CyberEd Pro
Subscription
Accelerate your career in cybersecurity with CyberEd Pro—a comprehensive subscription designed to meet your needs for professional development. This tier includes everything in CyberEd Essentials, plus specialized technical training to advance both individual and team-wide skill growth. From foundational concepts to cutting-edge techniques, CyberEd Pro is your all-in-one resource for recognized certification coursework and in-depth learning provided by the industry’s most trusted organizations.
What's Included:
- All CyberEd Essentials Features
Receive access to global cybersecurity events, expert-led sessions, a vibrant professional community, automated CPE tracking, and fresh, relevant content. - Specialized Technical Training
Gain advanced knowledge through targeted courses designed to refine your expertise in areas such as cloud security, penetration testing, threat hunting, and more. - Career & Team Skill Development
Tailor your learning paths to align with personal or organizational goals, ensuring the highest impact on professional growth and team performance. - Industry-Recognized Certification Coursework
Prepare for your accredited certifications, validating your skill set and bolstering your credentials in the marketplace.
Here is a list of the items in the subscription:
CompTIA A+ Core 1Learn and master the material for CompTIA's A+ Core 1 Exam
Course
|
CompTIA A+ Core 2Learn and master the material needed to pass the CompTIA A+ Core 2 exam!
Course
|
CompTIA Cloud Essentials+CompTIA Cloud Essentials+ is for both IT and non-technical professionals who require the essential business acumen needed to make informed cloud service decisions.
Course
|
Fundamentals of Cybersecurity - Part 1Fundamentals of Cybersecurity, Part 1 is an introduction to cybersecurity and risk management.
Course
|
Fundamentals of Cybersecurity - Part 2Fundamentals of Cybersecurity, Part 2 is an introduction to Access Control and Network Security.
Course
|
Fundamentals of Cybersecurity - Part 3Fundamentals of Cybersecurity, Part 3 covers overarching concepts of endpoint and data security.
Course
|
Fundamentals of Cybersecurity - Part 4Fundamentals of Cybersecurity Part 4 is an introduction to Cloud and Web Security.
Course
|
Accredited Management of Risk® PractitionerLearn practical Risk Management. Explore case studies and exercises. Prepare for the Management of Risk® Practitioner exam.
Course
|
Absolute Musts in Your Incident Response PlanJoin Rocco Grillo, Kevin Li, and Parthiv Shah as they discuss incident response plans that work... and those that fail!
Course
|
Accredited DevOps FoundationLearn DevOps concepts and principles. Become a DevOps Professional. Prepare for the EXIN DevOps Professional certification exam.
Course
|
Accredited DevOps ProfessionalPrepare for the EXIN DevOps Professional certification. Learn DevOps concepts, principles, and practice with sample exams.
Course
|
Combatting Social Engineering & Insider ThreatsTake practical, actionable steps to enhance the overall security posture of your financial service organization today!
Course
|
Commanding the IT-OT ConvergenceCommanding the IT-OT Convergence is designed for leaders tasked with driving the secure convergence of IT and OT systems. Click continue to start!
Course
|
FDIC Cybersecurity Laws and RegulationsMake sure your institution stays compliant. Brush up on FDIC Laws and Regulations today!
Course
|
Financial Supply Chain CybersecurityImplement stronger third party vendor and supply chain cybersecurity risk mitigation tactics today!
Course
|
Fundamentals of Cybersecurity - Part 5Fundamentals of Cybersecurity Part 5 is an introduction to compliance and human risk management.
Course
|
HIPAAJoin our AI guide in this course about The Health Insurance Portability and Accountability Act of 1996 (HIPAA).
Course
|
Human Risk ManagementTackle the human aspect of cybersecurity in this course about human risk management.
Course
|
Intro to ICS & OT CybersecurityLearn the basics of Industrial Control Systems (ICS) and Operational Technology (OT) to protect your organization from cybersecurity related threats!
Course
|
Intro to Malware Analysis, Part 1Explore the principles of malware analysis and set up your own malware analysis lab!
Course
|
Intro to OWASP & Broken Access ControlLearn about OWASP's broken access control related cybersecurity concerns, risk mitigation strategies and pro tips!
Course
|
Intro to OWASPThe OWASP Top 10, which highlights the top ten cybersecurity risks. Dive into each risk category, risk mitigations strategies and pro tips today!
Course
|
Intro to OWASP & Cryptographic FailuresLearn about OWASP's encryption related cybersecurity concerns, risk mitigation strategies and pro tips!
Course
|
Intro to PCI DSSEveryone in finance should know the basics of payment card data security compliance. Learn about payment card industry data security standard compliance today!
Course
|
OT Attack!"OT Attack!" is a hands-on tabletop simulating cyber-attacks on OT systems.
Course
|
Intro to the Gramm-Leach-Bliley ActLearn how the Gramm-Leach-Bliley Act requires financial institutions to explain information-sharing practices and safeguard sensitive data.
Course
|
Intro to OWASP & InjectionLearn about OWASP's injection related cybersecurity concerns, risk mitigation strategies and pro tips!
