Book
- A Leader's Guide to Cybersecurity: Why Boards Need to Lead-And How to Do It
- Cybersecurity and Cyberwar: What Everyone Needs to Know
- Cybersecurity For Dummies
- Cybersecurity: The Insights You Need from Harvard Business Review
- The Cybersecurity Playbook: How Every Leader and Employee Can Contribute to a Culture of Security
Digital Transformation
IT Skills
- Artificial Intelligence, Cybersecurity and Cyber Defence
- Big Breaches: Cybersecurity Lessons for Everyone
- Binary Code Fingerprinting for Cybersecurity: Application to Malicious Code Fingerprinting
- Blockchain Cybersecurity, Trust and Privacy
- CompTIA Cybersecurity Analyst (CySA+) Study Guide: Exam CS0-002, Second Edition
- Cybersecurity and Decision Makers: Data Security and Digital Trust
- Cybersecurity and Secure Information Systems: Challenges and Solutions in Smart Environments
- Cybersecurity in the Electricity Sector: Managing Critical Infrastructure
- Jump-Start Your SOC Analyst Career: A Roadmap to Cybersecurity Success
- Modern Cybersecurity Practices: Exploring and Implementing Agile Cybersecurity Frameworks and Strategies for Your Organization
- Privacy, Regulations, and Cybersecurity: The Essential Business Guide
- The Digital Big Bang: The Hard Stuff, the Soft Stuff, and the Future of Cybersecurity
Network Security Specialist to CloudOps Security Architect
Security
- A Guide to the National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework (2.0)
- Building a HIPAA-Compliant Cybersecurity Program: Using NIST 800-30 and CSF to Secure Protected Health Information
- Building an Effective Cybersecurity Program, 2nd Edition
- Building Effective Cybersecurity Programs: A Security Managerâs Handbook
- CompTIA Cybersecurity Analyst (CSA+) for Exam CS0-001 Study Guide
- CompTIA Cybersecurity Analyst (CSA+) Study Guide: Exam CS0-001
- CompTIA CySA+ Cybersecurity Analyst Certification All-In-One Exam Guide (Exam CS0-001)
- CompTIA CySA+ Cybersecurity Analyst Certification Practice Exams (Exam CS0-001)
- CompTIA CySA+ Cybersecurity Analyst Certification Practice Exams (Exam CS0-002)
- CSX Cybersecurity Fundamentals Study Guide 2015
- Cybersecurity Blue Team Toolkit
- Cybersecurity Breaches and Issues Surrounding Online Threat Protection
- Cybersecurity for Dummies
- Cybersecurity for Executives: A Practical Guide
- Cybersecurity for Hospitals and Healthcare Facilities: A Guide to Detection and Prevention
- Cybersecurity for Industrial Control Systems: SCADA, DCS, PLC, HMI, and SIS
- Cybersecurity for Space: Protecting the Final Frontier
- Cybersecurity Guidance for Small and Medium-Sized Enterprises
- Cybersecurity Law
- Cybersecurity Law, Standards and Regulations, 2nd Edition
- Cybersecurity Lexicon
- Cybersecurity of Industrial Systems
- Cybersecurity Policies and Strategies for Cyberwarfare Prevention
- Cybersecurity Program Development for Business: The Essential Planning Guide
- Cybersecurity Program Development for Business: The Essential Planning Guide
- Cybersecurity: A Self-Teaching Introduction
- Cybersecurity: Managing Systems, Conducting Testing, and Investigating Intrusions
- Cybersecurity: Public Sector Threats and Responses
- Cyberspace and Cybersecurity
- Cyberwar, Cyberterror, Cybercrime and Cyberactivism: An In-depth Guide to the Role of Security Standards in the Cybersecurity Environment. 2nd Edition
- Engineering Trustworthy Systems: Get Cybersecurity Design Right the First Time
- Enterprise Cybersecurity Study Guide: How to Build a Successful Cyberdefense Program Against Advanced Threats
- Enterprise Cybersecurity: How to Build a Successful Cyberdefense Program Against Advanced Threats
- Financial Cybersecurity Risk Management: Leadership Perspectives and Guidance for Systems and Institutions
- How to Measure Anything in Cybersecurity Risk
- Implementing the NIST Cybersecurity Framework
- Network Science and Cybersecurity
- NIST Cybersecurity Framework: A Pocket Guide
- Personal Cybersecurity: How to Avoid and Recover from Cybercrime
- Professional Red Teaming: Conducting Successful Cybersecurity Engagements
- Rational Cybersecurity for Business: The Security Leaders' Guide to Business Alignment
- The Complete Guide to Cybersecurity Risks and Controls
- The Cyber Risk Handbook: Creating and Measuring Effective Cybersecurity Capabilities
- The Cybersecurity Maturity Model Certification (CMMC): A Pocket Guide
- The Cybersecurity Playbook: How Every Leader and Employee Can Contribute to a Culture of Security
- The Second Economy: The Race for Trust, Treasure and Time in the Cybersecurity War
- Transforming Cybersecurity
- Tribe of Hackers Red Team: Tribal Knowledge from the Best in Offensive Cybersecurity
- Tribe of Hackers Security Leaders: Tribal Knowledge from the best in Cybersecurity Leadership
- Tribe of Hackers: Cybersecurity Advice from the Best Hackers in the World
