Online Cyber Security Courses
We are dedicated to providing high-quality training delivered in an exciting, dynamic format both in person and via online tools. Extend your learning through our Online Courses and exclusive study materials for CyberProtex students. We offer a number of different online courses for students who want to study on demand. These courses are offered independently of our instructor-led courses and can be utilized to prepare for the CISSP, Security+, Network+, CEH, CHFI, ECSA, LPT, and CCISO. Watch a sample video below to hear how our lead instructor, Ben McGee, gives test-prep tips for some of the most popular courses CyberProtex offers.
5 Reasons to Love eLearning
eLearning is easy to love because it enables you to learn from anywhere, engage with training content, practice what you’ve learned, combine new learning with prior knowledge and test with confidence.
- Learn from Anywhere: If you aren’t able to get to a class or one isn’t offered near you, eLearning lets you learn from anywhere with an internet connection. And you can decide if you want to work on your own schedule or attend a virtual class.
- Engage with Training Content: There’s nothing more frustrating than zoning out while you’re supposed to be learning. Online learning takes the boredom out of IT training by integrating games, simulations, quizzes and multiple types of media into learning content.
- Practice What You've Learned: One of the most powerful ways to retain knowledge is to practice what you’ve learned. eLearning gives you the chance to pause and replay a lesson over and over and take perfectly timed quizzes to ensure you retain the information long term.
- Test with Confidence: No matter how much you know, going into a testing situation with low confidence can sabotage your success. eLearning tools build your confidence by giving you plenty of opportunities to practice what you’ve learned and get a sense of what testing feels like.
- Combine New Learning with Prior Knowledge: If you already have some knowledge on the topic you’re studying, you may want to prioritize your studies based on what you don’t yet know versus what you do. Some eLearning platforms are designed to build upon your existing knowledge to help you learn new skills.
Available On-Demand Courses
Cisco - Interconnecting Cisco Networking Devices Part 1 (ICND1)
This 1-week course provides the foundational understanding of network layers 1-3 that apply
to core routing and switching plus other advanced technologies. Several topics have been added including; understanding the interactions and network functions of firewalls, wireless controllers, and access points, along with an additional focus on IPv6 and basic network security. This exam tests a candidate's knowledge and skills related to network fundamentals, LAN switching technologies, routing technologies, infrastructure services, and infrastructure maintenance.
Cisco - Interconnecting Cisco Networking Devices Part 2 (ICND2)
This 1-week course prepares the participant to take the ICND2 exam. This exam tests a candidate's knowledge and skills related to LAN switching technologies, IPv4 and IPv6 routing technologies, WAN technologies, infrastructure services, and infrastructure maintenance.
CompTIA Network+
CompTIA Network+ helps develop a career in IT infrastructure covering troubleshooting, configuring, and managing networks. This 5-day course will also focus on specific key concepts of security, cloud computing, hardware, and virtualization.
CompTIA Security+ SY0-601
CompTIA(c) Security+ Certification covers the essentials of understanding best
practices in Network Security and Risk Management. This comprehensive 5-day course will prepare the participant to take the Security + exam. Topics include Network Security, Compliance, Threats, Vulnerabilities, Malware, Penetration Testing, Application, Data & Host Security, Access Control &
Identity Management, and Cryptography.
CompTIA Cybersecurity Analyst+
The CSA+ is a mid-level 5-day course for professionals that have already passed the Security+. The behavioral analytics skills covered by CSA+ identify and combat malware and advanced persistent threats (APTs), resulting in enhanced threat visibility across a broad attack surface. CompTIA CSA+ is for IT professionals looking to gain the following security analyst skills: Configure and use threat detection tools; Perform data analysis; and Interpret the results to identify vulnerabilities,
threats, and risks to an organization.
CompTIA Advanced Security Practitioner (CASP+)
The goal of this advanced 5-day course is to prepare students to take and pass the CompTIA Advanced Security Practitioner (CASP+) exam. As well as to help students gain a solid understanding of the concepts addressed in this topic so they can apply them to their work in the field. CASP+ meets the growing demand for advanced IT security in the enterprise. Recommended for IT professionals with at least 5 years of experience. CASP+ certifies critical thinking and judgment across a broad spectrum of security disciplines and requires candidates to implement clear solutions in complex environments.
