Course Catalog
- 
	John StrandLiveOD16 HrsActive Defense and Cyber Deception with John Strand
- 
	Multiple InstructorsLive16 HrsActive Directory Security and Hardening with Jordan Drysdale and Kent Ickler
- 
	Alissa TorresLiveOD16 HrsAdvanced Endpoint Investigations with Alissa Torres
- 
	Steve BoroshLive8 HrsAdvanced Penetration Testing of Non-Western IT Infrastructures with Steve Borosh
- 
	Multiple InstructorsLive16 HrsAI for Cybersecurity Professionals with Joff Thyer and Derek Banks
- 
	Multiple InstructorsLive16 HrsAssumed Compromise: A Methodology with Detections and Microsoft Sentinel
- 
	Bill StearnsLiveOD16 HrsBash Scripting for Server Administration with Bill Stearns
- 
	Bryan StrandLiveOD4 HrsBlue Team Foundations with Atomic Controls with Bryan Strand
- 
	Beau BullockLiveOD16 HrsBreaching the Cloud with Beau Bullock
- 
	Faan RossouwLive16 HrsBuilding a C2 Framework in Go with Faan Rossouw
- 
	John StrandODCIS Controls Mastery for MSPs
- 
	Wade WellsLive16 HrsCyber Threat Intelligence 101 2 Day Version with Wade Wells
- 
	Wade WellsLiveOD8 HrsCyber Threat Intelligence 101 with Wade Wells
- 
	Gerard JohansenLive16 HrsCybersecurity Incident Command with Gerard Johansen
- 
	Kevin KlingbileLiveOD16 HrsDefending M365 & Azure with Kevin Klingbile
- 
	Multiple InstructorsLiveOD16 HrsDefending the Enterprise with Kent Ickler and Jordan Drysdale
- 
	Joff ThyerLive16 HrsEnterprise Attacker Emulation and C2 Implant Development with Joff Thyer
- 
	Gerard JohansenLiveOD16 HrsEnterprise Forensics and Response with Gerard Johansen
- 
	Multiple InstructorsLiveOD16 HrsEnterprise Security for All with Bob Hewitt and Rich Fifarek
- 
	Benjamin BowmanLive16 HrsExploiting AI with Ben Bowman
- 
	Bill McCauleyLive4 HrsFoundational Application Security Training with Bill McCauley
- 
	Kevin JohnsonLiveOD8 HrsFoundational Application Security Training with Kevin Johnson
- 
	Bill McCauleyLive8 HrsFoundational Data Protection Training with Bill McCauley
- 
	Hayden CovingtonLiveOD16 HrsFoundations of Security Operations with Hayden Covington
- 
	John StrandLiveOD16 HrsGetting Started in Security with BHIS and MITRE ATT&CK with John Strand
- 
	Ralph MayLiveOD16 HrsHackerOps with Ralph May
- 
	Dale HobbsLiveOD16 HrsHacking Active Directory: Fundamentals and Techniques with Dale Hobbs
- 
	Jake WilliamsLive16 HrsHands-On AI Security Risk Assessment with Jake Williams
- 
	Kip BoyleLiveOD16 HrsHiring Handbook: How to Build an InfoSec Team that Gets Stuff Done with Kip Boyle
- 
	Kip BoyleLive16 HrsHow to be Irresistible to Hiring Managers with Kip Boyle
- 
	Derek BanksLiveOD16 HrsIncident Response Foundations with Derek Banks
- 
	Multiple InstructorsLive16 HrsIntro to IoT Hacking with Rick Wisser and Dave Fletcher
- 
	Multiple InstructorsLive4 HrsIntroduction to AI for Cybersecurity Professionals with Joff Thyer and Derek Banks
- 
	Ashley Van HoesenLiveOD16 HrsIntroduction to Industrial Control Systems with Ashley Van Hoesen
- 
