Course Catalog
-
John StrandLiveOD16 Hrs
Active Defense and Cyber Deception
Jan 19 – Jan 22
-
Multiple InstructorsLive16 Hrs
Active Directory Security and Hardening
-
Alissa TorresLiveOD16 Hrs
Advanced Endpoint Investigations
-
Steve BoroshLive8 Hrs
Advanced Penetration Testing of Non-Western IT Infrastructures
-
Multiple InstructorsLive16 Hrs
AI for Cybersecurity Professionals
-
Multiple InstructorsLive16 Hrs
Assumed Compromise: A Methodology with Detections and Microsoft Sentinel
-
Bill StearnsLiveOD16 Hrs
Bash Scripting for Server Administration
-
Bryan StrandLiveOD4 Hrs
Blue Team Foundations with Atomic Controls
-
Beau BullockLiveOD16 Hrs
Breaching the Cloud
-
Faan RossouwLive16 Hrs
Building a C2 Framework in Go
-
John StrandOD48 Hrs
CIS Controls Mastery for MSPs
-
Wade WellsLiveOD8 Hrs
Cyber Threat Intelligence 101
-
Wade WellsLive16 Hrs
Cyber Threat Intelligence 101 2 Day Version
-
Gerard JohansenLive16 Hrs
Cybersecurity Incident Command
-
Kevin KlingbileLiveOD16 Hrs
Defending M365 & Azure
-
Multiple InstructorsLiveOD16 Hrs
Defending the Enterprise
-
Joff ThyerLive16 Hrs
Enterprise Attacker Emulation and C2 Implant Development
-
Gerard JohansenLiveOD16 Hrs
Enterprise Forensics and Response
-
Multiple InstructorsLiveOD16 Hrs
Enterprise Security for All
-
Benjamin BowmanLive16 Hrs
Exploiting AI
-
Bill McCauleyLive4 Hrs
Foundational Application Security Training
-
Kevin JohnsonLiveOD8 Hrs
Foundational Application Security Training
-
Bill McCauleyLive8 Hrs
Foundational Data Protection Training
-
Hayden CovingtonLiveOD16 Hrs
Foundations of Security Operations
-
John StrandLiveOD16 Hrs
Getting Started in Security with BHIS and MITRE ATT&CK
Feb 23 – Feb 26
-
Ralph MayLiveOD16 Hrs
HackerOps
-
Dale HobbsLiveOD16 Hrs
Hacking Active Directory: Fundamentals and Techniques
-
Jake WilliamsLive16 Hrs
Hands-On AI Security Risk Assessment
-
Kip BoyleLiveOD16 Hrs
Hiring Handbook: How to Build an InfoSec Team that Gets Stuff Done
-
Kip BoyleLive16 Hrs
How to be Irresistible to Hiring Managers
-
Derek BanksLiveOD16 Hrs
Incident Response Foundations
-
Multiple InstructorsLive16 Hrs
Intro to IoT Hacking
-
Multiple InstructorsLive4 Hrs
Introduction to AI for Cybersecurity Professionals
-
Ashley Van HoesenLiveOD16 Hrs
Introduction to Industrial Control Systems
-
Kathy CollinsLive4 Hrs
Introduction to PCI – PCI 101
-
John StrandLiveOD16 Hrs
Introduction to Pentesting
-
Joff ThyerLiveOD16 Hrs
Introduction to Python
-
Hal PomeranzLiveOD16 Hrs
Linux Command-Line for Analysts and Operators
-
Hal PomeranzLiveOD32 Hrs
Linux Forensics
-
BB KingLiveOD16 Hrs
Modern Webapp Pentesting
-
BB KingLiveOD16 Hrs
Modern Webapp Pentesting II: Webapp Internals
-
Troy WojewodaLiveOD16 Hrs
Network Forensics and Incident Response
-
Mishaal KhanLive16 Hrs
Next Level OSINT
-
Multiple InstructorsLive16 Hrs
Offense for Defense
-
Chris TraynorLiveOD16 Hrs
Offensive Tooling for Operators
-
Chris TraynorLiveOD8 Hrs
Offensive Tooling Foundations with Chris Traynor
-
Jim ManicoLiveOD4 Hrs
OWASP Top 10
-
Tim MedinLive16 Hrs
Penetration Testing: Beyond the Basics
-
Carrie RobertsLiveOD16 Hrs
PowerShell for InfoSec: What You Need to Know
-
Multiple InstructorsLive16 Hrs
Practical iOS Application Security Testing
-
Kevin JohnsonLiveOD12 Hrs
Practical OWASP TOP 10
-
Multiple InstructorsLive24 Hrs
Practical Physical Exploitation
-
Markus SchoberLiveOD16 Hrs
Practical Windows Forensics
-
Jennifer ShannonLive12 Hrs
Professionally Evil API Testing: A Practical Course for Beginners
-
Jennifer ShannonLive4 Hrs
Professionally Evil API Testing: AAA and Keys are Not Just for Cars
-
Jennifer ShannonLive4 Hrs
Professionally Evil API Testing: GraphQL, SOAP, and REST Fundamentals and Techniques