Course
|
Intro to OWASP & Auth FailuresDive into OWASP's identification or authentication related cybersecurity concerns, risk mitigation strategies and pro tips!
Course
|
ISO/IEC 27001Join our AI guide in this course about ISO/IEC 27001 the international standard that provides a framework for Information Security Management Systems (ISMS).
Course
|
Taming ICS and OT Cyber ThreatsLearn about taming ICS and OT cyber threats to implement more secure cybersecurity risk management strategies today!
Course
|
OWASP with Hannah McCartneyJoin Hannah McCartney your trusted AI guide and explore the top 10 categories of application security risk.
Course
|
Intro to OWASP & Insecure DesignLearn about OWASP's design related cybersecurity concerns, risk mitigation strategies and pro tips!
Course
|
Intro to OWASP & Security Logging FailuresDive into OWASP's logging or monitoring related cybersecurity concerns, risk mitigation strategies and pro tips!
Course
|
Intro to Ransomware in FinServEvery financial sector business professional should have a basic understanding of ransomware threats. Kick off your ransomware journey today!
Course
|
Introduction to a Security Operations CenterLearn about strategic importance of SOCs and consider potential career paths within this essential domain.
Course
|
Preparing for Industry 5.0 and 6.0Preparing for Industry 5.0 and 6.0 highlights security challenges and benefits introduced by Industry 5.0 and 6.0.
Course
|
Intro to OWASP & Server-Side Request ForgeryDive into OWASP's server-side request forgery cybersecurity concerns, risk mitigation strategies and pro tips!
Course
|
Intro to OWASP & Security MisconfigurationLearn about OWASP's misconfiguration related cybersecurity concerns, risk mitigation strategies and pro tips!
Course
|
Intro to the NCUA's Cybersecurity RequirementsEvery financial sector business professional should know the basics of data protection and NCUA compliance. Start your NCUA journey today!
Course
|
NCUA Cybersecurity Compliance Practical ApplicationEnhance your credit union's overall security posture with NCUA Cybersecurity Compliance training today!
Course
|
Intro to OWASP & Data Integrity FailuresLearn about OWASP's integrity related cybersecurity concerns, risk mitigation strategies and pro tips!
Course
|
Leading NCUA Cybersecurity ComplianceLead teams that safeguard member information, maintain the integrity of financial operations, and remain NCUA compliant.
Course
|
Strategies Against Geopolitical Cyber ThreatsStrategies Against Geopolitical Cyber Threats outlines strategies to defend critical infrastructure from state-sponsored attacks.
Course
|
Intro to OWASP & Outdated ComponentsDive into OWASP's component related cybersecurity concerns, risk mitigation strategies and pro tips!
Course
|
Leading Financial Supply Chain Cybersecurity TeamsExpand your third party vendor and supply chain cybersecurity leadership skills and drive better business impact, for your business today!
Course
|
AI and ML in CybersecurityAI and ML in Cybersecurity explores the intersection of AI and cybersecurity in this comprehensive course designed for learners at all levels.
Course
|
Dark Web & Threat Intelligence: Understanding Your EnemyJoin Manoj Abraham in an exploration of the dark web.
Course
|
Practical Pentesting: featuring Brad StineIn this series, Daniel and Brad will take a look at what a pentesting engagement looks like through the lens of Brad's experience as a pentester.
Course
|
The Future of Ransomware & Evolving AttacksJoin Troy Leach, Shannon Lawson, and Mike Manrod in a discussion of adaptations are needed to keep pace with the changing ransomware environment.
Course
|
CompTIA IT Fundamentals+ (FC0-U61)CompTIA IT Fundamentals+ (ITF+) is an entry-level certification for beginners exploring IT
Course
|
Mastering Microsoft Endpoint Manager and IntuneMaster Microsoft Endpoint Manager and Intune to streamline device management and enhance security.
Course
|
Demystifying Zero Trust with Greg TouhillGreg Touhill Director, CERT Division, Carnegie Mellon University Software Engineering Institute
Course
|
All Other Identities: Implications for Zero TrustThe world of identity and access management has spent the last 30 years or more focusing almost exclusively on the enterprise workforce.
Course
|
Amping Up Splunk with Advanced AdminLearn Splunk parsing and data management. Mask, reroute, and transform data. Build on your Splunk Enterprise administration skills.
Course
|
PowerShell SkillsThis course is for anyone wanting to learn how to write PowerShell scripts to automate tasks.
Course
|
Developing Solutions for Microsoft Azure (AZ-204)AZ-204: Developing Solutions for Microsoft Azure certification validates expertise in designing, building, and maintaining cloud applications.
Course
|
AZ-140: Microsoft Azure Virtual DesktopAZ-140: Microsoft Azure Virtual Desktop certification focuses on planning, delivering, and managing virtual desktop experiences using Azure.
Course
|
AZ-500: Microsoft Azure Security TechnologiesAZ-500: Microsoft Azure Security Technologies certification focuses on managing security for Azure environments.
Course
|
Nefarious Use of Modern MoneyJoin Karen Boyer, Claire Le Gal and David Pollino in a discussion of the criminal use of newer forms of money movement to hide criminal proceeds and cash out.