	Kathy CollinsLive4 HrsIntroduction to PCI – PCI 101 with Kathy Collins
- 
	John StrandLiveOD16 HrsIntroduction to Pentesting with John Strand
- 
	Joff ThyerLiveOD16 HrsIntroduction to Python with Joff Thyer
- 
	Hal PomeranzLiveOD16 HrsLinux Command-Line for Analysts and Operators with Hal Pomeranz
- 
	Hal PomeranzLiveOD32 HrsLinux Forensics with Hal Pomeranz
- 
	BB KingLiveOD16 HrsModern Webapp Pentesting II: Webapp Internals with BB King
- 
	BB KingLiveOD16 HrsModern Webapp Pentesting with BB King
- 
	Troy WojewodaLiveOD16 HrsNetwork Forensics and Incident Response with Troy Wojewoda
- 
	Mishaal KhanLive16 HrsNext Level OSINT with Mishaal Khan
- 
	Multiple InstructorsLive16 HrsOffense for Defense with Red Siege
- 
	Chris TraynorLiveOD16 HrsOffensive Tooling for Operators with Chris Traynor
- 
	Chris TraynorLiveOD8 HrsOffensive Tooling Foundations with Chris Traynor
- 
	Jim ManicoLiveOD4 HrsOWASP Top 10 with Jim Manico
- 
	Tim MedinLive16 HrsPenetration Testing: Beyond the Basics with Tim Medin
- 
	Carrie RobertsLiveOD16 HrsPowerShell for InfoSec: What You Need to Know with Carrie Roberts
- 
	Multiple InstructorsLive16 HrsPractical iOS Application Security Testing with Cameron Cartier and Dave Blandford
- 
	Kevin JohnsonLiveOD12 HrsPractical OWASP TOP 10 with Kevin Johnson
- 
	Multiple InstructorsLive24 HrsPractical Physical Exploitation with Ralph May and Travis Weathers
- 
	Markus SchoberLiveOD16 HrsPractical Windows Forensics with Markus Schober
- 
	Jennifer ShannonLive12 HrsProfessionally Evil API Testing: A Practical Course for Beginners with Jennifer Shannon
- 
	Jennifer ShannonLive4 HrsProfessionally Evil API Testing: AAA and Keys are Not Just for Cars with Jennifer Shannon
- 
	Jennifer ShannonLive4 HrsProfessionally Evil API Testing: GraphQL, SOAP, and REST Fundamentals and Techniques with Jennifer Shannon
- 
	Jordan BonaguraLive16 HrsProfessionally Evil Application Security: From Mapping to Exploitation with Jordan Bonagura
- 
	Kevin JohnsonLive4 HrsProfessionally Evil Application Security: Mastering Application Reconnaissance and Mapping with Kevin Johnson
- 
	Kevin JohnsonLive4 HrsProfessionally Evil Application Security: Mastering Client-Side Flaws and Exploitation with Kevin Johnson
- 
	Kevin JohnsonLive4 HrsProfessionally Evil Application Security: Unveiling Server-Side Discovery and Exploitation with Kevin Johnson
- 
	Giovanni CofréLive16 HrsProfessionally Evil ICS & OT Fundamentals with Giovanni Cofre
- 
	Markus SchoberLive16 HrsRansomware Attack Simulation and Investigation for Blue Teamers with Markus Schober
- 
	Michael AllenLive16 HrsREAL Social Engineering with Michael Allen
- 
	Eric KuehnLive8 HrsRed Team Fundamentals for Active Directory with Eric Kuehn
- 
	Michael AllenLiveOD16 HrsRed Team Initial Access with Michael Allen
- 
	Joff ThyerLiveOD4 HrsRegular Expressions: Your New Lifestyle with Joff Thyer
- 
	BB KingLiveOD4 HrsReporting for Pentesters with BB King
- 
	Tanya JancaLive16 HrsSecure Coding and API Hardening: Secure Design, Development, and Threat Modeling with Tanya Janca