-
Jordan BonaguraLive16 Hrs
Professionally Evil Application Security: From Mapping to Exploitation
-
Kevin JohnsonLive4 Hrs
Professionally Evil Application Security: Mastering Application Reconnaissance and Mapping
-
Kevin JohnsonLive4 Hrs
Professionally Evil Application Security: Mastering Client-Side Flaws and Exploitation
-
Kevin JohnsonLive4 Hrs
Professionally Evil Application Security: Unveiling Server-Side Discovery and Exploitation
-
Multiple InstructorsLive20 Hrs
Professionally Evil CISSP Mentorship Program
Begins Mar 17
-
Giovanni CofréLive16 Hrs
Professionally Evil ICS & OT Fundamentals
-
Markus SchoberLive16 Hrs
Ransomware Attack Simulation and Investigation for Blue Teamers
-
Michael AllenLive16 Hrs
REAL Social Engineering
-
Eric KuehnLive8 Hrs
Red Team Fundamentals for Active Directory
-
Michael AllenLiveOD16 Hrs
Red Team Initial Access
-
Joff ThyerLiveOD4 Hrs
Regular Expressions: Your New Lifestyle
-
BB KingLiveOD4 Hrs
Reporting for Pentesters
-
Tanya JancaLive16 Hrs
Secure Coding and API Hardening: Secure Design, Development, and Threat Modeling
-
Andrew KrugLiveOD16 Hrs
Securing the Cloud: Foundations
-
Multiple InstructorsLive16 Hrs
Security Defense and Detection TTX
-
Hal PomeranzLiveOD6 Hrs
SELinux Necessary and Not Evil
-
John StrandLiveOD16 Hrs
SOC Core Skills
-
Multiple InstructorsLive16 Hrs
Threat Hunting & Incident Response with Velociraptor
-
Multiple InstructorsLive4 Hrs
Workshop: AI Foundation: Cyber Security Workflow Optimization using AI Technology
-
Doc BlackburnLive4 Hrs
Workshop: An Introduction to Cryptography
-
Faan RossouwLive4 Hrs
Workshop: Build a Multi-Modal C2 Covert Channel in Golang
-
Benjamin BowmanLive4 Hrs
Workshop: Exploiting AI with Ben Bowman
-
Bill McCauleyLive4 Hrs
Workshop: Foundational Application Security Training with Bill McCauley
-
Troy WojewodaLive4 Hrs
Workshop: Foundations of Network Forensics and Analysis
Jan 30
-
BB KingLive4 Hrs
Workshop: Getting Comfortable in Burp Suite
-
Multiple InstructorsLive4 Hrs
Workshop: Hacking AI-LLM Applications
-
Tim MedinLive4 Hrs
Workshop: Hands on Kerberos
-
Tim PappaLive4 Hrs
Workshop: How to Befriend and Bedazzle Online Threat Actors
-
Dale HobbsLive4 Hrs
Workshop: Intro to Active Directory with Dale Hobbs
-
Daniel LowrieLive2 Hrs
Workshop: Intro to Virtualization with Daniel Lowrie
-
Beau BullockLive4 Hrs
Workshop: Introduction to Cloud Security with Beau Bullock
-
John StrandLive4 Hrs
Workshop: Introduction to IP Network with John Strand
-
Patterson CakeLive4 Hrs
Workshop: Investigating M365 Business Email Compromise with Patterson Cake
-
Jason BlanchardLive6 Hrs
Workshop: Job Hunt Like a Hacker – 2026 Edition with Jason Blanchard
Jan 20
-
Chris TraynorLive4 Hrs
Workshop: Offensive Tooling Foundations with Chris Traynor
-
Zach HillLive4 Hrs
Workshop: Practical IT Fundamentals with Zach Hill
-
Abraham ArangurenLive4 Hrs
Workshop: Practical Mobile App Attacks by Example with Abraham Aranguren
-
Patterson CakeLive4 Hrs
Workshop: Rapid Endpoint Investigations with Patterson Cake
-
Hayden CovingtonLive4 Hrs
Workshop: SOC Detection Engineering Crash Course with Hayden Covington
-
Matt ToussainLive4 Hrs
Workshop: Tactical Vulnerability Assessment with Matt Toussain
-
Hal DentonLive4 Hrs
Workshop: Telemetry to Tactics: A Hands-On Detection Engineering Workshop with Hal Denton
-
Cameron CartierLive4 Hrs
Workshop: The Hitchhiker’s Guide To Social Engineering with Cameron Cartier
-
Tanya JancaLive4 Hrs
Workshop: The OWASP API Security Top Ten 2023 with Tanya Janca
-
Marco LuxLive16 Hrs
x86_32 Assembly and Shellcode-Lab for Linux with Marco Lux
-
Hal PomeranzLive4 Hrs
Zero to Linux with Hal Pomeranz