Course
|
CompTIA CySA+ (CS0-003)The CompTIA CySA+ is an industry-recognized certification that aims to validate the skills and knowledge of cybersecurity analysts.
Course
|
CompTIA Server+ (SK0-005)CompTIA Server+ (SK0-005) certification validates the skills needed to manage and troubleshoot servers in data centers and cloud environments.
Course
|
Microsoft Power BI SkillsEnhance your Microsoft Power BI skills to create impactful data visualizations and business intelligence solutions.
Course
|
Microsoft Sentinel SkillsMicrosoft Sentinel is a scalable, cloud-native, security information and event management (SIEM) and security orchestration, automation, and response (SOAR) solution.
Course
|
Networking FundamentalsLearn network fundamentals: components, topologies, IPv4/IPv6 addressing, and more.
Course
|
This Is How You FailJoin Chase Cunningham, the "Doctor of Zero Trust" in a conversation about why well-meaning enterprises fail.
Course
|
Accredited SIAM FoundationSIAM: Manage multi-provider services. Learn the business case, benefits, processes, and challenges. Prepare for the EXIN SIAM Foundation exam.
Course
|
SOC 2 ComplianceSOC 2, developed by the American Institute of CPAs, outlines how organizations manage customer data. Comply with SOC 2 today!
Course
|
The Impact of HRM on Breach PreventionSecurity awareness training has done little to decrease the percentage of cyber incidents involving human error.
Course
|
Becoming a Linux Power UserBecoming a Linux Power User is a technical skills course designed to elevate viewers to "Power User" status.
Course
|
ZTNA-Evolving Beyond Antiquated VPNsJoin Dr. Chase Cunningham in an explanation of why companies should move away from VPNs and toward zero-trust network access (ZTNA) solutions.
Course
|
Becoming a Linux Server AdminThe Becoming a Linux Server Administrator covers managing Linux servers in a business environment.
Course
|
Zero Trust, The DoD & YouZero trust, supply chain security and DevSecOps.
Course
|
Zero Trust Case Study: Inwood BankJoin Tom Field, Jon Drake and John Kindervag to discuss Inwood National Bank's Zero Trust journey.
Course
|
Windows Terminal SkillsThis course will acquaint learners with the new Windows Terminal Application.
Course
|
Windows Admin CenterMaster Windows Admin Center to simplify server and infrastructure management. Enroll today!
Course
|
Zero Trust: The Key to Securing Higher EducationJoin George Finney, the CISO at Southern Methodist University and explore higher education specific cybersecurity challenges.
Course
|
SC-200: Microsoft Security Operations AnalystSC-200: Microsoft Security Operations Analyst certification focuses on managing and mitigating security threats using Microsoft tools.
Course
|
CISA: Certified Information Systems AuditorThis course will help you understand the requirements for passing ISACA's Certified Information Systems Auditor exam.
Course
|
Cisco CCNA (200-301)This comprehensive CCNA 200-301 Certification Course is designed to prepare students for the Cisco Certified Network Associate (CCNA) exam
Course
|
Cisco CCNP Data Center DCCOR (350-601)The DCCOR course helps you prepare for the CCNP Data Center and CCIE Data Center certifications for advanced-level data center roles.
Course
|
Linux Security TechniquesThe Linux Security Techniques series introduces the viewers to the various security features found in modern Linux distributions.
Course
|
Linux in the CloudThe Linux in the Cloud series focuses on implementing the Linux operating system in a virtualized environment.
Course
|
Customer IAM & the Path to Making Identity BetterJoin Jeremy Grant in an examination of the critical role of digital identity as infrastructure.
Course
|
Linux for BeginnersLinux for Beginners is a technical skills course designed to introduce new users to the Linux operating system.
Course
|
Linux EssentialsThe Linux Essentials certification from the Linux Professional Institute is designed to showcase your foundation skills in working with the Linux operating system.
Course
|
Jr Penetration Test - TheoreticalJoin CyberSage for your hacker initiation and kick off your Penetration Testing journey today!
Course
|
CyberPatriotCyberPatriot is an amazing free program. It is a National Youth Cyber Education Program with emphasis on the national competition. Get Started Today!
Course
|
ICS SCADA and IIoT VulnerabilitiesICS SCADA and IIoT Vulnerabilities discusses the components of ICS, SCADA, and IIoT systems their vulnerabilities and threats.
Course
|
How Hybrid Work Enabled Security Service Edge in UKIJoin Christopher Hines and Tom Field as they discuss how hybrid work paved the way for the security service edge in UKI.
Course
|
Hands-On Web App PentestingThis course is designed for those looking to gain skills related to penetration testing web applications.
Course
|
FinCEN and the Digital Identity MissionJoin Tom Field and Kay Turner, U.S. Department of the Treasury as they discuss FinCEN, the Digital Identity Mission, and compliance.
Course
|
Exposure Management for Modern Attack SurfaceJoin Kartik Shahani in an exploration of the cloud, ever expanding attack surfaces, and endpoint security.
Course
|
DNSThis series explores the practical application of DNS, the Domain Naming System. We demonstrate using DNS records to support websites, mail servers, and other services.
Course
|