We no longer support Internet Explorer

Please download one of these browsers:

Chrome Firefox Safari Microsoft Edge

Keep your browser version up-to-date for a fast, secure, web experience.

Skip to content
CyberEd.io
  • About
    About
    Company Our values Challenges we solve
    Event partnerships
    NullconHardwear.ioOTSEC.World
  • Solutions
    Subscriptions
    CyberEd EssentialsCyberEd ProCyberEd Pro+Pricing
    Enterprise
    CyberEd EnterpriseCyberEd CustomCyberEd Interactives
    Interactives
    Breach of FaithEcho ChamberKill SwitchCode RedZero HourPoint of FailureCompromised Agenda
    Immersive Learning
    LabsMasterclassesInteractivesCapture the Flag (CTF)Role-based PathwaysCyberEd Communities
  • Training
    Sectors
    Financial ServicesHealthcareManufacturingPayments
    Roles
    SOC Analysts & EngineersDevSecOpsThreat Intelligence Analysts
    Disciplines
    AI Security (Adversarial AI & Defense)Artificial Intelligence (AI) in SecurityBug HuntingCloud SecurityDevice SecurityForensics & Malware AnalysisGovernance, Risk & Compliance (GRC)
    Hardware & Embedded SecurityIncident ResponseOperational Technology (OT) SecurityPlatform SecurityResearch & VulnerabilitiesSoftware Supply Chain SecurityThreat Intelligence & Threat Hunting
  • Catalog
  • Resources
  • Contact us
  • User login
  • About
    About
    CompanyOur valuesChallenges we solve
    Event partnerships
    NullconHardwear.ioOTSEC.World
  • Solutions
    Subscriptions
    CyberEd EssentialsCyberEd ProCyberEd Pro+Pricing
    Enterprise
    CyberEd EnterpriseCyberEd CustomCyberEd Interactives
    Interactives
    Breach of FaithEcho ChamberKill SwitchCode RedZero HourPoint of FailureCompromised Agenda
    Immersive Learning
    LabsMasterclassesInteractivesCapture the Flag (CTF)Role-based PathwaysCyberEd Communities
  • Training
    Sectors
    Financial ServicesHealthcareManufacturingPayments
    Roles
    SOC Analysts & EngineersDevSecOpsThreat Intelligence Analysts
    Disciplines
    AI Security (Adversarial AI & Defense)Artificial Intelligence (AI) in SecurityBug HuntingCloud SecurityDevice SecurityForensics & Malware AnalysisGovernance, Risk & Compliance (GRC)
    Hardware & Embedded SecurityIncident ResponseOperational Technology (OT) SecurityPlatform SecurityResearch & VulnerabilitiesSoftware Supply Chain SecurityThreat Intelligence & Threat Hunting
  • Catalog
  • Resources
  • Contact us
  • User login
Back

Identity & Access Management Specialist

Microsoft 365 Security Administration (MS-500)

This course is designed for Microsoft Administrators who implement, manage, and monitor security and compliance solutions for Microsoft 365 and hybrid environments.

Course duration Duration: 37 hours, 9 min.

Zero Trust Case Study: Inwood Bank

Join Tom Field, Jon Drake and John Kindervag to discuss Inwood National Bank's Zero Trust journey.

Course duration Duration: 25 minutes

Identity Security: Moving the Goal Posts

Al Pascual explores the paradigm shift in identity management, from traditional controls to challenges posed by Web3, the Metaverse, and NFTs. Discover how identity goalposts have shifted, the new opportunities and challenges for vendors and practitioners, and what it means for the future of identity.

Course duration Duration: 24 minutes

Zero Trust and Microsegmentation

Tony Steffe demystifies zero trust and microsegmentation, offering actionable steps to counter ransomware. Learn to identify vulnerabilities, close risky ports, and use existing tools effectively. Discover how to implement zero trust strategies without added complexity to protect your organization.

Course duration Duration: 12 minutes

ZT Q&A with Greg Touhill

In this Q&A session, Greg Touhill shares key strategies for implementing zero trust. Learn how to understand your data environment, set access rules, and align organizational objectives. Gain practical advice on adopting enabling technologies, including reference checks and lessons from peers.

Course duration Duration: 11 minutes

Winning the Account Takeover Battle

Join Ayelet Biger-Levin and Erin Englund as they examine real-world fraud cases and analyze digital behavior to decide whether the transaction is being conducted by a genuine customer or a criminal.
 

