Professional development

13 cyber security training courses you can take now — for free

July 6, 2021 by Greg Belding

Cybersecurity is a growing field and one of the most important in today’s world. This career landscape contains many skills and skills paths to choose from, which may seem overwhelming to some. If this is you, don’t fret; you will not be alone in your learning path. Infosec Skills offers cybersecurity training courses and learning paths headed by some great experts that are all at your fingertips if you utilize an Infosec Skills trial. 

Here are 13 cybersecurity learning paths you can try to begin your pursuit of cybersecurity education or a career.

Start Your Free Trial

1. Cybersecurity Foundations

This learning path is the one you want to take before trying out the rest. Rather than being a series of advisory courses, this path will give you the foundational skills to get the most out of other courses and boot camps. Taught by information security expert Keatron Evans, this is where you want to start your journey. 

 

2. Network Traffic Analysis

Most cyberattacks come over the network, so understanding network traffic is as important as ever. Taught by cybersecurity consultant Howard Poston, this learning path will teach you what network traffic looks like, how to analyze it and how to identify malicious traffic on a network.

 

3. Advanced Intrusion Detection

Advanced Intrusion Detection is headed by Mark Viglione, a cybersecurity analyst and practitioner. This learning path delves into intrusion detection methodologies, tools and how to identify malicious activity within your organization’s networks. By taking these courses, you will develop a better understanding of IDS and IPS systems, SEIM technology and other detection frameworks and tools.

 

4. Incident Response

This incident response learning path is one of the first of its kind to walk you through both high-level incident response procedures and take you into the weeds by exploring memory forensics, network forensics and material you can use to help you pass the incident response certifications currently on the market. This path includes hands-on exercises and two challenging incident response cases that you are required to complete at the path’s end. 

 

5. Threat Modeling

Threat modeling, taught by threat model veteran Geoffrey Hill, will teach you how to be proactive in your approach to security. Threat modeling refers to a process to identify security weaknesses. These courses will teach how to find threats, find countermeasures and mitigate weaknesses. Threat modeling is language-agnostic and can be used for any modern workflow such as SecOps, DevOps, Agile and more. 

 

6. Windows Server Security

Focusing on Windows Server 2019, this learning path is taught by Robert McMillen, a Microsoft security expert, certified trainer and college professor. These courses will teach you how to protect file shares, password policies, group policies, password encryption and decryption, as well as protection from ransomware.

 

7. Advanced Adversary Attacks

This hands-on learning path covers a selection of the tactics and techniques represented in the MITRE ATT&CK® Matrix for Enterprise. Built by Infosec cyber range engineer June Werner, each lab covers known techniques that attackers use to compromise a system. By understanding the tactics and techniques used by attackers, you’ll be able to put offensive and defensive measures in place to prevent and mitigate attacks.

 

8. Implementing Controls for HIPAA Compliance

This learning path is taught by April Powers, an IT policy and compliance administrator at Harvard Medical School. You’ll learn about maintaining the confidentiality, integrity and availability of PHI and ePHI. This includes protecting ePHI from unauthorized use and disclosure, implementing procedural mechanisms to examine access and other activity in information systems, and administering HIPAA compliance training for your organization.

 

9. DoD CMMC Overview

This learning path teaches you the foundational components of the Cybersecurity Maturity Model Certification (CMMC). Taught by Tony Buenger, a longtime risk assessor and one of the new provisional CMMC assessors, you’ll build the necessary skills to assist your organization in preparing for a CMMC assessment. This includes understanding the federal government regulations and guidelines, the CMMC ecosystem, the model and assessment methodology and more.

 

10. CIPM

This learning path focuses on the IAPP CIPM or Certified Information Privacy Manager. It teaches you how to manage a global privacy program through the lens of a new privacy professional at an organization, with your job being to understand your organization’s data and requirements and then craft a privacy program. The courses are taught by Ralph O’Brien, a veteran information privacy expert and consultant (who also heads a CIPP/E certification path). 

 

11. Certified Cloud Security Practitioner (CCSP)

This learning path is headed by Ross Casanova, a cloud security practitioner, and provides foundational knowledge on how to design, manage and secure assets in the cloud. It covers the six CCSP domains and will teach you to identify and evaluate security risks for an organizations’ cloud environments, the fundamentals of cloud computing architecture frameworks and selecting and implementing the appropriate controls for cloud security. You will learn best practices for cloud data, applications and infrastructure, and the information you need to pass the CCSP certification exam.

 

12. Writing Secure Code in iOS

This learning path will teach you secure coding for iOS application development with a focus on Swift. You will be able to look at a piece of code, find the weaknesses and vulnerabilities, fix them and test them. It explores known major vulnerabilities and how to research the unknown ones. Written for beginner developers, experienced developers will benefit from it as well. This path is headed by Chrys Thorsen, an iOS application developer team lead.

 

13. Writing Secure Code in Node.js

This learning path will teach you how to safely build applications with Node.js, all the ways to attack a Node.js application and how to protect against these attacks. You will learn general attacks against Node.js, such as SQL injections, and JavaScript-specific ones, such as regular expression denial of service and how to code in Node.js safely. Taught by Vladimir de Turckheim, you will benefit from his experience as a Node.js co-collaborator.

 

Coming soon

Information Security Management Practices

Taught by Ted Harrington, this learning path delves into the world of information security management for applications. It will teach you to identify the common misconceptions that hold most organizations back and what to replace those misconceptions with. You will learn how to think, how to vet and select a security partner, how to use different penetration testing types and a whole lot more. The courses will help you understand how to use security to get a competitive advantage and solve security challenges.

 

Advanced Splunk Core

In this learning path, you will learn about Splunk Core and how it can be used to identify threats and vulnerabilities in your organization’s IT environment. The advanced Splunk Core courses will teach you how to use the features of Splunk to create useful and repeatable visualizations that will directly support strategic business decision-making. This training is headed by Gina Napier, a senior information security analyst.

 

Start learning cybersecurity today

These cybersecurity learning paths can help build your skills and give you a competitive edge in the growing area of information security. You can try them all for free with an Infosec Skills trial. After the trial, full access to everything is available for just $34 per month.

Start Your Free Trial

Posted: July 6, 2021
Articles Author
Greg Belding
View Profile

Greg is a Veteran IT Professional working in the Healthcare field. He enjoys Information Security, creating Information Defensive Strategy, and writing – both as a Cybersecurity Blogger as well as for fun.

Leave a Reply

Your email address will not be published. Required fields are marked *