Which Path is   Right for You?

Are you an End User? IT Professional who doesn't work on cybersecurity? IT Cybersecurity Professional looking to advance your career or stay up-to-date on the latest technological advances? In any case, you have come to the right place!

Welcome to the New Horizons Cybersecurity Interactive Map. Click on the job role/function that best describes you now or best describes where you would like to advance.

Each section offers a series of courses that best fit the role and experience level chosen. Hover over the course titles to see further information that will assist you in making the most informed decisions.

The information obtained through this map can be used when having a conversation with any of our Cybersecurity Sales Experts in designing the best learning path for you!

End User
 

You have nothing to do with the cybersecurity implementation or policy of your company but you have access to mail and databases through company servers on both company-owned and personal devices.

View Courses  

CyberSAFE
(Securing Assets for
the End User)
Who Should Attend
This course is designed for non-technical end-users of computers, mobile devices, networks, and the Internet, to enable them to use technology more securely.

What Is This Course About?
This course will help you to understand security compliance considerations, social engineering, malware, and various other data security-related concepts. In this course, you will explore the hazards and pitfalls and learn how to use technology safely.
Learn More
IT Professional
(non-security)
 

Your primary responsibilities involve the design, implementation, management, and administration of network servers and other company devices. Security is not part of your job function but cybersecurity knowledge would be beneficial.
View Courses  

IT Professional
(some security)
 

Your primary responsibilities involve the design, implementation, management, and administration of network servers and other company devices. Fundamental aspects of cybersecurity is currently a part of, or is becoming a part of, your job role.
View Courses  

CyberSec
First Responder
Threat Detection
and Response
Who Should Attend
This course is designed for IT professionals who perform job functions related to the development, operation, management, and enforcement of security

What Is This Course About?
In this course, students develop, operate, manage, and enforce security capabilities for systems and networks, including assessing information security risk in computing and network environments, designing and operating secure computing and network environments, and collecting cybersecurity intelligence information.
Learn More
Cisco®
Implementing and
Administering Cisco®
Solutions v1.0
(CCNA)
Who Should Attend
This course is designed for Entry-level network engineer, Network administrator, Network support technician, Help desk technician, and those pursing the CCNA Security certification.

What Is This Course About?
In this course, You will learn how to install, operate, configure, and verify a basic IPv4 and IPv6 network. including configuring switches, routers, and Wireless LAN Controllers, managing network devices, and identifying basic security threats. The goal of the course is to provide you a foundation in network programmability, automation, and software-defined networking. Learn More
Cisco®
Understanding Cisco
Security Foundations v1.0
(SFNDU)
Who Should Attend:
This course is of benefit to network designers, network, systems, and security engineers, network and security managers, and those looking to complete their CCNA Security certification.

What Is This Course About?
In this course, you will learn about the design, implementation, and monitoring of a comprehensive security policy using Cisco IOS security features and technologies as examples. You will also learn about security controls of Cisco IOS devices as well as a functional introduction to the Cisco Adaptive Security Appliance (ASA). This course enables you to perform basic tasks to secure a network using Cisco IOS security features, which are available through web-based GUIs on the Cisco ASA, and the command-line interface (CLI) on Cisco routers and switches.
Palo Alto Networks®
- Firewall Essentials
- Configuration and
Management v9.0
(EDU-210)
Who Should Attend:
This course is suited for Security Engineers, Administrators, Operations Specialists, Analysts, Network Engineers and support staff who want to install, configure, and manage the entire line of Palo Alto Networks Next-Generation firewalls.

What Is This Course About?
Students attending this introductory-level class will gain an in-depth knowledge of how to install, configure, and manage their firewall, as well as configuration steps for the security, networking, threat prevention, logging, and reporting features of the Palo Alto Networks Operating System.
Learn More
Palo Alto Networks®
- Firewall Optimizing
Firewall Threat
Prevention V9.0
(EDU-214)
Who Should Attend:
This course is suited for Security Engineers, Network Engineers, and support staff who wish to expand on the concepts taught in Course EDU-214 and explore many new features and functions of Palo Alto Networks Next-Generation firewalls.

