Cybersecurity Foundations: The Modern Threat Landscape
RCCE Deep Dive Courses
Browse the full RCCE catalog. Type to filter by title, number, level, or track.
🔎
Security Essentials for Absolute Beginners
Introduction to Information Security Management
CIA Triad and Beyond: Security Principles
Cybersecurity Terminology Crash Course
Hands-On Standards mapping: Mastery
Lifecycle for Beginners
AI data protection Incident Response: Fast Track
Hands-On Risk basics: Basics
OAuth/OIDC Incident Response
Cloud forensics Operations Playbook
Ransomware readiness for Beginners
Hardening Deep Dive
Wi-Fi Threats and Detection: Blueprint
Essentials of Wireless testing
IoT Threats and Detection: Mastery
Audits Troubleshooting
Essentials of Email
VPN Deep Dive
Detection engineering Troubleshooting: Blueprint
DLP Operations Playbook
Hands-On Continuous compliance
Tabletops Deep Dive: Fast Track
IoT Incident Response: Blueprint
Essentials of Access reviews
Email Deep Dive
Intel reporting Troubleshooting: Bootcamp Module
AI governance Hardening Workshop
BCP Incident Response
Memory forensics Threats and Detection
Essentials of Wi-Fi
Logging Threats and Detection
Risk assessment Hardening Workshop
Essentials of Hiring
AI governance Incident Response
Hands-On Supply chain: Workshop
Security principles Operations Playbook
Hands-On Containment
Budgeting Incident Response
OWASP for Beginners
Essentials of Communications
NAC Troubleshooting
Essentials of Conditional access: In Practice
Hands-On Case management
Pentest basics for Beginners: Bootcamp Module
Privilege management Operations Playbook
API security Deep Dive
OSINT Deep Dive
DLP Troubleshooting
Hands-On Alert triage: In Practice
Security controls Architecture Patterns
Hands-On Security principles
Hands-On Access reviews
Firewalls Incident Response: Bootcamp Module
Evidence handling for Beginners
Malware triage Hardening Workshop: Bootcamp Module
Hands-On SSO: Fast Track
API security Threats and Detection
Hands-On Privacy by design: Blueprint
AWS Deep Dive: Bootcamp Module
MFA Operations Playbook
SIEM Incident Response: Basics
IoT Deep Dive: Bootcamp Module
Hiring Threats and Detection
Security principles Threats and Detection: Bootcamp Module
IOC vs TTP Incident Response
Hardening Deep Dive: Basics
Essentials of Evidence handling
Memory forensics Hardening Workshop
Essentials of Logging
Hands-On MFA
Hiring Deep Dive
Network forensics Deep Dive
VPN Threats and Detection
IaC Operations Playbook: Blueprint
GCP Threats and Detection: Mastery
Hands-On IoT: In Practice
Tabletops Deep Dive
Hands-On Secrets
Network for Beginners
IR in cloud Architecture Patterns
Disk forensics Operations Playbook
Critical infrastructure for Beginners: In Practice
Hardening Operations Playbook: Field Guide
Supply chain Deep Dive
Containment Hardening Workshop: Basics
Standards mapping Threats and Detection
Kubernetes for Beginners
DR Hardening Workshop
Essentials of Windows artifacts: Workshop
Metrics Troubleshooting
GraphQL for Beginners: Blueprint
Essentials of API testing
Hands-On AWS
AI governance Threats and Detection
IoT Deep Dive
Wireless testing for Beginners
DR Troubleshooting
Network testing Deep Dive: In Practice
Security culture Hardening Workshop: Bootcamp Module
CI/CD Deep Dive: Field Guide
Hands-On KMS
Secrets Incident Response
Essentials of Kubernetes: Mastery
Essentials of GCP: Fast Track
Web testing Troubleshooting
NAC Threats and Detection
TCP/IP Threats and Detection: Field Guide
Email Troubleshooting
Hands-On Stakeholder management
Containment Operations Playbook
Auth Operations Playbook
SSRF Threats and Detection
Evidence Architecture Patterns: Basics
AD Threats and Detection
Containers Hardening Workshop
PAM Incident Response
Hands-On Privilege management: Blueprint
Reporting Deep Dive
OAuth/OIDC for Beginners: Field Guide
Hands-On Evidence
Malware triage Deep Dive
Auth Deep Dive: Basics
Hands-On Hiring
MDM Incident Response
Network testing Hardening Workshop
Risk assessment Troubleshooting
Evidence Incident Response
Alert triage for Beginners
GCP Deep Dive
Recon Incident Response
KMS Hardening Workshop: Mastery
Cloud logging Troubleshooting: In Practice
Hardening Deep Dive: Fast Track
MITRE ATT&CK Threats and Detection: Fast Track
Pentest basics Architecture Patterns
Model risks Architecture Patterns
SBOM Operations Playbook
Tabletops Incident Response
Case management Deep Dive: Bootcamp Module
Supply chain Threats and Detection
SCADA for Beginners
ICS Threats and Detection
VPN Threats and Detection: Bootcamp Module
GCP Threats and Detection: Bootcamp Module
Ransomware readiness Threats and Detection: Fast Track
VPN Hardening Workshop: Basics
Hands-On Lifecycle
Essentials of TCP/IP
Security controls Architecture Patterns: Workshop
NAC Architecture Patterns
Azure Troubleshooting: In Practice
Hands-On CI/CD
Malware triage Threats and Detection
Firewalls Architecture Patterns
DDoS Operations Playbook
Hands-On Wireless testing
Essentials of Web testing: Fast Track
Email Incident Response
Stakeholder management Threats and Detection
Code signing Hardening Workshop
Cloud logging Architecture Patterns
Telemetry strategy Hardening Workshop
Cloud forensics Operations Playbook: Field Guide
KMS Hardening Workshop: Bootcamp Module
Evidence Threats and Detection: Bootcamp Module
MFA Hardening Workshop: Mastery
