We no longer support Internet Explorer

Please download one of these browsers:

Chrome Firefox Safari Microsoft Edge

Keep your browser version up-to-date for a fast, secure, web experience.

Skip to content
  • Solutions
    • CyberEd Essentials
    • CyberEd Pro
    • CyberEd Pro +
    • Enterprise
  • Insights
  • Pricing
  • Catalog
  • Contact Us
  • Solutions
    • CyberEd Essentials
    • CyberEd Pro
    • CyberEd Pro +
    • Enterprise
  • Insights
  • Pricing
  • Catalog
  • Contact Us
Back

Cybersecurity Analyst

Search

Clear Expand Collapse

Apple Certified Support Professional macOS 11

Apple Certified Support Professional (ACSP) certification confirms the candidate's understanding of macOS's core functionality as well as having the ability to configure key services, perform basic troubleshooting, and support multiple users with essential macOS capabilities.

Course duration Duration: 12 hours

Becoming a Linux Power User

Becoming a Linux Power User is a technical skills course designed to elevate viewers to "Power User" status.

Course duration Duration: 8 hours, 45 min.

Becoming a Linux Server Admin

The Becoming a Linux Server Administrator covers managing Linux servers in a business environment.

Course duration Duration: 12 hours, 15 min.

CertNexus Certified Internet of Things Practitioner (ITP-110)

The CertNexus Certified Internet of Things Practitioner examination will prepare an individual with the skills necessary to evaluate, design, and create an internet of things solution.

Course duration Duration: 4 hours, 30 min.

CertNexus CyberSec First Responder (CFR-310)

This course covers network defense and incident response methods, tactics, and procedures that are in alignment with industry frameworks such as NIST 800-61r2 (Computer Security Incident Handling Guide), US-CERT's National Cyber Incident Response Plan (NCIRP), and Presidential Policy Directive (PPD)-41 on Cyber Incident Coordination.

Course duration Duration: 13 hours, 20 min.

Cisco CyberOps Associate (200-201)

This course is designed for aspiring or current IT professionals who want to learn how to fulfill the role of an entry or associate-level cybersecurity analyst. Start today!

Course duration Duration: 6 hours, 12 min.

CompTIA CASP+ (CAS-004)

CASP+ covers the technical knowledge and skills required to conceptualize, design, and engineer secure solutions across complex enterprise environments. The certification is designed for advanced security professionals that have knowledge of Security+

Course duration Duration: 26 hours, 18 min.

CompTIA CySA+ (CS0-003)

The CompTIA CySA+ is an industry-recognized certification that aims to validate the skills and knowledge of cybersecurity analysts.

Course duration Duration: 15 hours, 11 min.

CompTIA Security+ (SY0-701)

This course is designed to equip you with the knowledge and skills required to excel in the dynamic field of cybersecurity and achieve the CompTIA Security+ certification

Course duration Duration: 30 hours, 19 min.

CyberPatriot

CyberPatriot is an amazing free program. It is a National Youth Cyber Education Program with emphasis on the national competition. Get Started Today!

Course duration Duration: 11 hours, 25 min.

EC-Council CEH V.12

The Certified Ethical Hacker(CEH) v12 course is designed to give the student a foundational knowledge base and skillset to be an asset to their current organization as a security analyst, or to become an effective member of a security team engaged in offensive security testing and vulnerability assessments.

Course duration Duration: 48 hours, 17 min.

GIAC Security Essentials (GSEC)

The GIAC Security Essentials (GSEC) is designed for Security Professionals who want to demonstrate that they are qualified for IT systems hands-on roles with respect to security tasks.

Course duration Duration: 10 hours, 44 min.

Intro to AV/EDR Evasion

Embark on your journey into the dynamic world of cybersecurity with our introductory course tailored for aspiring red team members or advanced penetration testers. Designed for those new to the realm of Antivirus (AV) and Endpoint Detection and Response (EDR) evasions.

Course duration Duration: 5 hours

Introduction to Programming Using Python

In this series, we are going to take a look at programming using the Python programming language. If you have tried to start before and just spun your wheels, then you should give it a try again.

Course duration Duration: 9 hours, 45 min.

ISC2 Certified in Cybersecurity: Cybersecurity Fundamentals

Embark on your cybersecurity journey with Cybersecurity Fundamentals, a course designed for those new to the field. This course prepares you for the ISC2 Certified in Cybersecurity (CC) exam

Course duration Duration: 7 hours

ISC2 SSCP: Systems Security Certified Practitioner

The Systems Security Certified Practitioner (SSCP) is ideal for IT administrators, managers, directors and network security professionals responsible for the hands-on operational security of their organization's critical assets

Course duration Duration: 27 hours

Linux Command Line

The Linux Command Line show is designed to introduce viewers to working on Linux based computers using only the command line interface. This is considered the first step in learning BASH scripting as most scripts are made up of a series of CLI commands.

