CyberEd Pro+
Subscription
Push your cybersecurity prowess to the next level with CyberEd Pro+—the ultimate immersive training experience. This tier includes all the benefits of CyberEd Essentials and CyberEd Pro, plus interactive, hands-on labs and simulated cyber ranges. Develop real-world attack and defense strategies through experiential exercises, reinforcing technical proficiency for both individuals and teams. Experience advanced learning that allows you to learn, test, and refine your skills in dynamic, realistic environments.
What’s Included:
- All CyberEd Essentials & Pro Features
Enjoy access to the same leading events, expert-led webinars, specialized training, professional community, and automated CPE tracking available in both Essentials and Pro. - Hands-On Labs & Cyber Ranges
Strengthen your skills with engaging, real-world simulations that mimic authentic cyber threats, enabling safe yet immersive practice. - Red Team & Blue Team Exercises
Dive into offense-focused and defense-focused scenarios, developing a comprehensive perspective on modern cybersecurity challenges. - Escape Rooms & Scenario-Based Challenges
Tackle interactive puzzles and complex threat simulations designed to enhance problem-solving skills in high-pressure environments. - Advanced Experiential Learning
Explore a wide range of cutting-edge techniques and strategies, solidifying your expertise through trial, error, and hands-on mastery.
Here is a list of the items in the subscription:
Hands-On Web App PentestingThis course is designed for those looking to gain skills related to penetration testing web applications.
Course
|
AI and ML in CybersecurityAI and ML in Cybersecurity explores the intersection of AI and cybersecurity in this comprehensive course designed for learners at all levels.
Course
|
Dark Web & Threat Intelligence: Understanding Your EnemyJoin Manoj Abraham in an exploration of the dark web.
Course
|
OT Attack!"OT Attack!" is a hands-on tabletop simulating cyber-attacks on OT systems.
Course
|
Practical Pentesting: featuring Brad StineIn this series, Daniel and Brad will take a look at what a pentesting engagement looks like through the lens of Brad's experience as a pentester.
Course
|
The Future of Ransomware & Evolving AttacksJoin Troy Leach, Shannon Lawson, and Mike Manrod in a discussion of adaptations are needed to keep pace with the changing ransomware environment.
Course
|
CompTIA IT Fundamentals+ (FC0-U61)CompTIA IT Fundamentals+ (ITF+) is an entry-level certification for beginners exploring IT
Course
|
Intro to OWASP & Security Logging FailuresDive into OWASP's logging or monitoring related cybersecurity concerns, risk mitigation strategies and pro tips!
Course
|
Mastering Microsoft Endpoint Manager and IntuneMaster Microsoft Endpoint Manager and Intune to streamline device management and enhance security.
Course
|
This Is How You FailJoin Chase Cunningham, the "Doctor of Zero Trust" in a conversation about why well-meaning enterprises fail.
Course
|
Demystifying Zero Trust with Greg TouhillGreg Touhill Director, CERT Division, Carnegie Mellon University Software Engineering Institute
Course
|
All Other Identities: Implications for Zero TrustThe world of identity and access management has spent the last 30 years or more focusing almost exclusively on the enterprise workforce.
Course
|
Amping Up Splunk with Advanced AdminLearn Splunk parsing and data management. Mask, reroute, and transform data. Build on your Splunk Enterprise administration skills.
Course
|
PowerShell SkillsThis course is for anyone wanting to learn how to write PowerShell scripts to automate tasks.
Course
|
Strategies Against Geopolitical Cyber ThreatsStrategies Against Geopolitical Cyber Threats outlines strategies to defend critical infrastructure from state-sponsored attacks.
Course
|
Taming ICS and OT Cyber ThreatsLearn about taming ICS and OT cyber threats to implement more secure cybersecurity risk management strategies today!
Course
|
Commanding the IT-OT ConvergenceCommanding the IT-OT Convergence is designed for leaders tasked with driving the secure convergence of IT and OT systems. Click continue to start!