Security Analyst to Security Architect
Video Course
Cloud & Virtualization Collection
CompTIA
- CompTIA Cybersecurity Analyst+ CS0-001: Threat Mitigation
- CS0-002 - CompTIA Cybersecurity Analyst+: Business Continuity
- CS0-002 - CompTIA Cybersecurity Analyst+: Encryption & Hashing
- CS0-002 - CompTIA Cybersecurity Analyst+: Hardware & Security
- CS0-002 - CompTIA Cybersecurity Analyst+: IT Security Risk Mitigation
- CS0-002 - CompTIA Cybersecurity Analyst+: Network Infrastructure Security
- CS0-002 - CompTIA Cybersecurity Analyst+: Threat Intelligence
- Mentoring CS0-001 CompTIA Cybersecurity Analyst+
- TestPrep CS0-001 CompTIA Cybersecurity Analyst (CySA+)
Cybersecurity Collection
- Advanced Windows Store Apps with C# in Visual Studio 2013: Security & Optimizing
- CISA: Governance and Management of IT - Part 1
- CISA: Information Systems Acquisition, Development, and Implementation
- CISA: Information Systems Operations, Maintenance, and Service Management
- CISA: The Process of Auditing Information Systems - Part 1
- CISSP 2018: Identity and Access Management (IAM)
- CISSP 2018: Site and Facility Security Controls
- CISSP 2018: Software Development Security
- Cloud Service â Operations Management
- CompTIA Cybersecurity Analyst+ CS0-001: Reducing Vulnerabilities
- CompTIA PenTest+: Network-Based Exploits
- CompTIA PenTest+: Reporting and Communication
- CompTIA PenTest+: Scoping an Engagement
- CompTIA PenTest+: Social Engineering and Specialized System Attacks
- CompTIA PenTest+: Vulnerability Identification
- CompTIA Security+ SY0-501: Analyzing Output from Security Technologies
- CompTIA Security+ SY0-501: Cloud, Virtualization, and Resiliency Concepts
- CompTIA Security+ SY0-501: Implement Secure Network Architecture Concepts
- CompTIA Security+ SY0-501: Wireless Security Settings
- Defensive Programming in Android: Input and Methods
- Defensive Programming in Android: Network Access and Java Defensive Techniques
- IINS 3.0: AnyConnect VPN Using ASDM
- IINS 3.0: Management Plane Access
- IINS 3.0: Network Time Protocol
- IINS 3.0: PVLANs and VLAN Security
- IINS 3.0: SCP and AAA Technologies
- Introduction to Secure Programming
- IT Security for End Users: Using Corporate Devices Securely
- Mentoring Systems Security Certified Practitioner (SSCP)
- OWASP A10 and A9: API and Component Attacks
- OWASP A7 and A6: Leaky and Unprepared Applications
- OWASP Top 10: List Item Overview
- SECFND: ACLs & Filtering
- SECFND: Basic Networking Protocols
- SECFND: Basic Networking Services
- SECFND: Cryptographic Hashing Algorithms
- SECFND: Cryptography
- SECFND: Interpreting Log Data
- SECFND: Linux Host Terminology
- SECFND: Network and Web Attacks
- SECFND: Network Data Types
- SECFND: Network Data Types and Security Monitoring
- SECFND: Network Models
- SECFND: Next Generation Firewalls
- SECFND: Packet Analysis
- SECFND: Security Management Part 1
- SECOPS: Analyzing Intrusion Impact
- SECOPS: Handling Incident Events and Evidence
- SECOPS: ICMP Intrusion
- SECOPS: Securing File Systems
- Securing Mobile Devices in the Enterprise: Mobile Security Technologies
- System Security Certified Practitioner (SSCP 2018): Cryptography Primer
- System Security Certified Practitioner (SSCP 2018): Network Fundamentals
HR Compliance
- Cybersecurity Short: Avoiding Phishing Attacks
- Cybersecurity Short: Blogging
- Cybersecurity Short: Professional Social Networking
- Cybersecurity Short: Proper Password Management
- Cybersecurity Short: Proper Use of E-mail
- Cybersecurity Short: Proper Use of the Internet at Work
- Cybersecurity Short: The Virtual Meeting â Doing It Right
- Cybersecurity Short: Using IM and Text Messaging
Internet and Network Technologies Solution Area
- CEH v11: Cybersecurity Basics, Attacks & Information Warfare
- CompTIA Cybersecurity Analyst+ CS0-001: Investigate Security Incidents
- CompTIA Cybersecurity Analyst+ CS0-001: Threat Identification
- CS0-002 - CompTIA Cybersecurity Analyst+: Threat Monitoring
- CS0-002 - CompTIA Cybersecurity Analyst+: User Account Security
- Cybersecurity 101: Auditing & Incident Response
- Cybersecurity Awareness: Getting Started with Security Foundations
- SY0-601 - CompTIA Security+: Implementing Cybersecurity Resilience
- SY0-601 - CompTIA Security+: Virtualization, Cloud Computing, and Cloud Cybersecurity Solutions
IT Infrastructure Practice Labs
Security
- CompTIA Cybersecurity Analyst+ CS0-001: Network Architecture and Reconnaissance
- CS0-002 - CompTIA Cybersecurity Analyst+: Attack Types
- CS0-002 - CompTIA Cybersecurity Analyst+: Data Privacy
- CS0-002 - CompTIA Cybersecurity Analyst+: Digital Forensics
- CS0-002 - CompTIA Cybersecurity Analyst+: Malware Threats
- CS0-002 - CompTIA Cybersecurity Analyst+: Network Scanning & Traffic Analysis
- Cybersecurity Awareness: Exposure to Security Risks