Cybersecurity Education and Training Courses
Skill Area
Experience Level
Delivery Option
Training Format
Available Series
Core 110: Cybersecurity Foundations
The Core 110 course focuses on the fundamental principles of cyber and information security. You will learn cyber history, key security concepts, risk and vulnerability management, and cryptography basics. Gain hands-on experience with seven virtual labs and get acquainted with industry tools and techniques such as Active Directory, icacls.exe, GnuPG, and server managers.
Core 120: Enterprise Security
Core 120 focuses on the fundamentals of creating, implementing, and managing enterprise-level security efforts. You will cover topics like security frameworks, network architecture, protocols, wireless security, monitoring, virtualization and cloud, basics of malware, data protection, and more.
Core 130: Vulnerability Management
Core 130 teaches the basics of vulnerability management concepts and analysis. You will learn topics like threat hunting, vulnerability scanning & reporting, vulnerability assessments, incident response, disaster recovery, application security, and more.
Core 140: Ethical Hacking
Core 140 builds a foundation for ethical hacking through videos, readings, and labs. You will learn about the basics of ethical hacking, network and systems enumeration, vulnerability scanning, system attacks, sniffing, and social engineering.
Essential Defender 201: Network Monitoring Fundamentals
ED-201 lays the foundational layer of cyber defense with the understanding of communication methods used by attacks. You will learn about firewalls and packet captures through lecture materials and three real-world cyberattack scenarios on the Purdue Cyber Range.
Essential Defender 202: Security Operations Fundamentals
Start learning key defensive security concepts with a focus on following an attacker through the Cyber Kill Chain. Learn how to recognize indicators of compromise. Key concepts and tools include commercial SIEMs and firewalls, and other investigation tools.
Defender 302: Security Operations and Network Monitoring
Learn security operations and defensive security, including the basics of Windows, Linux, and network forensics. Key concepts and tools include commercial SIEM, firewalls, and systems monitoring.
Defender 303: Advanced Network Monitoring
Continue learning key defensive security concepts, including Linux and Windows log management, scripting, packet sniffing, and more. Key concepts and tools include commercials SIEMs and firewalls, and other investigation tools.
Defender 304: Security Log Management and Threat Hunting
Continue learning key defensive security concepts, including Linux log management, Windows and Linux forensics, and MS SQL technologies. Key concepts and tools include commercials SIEMs and firewalls, common mail server applications, packet capture tools.
Defender 305: Network Forensics
Finish key learning objectives of defensive security concepts including advanced Linux and Windows forensics and logging, reverse engineering techniques. Key concepts and tools include commercials SIEMs and firewalls, and other investigation tools.
Advanced Defender 401: Individual Security Operations
Acting as a skills test, this course allows participants to recognize and respond to three cyber attacks as a solo investigator and responder.
Advanced Defender 402: Team Based Security Operations
Continue learning key defensive security concepts, including Linux and Windows log management, scripting, packet sniffing, and more. Key concepts and tools include commercials SIEMs and firewalls, and other investigation tools.
Advanced Defender 403: Multi-stage Attack Security
Continue learning key defensive security concepts, including Linux and Windows log management, scripting, packet sniffing, and more. Key concepts and tools include commercials SIEMs and firewalls, and other investigation tools.
Raider 501: Edge Network Compromises
Learn and practice offensive cybersecurity skills through three scenarios of varying difficulty; one easy, one medium, and one hard. Use common red team tools to train for edge network attack techniques.
Raider 601: Internal Network Compromises
Learn and practice offensive cybersecurity skills through three “hard” scenarios. Use common red team tools to train for internal network attack techniques
Ransomware 499: Ransomware Response and Recovery
This one-day ransomware course introduces learners to the basics of ransomware and provides a live, scenario-based learning experience for all attendees. Attendees will receive tools necessary to respond to future ransomware attacks.