Course duration Duration: 9 hours, 15 min.

Linux Essentials

The Linux Essentials certification from the Linux Professional Institute is designed to showcase your foundation skills in working with the Linux operating system.

Course duration Duration: 8 hours, 40 min.

Linux for Beginners

Linux for Beginners is a technical skills course designed to introduce new users to the Linux operating system.

Course duration Duration: 2 hours

Linux in the Cloud

The Linux in the Cloud series focuses on implementing the Linux operating system in a virtualized environment.

Course duration Duration: 5 hours, 20 min.

Linux Security Techniques

The Linux Security Techniques series introduces the viewers to the various security features found in modern Linux distributions.

Course duration Duration: 11 hours

Linux Shell Scripting - Advanced

In this series, Daniel and Justin take a look at some of the more advanced scripting practices. Here they will empower your scripts by taking advantage of things like Functions, Libraries, creating graphical elements, sed (Stream EDitor), gawk, and Regular Expression.

Course duration Duration: 8 hours, 15 min.

LPIC-1 Linux Administrator (101-500)

The LPIC-1 Linux Administrator certification demonstrates a basic proficiency with the Linux operating system and the ability to perform real-world maintenance and administrative tasks.

Course duration Duration: 12 hours, 20 min.

LPIC-1 Linux Administrator (102-500)

The LPIC-1 Linux Administrator certification demonstrates a basic proficiency with the Linux operating system and the ability to perform real-world maintenance and administrative tasks.

Course duration Duration: 10 hours, 40 min.

LPIC-2 Linux Engineer (201-450)

The LPIC-2 Linux Engineer certification demonstrates an advanced proficiency with the Linux operating system and the ability to perform real-world maintenance and administrative tasks.

Course duration Duration: 10 hours, 15 min.

LPIC-2 Linux Engineer (202-450)

The LPIC-2 Linux Engineer (202-450) course is designed for IT Professionals who are seeking the LPIC-2 certification. The course covers skills required of any intermediate to advanced systems administrator who is tasked with supporting Linux in a production environment.

Course duration Duration: 13 hours

Mastering Microsoft Endpoint Manager and Intune

Master Microsoft Endpoint Manager and Intune to streamline device management and enhance security.

Course duration Duration: 3 hours

Microsoft Sentinel Skills

Microsoft Sentinel is a scalable, cloud-native, security information and event management (SIEM) and security orchestration, automation, and response (SOAR) solution.

Course duration Duration: 8 hours

NIST Cybersecurity and Risk Management Frameworks

In the US, NIST is the de-facto standard for security, compliance and privacy. If you are doing business with the US federal government, manage critical infrastructure, or maintain personally identifiable information (PII), you must be compliant with NIST standards. NIST provides the Cybersecurity Framework (CSF) and Risk Management Framework (RMF) to guide organizations on securing their infrastructure, systems, and data.

Course duration Duration: 21 hours, 20 min.

OWASP Top 10

This course is designed to teach you about the 2021 version of the OWASP Top 10 Web Application Vulnerabilities. The OWASP Top 10 is a list of the most critical security risks to web applications, and it is widely used by organizations to improve their web application security.

Course duration Duration: 8 hours

PowerShell Skills

This course is for anyone wanting to learn how to write PowerShell scripts to automate tasks.

Course duration Duration: 7 hours, 30 min.

SC-200: Microsoft Security Operations Analyst

SC-200: Microsoft Security Operations Analyst certification focuses on managing and mitigating security threats using Microsoft tools.

Course duration Duration: 8 hours, 40 min.

VMware VCP-DCV (Updated for vSphere 7)

This course takes you from introductory to advanced VMware vSphere management skills. Starting with the knowledge required to install and configure, you will also develop the advanced skills needed to manage and maintain a highly available and scalable virtual infrastructure.

Course duration Duration: 18 hours, 30 min.

Vulnerable Erlang

Master container security in our Vulnerable Erlang course! Exploit CVE-2025-32433, deploy vulnerable Docker containers, detect threats with Sysdig Falco, and secure systems. Ideal for security professionals, DevSecOps, and pentesters.

Course duration Duration: 1 hour, 30 min.

Windows Terminal Skills

This course will acquaint learners with the new Windows Terminal Application.

Course duration Duration: 2 hours, 50 min.

Working with SSH

The Working with SSH show aims to remove the intimidation of using the Secure Shell protocol on your network. SSH allows for encrypting network communications to protect from eavesdropping and man-in-the-middle attacks. This series demonstrates how to configure and use SSH to securely manage your systems.

Course duration Duration: 40 minutes

Search

Clear

  
Contact Us

+1-609-356-1499 | info@cybered.io | Sign Up for Our Newsletter

©2024 Information Security Media Group | About ISMG | Privacy & GDPR Statement