Course
|
Combatting Social Engineering & Insider ThreatsTake practical, actionable steps to enhance the overall security posture of your financial service organization today!
Course
|
Developing Solutions for Microsoft Azure (AZ-204)AZ-204: Developing Solutions for Microsoft Azure certification validates expertise in designing, building, and maintaining cloud applications.
Course
|
AZ-140: Microsoft Azure Virtual DesktopAZ-140: Microsoft Azure Virtual Desktop certification focuses on planning, delivering, and managing virtual desktop experiences using Azure.
Course
|
AZ-500: Microsoft Azure Security TechnologiesAZ-500: Microsoft Azure Security Technologies certification focuses on managing security for Azure environments.
Course
|
Nefarious Use of Modern MoneyJoin Karen Boyer, Claire Le Gal and David Pollino in a discussion of the criminal use of newer forms of money movement to hide criminal proceeds and cash out.
Course
|
CompTIA CySA+ (CS0-003)The CompTIA CySA+ is an industry-recognized certification that aims to validate the skills and knowledge of cybersecurity analysts.
Course
|
CompTIA Cloud Essentials+CompTIA Cloud Essentials+ is for both IT and non-technical professionals who require the essential business acumen needed to make informed cloud service decisions.
Course
|
CompTIA A+ Core 2Learn and master the material needed to pass the CompTIA A+ Core 2 exam!
Course
|
CompTIA A+ Core 1Learn and master the material for CompTIA's A+ Core 1 Exam
Course
|
CompTIA Server+ (SK0-005)CompTIA Server+ (SK0-005) certification validates the skills needed to manage and troubleshoot servers in data centers and cloud environments.
Course
|
Absolute Musts in Your Incident Response PlanJoin Rocco Grillo, Kevin Li, and Parthiv Shah as they discuss incident response plans that work... and those that fail!
Course
|
Microsoft Power BI SkillsEnhance your Microsoft Power BI skills to create impactful data visualizations and business intelligence solutions.
Course
|
Microsoft Sentinel SkillsMicrosoft Sentinel is a scalable, cloud-native, security information and event management (SIEM) and security orchestration, automation, and response (SOAR) solution.
Course
|
Networking FundamentalsLearn network fundamentals: components, topologies, IPv4/IPv6 addressing, and more.
Course
|
Accredited DevOps FoundationLearn DevOps concepts and principles. Become a DevOps Professional. Prepare for the EXIN DevOps Professional certification exam.
Course
|
Accredited DevOps ProfessionalPrepare for the EXIN DevOps Professional certification. Learn DevOps concepts, principles, and practice with sample exams.
Course
|
Accredited Management of Risk® PractitionerLearn practical Risk Management. Explore case studies and exercises. Prepare for the Management of Risk® Practitioner exam.
Course
|
Accredited SIAM FoundationSIAM: Manage multi-provider services. Learn the business case, benefits, processes, and challenges. Prepare for the EXIN SIAM Foundation exam.
Course
|
SOC 2 ComplianceSOC 2, developed by the American Institute of CPAs, outlines how organizations manage customer data. Comply with SOC 2 today!
Course
|
The Impact of HRM on Breach PreventionSecurity awareness training has done little to decrease the percentage of cyber incidents involving human error.
Course
|
OWASP with Hannah McCartneyJoin Hannah McCartney your trusted AI guide and explore the top 10 categories of application security risk.
Course
|
NCUA Cybersecurity Compliance Practical ApplicationEnhance your credit union's overall security posture with NCUA Cybersecurity Compliance training today!
Course
|
Becoming a Linux Power UserBecoming a Linux Power User is a technical skills course designed to elevate viewers to "Power User" status.
Course
|
ZTNA-Evolving Beyond Antiquated VPNsJoin Dr. Chase Cunningham in an explanation of why companies should move away from VPNs and toward zero-trust network access (ZTNA) solutions.
