We no longer support Internet Explorer

Please download one of these browsers:

Chrome Firefox Safari Microsoft Edge

Keep your browser version up-to-date for a fast, secure, web experience.

Skip to content
CyberEd.io
  • About
    About
    Company Our values Challenges we solve
    Event partnerships
    NullconHardwear.ioOTSEC.World
  • Solutions
    Subscriptions
    CyberEd EssentialsCyberEd ProCyberEd Pro+Pricing
    Enterprise
    CyberEd EnterpriseCyberEd CustomCyberEd Interactives
    Interactives
    Breach of FaithEcho ChamberKill SwitchCode RedZero HourPoint of FailureCompromised Agenda
    Immersive Learning
    LabsMasterclassesInteractivesCapture the Flag (CTF)Role-based PathwaysCyberEd Communities
  • Training
    Sectors
    Financial ServicesHealthcareManufacturingPayments
    Roles
    SOC Analysts & EngineersDevSecOpsThreat Intelligence Analysts
    Disciplines
    AI Security (Adversarial AI & Defense)Artificial Intelligence (AI) in SecurityBug HuntingCloud SecurityDevice SecurityForensics & Malware AnalysisGovernance, Risk & Compliance (GRC)
    Hardware & Embedded SecurityIncident ResponseOperational Technology (OT) SecurityPlatform SecurityResearch & VulnerabilitiesSoftware Supply Chain SecurityThreat Intelligence & Threat Hunting
  • Catalog
  • Resources
  • Contact us
  • User login
  • About
    About
    CompanyOur valuesChallenges we solve
    Event partnerships
    NullconHardwear.ioOTSEC.World
  • Solutions
    Subscriptions
    CyberEd EssentialsCyberEd ProCyberEd Pro+Pricing
    Enterprise
    CyberEd EnterpriseCyberEd CustomCyberEd Interactives
    Interactives
    Breach of FaithEcho ChamberKill SwitchCode RedZero HourPoint of FailureCompromised Agenda
    Immersive Learning
    LabsMasterclassesInteractivesCapture the Flag (CTF)Role-based PathwaysCyberEd Communities
  • Training
    Sectors
    Financial ServicesHealthcareManufacturingPayments
    Roles
    SOC Analysts & EngineersDevSecOpsThreat Intelligence Analysts
    Disciplines
    AI Security (Adversarial AI & Defense)Artificial Intelligence (AI) in SecurityBug HuntingCloud SecurityDevice SecurityForensics & Malware AnalysisGovernance, Risk & Compliance (GRC)
    Hardware & Embedded SecurityIncident ResponseOperational Technology (OT) SecurityPlatform SecurityResearch & VulnerabilitiesSoftware Supply Chain SecurityThreat Intelligence & Threat Hunting
  • Catalog
  • Resources
  • Contact us
  • User login
Back

Network Security Engineer

Cisco CCNA (200-301)

This comprehensive CCNA 200-301 Certification Course is designed to prepare students for the Cisco Certified Network Associate (CCNA) exam

Course duration Duration: 20 hours, 12 min.

CompTIA Network+ (N10-009)

This course provides the learner with a comprehensive exploration of networking, encompassing essential fundamental concepts, practical network implementations, and vital operational strategies found in the CompTIA Network+ (N10-009)

Course duration Duration: 34 hours

Cisco CCNP Security SCOR (Exam 350-701)

Cisco CCNP Security SCOR course at ITProTV is ideal for any learner that wants to understand enterprise-level approaches to defense in depth security of systems and data.

Course duration Duration: 16 hours, 50 min.

Zero Trust and Microsegmentation

Tony Steffe demystifies zero trust and microsegmentation, offering actionable steps to counter ransomware. Learn to identify vulnerabilities, close risky ports, and use existing tools effectively. Discover how to implement zero trust strategies without added complexity to protect your organization.

