We no longer support Internet Explorer

Please download one of these browsers:

Chrome Firefox Safari Microsoft Edge

Keep your browser version up-to-date for a fast, secure, web experience.

Skip to content
CyberEd.io
  • About
    About
    Company Our values Challenges we solve
    Event partnerships
    NullconHardwear.ioOTSEC.World
  • Solutions
    Subscriptions
    CyberEd EssentialsCyberEd ProCyberEd Pro+Pricing
    Enterprise
    CyberEd EnterpriseCyberEd CustomCyberEd Interactives
    Interactives
    Breach of FaithEcho ChamberKill SwitchCode RedZero HourPoint of FailureCompromised Agenda
    Immersive Learning
    LabsMasterclassesInteractivesCapture the Flag (CTF)Role-based PathwaysCyberEd Communities
  • Training
    Sectors
    Financial ServicesHealthcareManufacturingPayments
    Roles
    SOC Analysts & EngineersDevSecOpsThreat Intelligence Analysts
    Disciplines
    AI Security (Adversarial AI & Defense)Artificial Intelligence (AI) in SecurityBug HuntingCloud SecurityDevice SecurityForensics & Malware AnalysisGovernance, Risk & Compliance (GRC)
    Hardware & Embedded SecurityIncident ResponseOperational Technology (OT) SecurityPlatform SecurityResearch & VulnerabilitiesSoftware Supply Chain SecurityThreat Intelligence & Threat Hunting
  • Catalog
  • Resources
  • Contact us
  • User login
  • About
    About
    CompanyOur valuesChallenges we solve
    Event partnerships
    NullconHardwear.ioOTSEC.World
  • Solutions
    Subscriptions
    CyberEd EssentialsCyberEd ProCyberEd Pro+Pricing
    Enterprise
    CyberEd EnterpriseCyberEd CustomCyberEd Interactives
    Interactives
    Breach of FaithEcho ChamberKill SwitchCode RedZero HourPoint of FailureCompromised Agenda
    Immersive Learning
    LabsMasterclassesInteractivesCapture the Flag (CTF)Role-based PathwaysCyberEd Communities
  • Training
    Sectors
    Financial ServicesHealthcareManufacturingPayments
    Roles
    SOC Analysts & EngineersDevSecOpsThreat Intelligence Analysts
    Disciplines
    AI Security (Adversarial AI & Defense)Artificial Intelligence (AI) in SecurityBug HuntingCloud SecurityDevice SecurityForensics & Malware AnalysisGovernance, Risk & Compliance (GRC)
    Hardware & Embedded SecurityIncident ResponseOperational Technology (OT) SecurityPlatform SecurityResearch & VulnerabilitiesSoftware Supply Chain SecurityThreat Intelligence & Threat Hunting
  • Catalog
  • Resources
  • Contact us
  • User login
Back

Disaster Recovery and Backup

Cyber Insurance with Lynn Peachey

Join Lynn Peachey in a three part series on Cybersecurity Insurance. Part 1 is an introductory exploration of the growing ransomware threat and the role of cybersecurity insurance. Part 2 is an exploration of the cyber insurance vendor's incident response process and finally part 3 is an exploration of risks and trends in cyber insurance.

Course duration Duration: 2 hours, 47 min.

Business Continuity and Disaster Recovery

We have Rob Carson from SemperSec in the studios to lend his considerable expertise. With 10+ years in the Information Security industry, Rob is able to provide guidance and real world examples to help you understand how to create and manage BCDR in your organization.

Course duration Duration: 5 hours, 22 min.

Balancing Protection & Productivity: The UEM Approach

Join Romanus Prabhu Raymond in a conversation about expanding attack surfaces and cybersecurity strategies to protect endpoints.

Course duration Duration: 27 minutes

Future of Cybersecurity: Threats and Opportunities

Join Terence Gomes in an exploration of cyber resilience, disaster recovery and business goals.

Course duration Duration: 20 minutes

Setting Realistic Cybersecurity Goals

Join Ankit Wasnik in a discussion about going back to the basics of building a successful cybersecurity program.

Course duration Duration: 20 minutes

Future of Security: Threats and Opportunities

Join Suraj Jayaraman explores the cybersecurity disaster recovery process.

Course duration Duration: 15 minutes

Risk, Response and Recovery for Remote Endpoints

Join Romanus Prabhu Raymond in a conversation about expanding attack surfaces and cybersecurity strategies to protect endpoints.

Course duration Duration: 20 minutes

Breach Management: CISO's Practical Approach & Response

Sachin Khalap and Shivani Arni discuss CISO strategies for breach management, reputation recovery, and cyber resilience. Learn how to handle post-breach response, mitigate risks, and safeguard customer data.

Course duration Duration: 40 minutes

CertNexus CyberSec First Responder (CFR-310)

This course covers network defense and incident response methods, tactics, and procedures that are in alignment with industry frameworks such as NIST 800-61r2 (Computer Security Incident Handling Guide), US-CERT's National Cyber Incident Response Plan (NCIRP), and Presidential Policy Directive (PPD)-41 on Cyber Incident Coordination.

Course duration Duration: 13 hours, 20 min.

MITM on PSTN

Kirils Solovjovs of Possible Security exposes novel methods for intercepting phone calls through PSTN vulnerabilities, demonstrating how attackers can exploit SS7 protocols and call routing mechanisms.

Course duration Duration: 30 minutes

Control Cybersecurity Complexity by Knowing Assets

Sean Blenkhorn from Axonius explains modern approaches to cybersecurity asset management in increasingly complex environments.

Course duration Duration: 15 minutes

Mitigating the Evolving DDoS Threat Landscape

Siddharth Iyer from Radware examines current DDoS attack trends and proactive protection strategies for financial institutions.

Course duration Duration: 10 minutes

Establishing Security in a Multi-Cloud Environment

Ali Abdulla Alsadadi shares insights on managing multi-cloud security. Learn about quantifying risks, tackling API complexities, integrating data, and building offensive strategies to mitigate risks in siloed multi-cloud environments.

Course duration Duration: 20 minutes

How Can CIOs Harness AI, Data, and Analytics

Join Khalid Nizami as he explores aligning digital technologies with business goals, adopting AI-driven innovations like generative AI, and addressing challenges in talent, skills, and governance to drive business transformation and growth.

Course duration Duration: 30 minutes
Information Security Media Group

As the education division of ISMG, CyberEd.io delivers premium cybersecurity training. We advance workforce readiness through flexible, expert-led learning and continuously updated content that keeps pace with today’s challenges and tomorrow’s evolving needs.

About
  • About CyberEd.io
  • About ISMG
  • Contact us
Subscriptions
  • CyberEd Essentials
  • CyberEd Pro
  • CyberEd Pro+
  • Pricing
  • User login
Enterprise
  • CyberEd Enterprise
  • CyberEd Interactives
  • CyberEd Custom
Resources
  • Resource Center
  • Blog
+1-609-356-1499 info@cybered.io Sign Up for Our Newsletter About ISMG Privacy & GDPR Statement
Ask Apollo a question?

Floating Button