What’s popular in security
Your source for what’s next
Popular in live online training
See allAugust 7 & 8, 2023
CISSP Bootcamp
Presented by Dean Bushmiller
Preparing for the exam Every job that touches a computer has a cybersecurity component. Every business owner must make informed decisions and choices in cybersecurity computing. The Certified Information Systems Security ...

September 27 & 28, 2023
Kubernetes and Cloud Security Associate (KCSA) Crash Course
Presented by Michael Levan
Get Your KCSA Certification and Start Your k8s Security Journey Review all of the objectives in the new Cloud Native KCSA exam Learn foundational Kubernetes security concepts and skills Start your ...

October 18, 2023
Security Superstream: DevSecOps
Presented by Chloé Messdaghi
Learn best practices and the latest developments According to Gartner, by 2025 a single centralized cybersecurity function wonât be agile enough to meet the needs of a digital organization. DevSecOpsâthe integration ...
July 31, 2023
Microservice Security
Presented by Sam Newman
Best practices for microservice-style architectures Microservice architectures are increasingly popular, but they bring with them increased complexity and new challenges. One of the more challenging areas with any microservice-style architecture is ...

August 1, 2023
MITRE ATT&CK Fundamentals
Presented by Dean Bushmiller
How penetration testers, defenders, and blue or red teams can put the knowledge base to use MITRE ATT&CK is a globally accessible knowledge base of adversary tactics and techniques based on ...

October 26 & 27, 2023
Certified in Cybersecurity (ISC)2 Crash Course
Presented by Omar Santos
Your Ultimate Guide to Passing the Certified in Cybersecurity Exam Prepare for the (ISC)2 Certified in Cybersecurity certification Get a comprehensive review of all current exam topic areas Learn with real-world ...

Popular in interactive learning
See allEthical Hacking: Introducing Network and Port Scanning using Nmap
By Omar Santos, Derek Santos
The first step in any cyber-attack will always be reconnaissance. Reconnaissance and information gathering is essential when piecing together and formulating an attack. From an attacker's perspective, there are two major ...
Cleaning Data for a Spam SMS Detection Model
By Partha Majumdar
This lab cleans the input data before it can be used for building a supervised learning model ...
Loading Data and Creating Training and Test Sets for a Spam SMS Detection Model
By Partha Majumdar
This lab loads the data set, creates the training and test sets, and more ...
Testing a Spam SMS Detection Model
By Partha Majumdar
This lab tests the supervised learning model for spam SMS detection ...
Vectorizing the Data for a Spam SMS Detection Model
By Partha Majumdar
In this lab we convert text to numbers as required for building a supervised learning model ...
Extracting Features for a Spam SMS Detection Model
By Partha Majumdar
This lab builds functions for feature extraction for building a supervised learning model ...