Course duration Duration: 35 minutes

Can Zero Trust & Risk Management Coexist?

Join John Kindervag , E.P. Mathew, and Grant Schneider in a discussion about Zero Trust and Risk Management.

Course duration Duration: 31 minutes

Customer IAM & the Path to Making Identity Better

Join Jeremy Grant in an examination of the critical role of digital identity as infrastructure.

Course duration Duration: 22 minutes

This Is How You Fail

Join Chase Cunningham, the "Doctor of Zero Trust" in a conversation about why well-meaning enterprises fail.

Course duration Duration: 27 minutes

IDPro: Upscaling Digital Identity Management

Glazer is the senior vice president for identity product management at Salesforce. His responsibilities include leading the product management team, product strategy, and identity standards work.

Course duration Duration: 30 minutes

Demystifying Zero Trust with Greg Touhill

Greg Touhill
Director, CERT Division, Carnegie Mellon University Software Engineering Institute

Course duration Duration: 30 minutes

SC-300: Microsoft Identity and Access Administrator

SC-300: Microsoft Identity and Access Administrator certification validates expertise in managing identities, implementing access management solutions, and securing authentication with Microsoft tools.

Course duration Duration: 16 hours

Hands-on with Windows Server 2019

Even though the MCSA and MCSE have been retired, many of us still manage on-premises environments running Windows Server 2019. This course covers some of the basic administration tasks, updated for Windows Server 2019.

Course duration Duration: 7 hours, 25 min.

Linux Security Techniques

The Linux Security Techniques series introduces the viewers to the various security features found in modern Linux distributions.

Course duration Duration: 11 hours

CRISC: Certified in Risk and Information Systems Control

The ISACA Certified in Risk and Information Systems Control certification is one of the top risk management certifications in the world. This course will help prepare you to be acknowledged as a Risk Management expert.

Course duration Duration: 16 hours, 30 min.

Linux Fundamentals for Certification

The Linux Fundamentals for Certification learning path provides essential Linux operating system skills and prepares you for entry-level Linux certification exams. You'll master core command-line operations and fundamental system administration concepts.

Course duration Duration: 74 hours, 15 min.

NIST Cybersecurity and Risk Management Frameworks

In the US, NIST is the de-facto standard for security, compliance and privacy. If you are doing business with the US federal government, manage critical infrastructure, or maintain personally identifiable information (PII), you must be compliant with NIST standards. NIST provides the Cybersecurity Framework (CSF) and Risk Management Framework (RMF) to guide organizations on securing their infrastructure, systems, and data.

Course duration Duration: 21 hours, 20 min.

The Advent of the OT SOC

WSP's Christopher Johnson examines the evolution of OT-focused security operations centers, highlighting critical differences from traditional IT SOCs.

Course duration Duration: 15 minutes

AI-Powered SOC and Threat Intelligence

Learn about cutting edge trends in AI-Powered SOCs today!

Course duration Duration: 45 minutes

Zero Trust and Privacy

Explore data's critical role in zero trust strategies with Hudl's CISO Robert LaMagna-Reiter and Dr. Lisa McKee of Protiviti. Learn about privacy and security coordination, overcoming challenges, and integrating zero trust to enhance organizational security and compliance.

Course duration Duration: 30 minutes

OWASP Top 10

This course is designed to teach you about the 2021 version of the OWASP Top 10 Web Application Vulnerabilities. The OWASP Top 10 is a list of the most critical security risks to web applications, and it is widely used by organizations to improve their web application security.

Course duration Duration: 8 hours

MITM on PSTN

Kirils Solovjovs of Possible Security exposes novel methods for intercepting phone calls through PSTN vulnerabilities, demonstrating how attackers can exploit SS7 protocols and call routing mechanisms.

Course duration Duration: 30 minutes

Protecting Financial Services in an Era of Cyber Turbulence

Industry leaders Matanda Doss, Susan Koski, William Beer and Paul Leonhirth discuss cloud adoption challenges, API security and AI-powered fraud detection in financial services cybersecurity.

Course duration Duration: 25 minutes

Navigating Cyberthreats in Financial Services

Fred Harris, Matanda Doss and Patrice Boffa examine emerging attack patterns targeting financial services' revenue-generating digital assets.