KMS Architecture Patterns
Threat landscape Incident Response
Conditional access Threats and Detection
OSINT Hardening Workshop
Essentials of Alert triage: Field Guide
AWS Operations Playbook
Threat hunting Incident Response
BCP Incident Response: Bootcamp Module
CI/CD Operations Playbook: Field Guide
Windows Incident Response
MFA Deep Dive: Bootcamp Module
Cloud forensics Incident Response
Metrics Deep Dive: Blueprint
Threat landscape Incident Response: Basics
Linux Hardening Workshop: Basics
Network Hardening Workshop
Essentials of MFA: Bootcamp Module
Email Threats and Detection
Essentials of Incident notifications: Mastery
SSRF Architecture Patterns
ICS Hardening Workshop: Fast Track
Network forensics Architecture Patterns: In Practice
AD Deep Dive: In Practice
MDM Incident Response: Basics
Alert triage Architecture Patterns
Network Operations Playbook
Firewalls Deep Dive
Vendor risk Architecture Patterns
Hands-On API security
Hardening Operations Playbook
HTTP/S for Beginners
Security strategy Architecture Patterns
MITRE ATT&CK Operations Playbook
Containment Incident Response
Essentials of Risk assessment
Policies Operations Playbook: Field Guide
Budgeting Architecture Patterns
Ransomware readiness Operations Playbook
SCADA Operations Playbook: Fast Track
Reporting Hardening Workshop
Secrets Threats and Detection: In Practice
Kubernetes Threats and Detection
Critical infrastructure Threats and Detection
Hands-On Detection engineering: Blueprint
Pentest basics Threats and Detection
Security principles Incident Response
SSO Incident Response
Vendor risk Hardening Workshop
Cloud logging Incident Response: Mastery
Model risks Hardening Workshop: Field Guide
Logging Operations Playbook
Hands-On Authorization: In Practice
Windows for Beginners
Ransomware Operations Playbook
Threat hunting Deep Dive
SSO Architecture Patterns
Hands-On Hiring: Fast Track
Medical devices Incident Response: Basics
Brand monitoring Operations Playbook
Data minimization Hardening Workshop
Tabletops Hardening Workshop: Fast Track
Medical devices Troubleshooting
Conditional access Architecture Patterns
Essentials of Authorization: Bootcamp Module
Wireless testing Threats and Detection
Security strategy for Beginners
Containment Architecture Patterns: In Practice
Hands-On SIEM
Threat landscape for Beginners
Hands-On Hardening
Supply chain Architecture Patterns
Maturity models Troubleshooting
SQLi Troubleshooting
Prompt injection Incident Response: In Practice
Vendor risk Operations Playbook
Wi-Fi Threats and Detection
Hands-On Campaign tracking
Essentials of IR in cloud: Basics
OWASP Threats and Detection: Fast Track
API testing for Beginners: In Practice
SQLi Architecture Patterns
Memory forensics for Beginners: Mastery
Essentials of DLP
Network Incident Response: Bootcamp Module
API security Operations Playbook
OAuth/OIDC Threats and Detection
Misconfigurations Operations Playbook: Fast Track
Threat landscape Architecture Patterns
DNS Architecture Patterns
AI incident response Operations Playbook
Policies Troubleshooting: Field Guide
Azure for Beginners
Essentials of Continuous compliance: Bootcamp Module
Code signing for Beginners: Mastery
SSRF for Beginners: Blueprint
ICS Operations Playbook
ICS Hardening Workshop
BCP Troubleshooting
Firewalls for Beginners
Privacy by design Threats and Detection
Hands-On Code signing
GCP Incident Response: Blueprint
BCP Operations Playbook
Critical infrastructure Troubleshooting: Field Guide
Risk basics Architecture Patterns
SCADA Architecture Patterns: In Practice
NAC for Beginners: Basics
Hands-On Playbooks: Workshop
Detection engineering Troubleshooting
BCP for Beginners
Metrics Hardening Workshop
Security culture Troubleshooting: Bootcamp Module
Maturity models Troubleshooting: Blueprint
AI incident response Troubleshooting: Mastery
Windows Hardening Workshop: Field Guide
Standards mapping Architecture Patterns
Kubernetes Deep Dive
Hands-On AD
AD Architecture Patterns: Field Guide
EDR Architecture Patterns: Workshop
Evidence handling Operations Playbook
Essentials of Data minimization: Blueprint
Conditional access Architecture Patterns: Workshop
Linux Threats and Detection
Threat hunting Hardening Workshop
Hands-On Cloud forensics
Essentials of Evidence
Data minimization Incident Response: Basics
Telemetry strategy Threats and Detection
Intel reporting Hardening Workshop: In Practice
Policies for Beginners: Mastery
Memory forensics Incident Response
Risk assessment Incident Response: Fast Track
Hands-On API testing
Model risks Incident Response
GraphQL Hardening Workshop
Supply chain Hardening Workshop
Segmentation Troubleshooting
Azure Troubleshooting
IoT Hardening Workshop: In Practice
Hands-On GraphQL
Hands-On DLP
Essentials of Brand monitoring
Hands-On SBOM
Hardening Hardening Workshop: In Practice
Stakeholder management Incident Response
Reporting Architecture Patterns
Metrics Operations Playbook: Mastery
Essentials of Secrets: Workshop
Hands-On Auth: Basics
BCP Incident Response: Fast Track
Supply chain for Beginners
Recon Architecture Patterns
Hardening for Beginners
VPN Operations Playbook
Case management Architecture Patterns
High availability Incident Response: Fast Track
Network Architecture Patterns
TCP/IP Deep Dive
Security principles Deep Dive: Field Guide
Ransomware readiness Operations Playbook: In Practice