Course
|
Becoming a Linux Server AdminThe Becoming a Linux Server Administrator covers managing Linux servers in a business environment.
Course
|
Zero Trust, The DoD & YouZero trust, supply chain security and DevSecOps.
Course
|
Zero Trust Case Study: Inwood BankJoin Tom Field, Jon Drake and John Kindervag to discuss Inwood National Bank's Zero Trust journey.
Course
|
Windows Terminal SkillsThis course will acquaint learners with the new Windows Terminal Application.
Course
|
Windows Admin CenterMaster Windows Admin Center to simplify server and infrastructure management. Enroll today!
Course
|
Zero Trust: The Key to Securing Higher EducationJoin George Finney, the CISO at Southern Methodist University and explore higher education specific cybersecurity challenges.
Course
|
SC-200: Microsoft Security Operations AnalystSC-200: Microsoft Security Operations Analyst certification focuses on managing and mitigating security threats using Microsoft tools.
Course
|
Intro to OWASP & Insecure DesignLearn about OWASP's design related cybersecurity concerns, risk mitigation strategies and pro tips!
Course
|
Intro to OWASP & InjectionLearn about OWASP's injection related cybersecurity concerns, risk mitigation strategies and pro tips!
Course
|
Intro to OWASP & Auth FailuresDive into OWASP's identification or authentication related cybersecurity concerns, risk mitigation strategies and pro tips!
Course
|
Intro to OWASP & Cryptographic FailuresLearn about OWASP's encryption related cybersecurity concerns, risk mitigation strategies and pro tips!
Course
|
CISA: Certified Information Systems AuditorThis course will help you understand the requirements for passing ISACA's Certified Information Systems Auditor exam.
Course
|
Cisco CCNA (200-301)This comprehensive CCNA 200-301 Certification Course is designed to prepare students for the Cisco Certified Network Associate (CCNA) exam
Course
|
Cisco CCNP Data Center DCCOR (350-601)The DCCOR course helps you prepare for the CCNP Data Center and CCIE Data Center certifications for advanced-level data center roles.
Course
|
Preparing for Industry 5.0 and 6.0Preparing for Industry 5.0 and 6.0 highlights security challenges and benefits introduced by Industry 5.0 and 6.0.
Course
|
Linux Security TechniquesThe Linux Security Techniques series introduces the viewers to the various security features found in modern Linux distributions.
Course
|
Linux in the CloudThe Linux in the Cloud series focuses on implementing the Linux operating system in a virtualized environment.
Course
|
Customer IAM & the Path to Making Identity BetterJoin Jeremy Grant in an examination of the critical role of digital identity as infrastructure.
Course
|
Linux for BeginnersLinux for Beginners is a technical skills course designed to introduce new users to the Linux operating system.
Course
|
Linux EssentialsThe Linux Essentials certification from the Linux Professional Institute is designed to showcase your foundation skills in working with the Linux operating system.
Course
|
Leading NCUA Cybersecurity ComplianceLead teams that safeguard member information, maintain the integrity of financial operations, and remain NCUA compliant.
Course
|
Leading Financial Supply Chain Cybersecurity TeamsExpand your third party vendor and supply chain cybersecurity leadership skills and drive better business impact, for your business today!
Course
|
Jr Penetration Test - TheoreticalJoin CyberSage for your hacker initiation and kick off your Penetration Testing journey today!
Course
|
ISO/IEC 27001Join our AI guide in this course about ISO/IEC 27001 the international standard that provides a framework for Information Security Management Systems (ISMS).
Course
|
Intro to OWASP & Security MisconfigurationLearn about OWASP's misconfiguration related cybersecurity concerns, risk mitigation strategies and pro tips!
Course
|
Intro to OWASP & Server-Side Request ForgeryDive into OWASP's server-side request forgery cybersecurity concerns, risk mitigation strategies and pro tips!
Course
|
Intro to OWASP & Data Integrity FailuresLearn about OWASP's integrity related cybersecurity concerns, risk mitigation strategies and pro tips!