What Is This Course About?
Successful completion of this two-day, instructor-led course will enhance the student’s understanding of how to install, configure, manage, and perform basic troubleshooting on the entire line of Palo Alto Networks Next-Generation firewalls. Additionally, students will be instructed on the basics of implementing and managing GlobalProtect and Active/Active High Availability. Students will gain an in-depth knowledge of how to optimize their visibility and control over applications, users, and content.
Learn More
IT Cybersecurity Professional
(0-2 years experience)
 

Your primary focus is on the cybersecurity of your organization's data and equipment. You are involved in the day-to-day implementation and compliance of your organization's security policies. You have six months to less than two years experience as a Cybersecurity Professional.
View Courses  

Certified Network
Defender (CND)
Who Should Attend
This course is designed for network administrators, security administrators and engineers, network defense technicians, CND analysts and security analysts, security operators, as well as anyone involved in network operations.

What Is This Course About?
Certified Network Defender (CND) is a vendor-neutral, comprehensive network security certification training program. CND is based on a job-task analysis and cybersecurity education framework presented by the National Initiative of Cybersecurity Education (NICE). The course has also been mapped to global job roles and responsibilities and the Department of Defense (DoD) job roles for system/network administrators. CND prepares network administrators on network security technologies and operations to attain Defense-in-Depth network security preparedness
Coming Soon
CyberSec
First Responder
Threat Detection
and Response
Who Should Attend
This course is designed for IT professionals who perform job functions related to the development, operation, management, and enforcement of security capabilities for systems and networks.

What Is This Course About?
In this course, students develop, operate, manage, and enforce security capabilities for systems and networks, including assessing information security risk in computing and network environments, designing and operating secure computing and network environments, and collecting cybersecurity intelligence information.
Learn More
CSX Practitioner:
Identification
and Protection
Who Should Attend:
The Identification and Protection course is ideal for individuals in the field of cyber security who are interested in gaining hands-on technical skills.

What Is This Course About?
The first course in the CSX Practitioner series focuses on key cyber security skills and includes foundational, real world instruction in the Identify and Protect domains. Topics range from preliminary network scanning to security control implementation. Through the completion of multiple lab-reinforced modules, students will learn how to apply industry-developed, experience-based methods to the identification of key networks and learn to develop appropriate protection mechanisms.
Coming Soon
CSX Practitioner:
Detection
Who Should Attend:
The Detection course is ideal for individuals in the field of cybersecurity who are interested in gaining hands-on technical skills.

What Is This Course About?
The second course in the CSX Practitioner series goes deeper into skills focused in the Detect domain. Students will learn the basic concepts, methods and tools used to leverage cybersecurity controls in order to identify system events and non-event level incidents. By completing multiple lab-reinforced modules, students will gain the skills necessary to detect potential network events and incidents. Topics range from incident packet analysis to Incident Response (IR) report drafting and generation.
Coming Soon
CSX Practitioner:
Respond
and Recover
Who Should Attend:
The Respond and Recover course is ideal for individuals in the field of cybersecurity who are interested in gaining hands-on technical skills.

What Is This Course About?
The final course in the CSX Practitioner series provides hands-on instruction in the Respond and Recover domains. With course lecture backed up by lab sequences, students will learn how to apply professional methodology to respond and recover from network incidents or disasters. Students will discover how to contain an event and protect assets and infrastructure, and learn the components and procedures required for a comprehensive incident response plan.

The Respond domain shows students the basic concepts, methods and tools required to draft and execute comprehensive incident response plans, provide proper isolation response documentation, and how to document and maintain information related to Incident Response.

In the Recover domain, students will master the basic concepts, methods and tools required to recuperate a system or network, as well as learn how to implement continuity and contingency plans.
Coming Soon
Cisco® Implementing
and Operating Cisco
Security Core
Technologies
(SCOR)
Who Should Attend:
This course is of benefit to network designers, network, systems, and security engineers, network and security managers, and those looking to complete their CCNA Security certification.

