We no longer support Internet Explorer

Please download one of these browsers:

Chrome Firefox Safari Microsoft Edge

Keep your browser version up-to-date for a fast, secure, web experience.

Skip to content
CyberEd.io
  • About
    About
    Company Our values Challenges we solve
    Event partnerships
    NullconHardwear.ioOTSEC.World
  • Solutions
    Subscriptions
    CyberEd EssentialsCyberEd ProCyberEd Pro+Pricing
    Enterprise
    CyberEd EnterpriseCyberEd CustomCyberEd Interactives
    Interactives
    Breach of FaithEcho ChamberKill SwitchCode RedZero HourPoint of FailureCompromised Agenda
    Immersive Learning
    LabsMasterclassesInteractivesCapture the Flag (CTF)Role-based PathwaysCyberEd Communities
  • Training
    Sectors
    Financial ServicesHealthcareManufacturingPayments
    Roles
    SOC Analysts & EngineersDevSecOpsThreat Intelligence Analysts
    Disciplines
    AI Security (Adversarial AI & Defense)Artificial Intelligence (AI) in SecurityBug HuntingCloud SecurityDevice SecurityForensics & Malware AnalysisGovernance, Risk & Compliance (GRC)
    Hardware & Embedded SecurityIncident ResponseOperational Technology (OT) SecurityPlatform SecurityResearch & VulnerabilitiesSoftware Supply Chain SecurityThreat Intelligence & Threat Hunting
  • Catalog
  • Resources
  • Contact us
  • User login
  • About
    About
    CompanyOur valuesChallenges we solve
    Event partnerships
    NullconHardwear.ioOTSEC.World
  • Solutions
    Subscriptions
    CyberEd EssentialsCyberEd ProCyberEd Pro+Pricing
    Enterprise
    CyberEd EnterpriseCyberEd CustomCyberEd Interactives
    Interactives
    Breach of FaithEcho ChamberKill SwitchCode RedZero HourPoint of FailureCompromised Agenda
    Immersive Learning
    LabsMasterclassesInteractivesCapture the Flag (CTF)Role-based PathwaysCyberEd Communities
  • Training
    Sectors
    Financial ServicesHealthcareManufacturingPayments
    Roles
    SOC Analysts & EngineersDevSecOpsThreat Intelligence Analysts
    Disciplines
    AI Security (Adversarial AI & Defense)Artificial Intelligence (AI) in SecurityBug HuntingCloud SecurityDevice SecurityForensics & Malware AnalysisGovernance, Risk & Compliance (GRC)
    Hardware & Embedded SecurityIncident ResponseOperational Technology (OT) SecurityPlatform SecurityResearch & VulnerabilitiesSoftware Supply Chain SecurityThreat Intelligence & Threat Hunting
  • Catalog
  • Resources
  • Contact us
  • User login
Back

Security Awareness and HRM

Security Fundamentals

In this series the learner will be introduced to concepts in cybersecurity, such as the core principles of security, wired and wireless network security. The learner will explore topics like operating system security and security software and more.

Course duration Duration: 7 hours, 2 min.

Navigating the Risks of Social Engineering Attacks

Join Bob Slocum, Product Marketing Director at Tessian discusses the most sophisticated, real-world email social engineering attacks found by Tessian's threat intelligence team.

Course duration Duration: 15 minutes

Security Awareness Onboarding

This course is designed to help bring new employees up to speed on the various IT security issues facing companies to day. Its primary use is intended to be as an instructional video shown during the new-hire on-boarding process.

Course duration Duration: 39 minutes

ISC2 Certified in Cybersecurity: Cybersecurity Fundamentals

Embark on your cybersecurity journey with Cybersecurity Fundamentals, a course designed for those new to the field. This course prepares you for the ISC2 Certified in Cybersecurity (CC) exam

Course duration Duration: 7 hours

End User Security Awareness

This is a non-technical course designed for every end user. Our experts explain very common security topics that are critical to be aware of in today’s work environment, but explains in the “end-users” non-technical language, so everyone can understand.

Course duration Duration: 3 hours

NIST Cybersecurity and Risk Management Frameworks

In the US, NIST is the de-facto standard for security, compliance and privacy. If you are doing business with the US federal government, manage critical infrastructure, or maintain personally identifiable information (PII), you must be compliant with NIST standards. NIST provides the Cybersecurity Framework (CSF) and Risk Management Framework (RMF) to guide organizations on securing their infrastructure, systems, and data.

Course duration Duration: 21 hours, 20 min.

Guarding Against AI's Expanded Threats

Nathan Swain of Binance, Max Kington of BNP and Surinder Lall of Paramount analyze AI-driven cyberthreats, from deepfakes to automated phishing, sharing real-world examples and practical defense strategies.