EC|Council Certification CEH: Certified Ethical Hacker
This advanced 5-day, hands-on training course for the EC|Council Certified Ethical Hacker exam will provide professionals with the knowledge and skills that hackers use to target systems so that professionals can work legally and ethically to improve security systems. Participants will be prepared to take the EC|Council CEH exam. Topics include Malware Operations, Mobile Technologies, Risk Assessments, Firewalls, Cryptography, Threat Modeling, Vulnerabilities, Testing, and Professional Standards.
EC|Council CND: Certified Network Defender
This advanced 5-day course is designed to provide Network Administrators with the skills and knowledge to protect,
detect and mitigate network attacks. The goal of this course is to prepare the participant to take the EC|Council CND exam. Topics include Network Security Threats, Vulnerabilities & Attacks; Controls, Protocols & Devices; Policy Design & Implementation; Physical Security; Wireless Network Defense; Network Traffic Monitoring & Analysis; Network Risk & Vulnerability Management; and Data Backup & Recovery.
ISC2 Certified Authorization Professional (CAP)
The goal of this 5-day course is to prepare professionals to take the CAP (Certified Authorization Professional) exam, and to help them gain a solid understanding of the concepts addressed in the topic so that they can apply them to their work in the field. The CAP certification is an objective measure of the knowledge, skills, and abilities required for personnel involved in the process of authorizing and maintaining information systems. The CAP examination tests the breadth and depth of a candidate’s knowledge by focusing on the 7 domains of the CAP CBK: Risk Management Framework (RMF), Categorization of Information Systems, Selection of Security Controls, Security Control Implementation, Security Control Assessment, Information System Authorization, and Monitoring of Security Controls.
ISC2 Certified Information System Security Practitioner – (CISSP)
The vendor-neutral CISSP certification is the ideal credential for those with proven deep technical and managerial competence, skills, experience, and credibility to design, engineer, implement, and manage their overall information security program to protect organizations from growing sophisticated attacks. As one of our most popular courses year after year, this advanced 5- day course will prepare the Information Systems professional to take the (ISC)² CISSP exam.
ISC2 Certified Information System Security Practitioner – CISSP CONCENTRATION
This course builds on the CISSP and specializes on the subjects of information security architecture, engineering, and management. Topics include: Security and Risk Management, Asset Security, Engineering for secure systems and software, Secure Networks; Identity & Access Management, Security Assessment & Testing, and Security Operations.
CISSP-ISSEP: Information Systems Security Engineering Professional
The CISSP-ISSEP credential was developed in conjunction with the U.S. National Security Agency (NSA) providing an invaluable tool for any systems security engineering professional.
For the professional who already holds the CISSP certification, the ISSEP is the guide for incorporating security into projects, applications, business processes, and all information systems. This 5-day course will prepare the professional in the topics on the CISSP-ISSEP certification exam.
ISACA CISA Certified Information Systems Auditor
This 3-day course prepares the participant for the topics on the Certified Information Systems Auditor exam. Professionals with the CISA certification are recognized among the most qualified and sought-after IS audit, control, and security professionals. ISACA's globally accepted CISA certification showcases your experience, knowledge, and abilities.
ISACA CISM Certified Information Security Manager
This 3-day course prepares the participant to take and pass the Certified Information Security Manager exam. With the ability to configure information security programs to advance broader enterprise goals and objectives, earning the CISM can secure your place among the most in-demand information
security management professionals.
IT Fundamentals
This basic beginner course in IT Fundamentals will prepare the student for entry-level jobs in technology and is a good spring board to understanding more advanced concepts and earning certifications. 3-5 day options available.
Python Programming for Cybersecurity
The CyberProtex "Python for Cyber" Course follows the
Department of Homeland Security (DHS) Workforce Framework. The Framework is the foundation for
increasing the size and capability of the US cybersecurity workforce. CyberProtex has partnered with the Department of Homeland Security to implement the Workforce Framework through the National
Initiative for Cybersecurity Education (NICE). Python is a widely used general-purpose, high-level programming language. Its design philosophy emphasizes code readability, and its syntax allows
programmers to express concepts in fewer lines of code than would be possible in languages such as C++, or Java. Cyber Security works best when implemented at the earliest point possible. This course teaches the participant how to work Cyber Security considerations into their Python programming. This 3-day Python Programming for Cyber Security course is available on demand for groups of 8 or more.