- 
	Andrew KrugLiveOD16 HrsSecuring the Cloud: Foundations with Andrew Krug
- 
	Multiple InstructorsLive16 HrsSecurity Defense and Detection TTX with Amanda Berlin and Jeremy Mio
- 
	Hal PomeranzLiveOD6 HrsSELinux Necessary and Not Evil with Hal Pomeranz
- 
	John StrandLiveOD16 HrsSOC Core Skills with John Strand
- 
	Multiple InstructorsLive16 HrsThreat Hunting & Incident Response with Velociraptor with Eric Capuano and Whitney Champion
- 
	Multiple InstructorsLive4 HrsWorkshop: AI Foundation: Cyber Security Workflow Optimization using AI Technology with Joff Thyer and Derek BanksNov 21 
- 
	Doc BlackburnLive4 HrsWorkshop: An Introduction to Cryptography with Doc BlackburnNov 20 
- 
	Faan RossouwLive4 HrsWorkshop: Build a Multi-Modal C2 Covert Channel in Golang with Faan Rossouw
- 
	Benjamin BowmanLive4 HrsWorkshop: Exploiting AI with Ben Bowman
- 
	Bill McCauleyLive4 HrsWorkshop: Foundational Application Security Training with Bill McCauley
- 
	Troy WojewodaLive4 HrsWorkshop: Foundations of Network Forensics and Analysis with Troy Wojewoda
- 
	BB KingLive4 HrsWorkshop: Getting Comfortable in Burp Suite with BB King
- 
	Multiple InstructorsLive4 HrsWorkshop: Hacking AI-LLM Applications with Brian Fehrman, Joff Thyer and Derek Banks
- 
	Tim MedinLive4 HrsWorkshop: Hands on Kerberos with Tim Medin
- 
	Tim PappaLive4 HrsWorkshop: How to Befriend and Bedazzle Online Threat Actors with Tim Pappa
- 
	Dale HobbsLive4 HrsWorkshop: Intro to Active Directory with Dale HobbsNov 6 
- 
	Daniel LowrieLive2 HrsWorkshop: Intro to Virtualization with Daniel Lowrie
- 
	Beau BullockLive4 HrsWorkshop: Introduction to Cloud Security with Beau Bullock
- 
	John StrandLive4 HrsWorkshop: Introduction to IP Network with John Strand
- 
	Patterson CakeLive4 HrsWorkshop: Investigating M365 Business Email Compromise with Patterson Cake
- 
	Jason BlanchardLive6 HrsWorkshop: Job Hunt Like a Hacker – 2025 Edition with Jason BlanchardNov 11 
- 
	Chris TraynorLive4 HrsWorkshop: Offensive Tooling Foundations with Chris Traynor
- 
	Zach HillLive4 HrsWorkshop: Practical IT Fundamentals with Zach Hill
- 
	Abraham ArangurenLive4 HrsWorkshop: Practical Mobile App Attacks by Example with Abraham ArangurenNov 7 
- 
	Patterson CakeLive4 HrsWorkshop: Rapid Endpoint Investigations with Patterson Cake
- 
	Hayden CovingtonLive4 HrsWorkshop: SOC Detection Engineering Crash Course with Hayden Covington
- 
	Matt ToussainLive4 HrsWorkshop: Tactical Vulnerability Assessment with Matt Toussain
- 
	Hal DentonLive4 HrsWorkshop: Telemetry to Tactics: A Hands-On Detection Engineering Workshop with Hal Denton
- 
	Cameron CartierLive4 HrsWorkshop: The Hitchhiker’s Guide To Social Engineering with Cameron Cartier
- 
	Tanya JancaLive4 HrsWorkshop: The OWASP API Security Top Ten 2023 with Tanya Janca
- 
	Marco LuxLive16 Hrsx86_32 Assembly and Shellcode-Lab for Linux with Marco Lux
- 
	Hal PomeranzLive4 HrsZero to Linux with Hal Pomeranz
