New Horizons OLA Course Details

CyberSecurity Collection

The New Horizons CyberSecurity Collection offers a vast array of learning options with instant access to hundreds of learning assets across a wide choice of modalities (videos, courses, books, assessments, mentoring, etc.). These learning assets can be used to support cybersecurity professionals’ continuous learning needs from solving an immediate technical problem, to building a well-rounded set of skills and preparing for certification exams.

This is an Online ANYTIME course library and includes multiple individual online courses. Online ANYTIME gives you access to a self-paced training solution that uses the same core course content as our world-renowned Instructor-Led Training.

 Back to OLA Course Catalog  Request Information about this Library

What’s Included

  • An Executive's Guide to Security: Protecting Your Information
  • An Executive's Guide to Security: Understanding Security Threats
  • Android Architecture, Protection, and Development Best Practices
  • Android Security Vulnerabilities, Testing, and Enterprise Considerations
  • Applying Security Best Practices to a Physical Environment
  • Attack Vectors and Mitigations
  • CEHv10: Common Web App Threats
  • CEHv10: Denial of Service
  • CEHv10: Ethical Hacking Overview and Threats
  • CEHv10: Evading IDS, Firewalls, and Honeypots Part 2
  • CEHv10: Footprinting
  • CEHv10: Hacking Concepts
  • CEHv10: Hacking Web Servers
  • CEHv10: Hidden Files and Covering Tracks
  • CEHv10: Host Discovery and Scanning with Nmap
  • CEHv10: IoT Hacking and Countermeasures
  • CEHv10: Network Sniffing
  • CEHv10: Password Attacks
  • CEHv10: Password Attacks Part 2
  • CEHv10: Pentesting, Laws, and Standards
  • CEHv10: ProxyChains and Enumeration
  • CEHv10: Security Controls
  • CEHv10: Security Controls Part 2
  • CEHv10: SQL Injection
  • CEHv10: Vulnerability Analysis Concepts and Tools
  • CEHv10: Wireless Hacking Concepts
  • Certified Ethical Hacker - CEHv10: Cloud Computer Attacks
  • Certified Ethical Hacker - CEHv10: Clouding Computing Concepts
  • Certified Ethical Hacker - CEHv10: Common Web App Threats Part 2
  • Certified Ethical Hacker - CEHv10: Covert Data Gathering
  • Certified Ethical Hacker - CEHv10: Cracking and Mobile Hacking
  • Certified Ethical Hacker - CEHv10: Cryptography Attacks
  • Certified Ethical Hacker - CEHv10: Cryptography Concepts
  • Certified Ethical Hacker - CEHv10: Cryptography Concepts Part 2
  • Certified Ethical Hacker - CEHv10: Cryptography Concepts Part 3
  • Certified Ethical Hacker - CEHv10: Evading IDS, Firewalls, and Honeypots
  • Certified Ethical Hacker - CEHv10: Evading IDS, Firewalls, and Honeypots Part 3
  • Certified Ethical Hacker - CEHv10: IoT Attacks
  • Certified Ethical Hacker - CEHv10: IoT Concepts
  • Certified Ethical Hacker - CEHv10: Malware Distribution
  • Certified Ethical Hacker - CEHv10: Malware Threats
  • Certified Ethical Hacker - CEHv10: Practical Web App Hacking
  • Certified Ethical Hacker - CEHv10: Privilege Escalation
  • Certified Ethical Hacker - CEHv10: Session Hijacking
  • Certified Ethical Hacker - CEHv10: Social Engineering
  • Certified Ethical Hacker - CEHv10: SQL Injection Types and Tools
  • Certified Ethical Hacker - CEHv10: Wireless Hacking Common Threats
  • Certified Ethical Hacker - CEHv10: Wireless Hacking Tools
  • CISA: Governance and Management of IT - Part 1
  • CISA: Governance and Management of IT - Part 2
  • CISA: Information Systems Acquisition, Development, and Implementation
  • CISA: Information Systems Operations, Maintenance, and Service Management
  • CISA: Protection of Information Assets - Part 1
  • CISA: Protection of Information Assets - Part 2
  • CISA: The Process of Auditing Information Systems - Part 1
  • CISA: The Process of Auditing Information Systems - Part 2
  • CISM: Information Risk Management Part 1
  • CISM: Information Risk Management Part 2
  • CISM: Information Security Governance Part 1
  • CISM: Information Security Governance Part 2
  • CISM: Information Security Incident Management Part 1
  • CISM: Information Security Incident Management Part 2
  • CISM: Information Security Program Development and Management Part 1
  • CISM: Information Security Program Development and Management Part 2
  • CISSP 2018 : Communication and Network Security
  • CISSP 2018: (ISC)² and Security Fundamentals
  • CISSP 2018: Conducting Incident Management
  • CISSP 2018: Cryptographic Client-based Systems
  • CISSP 2018: Identity and Access Management (IAM)
  • CISSP 2018: Security and Risk Management (Part 1)
  • CISSP 2018: Security and Risk Management (Part 2)
  • CISSP 2018: Security Architecture and Engineering (Part 1)
  • CISSP 2018: Security Architecture and Engineering (Part 2)
  • CISSP 2018: Security Assessment and Testing
  • CISSP 2018: Security Operations (Part 1)
  • CISSP 2018: Security Operations (Part 2)
  • CISSP 2018: Site and Facility Security Controls
  • CISSP 2018: Software Development Security
  • COBIT 5 Principles and Implementation
  • CompTIA CASP CAS-003: Applying Research Methods for Trend and Impact Analysis
