What’s popular in security
Your source for what’s next
Popular in live online training
See allJuly 6 & 7, 2023
AWS Certified Security - Specialty (SCS-C02) Crash Course
Presented by Chad Smith
Your Ultimate Guide to Passing the SCS-C02 Exam Learn whatâs new in the AWS SCS-C02 exam and review all objectives so you can successfully prepare for the exam Explore the principles ...

June 13, 2023
Software Development Hour with Sam Newman: Building Secure Software with Laura Bell
Presented by Sam Newman, Laura Bell
Ask Laura and Sam whatâs next for software engineering The best time to get started with cybersecurity is now. And the best way to get started is as a team. Join ...


June 29, 2023
Hands-On Kubernetes and Docker Security
Presented by Omar Santos
Secure your DevOps infrastructure and protect your applications from cyber attacks Learn real-world security best practices to secure container technology Prevent common security attacks and minimize the attack surface Get hands-on ...

October 18, 2023
Security Superstream: DevSecOps
Presented by Chloé Messdaghi
Learn best practices and the latest developments According to Gartner, by 2025 a single centralized cybersecurity function wonât be agile enough to meet the needs of a digital organization. DevSecOpsâthe integration ...
June 12, 2023
MITRE ATT&CK Fundamentals
Presented by Dean Bushmiller
How penetration testers, defenders, and blue or red teams can put the knowledge base to use MITRE ATT&CK is a globally accessible knowledge base of adversary tactics and techniques based on ...

July 7, 2023
HashiCorp Vault Fundamentals—with Interactivity
Presented by Sean Kane
Robust secrets management, data encryption, and security Managing secrets is one of the most common security-related tasks that companies must handle, yet the solutions used are often homegrown, locked into a ...

Popular in interactive learning
See allSoftware Engineering Fundamentals: Spot the Bugs
By Nathaniel Schutta
Examining code for bugs ...
Ethical Hacking: Introducing Network and Port Scanning using Nmap
By Omar Santos, Derek Santos
The first step in any cyber-attack will always be reconnaissance. Reconnaissance and information gathering is essential when piecing together and formulating an attack. From an attacker's perspective, there are two major ...
Cleaning Data for a Spam SMS Detection Model
By Partha Majumdar
This lab cleans the input data before it can be used for building a supervised learning model ...
Loading Data and Creating Training and Test Sets for a Spam SMS Detection Model
By Partha Majumdar
This lab loads the data set, creates the training and test sets, and more ...
Testing a Spam SMS Detection Model
By Partha Majumdar
This lab tests the supervised learning model for spam SMS detection ...
Extracting Features for a Spam SMS Detection Model
By Partha Majumdar
This lab builds functions for feature extraction for building a supervised learning model ...