with an account
myosintFacebook - Private Profiles
myosintFacebook - Sowsearch
SANSFOR308: Digital Forensics Essentials
SANSFOR498: Battlefield Forensics & Data Acquisition
SANSFOR500: Windows Forensic Analysis
SANSFOR508: Advanced Incident Response, Threat Hunting, and Digital Forensics
SANSFOR509: Enterprise Cloud Forensics and Incident Response
SANSFOR518: Mac and iOS Forensic Analysis and Incident Response
SANSFOR528: Ransomware for Incident Responders
SANSFOR572: Advanced Network Forensics: Threat Hunting, Analysis, and Incident Response
SANSFOR578: Cyber Threat Intelligence
SANSFOR585: Smartphone Forensic Analysis In-Depth
SANSFOR608: Enterprise-Class Incident Response & Threat Hunting
SANSFOR610: Reverse-Engineering Malware: Malware Analysis Tools and Techniques
SANSFOR710: Reverse-Engineering Malware: Advanced Code Analysis
EC-CouncilForensic Investigator
FedVTEFoundations of Cybersecurity for Managers
FedVTEFoundations of Incident Management
FedVTEFundamentals of Cyber Risk Management
SANSICS410: ICS/SCADA Security Essentials
SANSICS456: Essentials for NERC Critical Infrastructure Protection
SANSICS515: ICS Visibility, Detection, and Response
myosintImage Analysis for OSINT
EC-CouncilIncident Handler
FedVTEIncident Response 101
FedVTEInsider Threat Analysis
Basis TechnologyIntro to DFIR: The Divide & Conquer process
FedVTEIntroduction to Computer Forensics
FedVTEIntroduction to Data Packet Analysis
FedVTEIntroduction to Investigation of Digital Assets
myosintIntroduction to Social Media
FedVTEIntroduction to Threat Hunting Teams
FedVTEIntroduction to Windows Scripting
SANSLEG523: Law of Data Security and Investigations
EC-CouncilLicensed Penetration Tester
Magnet ForensicsMagnet AXIOM to Magnet AXIOM CYBER Transition
Magnet ForensicsMagnet Certified Cloud Examiner
Magnet ForensicsMagnet Certified Forensics Examiner - AXIOM
Magnet ForensicsMagnet Certified Forensics Examiner Recertification - AXIOM
Magnet ForensicsMagnet Certified macOS Examiner
Magnet ForensicsMagnet Certified Video Examiner
FedVTEManaging Computer Security Incident Response Teams (CSIRTs)
SANSMGT414: SANS Training Program for the CISSP Certification
SANSMGT415: A Practical Introduction to Cyber Security Risk Management
SANSMGT512: Security Leadership Essentials for Managers
SANSMGT514: Security Strategic Planning, Policy, and Leadership
SANSMGT516: Managing Security Vulnerabilities: Enterprise and Cloud
SANSMGT520: Leading Cloud Security Design and Implementation
SANSMGT521: Leading Cybersecurity Change: Building a Security-Based Culture
SANSMGT525: Managing Cybersecurity Initiatives and Effective Communication
SANSMGT551: Building and Leading Security Operations Centers
SANSMGT553: Cyber Incident Management
ADF SolutionsMobile Device Investigator
EC-CouncilMobile Ethical Hacking
FedVTEMobile Forensics
EC-CouncilNetwork Defense Essentials
MSABODT-XYW Certification
FedVTEOffensive and Defensive Network Operations
myosintOSINT Documentation with Obsidian
FedVTEOverview of Creating and Managing Computer Security Incident Response Teams (CSIRTs)
myosintPeople Searching
myosintPhysical Addresses and Phone Number Searches
FedVTEPure Data for Traffic Analysts
EC-CouncilPython for Pentesters
myosintReverse Image Searching
FedVTERoot Cause Analysis
SANSSEC301: Introduction to Cyber Security
SANSSEC388: Introduction to Cloud Computing and Security
SANSSEC401: Security Essentials - Network, Endpoint, and Cloud