Course duration Duration: 30 minutes

Control Cybersecurity Complexity by Knowing Assets

Sean Blenkhorn from Axonius explains modern approaches to cybersecurity asset management in increasingly complex environments.

Course duration Duration: 15 minutes

Mitigating Risk in Unmonitored Business Channels

SafeGuard Cyber CEO Chris Lehman discusses AI-powered defense strategies against language-based attacks across communication channels.

Course duration Duration: 25 minutes

Reclaim Control Over Your Secrets

Stephen Johnson introduces Entro's Secrets Security Platform for managing secrets across vaults, source code and cloud environments.

Course duration Duration: 10 minutes

Mitigating the Evolving DDoS Threat Landscape

Siddharth Iyer from Radware examines current DDoS attack trends and proactive protection strategies for financial institutions.

Course duration Duration: 10 minutes

A Sit Down With the Former CISO of the City of New York

Geoff Brown, former CISO of the City of New York, shares insights on machine-to-machine intelligence and lessons from Ukraine and Belgium's cybersecurity strategies.

Course duration Duration: 30 minutes

Why FinServ Cyber Pros Must Embrace Data-Centric Security

Trevor Foskett of Virtru explores military-grade encryption and data-centric protection strategies for financial services compliance and security.

Course duration Duration: 10 minutes

Real-Time Attack Tracing and Automation in the SOC

David Cifuentes of Devo Technology demonstrates how AI can eliminate 95% of security alerts and enable real-time threat detection in financial SOCs.

Course duration Duration: 15 minutes

ChatGPT: I, for One, Welcome Our New AI Overlords!

Steven Wallstedt, Vlad Brodsky and Bino Gopal discuss real-world applications and challenges of generative AI in financial services security.

Course duration Duration: 35 minutes

Gen AI & Cyber Mesh for Financial CISOs

Industry experts Gary Meshell and John Gutkowski explore how financial institutions can integrate AI and cyber mesh architecture to enhance threat detection and improve security resilience.

Course duration Duration: 25 minutes

Protecting Trust in a Changing World

Claire Le Gal, SVP at Mastercard, explores payment security evolution, cyber risk mitigation and fraud prevention strategies in an evolving digital landscape.

Course duration Duration: 25 minutes

Balancing Agility & Cyber Resilience

Prof. Syed Munir Khasru shares insights on fostering business-IT collaboration, building enterprise-wide data strategies, and ensuring robust data governance. Learn how to optimize data use while safeguarding security and privacy in a data-driven world.

Course duration Duration: 25 minutes

Implementing Zero Trust for Resilient Business: CIO's Role

Join James Thang to explore zero trust’s business implications, challenges, and the CIO’s role. Learn how IT and security teams collaborate to balance security posture with user experience and align zero trust with business goals and risk tolerance.

Course duration Duration: 30 minutes

Hybrid Workplace: Fad or Future

Explore how CIOs empower hybrid workforces with insights from Anil Kumar Saha and Ivan Irawan. Learn about collaboration tools, evolving workforce needs, cybersecurity, and data-driven strategies for productivity and innovation in hybrid models.

Course duration Duration: 30 minutes

Pivoting Technology From Cost Center to Revenue Generator

Discover how CIOs can position technology as a value creator and revenue generator with insights from Santosh Nair and Sourabh Chitrachar. Explore innovations for new revenue models, IT's role beyond enablement, and overcoming challenges in demonstrating IT's value.

Course duration Duration: 25 minutes

How to Secure Digital Identity in the Face of Rising Cyberthreats

Pierre-François Guglielmi of Rubrik explores how unified identity protection reduces recovery time from days to hours while maintaining cyber resilience across hybrid environments.

Course duration Duration: 30 minutes
Information Security Media Group

As the education division of ISMG, CyberEd.io delivers premium cybersecurity training. We advance workforce readiness through flexible, expert-led learning and continuously updated content that keeps pace with today’s challenges and tomorrow’s evolving needs.

About
  • About CyberEd.io
  • About ISMG
  • Contact us
Subscriptions
  • CyberEd Essentials
  • CyberEd Pro
  • CyberEd Pro+
  • Pricing
  • User login
Enterprise
  • CyberEd Enterprise
  • CyberEd Interactives
  • CyberEd Custom
Resources
  • Resource Center
  • Blog
+1-609-356-1499 info@cybered.io Sign Up for Our Newsletter About ISMG Privacy & GDPR Statement
Ask Apollo a question?

Floating Button