Skip to main content

Cybersecurity Education and Training Courses

Skill Area
Experience Level
Delivery Option
Training Format
Available Series

Core 110: Cybersecurity Foundations

The Core 110 course focuses on the fundamental principles of cyber and information security. You will learn cyber history, key security concepts, risk and vulnerability management, and cryptography basics. Gain hands-on experience with seven virtual labs and get acquainted with industry tools and techniques such as Active Directory, icacls.exe, GnuPG, and server managers.

  • Cybersecurity Fundamentals

Core 120: Enterprise Security

Core 120 focuses on the fundamentals of creating, implementing, and managing enterprise-level security efforts. You will cover topics like security frameworks, network architecture, protocols, wireless security, monitoring, virtualization and cloud, basics of malware, data protection, and more.

  • Cybersecurity Fundamentals

Core 130: Vulnerability Management

Core 130 teaches the basics of vulnerability management concepts and analysis. You will learn topics like threat hunting, vulnerability scanning & reporting, vulnerability assessments, incident response, disaster recovery, application security, and more.

  • Cybersecurity Fundamentals

Core 140: Ethical Hacking

Core 140 builds a foundation for ethical hacking through videos, readings, and labs. You will learn about the basics of ethical hacking, network and systems enumeration, vulnerability scanning, system attacks, sniffing, and social engineering.

  • Cybersecurity Fundamentals

Essential Defender 201: Network Monitoring Fundamentals

ED-201 lays the foundational layer of cyber defense with the understanding of communication methods used by attacks. You will learn about firewalls and packet captures through lecture materials and three real-world cyberattack scenarios on the Purdue Cyber Range. 

  • Defensive Operations

  • Range Training

Essential Defender 202: Security Operations Fundamentals

Start learning key defensive security concepts with a focus on following an attacker through the Cyber Kill Chain. Learn how to recognize indicators of compromise. Key concepts and tools include commercial SIEMs and firewalls, and other investigation tools. 

  • Defensive Operations

  • Range Training

Defender 302: Security Operations and Network Monitoring

Learn security operations and defensive security, including the basics of Windows, Linux, and network forensics. Key concepts and tools include commercial SIEM, firewalls, and systems monitoring. 

  • Defensive Operations

  • Range Training

Defender 303: Advanced Network Monitoring

Continue learning key defensive security concepts, including Linux and Windows log management, scripting, packet sniffing, and more.  Key concepts and tools include commercials SIEMs and firewalls, and other investigation tools. 

  • Defensive Operations

  • Range Training

Defender 304: Security Log Management and Threat Hunting

Continue learning key defensive security concepts, including Linux log management, Windows and Linux forensics, and MS SQL technologies.  Key concepts and tools include commercials SIEMs and firewalls, common mail server applications, packet capture tools.

  • Defensive Operations

  • Range Training

Defender 305: Network Forensics

Finish key learning objectives of defensive security concepts including advanced Linux and Windows forensics and logging, reverse engineering techniques.  Key concepts and tools include commercials SIEMs and firewalls, and other investigation tools.  

  • Defensive Operations

  • Range Training

Advanced Defender 401: Individual Security Operations

Acting as a skills test, this course allows participants to recognize and respond to three cyber attacks as a solo investigator and responder.

  • Defensive Operations

  • Range Training

Advanced Defender 402: Team Based Security Operations

Continue learning key defensive security concepts, including Linux and Windows log management, scripting, packet sniffing, and more.  Key concepts and tools include commercials SIEMs and firewalls, and other investigation tools. 

  • Defensive Operations

  • Range Training

Advanced Defender 403: Multi-stage Attack Security

Continue learning key defensive security concepts, including Linux and Windows log management, scripting, packet sniffing, and more.  Key concepts and tools include commercials SIEMs and firewalls, and other investigation tools. 

  • Defensive Operations

  • Range Training

Raider 501: Edge Network Compromises

Learn and practice offensive cybersecurity skills through three scenarios of varying difficulty; one easy, one medium, and one hard. Use common red team tools to train for edge network attack techniques.

  • Offensive Operations

  • Range Training

Raider 601: Internal Network Compromises

Learn and practice offensive cybersecurity skills through three “hard” scenarios. Use common red team tools to train for internal network attack techniques

  • Offensive Operations

  • Range Training

Ransomware 499: Ransomware Response and Recovery

This one-day ransomware course introduces learners to the basics of ransomware and provides a live, scenario-based learning experience for all attendees.  Attendees will receive tools necessary to respond to future ransomware attacks. 

  • Ransomware

  • Range Training

Return to main content

Purdue University, 610 Purdue Mall, West Lafayette, IN 47907, (765) 494-4600

© 2021 Purdue University | An equal access/equal opportunity university | Copyright Complaints | Maintained by Technical Assistance Program

Trouble with this page? Disability-related accessibility issue? Please contact Technical Assistance Program at tap@purdue.edu.