Playbooks Threats and Detection: Fast Track
Access reviews Incident Response
Wireless testing Troubleshooting: Basics
Security controls Hardening Workshop
Campaign tracking Threats and Detection: Fast Track
Containers for Beginners
Metrics Troubleshooting: In Practice
GraphQL Architecture Patterns
Prompt injection Operations Playbook
Kubernetes for Beginners: In Practice
SSO Troubleshooting
Reporting for Beginners: Workshop
MDM Architecture Patterns: In Practice
Pentest basics Hardening Workshop
Ransomware readiness Architecture Patterns
Network forensics Architecture Patterns: Blueprint
Email Hardening Workshop
API testing Operations Playbook
Hands-On Containment: Bootcamp Module
HTTP/S Troubleshooting
Containment Threats and Detection
Wireless testing Architecture Patterns
Threat hunting Incident Response: Basics
DDoS Troubleshooting
Containment for Beginners: Bootcamp Module
Communications Incident Response
OWASP Operations Playbook
Privacy by design Architecture Patterns: Blueprint
Segmentation Incident Response
Azure Architecture Patterns
Memory forensics for Beginners
PII handling Threats and Detection: In Practice
DLP Incident Response: Fast Track
Essentials of Code signing
PAM Troubleshooting
SSO Deep Dive
Hands-On Misconfigurations
Metrics Incident Response: Blueprint
Linux Architecture Patterns
Metrics Architecture Patterns
Essentials of SIEM
Conditional access Hardening Workshop
Web testing Hardening Workshop: Field Guide
Wireless testing Hardening Workshop
OWASP Architecture Patterns
Network Threats and Detection
Logging Deep Dive
Essentials of Azure
Hands-On Disk forensics
Hands-On Stakeholder management: Workshop
Alert triage Incident Response: Fast Track
ICS Deep Dive
Essentials of Medical devices
OWASP Deep Dive
Essentials of Lifecycle: In Practice
PII handling Troubleshooting
Security culture Operations Playbook
IOC vs TTP for Beginners
Security controls Operations Playbook: Workshop
Critical infrastructure Architecture Patterns
Network Deep Dive: Basics
NAC Hardening Workshop
Vendor risk Incident Response
EDR Operations Playbook
SBOM Deep Dive
Evidence handling Incident Response
Essentials of Disk forensics
Email Troubleshooting: In Practice
DR Troubleshooting: Blueprint
Incident notifications Hardening Workshop
Vendor risk for Beginners
Recon Hardening Workshop: Field Guide
API testing Deep Dive
CI/CD Incident Response
Threat hunting Operations Playbook: Field Guide
Essentials of SBOM
Windows Troubleshooting
BCP Hardening Workshop
Playbooks Troubleshooting
Hands-On Cloud logging
MFA Incident Response: In Practice
Containers Operations Playbook: Fast Track
TCP/IP Troubleshooting
Essentials of KMS: Fast Track
Network testing for Beginners
Policies Hardening Workshop: In Practice
Recon Troubleshooting
Security culture Architecture Patterns: Bootcamp Module
OWASP Hardening Workshop
macOS Incident Response
PII handling Operations Playbook: In Practice
DR for Beginners
Hands-On Windows artifacts: Mastery
Alert triage Deep Dive
SCADA Hardening Workshop
Stakeholder management Troubleshooting
AI data protection Operations Playbook
Campaign tracking for Beginners
Windows Deep Dive
Essentials of Playbooks
MITRE ATT&CK Incident Response: In Practice
CI/CD Threats and Detection
Communications Threats and Detection
Incident notifications Incident Response: Workshop
GraphQL Incident Response
Hands-On Metrics
Privilege management for Beginners: Field Guide
Critical infrastructure Incident Response
Azure Deep Dive
Linux Operations Playbook
Containment for Beginners
Privilege management Architecture Patterns
Budgeting Architecture Patterns: Basics
Continuous compliance Architecture Patterns: Field Guide
Playbooks Incident Response: Mastery
AWS Threats and Detection: In Practice
Logging Hardening Workshop
AD Troubleshooting
Hiring Troubleshooting
Auth for Beginners
DDoS Troubleshooting: In Practice
Alert triage Deep Dive: Basics
XSS Architecture Patterns
AI incident response for Beginners
Brand monitoring Troubleshooting: Workshop
Ransomware Hardening Workshop
Essentials of Playbooks: Fast Track
Conditional access Deep Dive
Budgeting Hardening Workshop: Basics
GraphQL for Beginners
Ransomware readiness Threats and Detection
Network forensics Incident Response: Mastery
XSS Incident Response
CSRF Troubleshooting
Windows artifacts Troubleshooting
Policies Incident Response
Essentials of TCP/IP: Blueprint
BEC Hardening Workshop
Medical devices Architecture Patterns: Fast Track
DR Operations Playbook
Metrics Incident Response
Network forensics Operations Playbook
OWASP Troubleshooting
Memory forensics Operations Playbook
Essentials of Prompt injection
PII handling Architecture Patterns
Memory forensics Hardening Workshop: Fast Track
Security strategy Deep Dive: In Practice
SIEM Troubleshooting
BEC Deep Dive
Telemetry strategy Incident Response
Detection engineering Incident Response: Blueprint
Pentest basics Operations Playbook
Lifecycle Operations Playbook
AD Hardening Workshop: Blueprint
Medical devices Operations Playbook: Fast Track
Reporting Troubleshooting
Essentials of Misconfigurations: In Practice
SIEM Operations Playbook
OAuth/OIDC Incident Response: Mastery
DDoS Architecture Patterns
DNS Incident Response: Field Guide
Segmentation Threats and Detection: Bootcamp Module
Pentest basics for Beginners: Workshop
Medical devices Hardening Workshop