What Is This Course About?
In this course, you will learn about the design, implementation, and monitoring of a comprehensive security policy using Cisco IOS security features and technologies as examples. You will also learn about security controls of Cisco IOS devices as well as a functional introduction to the Cisco Adaptive Security Appliance (ASA). This course enables you to perform basic tasks to secure a network using Cisco IOS security features, which are available through web-based GUIs on the Cisco ASA, and the command-line interface (CLI) on Cisco routers and switches.
Learn More
Cisco® Securing
Networks with
Cisco Firepower®
Next Generation
Firewall v1.0
(SSNGFW)
Who Should Attend:
This course is suited for Security administrators, consultants, engineers, Network administrators, Technical support personnel and Cisco integrators and partners.

What Is This Course About?
Students attending this introductory-level class will gain an in-depth knowledge of how to setup, configure and routing, traffic control, NAT, implement NGFW, NGIPS features, including network intelligence, file type detection, network-based malware detection, and deep packet inspection and configure site-to-site VPN, remote-access VPN, and Secure Sockets Layer (SSL) decryption .
Learn More
Palo Alto Networks®
- Firewall Essentials
- Configuration and
Management v9.0
(EDU-210)
Who Should Attend:
This course is suited for Security Engineers, Administrators, Operations Specialists, Analysts, Network Engineers and support staff who want to install, configure, and manage the entire line of Palo Alto Networks Next-Generation firewalls.

What Is This Course About?
Students attending this introductory-level class will gain an in-depth knowledge of how to install, configure, and manage their firewall, as well as configuration steps for the security, networking, threat prevention, logging, and reporting features of the Palo Alto Networks Operating System.
Learn More
Palo Alto Networks®
- Panorama™ Managing
Firewalls at
Scale v9.0
(EDU-220)
Who Should Attend:
This course is suited for Security Administrators, Specialists, Analysts, Engineers, Architects, and support staff who wish to expand on the concepts taught in Course EDU-220 and explore many new features and functions of Palo Alto Networks Next-Generation firewalls.

What Is This Course About?
Successful completion of this course will enhance the student’s understanding of Streamlined policy management, Simplified operations, Unparalleled network and threat visibility, Flexible deployment options
Learn More
IT Cybersecurity Professional
(2-5 years experience)
 

Your primary focus is on the cybersecurity of your organization's data and equipment. You are involved in the day-to-day implementation and compliance of your organization's security policies. You are possibly in some kind of management or oversight position. You have more than two years experience and less than five years experience as a Cybersecurity Professional.
View Courses  

EC-Council
Certified Ethical
Hacker (CEH)
Who Should Attend
The Certified Ethical Hacking course will significantly benefit security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure.

What Is This Course About?
In 18 comprehensive modules, the course covers 270 attack technologies, commonly used by hackers. Throughout the CEH course, you will be immersed in a hacker's mindset, evaluating not just logical, but physical security.
Learn More
CompTIA
Cybersecurity
Analyst
(CySA+)
Who Should Attend
IT professionals with (or seeking) job roles such as IT Security Analyst, Security Operations Center (SOC) Analyst, Vulnerability Analyst, Cybersecurity Specialist, Threat Intelligence Analyst, and Security Engineer.

What Is This Course About?
CompTIA’s Cybersecurity Analyst (CySA+) training from New Horizons teaches students to apply behavioral analytics to improve the overall state of IT security, providing critical knowledge and skills that are required to prevent, detect and combat cybersecurity threats.
Learn More
CSX Specialist:
Identify
and Protect
Who Should Attend:
The Identify and Protect course is ideal for experienced individuals in the field of cyber security who are interested in gaining hands-on technical skills.