Risk Management Framework - NIST 800-53
The CyberProtex "Risk Management Framework (RMF)" Course follows the Department of Homeland Security (DHS) Workforce Framework. The Workforce Framework is the foundation for increasing the size and capability of the US cybersecurity workforce. CyberProtex has partnered with the Department of Homeland Security to implement the Workforce Framework through the National Initiative for
Cybersecurity Education (NICE).
Topics for this course include: Introduction to the RMF, Managing Risk at the Enterprise, and Threats and Vulnerabilities. This course will break down for the professional the steps of the RMF: Categorizing the System; Selecting Baseline Controls; Risk Assessments and Refining; System Security Planning, Implementation of controls; Assessing the Controls, Determining and Accepting the Risk; Seeking the Authority to Operate; and Continuous Monitoring of the System. There will be Labs and practical exercises to strengthen the participants learning, using our eMASS Simulator. This 3-day Risk Management Framework course is available on demand for groups of 8 or more.
Security Awareness and Social Engineering
Employees are the best defense and weakest link for malicious social engineering such as phishing attempts which can download malware such as ransomware. CyberProtex can customize training sessions from 3 hours to 3 days for your organization.
Threats and Vulnerabilities
This very popular introductory course is a great place to start in understanding
the basics of Threats, Vulnerabilities, and Attacks. This course is designed to provide management and other professionals an understanding of the vulnerabilities in information systems, to better prepare
them to mitigate attacks. This 3-day course is available on demand for groups of 8 or more. Topics include Network security Concerns; Network Reconnaissance Attacks; Network Access Attacks; DoS and DDoS; Malware Attacks and Viruses.
ICS/SCADA Security Essentials
This course provides students with the essentials for conducting cybersecurity work in industrial control systems (ICS) environments. Topics include Threats, Attacks and Vulnerabilities. This course provides an overview of ICS, how to control system attacks, methods and tools, approaches to system and network defense architectures and techniques, and incident response skills in a control system environment
Cyber System Administrators Desktop Technician's Survival Guide
Surviving the ins and outs of working the Help Desk isn’t easy, but it’s a typical first step into the world of IT and cyber security. Learn how to troubleshoot common problems with computers, networks,
printers, and sometimes users in this course.
System Admin's Survival Guide
Learn the basic skill sets every system administrator should know, regardless of whether they are administering a Windows or Linux server.
Software Engineers and Web Developers Intro to Python
Learn the basics of coding with Python! Using course modules such as; What is Python?, Hello World, Programmer’s First Python Loop, Name this Function, and Dictionaries.
Python for Cybersecurity
This course is an advanced hands-on development experience that focuses on applications that can be
used in both blue and red team settings. From the fundamentals of network programming, development of advanced forensics applications, and development of intrusion detection and prevention applications we will apply a rigorous software development cycle to create efficient Python code!
Cryptography with Python
The use and application of encryption and integrity-checking techniques continue to expand as organizations continue to seek security professionals that can effectively create and deploy cryptographic technologies. In this course, we will use Python to expand our understanding of effective cryptographic methods while both protecting and preserving data. This is an advanced course in Python security development and those attending should have an effective working knowledge of Python.
DevOps Training
The DevOps Certification Training will help you become an expert in the principles of continuous
development and deployment, automation of configuration management, inter-team collaboration, and IT service agility using tools including Git, Jenkins, Docker, Ansible, Puppet, Kubernetes and Nagios.
Artificial Intelligence Training
The Artificial Intelligence Course gives training on the skills required for a successful career in AI. You’ll master the programming languages required to excel in this domain and kick-start your career in Artificial Intelligence. We will review Deep Learning, Machine Learning, and building tools to make your life easier.
Ransomware Hostage Avoidance
Understanding what ransomware is and how its crafted and works. Help determine if your organization should pay the ransom. This course will also cover how to back up your files, various and overlapping
protection measures, and artificial intelligence security measures.
BurpeSuite
Our custom Boot Camps focus on the installation, configuration, alerts, and fine-tuning of Burp Suite Professional. Our course provides professionals with the knowledge and skills used by organizations
and security professionals around the globe and teaches students how to troubleshoot common issues and elements within Burp Suite Professional.
Microsoft
Microsoft Technology Associate (MTA)
MTA: Microsoft Technology Associate certifications validate the fundamental knowledge needed to begin building a career in technology. MTA certifications address a wide spectrum of fundamental
technical concepts, assess and validate core technical knowledge, and enhance technical credibility. This is a 3-day course.
