We no longer support Internet Explorer

Please download one of these browsers:

Chrome Firefox Safari Microsoft Edge

Keep your browser version up-to-date for a fast, secure, web experience.

Skip to content
CyberEd.io
  • About
    About
    Company Our values Challenges we solve
    Event partnerships
    NullconHardwear.ioOTSEC.World
  • Solutions
    Subscriptions
    CyberEd EssentialsCyberEd ProCyberEd Pro+Pricing
    Enterprise
    CyberEd EnterpriseCyberEd CustomCyberEd Interactives
    Interactives
    Breach of FaithEcho ChamberKill SwitchCode RedZero HourPoint of FailureCompromised Agenda
    Immersive Learning
    LabsMasterclassesInteractivesCapture the Flag (CTF)Role-based PathwaysCyberEd Communities
  • Training
    Sectors
    Financial ServicesHealthcareManufacturingPayments
    Roles
    SOC Analysts & EngineersDevSecOpsThreat Intelligence Analysts
    Disciplines
    AI Security (Adversarial AI & Defense)Artificial Intelligence (AI) in SecurityBug HuntingCloud SecurityDevice SecurityForensics & Malware AnalysisGovernance, Risk & Compliance (GRC)
    Hardware & Embedded SecurityIncident ResponseOperational Technology (OT) SecurityPlatform SecurityResearch & VulnerabilitiesSoftware Supply Chain SecurityThreat Intelligence & Threat Hunting
  • Catalog
  • Resources
  • Contact us
  • User login
  • About
    About
    CompanyOur valuesChallenges we solve
    Event partnerships
    NullconHardwear.ioOTSEC.World
  • Solutions
    Subscriptions
    CyberEd EssentialsCyberEd ProCyberEd Pro+Pricing
    Enterprise
    CyberEd EnterpriseCyberEd CustomCyberEd Interactives
    Interactives
    Breach of FaithEcho ChamberKill SwitchCode RedZero HourPoint of FailureCompromised Agenda
    Immersive Learning
    LabsMasterclassesInteractivesCapture the Flag (CTF)Role-based PathwaysCyberEd Communities
  • Training
    Sectors
    Financial ServicesHealthcareManufacturingPayments
    Roles
    SOC Analysts & EngineersDevSecOpsThreat Intelligence Analysts
    Disciplines
    AI Security (Adversarial AI & Defense)Artificial Intelligence (AI) in SecurityBug HuntingCloud SecurityDevice SecurityForensics & Malware AnalysisGovernance, Risk & Compliance (GRC)
    Hardware & Embedded SecurityIncident ResponseOperational Technology (OT) SecurityPlatform SecurityResearch & VulnerabilitiesSoftware Supply Chain SecurityThreat Intelligence & Threat Hunting
  • Catalog
  • Resources
  • Contact us
  • User login
Back

Blockchain & Web3

Fundamentals of Cybersecurity - Part 6

Fundamentals of Cybersecurity Part 6 introduces disruptive and emerging technologies, including exciting possibilities and the various cybersecurity concerns they bring.

Contact us
Course duration Duration: 40 minutes

Identity Security: Moving the Goal Posts

Al Pascual explores the paradigm shift in identity management, from traditional controls to challenges posed by Web3, the Metaverse, and NFTs. Discover how identity goalposts have shifted, the new opportunities and challenges for vendors and practitioners, and what it means for the future of identity.

Contact us
Course duration Duration: 24 minutes

Cryptocurrency with Ari Redbord

Join Ari Redbord in an exploration of how TRM Labs aids law enforcement in tracking crypto fraud and financial crime. Learn about crypto's dual role as a tool for illicit actors and investigators, the challenges of noncompliant VAPs, and the need for regulation to enhance compliance and user safety.

Contact us
Course duration Duration: 31 minutes

Crypto Challenges: Security Defenses

Join Rohas Nagpal in an exploration of crypto cybersecurity defenses. Highlights include how to work closely with law enforcement, reducing the exposure to risk, and complying with regulatory norms.

Contact us
Course duration Duration: 30 minutes

Crypto's Promise: The Use of Digital Assets

Crypto's Promise: The Use of Digital Assets is a panel discussion led by Ari Redbord, Head of Legal and Governmental Affairs at TRM Labs, along with Alex Zerden, Caroline Hill, and Eric Lorber

Contact us
Course duration Duration: 40 minutes

Myth Busting a Move Toward Crypto Regulation

In 2021, we saw a steady drum beat toward mainstream adoption of cryptocurrencies by traditional financial institutions and investors of all sizes. We saw a move from a bitcoin-only world to an explosion of digital assets. And, we saw global regulators and policy makers begin discussions about building a clear regulatory framework for crypto.

Price
Course duration Duration: 30 minutes

Uniting Legacy and Emerging OT Security

Uniting Legacy and Emerging OT Security explores the cybersecurity implications of integrating new digital tools into existing infrastructures. Develop strategies to protect both new and legacy systems from vulnerabilities today!

Contact us
Course duration Duration: 25 minutes

Financial Sector Cybersecurity for Blockchain

Attention financial sector leaders and technicians who need to expand their knowledge in blockchain technologyBlockchain is here! Prepare your financial institution today!

Contact us
Course duration Duration: 20 minutes

Secure Banking in 2023: The Next Big Innovation

Join Agnelo D'Souza, Anagha Mujumdar, Pradeep Kumar Rangi, and K M Reddy in an exploration of fintech, emergent tech and cybersecurity.

Price
Course duration Duration: 30 minutes

Uncovering the Dark Web

Join Pavan Duggal, Gaurav Gupta, and Ashok Kumar in an exploration of cybercrime, "crime-as-a-service," the dark web, cryptocurrency, and what it means for cybersecurity.

Price
Course duration Duration: 25 minutes

Identity Vetting Using Decentralized ID

Identity Vetting Using Decentralized ID with Alan Bachmann, Senior Enterprise Architect, Technology Research and Innovation, CVS Health, explores how to leverage decentralized digital identity technology.

Contact us
Course duration Duration: 20 minutes

CBDC: Security Risks and Response

Join Siba Narayan Panda, and Dr. N. Rajendran for an exploration of central bank digital currency (CBDC) and what it means for financial service organizations and their security practices.

Price
Course duration Duration: 25 minutes

Fundamentals of Cybersecurity

The Fundamentals of Cybersecurity learning path covers essential cybersecurity concepts across six parts. You'll explore topics like risk management, access control, network security, endpoint protection, data security, cloud security, compliance, and emerging technologies such as AI and blockchain.

Price
Course duration Duration: 6 hours
Information Security Media Group

As the education division of ISMG, CyberEd.io delivers premium cybersecurity training. We advance workforce readiness through flexible, expert-led learning and continuously updated content that keeps pace with today’s challenges and tomorrow’s evolving needs.

About
  • About CyberEd.io
  • About ISMG
  • Contact us
Subscriptions
  • CyberEd Essentials
  • CyberEd Pro
  • CyberEd Pro+
  • Pricing
  • User login
Enterprise
  • CyberEd Enterprise
  • CyberEd Interactives
  • CyberEd Custom
Resources
  • Resource Center
  • Blog
+1-609-356-1499 info@cybered.io Sign Up for Our Newsletter About ISMG Privacy & GDPR Statement