What Is This Course About?
This week-long course will help students gain an intermediate-level understanding of the concepts, skills and tools required to identify threats and weaknesses and protect an organization from cyber attacks.  They will learn how to analyze and assess cyber threats against multiple levels of infrastructure, from host to system-level, using industry accepted methods and tools as governed by the NIST and ISO publication guidelines.  In addition, students will learn to establish, maintain, and develop a holistic protection policy for the networks under their responsibility – including network protection techniques, such as Intrusion Detection System (IDS) implementation and firewall rule configuration – and how to use specific tools in protecting a network.
Coming Soon
CSX Specialist:
Detect
Who Should Attend:
The Detect course is ideal for experienced individuals in the field of cyber security who are interested in gaining hands-on technical skills.

What Is This Course About?
This week-long course will help students gain an intermediate-level understanding of the concepts, skills and tools required to discover and differentiate incidents and events on their networks of responsibility. They will learn threat detection techniques, such as traffic monitoring and analysis, false positive minimization, and false negative eradication. In addition, they will learn how to utilize specialized tools, such as Wireshark and TCPdump to detect threats.

The Detect domain teaches students to distinguish network and system incidents and events. Students will learn to identify compromise indicators, assess potential damage, and provide appropriate data to first response teams.
Learn More
CSX Specialist:
Respond
and Recover
Who Should Attend:
The Respond and Recover course is ideal for experienced individuals in the field of cyber security who are interested in gaining hands-on technical skills.

What Is This Course About?
This week-long course will help students gain an intermediate-level understanding of the concepts, skills and tools required to maintain, enact and develop organizationally unique incident response plans. They will learn response techniques, such as malware removal, account deletion, and access revocation. In addition, they will understand how to utilize specialized malware identification and removal tools. In addition, students will learn how to execute tasks identified in organizational Business Continuity Plans (BCP) and Disaster Recovery Plans (DRP). They will learn to utilize recovery techniques, such as data integrity evaluation, alternative site maintenance and post event restoration. In addition, they will learn how to use specialized integrity evaluation and backup dispersion tools.
Coming Soon
Cisco® Implementing
and Configuring
Cisco® Identity
Services Engine v3.0
(SISE)
Who Should Attend:
This course is suited for network security engineers, ISE administrators, Wireless network security engineers and Cisco integrators and partners.

What Is This Course About?
This course teaches to implement and use Cisco ISE, including policy enforcement, profiling services, web authentication and guest access services, BYOD, endpoint compliance services, and TACACS+ device administration.
Learn More
Cisco® Securing
Cisco Networks
with Sourcefire
Intrusion Prevention
System v4.0
(SSFIPS)
Who Should Attend:
This course is designed for Security administrators, consultants, administrators, engineers, Technical support personnel, Channel partners and resellers and technical professionals who need to know how to deploy and manage a Cisco Firepower NGIPS in their network environment.

What Is This Course About?
This hands-on course gives you the knowledge and skills for detection of network-based malware and file type, NGIPS tuning and configuration, application control, security intelligence, firewall, and network-based malware and file controls; Snort® rules language; file and malware inspection, security intelligence, configuration and deployment of correlation policies, troubleshooting, system and user administration tasks.
Learn More
Palo Alto Networks®
- Panorama™ Managing
Firewalls at
Scale v9.0
(EDU-220)
Who Should Attend:
This course is suited for Security Administrators, Specialists, Analysts, Engineers, Architects, and support staff who wish to expand on the concepts taught in Course EDU-220 and explore many new features and functions of Palo Alto Networks Next-Generation firewalls.

What Is This Course About?
Successful completion of this course will enhance the student’s understanding of Streamlined policy management, Simplified operations, Unparalleled network and threat visibility, Flexible deployment options
Learn More
Palo Alto Networks®
- Firewall
Troubleshooting v9.0
(EDU-330)
Who Should Attend:
Security Engineers, Administrators, Operations Specialists, Security Analysts, Network Engineers and Support Staff
What Is This Course About?
this three-day, instructor-led course will enhance the participant’s understanding of how to troubleshoot the full line of Palo Alto Networks® next-generation firewalls.
Learn More
IT Cybersecurity Professional
(5+ years experience)
 