Course duration Duration: 12 minutes

AZ-801: Configuring Windows Server Hybrid Advanced Services

AZ-801: Configuring Windows Server Hybrid Advanced Services certification teaches advanced management of hybrid environments. Learn to configure security, troubleshoot, and optimize workloads across on-premises and cloud-based Windows Server infrastructure.

Course duration Duration: 15 hours

Windows Admin Center

Master Windows Admin Center to simplify server and infrastructure management. Enroll today!

Course duration Duration: 3 hours, 20 min.

Hands-on with SCCM

The Hands-on with SCCM show is designed for Enterprise Administrators who take part in evaluating, planning, migrating, deploying, and managing Microsoft Infrastructure using the Microsoft Endpoint Manager product. Microsoft Endpoint Manager is an integrated solution for managing all of your devices.

Course duration Duration: 17 hours

Networking Fundamentals

Learn network fundamentals: components, topologies, IPv4/IPv6 addressing, and more.

Course duration Duration: 7 hours, 43 min.

PowerShell Skills

This course is for anyone wanting to learn how to write PowerShell scripts to automate tasks.

Course duration Duration: 7 hours, 30 min.

Cisco CCT Routing and Switching (100-490)

The Cisco CCT Routing and Switching course is not for the complete novice to computing and networking but is designed to increase the level of competency in networking fundamentals, configuring devices remotely, basic troubleshooting (layer 1 and layer 2) and recognizing connectivity issues.

Course duration Duration: 6 hours, 35 min.

Cisco Certified DevNet Associate (200-901)

The Cisco Certified DevNet Associate (200-901) show is produced to help the software developer, networking professional and IT professional to achieve the latest Cisco certification offer, the Cisco Certified DevNet Associate certification.

Course duration Duration: 15 hours, 45 min.

Cisco CCNP Enterprise ENCOR (350-401)

Cisco CCNP Enterprise ENCOR (350-401) will help you to learn and prepare for the associated exam—Implementing Cisco Enterprise Network Core Technologies v1.0 (ENCOR 350-401). This exam is the core exam for both the CCNP Enterprise and CCIE Enterprise certifications. In the show, you learn every topic covered in the official exam blueprint from Cisco. These areas include Architecture, Virtualization, Infrastructure, Network Assurance, Security and Automation. 

Course duration Duration: 16 hours

Hands-on with CISCO Modeling Labs 2 (CML2)

The Cisco Modeling Labs 2 (CML2) is a redevelopment and rebranding of their VIRL1.x (Virtual Internet Routing Lab). This show is meant for those who may be familiar with VIRL 1.x or are brand new to it.

Course duration Duration: 3 hours, 20 min.

Hands-on with Cisco Meraki Wireless Access Points

Cisco Meraki wireless is a cloud-based managed enterprise wireless solution. This show will introduce you to implementing Cisco Meraki enterprise access points.

Course duration Duration: 2 hours, 30 min.

Linux for Beginners

Linux for Beginners is a technical skills course designed to introduce new users to the Linux operating system.

Course duration Duration: 2 hours

Linux Essentials

The Linux Essentials certification from the Linux Professional Institute is designed to showcase your foundation skills in working with the Linux operating system.

Course duration Duration: 8 hours, 40 min.

Linux Command Line

The Linux Command Line show is designed to introduce viewers to working on Linux based computers using only the command line interface. This is considered the first step in learning BASH scripting as most scripts are made up of a series of CLI commands.

Course duration Duration: 9 hours, 15 min.

Linux Shell Scripting - Basics

In this series, Daniel and Don walk you through the fundamentals of bash scripting in the Linux operating system. Watch here as they take you through the fundamentals like: Script file formats, running scripts, working with variables, performing arithmetic, conditional statements, loops, presenting data, taking user input, and script control.