High availability Operations Playbook: Basics
PII handling Architecture Patterns: Basics
MDM Threats and Detection
Essentials of SCADA
Playbooks for Beginners
IoT Operations Playbook
IoT Troubleshooting: Bootcamp Module
Infrastructure as Code Monitoring and Detection: Lab Series
Advanced Program management Mastery
Advanced SQL injection Mastery: Fast Track
Zero-Trust Approach to Disk forensics
Policies and standards Playbook for Teams
Security engineering Playbook for Teams
Threat hunting Tuning and Optimization
Program management Threats, Tactics, and Defenses
LLM application security Monitoring and Detection
Containment Threats, Tactics, and Defenses
Program management Monitoring and Detection
Kubernetes Hardening Clinic: Bootcamp Unit
Zero-Trust Approach to Attack surface
Malware triage Hardening Clinic: Field Guide
Zero-Trust Approach to Consent management
SQL injection Playbook for Teams
AI data protection Tuning and Optimization: Primer
Practical Business continuity Workshop
AI governance Hardening Clinic: Primer
Practical Privacy by design Workshop: Field Guide
Security mindset Tuning and Optimization: Blueprint
Advanced Reporting Mastery
Stakeholder management Threats, Tactics, and Defenses
Attack surface Monitoring and Detection
Authentication Threats, Tactics, and Defenses
Executive communication Architecture and Guardrails
Practical Segmentation Workshop
Memory forensics Monitoring and Detection: Fast Track
Advanced High availability Mastery
XSS Tuning and Optimization
Ransomware readiness Playbook for Teams: Primer
Credential protection Monitoring and Detection
Zero-Trust Approach to Risk assessment: Field Guide
Logging Architecture and Guardrails: Bootcamp Unit
Security metrics Monitoring and Detection: Operator Edition
Zero-Trust Approach to Continuous compliance
Practical Vendor risk Workshop
Application control Playbook for Teams
Advanced AI supply chain Mastery: Lab Series
Prompt injection Playbook for Teams: Primer
Recovery testing Monitoring and Detection: Primer
Malicious domains Architecture and Guardrails
Threat hunting Hardening Clinic
Disk forensics Hardening Clinic
Zero-Trust Approach to PAM
Advanced Maturity models Mastery: Lab Series
Practical Budgeting Workshop
Zero-Trust Approach to Logging
Network telemetry Hardening Clinic: Field Guide
Reconnaissance Hardening Clinic: Primer
Practical AI incident response Workshop
XSS Playbook for Teams
Advanced Malicious domains Mastery: Bootcamp Unit
Zero trust networking Tuning and Optimization
Purple teaming Tuning and Optimization
Post-incident reviews Incident Handling
GraphQL security Playbook for Teams
Containment Playbook for Teams
Security mindset Monitoring and Detection: Operator Edition
Zero-Trust Approach to Policies and standards: Field Guide
Routing security Playbook for Teams: Operator Edition
AI supply chain Hardening Clinic
Cloud forensics Threats, Tactics, and Defenses: Field Guide
Practical Azure security Workshop
Advanced Code signing Mastery: Fast Track
Brand monitoring Hardening Clinic: Operator Edition
SIEM Threats, Tactics, and Defenses
Zero-Trust Approach to Serverless security
Intel reporting Incident Handling
Zero-Trust Approach to CI/CD
XSS Incident Handling: Lab Series
Supply chain security Playbook for Teams
Budgeting Hardening Clinic
Advanced Crisis management Mastery: Fast Track
Exception management Incident Handling
Business continuity Tuning and Optimization
Ransomware readiness Tuning and Optimization: Case Studies
Privacy by design Hardening Clinic
AI supply chain Threats, Tactics, and Defenses
Continuous compliance Threats, Tactics, and Defenses
Safety constraints Tuning and Optimization: Case Studies
Security metrics Architecture and Guardrails
CI/CD Incident Handling
ICS security Threats, Tactics, and Defenses: Bootcamp Unit
Service accounts Incident Handling
Zero-Trust Approach to Standards mapping
Cloud forensics Monitoring and Detection: Blueprint
OWASP Top 10 Monitoring and Detection
Privilege management Threats, Tactics, and Defenses
Zero-Trust Approach to Ransomware readiness: Blueprint
Zero-Trust Approach to Intel reporting
GraphQL security Hardening Clinic
Practical Continuous compliance Workshop: Case Studies
Risk basics Threats, Tactics, and Defenses
Secure input validation Threats, Tactics, and Defenses
Security roadmaps Monitoring and Detection: Field Guide
macOS Tuning and Optimization
IOC vs TTP Architecture and Guardrails
Practical Security mindset Workshop
SQL injection Threats, Tactics, and Defenses: Primer
Attack simulation Hardening Clinic: Bootcamp Unit
Linux Incident Handling
macOS Hardening Clinic
Prompt injection Hardening Clinic
XSS Incident Handling: Fast Track
IR playbooks Incident Handling
Containment Architecture and Guardrails: Operator Edition
UEBA Monitoring and Detection: Operator Edition
Cloud networking Monitoring and Detection
Exception management Hardening Clinic
Business logic flaws Tuning and Optimization
Advanced Critical infrastructure Mastery: Bootcamp Unit
Pentest methodology Playbook for Teams
Resilient architecture Threats, Tactics, and Defenses
Practical Risk assessment Workshop
Practical MFA Workshop: Fast Track
Adversary profiling Tuning and Optimization
Ransomware response Tuning and Optimization
Policies and standards Monitoring and Detection: Blueprint