Course duration Duration: 35 minutes

Combating Phishing Attacks With Modern Authentication

Alex Wilson of Yubico and Pranav Bhayani of iValue Group explore modern authentication methods and defense-in-depth strategies against phishing.

Course duration Duration: 15 minutes

BEC Attacks: Detection and Response

Business email compromise (BEC) attacks are increasingly used by attackers as a way of targeting organizations. According to Gartner, through 2023, BEC attacks will continue to double each year to over $5 billion and lead to large financial losses for enterprises.

Course duration Duration: 30 minutes

Build Secure LLMs with the OWASP Top 10

Explore the OWASP Top 10 for LLM Applications!

Course duration Duration: 30 minutes

From Security Awareness to Human Risk Management

Vincent Porte explains how organizations must evolve from periodic awareness training to comprehensive human risk management addressing AI-powered threats and sophisticated attacks.

Course duration Duration: 20 minutes

Navigating Data Privacy in the Age of AI

As the volume of data generated and shared online grows exponentially, privacy concerns have become more pressing than ever before. Sign up today to learn from Babatunde Bambigboye, Head - Legal Enforcement Regulations, Nigeria Data Protection Commission!

Course duration Duration: 25 minutes

How to Prioritize, Measure and Convey It to the Board

Veracode CISO Sohail Iqbal provides guidance on prioritizing software security and effectively communicating metrics to board members.

Course duration Duration: 30 minutes

Eliminating Shared Password Risks in Manufacturing

Mohit Garg explores passwordless authentication strategies for manufacturing floors, addressing shared terminal challenges through RFID badges and biometric solutions that reduce IT costs, phishing risks and productivity losses.

Course duration Duration: 10 minutes

Mitigating Risk in Unmonitored Business Channels

SafeGuard Cyber CEO Chris Lehman discusses AI-powered defense strategies against language-based attacks across communication channels.

Course duration Duration: 25 minutes

Why FinServ Cyber Pros Must Embrace Data-Centric Security

Trevor Foskett of Virtru explores military-grade encryption and data-centric protection strategies for financial services compliance and security.

Course duration Duration: 10 minutes

Transforming People & Processes in Manufacturing

Robert Mitera explores human factors engineering principles that reduce cognitive load, adopts aviation safety privilege models and addresses why cybersecurity awareness training fails without continuous process integration.

Course duration Duration: 30 minutes

Who Will You Be in the Storm? Crisis Leadership & Resilience

Claire Moravec draws on FBI counterterrorism experience to explore how leaders transform crises into competitive strength through trust-based decision-making, cross-functional resilience and values-driven clarity under pressure.

Course duration Duration: 20 minutes

Protecting Trust in a Changing World

Claire Le Gal, SVP at Mastercard, explores payment security evolution, cyber risk mitigation and fraud prevention strategies in an evolving digital landscape.

Course duration Duration: 25 minutes

CIO & CISO: Collaborate to Defend

Wahyu Agung Prasetyo, Thuraya Al-Harthi and Sujit Christy explore the evolving partnership between CIOs and CISOs in driving business enablement while maintaining robust cybersecurity.

Course duration Duration: 25 minutes

Establishing Privacy & Data Protection in the Digital Era

Dr. Amirudin Abdul Wahab, CEO of CyberSecurity Malaysia, discusses evolving data protection frameworks and the balance between security and privacy in the digital era.

Course duration Duration: 30 minutes

CISOs' Rebalancing Practices

Learn from Matthias Yeo, Mel Migrino, and Jenny Tan about tackling the cybersecurity talent crunch, building resilient offensive strategies, leveraging automation, and weaving cybersecurity accountability across business functions for enhanced defense.

Course duration Duration: 30 minutes

How Can CIOs Harness AI, Data, and Analytics

Join Khalid Nizami as he explores aligning digital technologies with business goals, adopting AI-driven innovations like generative AI, and addressing challenges in talent, skills, and governance to drive business transformation and growth.

Course duration Duration: 30 minutes
Information Security Media Group

As the education division of ISMG, CyberEd.io delivers premium cybersecurity training. We advance workforce readiness through flexible, expert-led learning and continuously updated content that keeps pace with today’s challenges and tomorrow’s evolving needs.

About
  • About CyberEd.io
  • About ISMG
  • Contact us
Subscriptions
  • CyberEd Essentials
  • CyberEd Pro
  • CyberEd Pro+
  • Pricing
  • User login
Enterprise
  • CyberEd Enterprise
  • CyberEd Interactives
  • CyberEd Custom
Resources
  • Resource Center
  • Blog
+1-609-356-1499 info@cybered.io Sign Up for Our Newsletter About ISMG Privacy & GDPR Statement
Ask Apollo a question?

Floating Button