Course duration Duration: 8 hours, 45 minutes

Linux Shell Scripting - Advanced

In this series, Daniel and Justin take a look at some of the more advanced scripting practices. Here they will empower your scripts by taking advantage of things like Functions, Libraries, creating graphical elements, sed (Stream EDitor), gawk, and Regular Expression.

Course duration Duration: 8 hours, 15 min.

Becoming a Linux Power User

Becoming a Linux Power User is a technical skills course designed to elevate viewers to "Power User" status.

Course duration Duration: 8 hours, 45 min.

Becoming a Linux Server Admin

The Becoming a Linux Server Administrator covers managing Linux servers in a business environment.

Course duration Duration: 12 hours, 15 min.

Linux Security Techniques

The Linux Security Techniques series introduces the viewers to the various security features found in modern Linux distributions.

Course duration Duration: 11 hours

Red Hat Enterprise Linux 8

The Red Hat Enterprise Linux 8 (RHEL 8) course on ITPro is designed to introduce the viewer to the RHEL operating system. In this course you will learn how to install RHEL, manage networking, configure services like NFS, harden security through features like SELinux, and support virtual machines all on top of the RHEL platform.

Course duration Duration: 9 hours, 15 min.

LPIC-1 Linux Administrator (102-500)

The LPIC-1 Linux Administrator certification demonstrates a basic proficiency with the Linux operating system and the ability to perform real-world maintenance and administrative tasks.

Course duration Duration: 10 hours, 40 min.

LPIC-2 Linux Engineer (201-450)

The LPIC-2 Linux Engineer certification demonstrates an advanced proficiency with the Linux operating system and the ability to perform real-world maintenance and administrative tasks.

Course duration Duration: 10 hours, 15 min.

LPIC-2 Linux Engineer (202-450)

The LPIC-2 Linux Engineer (202-450) course is designed for IT Professionals who are seeking the LPIC-2 certification. The course covers skills required of any intermediate to advanced systems administrator who is tasked with supporting Linux in a production environment.

Course duration Duration: 13 hours

VMware VCP-DCV (Updated for vSphere 7)

This course takes you from introductory to advanced VMware vSphere management skills. Starting with the knowledge required to install and configure, you will also develop the advanced skills needed to manage and maintain a highly available and scalable virtual infrastructure.

Course duration Duration: 18 hours, 30 min.

Intro to AV/EDR Evasion

Embark on your journey into the dynamic world of cybersecurity with our introductory course tailored for aspiring red team members or advanced penetration testers. Designed for those new to the realm of Antivirus (AV) and Endpoint Detection and Response (EDR) evasions.

Course duration Duration: 5 hours

Working with SSH

The Working with SSH show aims to remove the intimidation of using the Secure Shell protocol on your network. SSH allows for encrypting network communications to protect from eavesdropping and man-in-the-middle attacks. This series demonstrates how to configure and use SSH to securely manage your systems.

Course duration Duration: 40 minutes

DNS

This series explores the practical application of DNS, the Domain Naming System. We demonstrate using DNS records to support websites, mail servers, and other services.

Course duration Duration: 13 hours, 25 minutes

MITM on PSTN

Kirils Solovjovs of Possible Security exposes novel methods for intercepting phone calls through PSTN vulnerabilities, demonstrating how attackers can exploit SS7 protocols and call routing mechanisms.

Course duration Duration: 30 minutes

Linux Fundamentals for Certification

The Linux Fundamentals for Certification learning path provides essential Linux operating system skills and prepares you for entry-level Linux certification exams. You'll master core command-line operations and fundamental system administration concepts.

Course duration Duration: 74 hours, 15 min.

The Advent of the OT SOC

WSP's Christopher Johnson examines the evolution of OT-focused security operations centers, highlighting critical differences from traditional IT SOCs.

Course duration Duration: 15 minutes

Uncovering Azure's Silent Threats

Trend Micro's senior threat researcher Nitesh Surana reveals critical vulnerabilities in Azure Machine Learning services, demonstrating how attackers can compromise ML workspaces.

