Enroll in expert-led training with hands-on labs and an Exam Pass Guarantee.
Build your skills with 1,900+ courses and hands-on labs mapped to the roles organizations need most.
CompTIA
ISC2
EC-Council
CMMC
Develop mission-ready teams with approved certifications and hands-on skills training — and keep knowledge in-house with our Knowledge Transfer Guarantee.
Verify real-world cyber capabilities at the micro-skill level so your organization can close gaps, manage risk and prove workforce readiness.
Certify your team and verify their capabilities through accelerated, expert-led training, hands-on labs and guaranteed pass rates that prove ROI.
Develop role-specific capabilities across your workforce with on-demand courses and hands-on labs.
Transform your workforce into your strongest defense with engaging training that drives lasting behavior change.
Reduce security incidents by connecting training to real employee behaviors and measuring impact on organizational risk.
Entry-level to advanced IT security certifications recognized across industries.
Governance, risk and audit certifications for security leadership roles.
Industry-recognized security certifications proving technical expertise and specialized knowledge.
Explore 60+ certification training programs across security, cloud and IT — all backed by our 93% pass rate and expert instruction.
A discussion forum for IT and security professionals to gain certification tips, networking opportunities and peer support.
Build capable security teams with proven frameworks for hiring, training and retaining cybersecurity talent.
For 22+ years, we've helped organizations develop cybersecurity teams with verified capabilities they can trust to defend against evolving threats.
March 21, 2018
In this lab, we will show you how to conduct and analyze a vulnerability risk assessment using the popular vulnerability scanning tool Nessus. We will:
Malware comes via attachments, malvertising, man-in-the-middle, man-in-the-browser, social engineering and countless other vectors. Even the most stringent o
QuadRooter is a threat vector specifically affecting Android devices. The common vulnerabilities and exposures (CVE) for these security issues are: CVE-2016
March 8, 2018
Suricata is an excellent, low-cost tool that gives you greater insight into a network. Despite this, it needs to be viewed as a single layer in a comprehensi
January 20, 2017
API call logging is a mechanism of logging API call made by an application. In this series, we are going to learn about how to develop an API call logger usi
December 9, 2015
Pony is a stealer Trojan and has been active for quite a while now. It was responsible for stealing over $200,000 in bitcoins ( https://threatpost.com/latest
November 23, 2015
November 17, 2015
MD5: 67877403db7f8ce451b72924188443f8 Installer: In the main function of the malware, two subroutines are used for checking whether the malware is already in
May 29, 2015
Executable and Linking Format (ELF) is the object format used in UNIX-like operating systems. This post introduces the ELF file format in the big picture of
May 25, 2015
IDC scripting language is used by IDA disassemblers to programmatically manipulate data assembly and parameter in the loaded IDB database file. Script can ma
May 21, 2015
Any code that you write utilizing any compiled language like C, C++, or Java can be integrated or imported into another Python script. This code is considere
May 18, 2015
Keygenning is a process of finding a valid key for a program. It is used for cracking/piracy. Most of the cracking has been documented on x86, there haven't