Microsoft Cybersecurity Architect (SC-100)
The Microsoft cybersecurity architect has subject matter expertise in designing and evolving the cybersecurity strategy to protect an organization's mission and business processes across all aspects of the enterprise architecture. The cybersecurity architect designs a Zero Trust strategy and architecture,
including security strategies for data, applications, access management, identity, and infrastructure. The cybersecurity architect also evaluates Governance Risk Compliance (GRC) technical strategies and security operations strategies. The cybersecurity architect continuously collaborates with leaders and
practitioners in IT security, privacy, and other roles across an organization to plan and implement a cybersecurity strategy that meets the business needs of an organization. A candidate for this exam should have advanced experience and knowledge in a wide range of security engineering areas including identity and access, platform protection, security operations, securing data, and securing applications.
They should also have experience with hybrid and cloud implementations.
Topics include: Design a Zero Trust strategy and architecture, Evaluate Governance Risk Compliance
(GRC) technical strategies and security operations strategies, Design security for infrastructure, Design a strategy for data and applications, Recommend security best practices and priorities.
Microsoft Security Operations Analyst (SC-200)
The Microsoft security operations analyst collaborates with organizational stakeholders to secure information technology systems for the organization. Their goal is to reduce organizational risk by
rapidly remediating active attacks in the environment, advising on improvements to threat protection practices, and referring violations of organizational policies to appropriate stakeholders. Candidates for this role should be familiar with attack vectors, cyberthreats, incident management, and Kusto Query Language (KQL). Candidates should also be familiar with Microsoft 365 and Azure services.
Microsoft Azure Secure Technologies (AZ-500)
Candidates for this exam should have subject matter expertise implementing Azure security controls that protect identity, access, data, applications, and networks in cloud and hybrid environments as part of an end-to-end infrastructure. Responsibilities for an Azure security engineer include managing the security posture, identifying and remediating vulnerabilities, performing threat modeling, implementing threat protection, and responding to security incident escalations. Candidates for this exam should have practical experience in the administration of Azure and hybrid environments. Candidates should have experience with infrastructure as code, security operations processes, cloud capabilities, and Azure services. Topics include: Manage identity and access, Implement platform protection, Secure data and applications, Manage security operations.
Microsoft Security, Compliance, And Identity Fundamentals (SC-900)
This course is targeted at those looking to familiarize themselves with the fundamentals of security, compliance, and identity (SCI) across cloud-based and related Microsoft services. This is a broad audience that may include business stakeholders, new or existing IT professionals, or students who have an interest in Microsoft Security, compliance, and identity solutions. Candidates should be familiar with Microsoft Azure and Microsoft 365 and want to understand how Microsoft Security, compliance, and identity solutions can span across these solution areas to provide a holistic and end-to-end solution. Topics include The concepts of security, compliance, and identity, the capabilities of Microsoft identity and access management solutions, Microsoft Security solutions, and Microsoft compliance solutions.
Microsoft Azure Fundamentals (AZ-900)
This course will focus on foundational knowledge of cloud services and how those services are provided with Microsoft Azure. The exam is intended for candidates who are just beginning to work with cloud- based solutions and services or are new to Azure. The Azure Fundamentals exam is an opportunity to
prove knowledge of cloud concepts, Azure services, Azure workloads, security and privacy in Azure, as well as Azure pricing and support. Candidates should be familiar with general technology concepts,
including concepts of networking, storage, compute, application support, and application development.
Topics include: Cloud concepts, Azure architecture and services, and Azure management and governance.
Microsoft 365 Fundamentals (MS-900)
This teaches foundational-level knowledge of Software as a Service (SaaS) solutions to facilitate productivity on-site, at home, or a combination of both. Candidates may have knowledge of cloud- based solutions or may be new to Microsoft 365. Candidates can use this exam to prepare for other Microsoft certifications, but it is not a prerequisite for any of the related certifications. You will learn how to recommend Microsoft 365 solutions that address common organizational IT challenges. They should understand how Microsoft 365 solutions improve productivity, facilitate collaboration, and optimize communications. You will also learn about solutions for endpoint and application management, desktop virtualization, automated operating system deployment, and rich reporting and analytics. Students should be familiar with Microsoft 365 licensing, deployment, and migration assistance, and support options for organizations looking to maximize their investment in the cloud.