Practical Threat landscape Workshop
Alert triage Tuning and Optimization: Blueprint
Alert triage Playbook for Teams
Standards mapping Incident Handling
Purple teaming Incident Handling: Lab Series
Practical Audit readiness Workshop
Zero-Trust Approach to EDR
SIEM Playbook for Teams
Linux Tuning and Optimization: Case Studies
Zero-Trust Approach to UEBA: Blueprint
PII handling Monitoring and Detection
Reporting Tuning and Optimization
Brand monitoring Monitoring and Detection
macOS Monitoring and Detection
Zero-Trust Approach to Reporting: Fast Track
Evidence collection Incident Handling: Bootcamp Unit
Advanced AI supply chain Mastery: Field Guide
Secrets management Monitoring and Detection
Advanced Reporting Mastery: Operator Edition
Attack simulation Threats, Tactics, and Defenses: Bootcamp Unit
Standards mapping Hardening Clinic
Practical Service restoration Workshop: Primer
Containers Hardening Clinic: Fast Track
PAM Monitoring and Detection
Medical device security Playbook for Teams: Bootcamp Unit
Security analytics Tuning and Optimization: Lab Series
Telemetry strategy Incident Handling
Advanced Evidence collection Mastery: Operator Edition
Practical Conditional access Workshop: Fast Track
CSRF Architecture and Guardrails
Zero-Trust Approach to Security mindset
Security principles Monitoring and Detection
Network telemetry Monitoring and Detection: Bootcamp Unit
Control testing Tuning and Optimization: Bootcamp Unit
Privacy by design Tuning and Optimization
DLP Architecture and Guardrails: Blueprint
Hardening Monitoring and Detection
Zero-Trust Approach to OWASP Top 10: Bootcamp Unit
Conditional access Threats, Tactics, and Defenses
Windows artifacts Architecture and Guardrails: Primer
Practical Cloud misconfigurations Workshop: Blueprint
Access reviews Tuning and Optimization: Field Guide
UEBA Playbook for Teams: Bootcamp Unit
Correlation Playbook for Teams
Active Directory Tuning and Optimization: Case Studies
Practical Safety constraints Workshop
Noise reduction Monitoring and Detection: Fast Track
Threat landscape Monitoring and Detection: Primer
MFA Threats, Tactics, and Defenses
Practical DLP Workshop: Case Studies
Advanced Crisis communications Mastery
Advanced IR playbooks Mastery
Backups Playbook for Teams
Practical Cloud identity governance Workshop
SaaS security posture Threats, Tactics, and Defenses
Malware triage Hardening Clinic: Fast Track
Safety constraints Threats, Tactics, and Defenses
Firewalls Threats, Tactics, and Defenses
Security roadmaps Threats, Tactics, and Defenses: Lab Series
Email forensics Threats, Tactics, and Defenses
Advanced Evidence preservation Mastery: Field Guide
Zero-Trust Approach to Ransomware readiness: Lab Series
Conditional access Incident Handling: Lab Series
Maturity models Incident Handling
Post-incident reviews Hardening Clinic
Stakeholder management Incident Handling
Federation Hardening Clinic: Operator Edition
Zero-Trust Approach to Artifact collection
Zero-Trust Approach to Security principles
Evidence handling Architecture and Guardrails: Primer
Post-incident reviews Playbook for Teams
Business logic flaws Monitoring and Detection
Practical Program management Workshop
Advanced AI governance Mastery: Bootcamp Unit
Resilient architecture Incident Handling
Advanced Business logic flaws Mastery
Brand monitoring Architecture and Guardrails: Primer
Routing security Threats, Tactics, and Defenses
Advanced Threat landscape Mastery
Critical infrastructure Architecture and Guardrails: Fast Track
Medical device security Hardening Clinic
DLP Hardening Clinic: Bootcamp Unit
Zero-Trust Approach to Identity lifecycle
Authorization Architecture and Guardrails
Maturity models Tuning and Optimization: Case Studies
Azure security Monitoring and Detection: Field Guide
Advanced Intel enrichment Mastery
Evidence handling Hardening Clinic
Privilege management Monitoring and Detection
Advanced Dependency risk Mastery: Lab Series
PII handling Architecture and Guardrails
Wireless testing Playbook for Teams
SCADA security Incident Handling
Practical Infrastructure as Code Workshop
Zero-Trust Approach to Program management
Artifact integrity Playbook for Teams: Field Guide
Executive communication Playbook for Teams: Primer
Advanced Malware triage Mastery: Operator Edition
Conditional access Tuning and Optimization
Zero-Trust Approach to Network forensics
Data access controls Monitoring and Detection: Bootcamp Unit
Privilege management Playbook for Teams
OAuth/OIDC Monitoring and Detection
Attack surface Tuning and Optimization
Timeline analysis Monitoring and Detection
PII handling Monitoring and Detection: Fast Track
Attack surface Threats, Tactics, and Defenses
Active Directory Hardening Clinic: Lab Series
Advanced OT segmentation Mastery
Campaign tracking Tuning and Optimization
Advanced Evidence handling Mastery: Case Studies
Advanced AI monitoring Mastery
Practical AI governance Workshop
Practical Secrets management Workshop
Kubernetes Playbook for Teams
Service restoration Hardening Clinic
Secrets and tokens Threats, Tactics, and Defenses
Threat landscape Threats, Tactics, and Defenses
Dependency risk Incident Handling
Malicious domains Incident Handling
OAuth/OIDC Architecture and Guardrails: Case Studies
CI/CD Incident Handling: Blueprint
Zero-Trust Approach to Vendor risk: Operator Edition
Practical SIEM Workshop