Your primary focus is on the cybersecurity of your organization's data and equipment. You are involved in the implementation and compliance of your organization's security policies. You are possibly in some kind of senior management or cybersecurity strategy position. You have more than five years experience as a Cybersecurity Professional.
View Courses  

Certified
Information System
Security Professional
(CISSP)
Who Should Attend
This course is intended for experienced IT security-related practitioners, auditors, consultants, investigators, or instructors, including network or security analysts and engineers, network administrators, information security specialists, and risk management professionals, who are pursuing CISSP training and certification to acquire the credibility and mobility to advance within their current computer security careers or to migrate to a related career. Through the study of all 10 CISSP CBK domains, students will validate their knowledge by meeting the necessary preparation requirements to qualify to sit for the CISSP certification exam. The CISSP exam is intentionally difficult and should not be taken lightly. Even students with years of security experience should assume that they will have additional study time after class. Because the domains are so varied, it is unlikely that any one student will have experience in all 10 domains.

What Is This Course About?
In this course, students will analyze a wide range of information systems security subjects that are organized into 10 domains for CISSP exam certification.
Learn More
Cisco® Implementing
Automation for
Cisco Security
Solutions
(SAUI)
Who Should Attend:
This is course is suited for Channel and Customer,Network, System, Wireless and Consulting Systems Engineers, Technical Solutions Architect, Network Admisnistrator and Manager, Channel SEs and AMs, Sales Engineer and Account Manager.

What Is This Course About?
This course is designed to prepare security engineers with the knowledge and hands-on experience so that they can deploy Cisco's Next Generation Firewall (NGFW) as well as Web Security, Email Security and Cloud Web Security.
Learn More
Cisco® Securing the
Web with Cisco®
Web Security
Appliance v3.0
(SWSA)
Who Should Attend:
this course Should Attend by Cisco integrators and partners, Network managers, network or security technicians, and security engineers and managers responsible for web security.

What Is This Course About?
Students of this course will gain knowledge of implement, use, and maintain Cisco® Web Security Appliance (WSA),deploy proxy services, use authentication, implement policies to control HTTPS traffic and access, implement use control settings and policies, use the solution’s anti-malware features, implement data security and data loss prevention, perform administration of Cisco WSA solution.
Learn More
Cisco® Implementing
Secure Solutions
with Virtual
Private Networks
(SVPN)
Who Should Attend:
This course is designed for professionals like Network security engineer, CCNP Security candidate and Channel Partner.

What Is This Course About?
This course is designed to teach students the skills to deploy and troubleshoot traditional Internet Protocol Security (IPsec), Dynamic Multipoint Virtual Private Network (DMVPN), FlexVPN, and remote access VPN to create secure and encrypted data, remote accessibility, and increased privacy.
Learn More
Cisco® Securing
Email with Cisco®
Email Security
Appliance v3.0
(SESA)
Who Should Attend:
This course is designed for security and network professionals as well as for Cisco integrators and partners

What Is This Course About?
This hands-on course provides you with the knowledge and skills to implement, troubleshoot, and administer Cisco Email Security Appliance, including key capabilities such as advanced malware protection, spam blocking, anti-virus protection, outbreak filtering, encryption, quarantines, and data loss prevention.
Learn More
EC-Council
Computer Hacking
Forensics
Investigator (CHFI)
Who Should Attend:
The CHFI course will benefit police and other laws enforcement personnel, defense and military personnel, e-Business security professionals, systems administrators, legal professionals, banking, insurance and other professionals, and those who work for or with government agencies.

What Is This Course About?
This course will provide participants the necessary skills to identify an intruders footprints and to properly gather the necessary evidence to prosecute in the court of law.
Learn More
EC-Council
Certified Security
Analyst (ECSA)
Who Should Attend:
Ethical Hackers, Penetration Testers, Network Server Administrators, Firewall Administrators, Security Testers, System Administrators and Risk Assessment Professionals.

What Is This Course About?
In this course will provide students will conduct a penetration test on a company that has various departments, subnets and servers, and multiple operating systems with defense mechanisms architecture that has both militarized and non-militarized zones.
Learn More