SANSSEC402: Cybersecurity Writing: Hack the Reader
SANSSEC403: Secrets to Successful Cybersecurity Presentation
SANSSEC405: Business Finance Essentials
SANSSEC440: CIS Critical Controls: A Practical Introduction
SANSSEC450: Blue Team Fundamentals: Security Operations and Analysis
SANSSEC460: Enterprise and Cloud | Threat and Vulnerability Assessment
SANSSEC474: Building A Healthcare Security & Compliance Program
SANSSEC488: Cloud Security Essentials
SANSSEC497: Practical Open-Source Intelligence (OSINT)
SANSSEC501: Advanced Security Essentials - Enterprise Defender
SANSSEC503: Network Monitoring and Threat Detection In-Depth
SANSSEC504: Hacker Tools, Techniques, and Incident Handling
SANSSEC505: Securing Windows and PowerShell Automation
SANSSEC510: Public Cloud Security: AWS, Azure, and GCP
SANSSEC511: Continuous Monitoring and Security Operations
SANSSEC522: Application Security: Securing Web Apps, APIs, and Microservices
SANSSEC530: Defensible Security Architecture and Engineering: Implementing Zero Trust for the Hybrid Enterprise
SANSSEC540: Cloud Security and DevSecOps Automation
SANSSEC541: Cloud Security Attacker Techniques, Monitoring, and Threat Detection
SANSSEC542: Web App Penetration Testing and Ethical Hacking
SANSSEC555: SIEM with Tactical Analytics
SANSSEC556: IoT Penetration Testing
SANSSEC560: Enterprise Penetration Testing
SANSSEC566: Implementing and Auditing Security Frameworks and Controls
SANSSEC573: Automating Information Security with Python
SANSSEC575: Mobile Device Security and Ethical Hacking
SANSSEC586: Blue Team Operations: Defensive PowerShell
SANSSEC587: Advanced Open-Source Intelligence (OSINT) Gathering and Analysis
SANSSEC588: Cloud Penetration Testing
SANSSEC595: Applied Data Science and Machine Learning for Cybersecurity Professionals
SANSSEC599: Defeating Advanced Adversaries - Purple Team Tactics & Kill Chain Defenses
SANSSEC617: Wireless Penetration Testing and Ethical Hacking
SANSSEC660: Advanced Penetration Testing, Exploit Writing, and Ethical Hacking
SANSSEC661: ARM Exploit Development
SANSSEC699: Purple Team Tactics - Adversary Emulation for Breach Prevention & Detection
SANSSEC760: Advanced Exploit Development for Penetration Testers
EC-CouncilSecurity Specialist
FedVTESensors 101 for Traffic Analysts
FedVTESiLK Traffic Analysis
FedVTESQL for Traffic Analysts
FedVTESurvival SiLK Series
FedVTETCP/IP Fundamentals for Network Traffic Analysts
myosintTelegram Analysis
myosintTool: CyberChef
myosintTool: DNSRecon
myosintTool: Holehe
myosintTool: Sherlock
myosintTool: Spiderfoot
ADF SolutionsTriage-G2
ADF SolutionsTriage-G2 PRO Certified Training
ADF SolutionsTriage-Investigator Certified Training
ADF SolutionsTriage-Investigator PRO
FedVTEUnderstanding DNS Attacks
myosintUsername Searching
myosintUsing Breach Data in OSINT Investigations
myosintUsing Commandline OSINT Tools Introduction
myosintUsing File Metadata
myosintUsing OSINT in Threat Assessment and Critical Incident Management
myosintUsing Search Engines Effectively
EC-CouncilWeb App Penetration Testing
EC-CouncilWeb Application Hacking and Security
myosintWireless Networks and OSINT
EC-CouncilWireless Pentesting
MSABXAMN Horizon Certification
MSABXAMN Spotlight Certification
MSABXRY Express Logical Certification
MSABXRY Express Physical Certification
MSABXRY Recertification
MSABXRY Refresher
DFIR TrainingX-Ways Forensics Practitioner's Guide