NAC Tuning and Optimization: Bootcamp Unit
LLM application security Tuning and Optimization: Primer
Advanced MDM Mastery
API testing Hardening Clinic
OWASP Top 10 Architecture and Guardrails
Practical Telemetry strategy Workshop
Advanced Campaign tracking Mastery
Zero-Trust Approach to Firewalls: Lab Series
AWS security Incident Handling
Timeline analysis Threats, Tactics, and Defenses
Kubernetes Hardening Clinic: Lab Series
CI/CD Monitoring and Detection
Zero-Trust Approach to BEC response: Blueprint
Access reviews Tuning and Optimization
Artifact collection Tuning and Optimization
Practical Pentest methodology Workshop
Segmentation Tuning and Optimization
Network telemetry Tuning and Optimization
Practical PAM Workshop
Timeline analysis Tuning and Optimization: Field Guide
PAM Monitoring and Detection: Fast Track
IOC vs TTP Monitoring and Detection
Zero-Trust Approach to Privilege management: Lab Series
Advanced Crisis communications Mastery: Case Studies
AI incident response Threats, Tactics, and Defenses: Operator Edition
AWS security Monitoring and Detection
Reconnaissance Tuning and Optimization: Case Studies
Consent management Tuning and Optimization
Telemetry strategy Playbook for Teams
Zero-Trust Approach to Session management
Cloud misconfigurations Incident Handling
Infrastructure as Code Playbook for Teams
Advanced AI governance Mastery: Case Studies
Session management Tuning and Optimization: Primer
Secrets and tokens Playbook for Teams
Security mindset Playbook for Teams: Fast Track
Network forensics Playbook for Teams
Zero-Trust Approach to IR playbooks
Policies and standards Tuning and Optimization
Advanced Data access controls Mastery
Detection engineering Threats, Tactics, and Defenses
Practical Policies and standards Workshop
MFA Monitoring and Detection
Telemetry strategy Threats, Tactics, and Defenses
Threat hunting Threats, Tactics, and Defenses: Operator Edition
Intel enrichment Incident Handling: Blueprint
Policies and standards Incident Handling
API security Architecture and Guardrails
Risk assessment Incident Handling
PII handling Threats, Tactics, and Defenses
Exception management Incident Handling: Operator Edition
SSO Incident Handling
Security governance Hardening Clinic
Audit readiness Tuning and Optimization: Primer
Zero-Trust Approach to HTTP/S
HTTP/S Playbook for Teams: Bootcamp Unit
Backups Threats, Tactics, and Defenses
Proxy security Playbook for Teams
Advanced Safety constraints Mastery: Bootcamp Unit
Practical CSRF Workshop: Lab Series
GCP security Threats, Tactics, and Defenses
KMS Incident Handling: Fast Track
AI governance Playbook for Teams
Zero-Trust Approach to Ransomware response: Primer
Artifact integrity Incident Handling: Operator Edition
Serverless security Incident Handling
XSS Incident Handling: Primer
DNS Playbook for Teams
Browser security Playbook for Teams
Brand monitoring Monitoring and Detection: Primer
Session management Hardening Clinic: Lab Series
Data access controls Hardening Clinic: Fast Track
Prompt injection Threats, Tactics, and Defenses
Security mindset Architecture and Guardrails
AI monitoring Incident Handling: Blueprint
Advanced Memory forensics Mastery
Advanced Cloud identity governance Mastery: Operator Edition
Data access controls Architecture and Guardrails: Blueprint
Firewalls Playbook for Teams: Operator Edition
Security principles Tuning and Optimization: Fast Track
Reconnaissance Incident Handling
Hiring and team building Incident Handling
LLM application security Architecture and Guardrails
Model risks Playbook for Teams
Practical Executive communication Workshop: Lab Series
Model risks Threats, Tactics, and Defenses: Field Guide
Artifact collection Hardening Clinic
Advanced Security governance Mastery
Practical BGP Workshop
Brand monitoring Hardening Clinic
Evidence collection Tuning and Optimization
Standards mapping Tuning and Optimization: Field Guide
PII handling Incident Handling
Privilege management Playbook for Teams: Case Studies
Resilient architecture Tuning and Optimization: Field Guide
Credential protection Architecture and Guardrails: Fast Track
Zero-Trust Approach to Alert triage: Operator Edition
IOC vs TTP Playbook for Teams
Stakeholder management Playbook for Teams
Secure Git Monitoring and Detection
Zero-Trust Approach to Incident communications
Crisis management Architecture and Guardrails
Practical Crisis management Workshop: Operator Edition
Practical Session management Workshop: Lab Series
Threat hunting Incident Handling
Zero-Trust Approach to Audit readiness: Operator Edition
Endpoint isolation Threats, Tactics, and Defenses: Primer
Zero-Trust Approach to PII handling: Operator Edition
Cloud forensics Tuning and Optimization
Windows artifacts Monitoring and Detection: Bootcamp Unit
Practical LLM application security Workshop
Defense in depth Hardening Clinic: Case Studies
Service accounts Playbook for Teams: Fast Track
Advanced Security strategy Mastery
Practical Security governance Workshop
ICS security Tuning and Optimization: Case Studies
Resilient architecture Hardening Clinic
AI incident response Incident Handling: Lab Series
Containment Architecture and Guardrails
Practical KMS Workshop
Case management Architecture and Guardrails: Lab Series
Malicious domains Monitoring and Detection
Identity lifecycle Threats, Tactics, and Defenses: Primer