Course
|
Intro to OWASP & Outdated ComponentsDive into OWASP's component related cybersecurity concerns, risk mitigation strategies and pro tips!
Course
|
Intro to PCI DSSEveryone in finance should know the basics of payment card data security compliance. Learn about payment card industry data security standard compliance today!
Course
|
Intro to Ransomware in FinServEvery financial sector business professional should have a basic understanding of ransomware threats. Kick off your ransomware journey today!
Course
|
Intro to the Gramm-Leach-Bliley ActLearn how the Gramm-Leach-Bliley Act requires financial institutions to explain information-sharing practices and safeguard sensitive data.
Course
|
Intro to the NCUA's Cybersecurity RequirementsEvery financial sector business professional should know the basics of data protection and NCUA compliance. Start your NCUA journey today!
Course
|
CyberPatriotCyberPatriot is an amazing free program. It is a National Youth Cyber Education Program with emphasis on the national competition. Get Started Today!
Course
|
Introduction to a Security Operations CenterLearn about strategic importance of SOCs and consider potential career paths within this essential domain.
Course
|
Intro to OWASP & Broken Access ControlLearn about OWASP's broken access control related cybersecurity concerns, risk mitigation strategies and pro tips!
Course
|
Intro to OWASPThe OWASP Top 10, which highlights the top ten cybersecurity risks. Dive into each risk category, risk mitigations strategies and pro tips today!
Course
|
Intro to Malware Analysis, Part 1Explore the principles of malware analysis and set up your own malware analysis lab!
Course
|
Intro to ICS & OT CybersecurityLearn the basics of Industrial Control Systems (ICS) and Operational Technology (OT) to protect your organization from cybersecurity related threats!
Course
|
ICS SCADA and IIoT VulnerabilitiesICS SCADA and IIoT Vulnerabilities discusses the components of ICS, SCADA, and IIoT systems their vulnerabilities and threats.
Course
|
Human Risk ManagementTackle the human aspect of cybersecurity in this course about human risk management.
Course
|
How Hybrid Work Enabled Security Service Edge in UKIJoin Christopher Hines and Tom Field as they discuss how hybrid work paved the way for the security service edge in UKI.
Course
|
HIPAAJoin our AI guide in this course about The Health Insurance Portability and Accountability Act of 1996 (HIPAA).
Course
|
Fundamentals of Cybersecurity - Part 4Fundamentals of Cybersecurity Part 4 is an introduction to Cloud and Web Security.
Course
|
Fundamentals of Cybersecurity - Part 5Fundamentals of Cybersecurity Part 5 is an introduction to compliance and human risk management.
Course
|
Fundamentals of Cybersecurity - Part 3Fundamentals of Cybersecurity, Part 3 covers overarching concepts of endpoint and data security.
Course
|
Fundamentals of Cybersecurity - Part 2Fundamentals of Cybersecurity, Part 2 is an introduction to Access Control and Network Security.
Course
|
Fundamentals of Cybersecurity - Part 1Fundamentals of Cybersecurity, Part 1 is an introduction to cybersecurity and risk management.
Course
|
FinCEN and the Digital Identity MissionJoin Tom Field and Kay Turner, U.S. Department of the Treasury as they discuss FinCEN, the Digital Identity Mission, and compliance.
Course
|
Financial Supply Chain CybersecurityImplement stronger third party vendor and supply chain cybersecurity risk mitigation tactics today!
Course
|
FDIC Cybersecurity Laws and RegulationsMake sure your institution stays compliant. Brush up on FDIC Laws and Regulations today!
Course
|
Exposure Management for Modern Attack SurfaceJoin Kartik Shahani in an exploration of the cloud, ever expanding attack surfaces, and endpoint security.
Course
|
DNSThis series explores the practical application of DNS, the Domain Naming System. We demonstrate using DNS records to support websites, mail servers, and other services.
Course
|