Course duration Duration: 50 minutes

Protecting Financial Services in an Era of Cyber Turbulence

Industry leaders Matanda Doss, Susan Koski, William Beer and Paul Leonhirth discuss cloud adoption challenges, API security and AI-powered fraud detection in financial services cybersecurity.

Course duration Duration: 25 minutes

Control Cybersecurity Complexity by Knowing Assets

Sean Blenkhorn from Axonius explains modern approaches to cybersecurity asset management in increasingly complex environments.

Course duration Duration: 15 minutes

Mitigating the Evolving DDoS Threat Landscape

Siddharth Iyer from Radware examines current DDoS attack trends and proactive protection strategies for financial institutions.

Course duration Duration: 10 minutes

A Sit Down With the Former CISO of the City of New York

Geoff Brown, former CISO of the City of New York, shares insights on machine-to-machine intelligence and lessons from Ukraine and Belgium's cybersecurity strategies.

Course duration Duration: 30 minutes

Why FinServ Cyber Pros Must Embrace Data-Centric Security

Trevor Foskett of Virtru explores military-grade encryption and data-centric protection strategies for financial services compliance and security.

Course duration Duration: 10 minutes

Real-Time Attack Tracing and Automation in the SOC

David Cifuentes of Devo Technology demonstrates how AI can eliminate 95% of security alerts and enable real-time threat detection in financial SOCs.

Course duration Duration: 15 minutes

ChatGPT: I, for One, Welcome Our New AI Overlords!

Steven Wallstedt, Vlad Brodsky and Bino Gopal discuss real-world applications and challenges of generative AI in financial services security.

Course duration Duration: 35 minutes

Gen AI & Cyber Mesh for Financial CISOs

Industry experts Gary Meshell and John Gutkowski explore how financial institutions can integrate AI and cyber mesh architecture to enhance threat detection and improve security resilience.

Course duration Duration: 25 minutes

Establishing Security in a Multi-Cloud Environment

Ali Abdulla Alsadadi shares insights on managing multi-cloud security. Learn about quantifying risks, tackling API complexities, integrating data, and building offensive strategies to mitigate risks in siloed multi-cloud environments.

Course duration Duration: 20 minutes

CISOs' Rebalancing Practices

Learn from Matthias Yeo, Mel Migrino, and Jenny Tan about tackling the cybersecurity talent crunch, building resilient offensive strategies, leveraging automation, and weaving cybersecurity accountability across business functions for enhanced defense.

Course duration Duration: 30 minutes

Balancing Agility & Cyber Resilience

Prof. Syed Munir Khasru shares insights on fostering business-IT collaboration, building enterprise-wide data strategies, and ensuring robust data governance. Learn how to optimize data use while safeguarding security and privacy in a data-driven world.

Course duration Duration: 25 minutes

Implementing Zero Trust for Resilient Business: CIO's Role

Join James Thang to explore zero trust’s business implications, challenges, and the CIO’s role. Learn how IT and security teams collaborate to balance security posture with user experience and align zero trust with business goals and risk tolerance.

Course duration Duration: 30 minutes
Information Security Media Group

As the education division of ISMG, CyberEd.io delivers premium cybersecurity training. We advance workforce readiness through flexible, expert-led learning and continuously updated content that keeps pace with today’s challenges and tomorrow’s evolving needs.

About
  • About CyberEd.io
  • About ISMG
  • Contact us
Subscriptions
  • CyberEd Essentials
  • CyberEd Pro
  • CyberEd Pro+
  • Pricing
  • User login
Enterprise
  • CyberEd Enterprise
  • CyberEd Interactives
  • CyberEd Custom
Resources
  • Resource Center
  • Blog
+1-609-356-1499 info@cybered.io Sign Up for Our Newsletter About ISMG Privacy & GDPR Statement
Ask Apollo a question?

Floating Button