Zero-Trust Approach to Cloud logging: Field Guide
Authentication Architecture and Guardrails
Advanced Crisis communications Mastery: Bootcamp Unit
Hiring and team building Incident Handling: Field Guide
Reporting Monitoring and Detection: Case Studies
Advanced Artifact collection Mastery
AI governance Tuning and Optimization
Tabletop exercises Architecture and Guardrails
Practical Detection engineering Workshop: Fast Track
Advanced Post-incident reviews Mastery
Model risks Incident Handling: Primer
Zero-Trust Approach to Ransomware response
Advanced Campaign tracking Mastery: Field Guide
Practical Resilient architecture Workshop
Advanced Exception management Mastery
Windows Hardening Clinic: Bootcamp Unit
Active Directory Hardening Clinic
Ransomware response Architecture and Guardrails
Practical NAC Workshop
Advanced API security Mastery: Blueprint
Practical Cloud misconfigurations Workshop
macOS Hardening Clinic: Operator Edition
Critical infrastructure Monitoring and Detection
Cloud misconfigurations Tuning and Optimization: Bootcamp Unit
Reporting Monitoring and Detection
Zero-Trust Approach to Policies and standards
Advanced High availability Mastery: Bootcamp Unit
Security analytics Tuning and Optimization
Advanced Evidence collection Mastery: Primer
Risk assessment Threats, Tactics, and Defenses: Primer
Advanced Secrets and tokens Mastery
Zero-Trust Approach to Service accounts: Bootcamp Unit
Practical Data minimization Workshop: Bootcamp Unit
Supply chain security Monitoring and Detection
OT monitoring Hardening Clinic: Field Guide
Practical IoT security Workshop
Advanced Web testing Mastery
Cloud forensics Playbook for Teams: Field Guide
Zero-Trust Approach to Incident notifications
Defense in depth Incident Handling
Advanced Pentest methodology Mastery: Case Studies
Zero-Trust Approach to Access reviews
AI supply chain Architecture and Guardrails
Secure input validation Hardening Clinic
Crisis management Tuning and Optimization
MITRE ATT&CK Incident Handling: Fast Track
Zero-Trust Approach to Memory forensics
Zero-Trust Approach to Privilege management
Zero-Trust Approach to HTTP/S: Primer
Proxy security Monitoring and Detection
Crisis management Playbook for Teams
Practical Critical infrastructure Workshop: Blueprint
Advanced Kubernetes Mastery
Dependency risk Architecture and Guardrails: Case Studies
Practical Cloud identity governance Workshop: Fast Track
Identity lifecycle Hardening Clinic: Operator Edition
Practical Malware triage Workshop
BEC response Incident Handling: Operator Edition
Executive communication Monitoring and Detection: Lab Series
Advanced Network testing Mastery: Bootcamp Unit
Evidence preservation Incident Handling
Advanced MFA Mastery
Zero-Trust Approach to OT segmentation
TCP/IP Hardening Clinic: Fast Track
Zero-Trust Approach to Critical infrastructure
Stakeholder management Tuning and Optimization: Case Studies
MITRE ATT&CK Playbook for Teams
Zero-Trust Approach to Privacy by design
Advanced Security roadmaps Mastery
MFA Hardening Clinic: Fast Track
Zero-Trust Approach to Malware triage: Field Guide
Advanced Continuous compliance Mastery
Backups Incident Handling: Operator Edition
Advanced Adversary profiling Mastery: Bootcamp Unit
Advanced Business continuity Mastery: Fast Track
Cloud logging Threats, Tactics, and Defenses
Privacy risk assessments Threats, Tactics, and Defenses
CI/CD Architecture and Guardrails
Security metrics Playbook for Teams
Network testing Monitoring and Detection
Practical Active Directory Workshop
Backups Incident Handling: Fast Track
Session security Architecture and Guardrails
SSRF Incident Handling: Lab Series
Incident communications Threats, Tactics, and Defenses
Session security Incident Handling: Lab Series
DLP Incident Handling: Bootcamp Unit
Phishing infrastructure Threats, Tactics, and Defenses
Zero-Trust Approach to Kubernetes: Field Guide
Reporting Threats, Tactics, and Defenses: Field Guide
Crisis management Incident Handling: Primer
Advanced Secure Git Mastery
Practical Recovery coordination Workshop
Practical Authorization Workshop
Cloud forensics Tuning and Optimization: Operator Edition
Intel reporting Tuning and Optimization: Bootcamp Unit
Privacy risk assessments Hardening Clinic: Operator Edition
Malware triage Incident Handling: Bootcamp Unit
Zero-Trust Approach to OWASP Top 10
Practical Service accounts Workshop: Field Guide
Practical ICS security Workshop
Artifact collection Incident Handling: Field Guide
Security roadmaps Threats, Tactics, and Defenses
Malicious domains Hardening Clinic: Blueprint
Kubernetes Architecture and Guardrails: Lab Series
Incident notifications Hardening Clinic: Blueprint
Zero-Trust Approach to Active Directory: Case Studies
Advanced AI data protection Mastery
Case management Hardening Clinic
Zero-Trust Approach to Budgeting: Case Studies
API testing Tuning and Optimization
Email forensics Incident Handling
CI/CD Monitoring and Detection: Blueprint
Security principles Architecture and Guardrails: Blueprint
Routing security Tuning and Optimization
Firewalls Incident Handling: Primer
Resilient architecture Playbook for Teams
Recovery testing Monitoring and Detection: Lab Series
API testing Playbook for Teams
Windows Incident Handling
Adversary profiling Monitoring and Detection: Lab Series
Session security Incident Handling
AI monitoring Monitoring and Detection: Lab Series
UEBA Threats, Tactics, and Defenses: Bootcamp Unit
High availability Incident Handling
MDM Architecture and Guardrails
AWS security Threats, Tactics, and Defenses: Case Studies
OSINT Monitoring and Detection: Fast Track
Advanced Policy as code Mastery
Resilient architecture Tuning and Optimization: Bootcamp Unit
Zero-Trust Approach to DNS
OT segmentation Tuning and Optimization
Practical DLP Workshop
Advanced Stakeholder management Mastery: Field Guide
Professional Penetration Testing Methodologies
Advanced Red Teaming and Adversary Simulation
Web Application Penetration Testing Mastery
Wireless Network Attacks and Defense
Social Engineering and Physical Security Assessments
Cloud Penetration Testing: AWS and Azure
Mobile Application Security Assessment
IoT and Embedded Device Hacking
Exploit Development and Buffer Overflows
Python for Offensive Security
Post-Exploitation and Persistence Tactics
Penetration Testing Reporting and Documentation
Microsoft Entra ID Attacks and Defense
Capture The Flag (CTF) Strategies
Rules of Engagement
Applied Cryptography and Data Protection
Public Key Infrastructure (PKI) Implementation
Cryptographic Algorithms and Protocols
Post-Quantum Cryptography
Physical Security Information Management (PSIM)
Site Security Design and Access Control
Surveillance Systems and Video Analytics
Data Center Physical Security
Blockchain Fundamentals and Security
Smart Contract Auditing and Exploitation
DeFi Security and Flash Loan Attacks
Web3 Wallet Security and Key Management
Enterprise Security Architecture Frameworks
Zero Trust Architecture Design
Cloud Security Architecture Patterns
Designing Secure Network Infrastructures
Enterprise Vulnerability Management Lifecycle
Advanced Vulnerability Scanning and Analysis
Risk-Based Vulnerability Prioritization
Patch Management and Remediation Strategies
Database Hardening and Security Standards
Database Activity Monitoring (DAM) and Auditing
NoSQL Database Security: MongoDB and Cassandra
Securing Cloud Databases
Hardware and Firmware Security Foundations
Firmware Reverse Engineering and Analysis
UEFI, BIOS, and Secure Boot Security
TPM, HSM, and Hardware Root of Trust
Embedded Device and RTOS Security
Hardware Interface Attacks: JTAG, UART, and SPI
Side-Channel Attacks, Fault Injection, and Glitching
Android Security Fundamentals
iOS Security Fundamentals
Mobile Application Penetration Testing
Mobile Reverse Engineering with Frida and Objection
Enterprise Mobile Security, BYOD, and MAM
Mobile Device Forensics and Artifact Analysis
Mobile Malware and Spyware Analysis
Malware Analysis Foundations
Static Malware Reverse Engineering
Dynamic Malware Analysis and Sandboxing
Packed and Obfuscated Malware Analysis
Rootkits, Bootkits, and Kernel Malware
YARA Rule Development for Malware Hunting
Product Security Foundations
Secure Product Lifecycle and Release Security Gates
PSIRT Operations and Case Management
Coordinated Vulnerability Disclosure and VDP Programs
Bug Bounty Program Design and Operations
Security Champions Programs for Engineering Teams
Enterprise Security Architecture Review Boards and Design Governance
Trust Boundaries, Data Flows, and Threat Modeling at Scale
Identity-Centric Security Architecture
Microsegmentation and East-West Traffic Security Design
Secure Multi-Tenant SaaS Architecture
Security Architecture for Secrets Management and Key Distribution
Continuous Threat Exposure Management (CTEM) Foundations
External Attack Surface Management (EASM)
Known Exploited Vulnerabilities and Threat-Informed Remediation
Vulnerability Exceptions, Risk Acceptance, and Compensating Controls
Remediation Program Operations, SLAs, and Patch Governance
CNAPP Foundations
Cloud Infrastructure Entitlement Management (CIEM)
Data Security Posture Management (DSPM)
Cloud Access Security Broker (CASB) Operations
SaaS Security Posture Management (SSPM)
Workload Identity and Service-to-Service Authentication
Kubernetes Admission Control and Policy Enforcement
eBPF-Based Container Runtime Detection and Response
Service Mesh Security for Cloud-Native Platforms
Deception Technology Foundations
Honeypots, Honeytokens, and Attacker Interaction
Adversary Emulation and Purple Team Operations
Breach and Attack Simulation Engineering
5G and Telecom Security
Automotive and Vehicle Cybersecurity
Aerospace, Satellite, and Space Systems Security
Maritime Port and Vessel Cybersecurity
Rail Systems and Transportation Cybersecurity
Mainframe Security and Legacy Platform Hardening
Browser Security Internals and Site Isolation
Content Security Policy, Browser Isolation, and Secure Headers
Browser Extension Security and Supply Chain Risk
Client-Side JavaScript Supply Chain Attacks
Identity Proofing and Secure Enrollment
Authentication Abuse and Account Takeover Defense
Non-Human Identity Security for APIs, Bots, and Services
Verifiable Credentials and Decentralized Identity
Fraud-Aware IAM for Consumer Platforms
Fuzzing Methodologies for Security Research
Coverage-Guided Fuzzing and Harness Development
Advanced Binary Exploitation and ROP
Windows and Linux Kernel Exploitation Concepts
Browser Exploitation and Sandbox Escape Concepts
File Format and Parser Exploitation
Mastering the Dark Web: Tor, Onion Circuits & Threat Intelligence