  • CompTIA CASP CAS-003: Business and Industry Influences and Risks
  • CompTIA CASP CAS-003: Conducting Security Assessments
  • CompTIA CASP CAS-003: Implementing Cryptographic Techniques
  • CompTIA CASP CAS-003: Implementing Incident Response and Recovery
  • CompTIA CASP CAS-003: Implementing Security Activities across the Technology Life Cycle
  • CompTIA CASP CAS-003: Integrating and Troubleshooting Advanced AAA Technologies
  • CompTIA CASP CAS-003: Integrating Cloud and Virtualization Technologies in the Enterprise
  • CompTIA CASP CAS-003: Integrating Hosts, Storage, and Applications in the Enterprise
  • CompTIA CASP CAS-003: Interacting across Diverse Business Units
  • CompTIA CASP CAS-003: Organizational Security and Privacy Policies
  • CompTIA CASP CAS-003: Secure Communication and Collaboration Solutions
  • CompTIA CASP+ CAS-003: Integrating Controls for Mobile and Small Form Factor Devices
  • CompTIA CASP+ CAS-003: Integrating Network and Security Components, Concepts, and Architectures
  • CompTIA CASP+ CAS-003: Integrating Security Controls for Host Devices
  • CompTIA CASP+ CAS-003: Risk Metric Scenarios for Enterprise Security
  • CompTIA CASP+ CAS-003: Risk Mitigation Strategies and Controls
  • CompTIA CASP+ CAS-003: Selecting Software Security Controls
  • CompTIA Cybersecurity Analyst+ CS0-001: Investigate Security Incidents
  • CompTIA Cybersecurity Analyst+ CS0-001: Monitoring for Security Issues
  • CompTIA Cybersecurity Analyst+ CS0-001: Network Architecture and Reconnaissance
  • CompTIA Cybersecurity Analyst+ CS0-001: Reducing Vulnerabilities
  • CompTIA Cybersecurity Analyst+ CS0-001: Threat Identification
  • CompTIA Cybersecurity Analyst+ CS0-001: Threat Mitigation
  • CompTIA PenTest+: Analyzing Tool and Script Output
  • CompTIA PenTest+: Application-Based vulnerabilities
  • CompTIA PenTest+: Information Gathering
  • CompTIA PenTest+: Local Host Vulnerabilities
  • CompTIA PenTest+: Network-Based Exploits
  • CompTIA PenTest+: Penetration Testing Tools
  • CompTIA PenTest+: Planning for an Engagement
  • CompTIA PenTest+: Post-Exploitation and Facilities Attacks
  • CompTIA PenTest+: Reporting and Communication
  • CompTIA PenTest+: Scoping an Engagement
  • CompTIA PenTest+: Social Engineering and Specialized System Attacks
  • CompTIA PenTest+: Vulnerability Identification
  • CompTIA Security+ SY0-501: Analyzing Output from Security Technologies
  • CompTIA Security+ SY0-501: Application and Service Attacks
  • CompTIA Security+ SY0-501: Business Impact Analysis and Risk Management
  • CompTIA Security+ SY0-501: Cloud, Virtualization, and Resiliency Concepts
  • CompTIA Security+ SY0-501: Common Account Management Practices
  • CompTIA Security+ SY0-501: Components Supporting Organizational Security
  • CompTIA Security+ SY0-501: Cryptographic and Wireless Attacks
  • CompTIA Security+ SY0-501: Cryptography
  • CompTIA Security+ SY0-501: Deploying Mobile Devices Securely
  • CompTIA Security+ SY0-501: Frameworks, Guidelines, and Physical Security
  • CompTIA Security+ SY0-501: Identity and Access Management Controls
  • CompTIA Security+ SY0-501: Identity Concepts and Access Services
  • CompTIA Security+ SY0-501: Impacts from Vulnerability Types
  • CompTIA Security+ SY0-501: Implement Secure Network Architecture Concepts
  • CompTIA Security+ SY0-501: Implementing Secure Protocols
  • CompTIA Security+ SY0-501: Incident Response, Forensics, and Disaster Recovery
  • CompTIA Security+ SY0-501: Penetration Testing and Vulnerability Scanning
  • CompTIA Security+ SY0-501: Policies, Plans, and Procedures
  • CompTIA Security+ SY0-501: Public Key Infrastructure
  • CompTIA Security+ SY0-501: Secure System and Application Design and Deployment
  • CompTIA Security+ SY0-501: Security Assessment Using Software Tools
  • CompTIA Security+ SY0-501: Social Engineering and Related Attacks
  • CompTIA Security+ SY0-501: The Present Threat Landscape
  • CompTIA Security+ SY0-501: Troubleshooting Common Security Issues
  • CompTIA Security+ SY0-501: Types of Malware
  • CompTIA Security+ SY0-501: Wireless Security Settings
  • Cryptography Fundamentals: Applying Cryptography
  • Cryptography Fundamentals: Defining Cryptography
  • CSSLP: Secure Software Concepts
  • CSSLP: Secure Software Design
  • CSSLP: Secure Software Implementation and Coding
  • CSSLP: Secure Software Requirements
  • CSSLP: Secure Software Testing
  • CSSLP: Software Acceptance, Deployment, Operations, Maintenance, and Disposal
  • CSSLP: Supply Chain and Software Acquisition
  • Cybersecurity 101: Auditing & Incident Response
  • Cybersecurity 101: Session & Risk Management
  • Defense in Depth: Using Security Controls
  • Identifying Security Controls
  • Introduction to COBIT 5
  • iOS Security Architecture and Application Data Protection
  • IT Security for End Users: IT Security Fundamentals
  • IT Security for End Users: Secure Corporate Communications and Networking
  • IT Security for End Users: Using Corporate Devices Securely
  • Mentoring Certified Information Systems Security Professional (CISSP)
  • Mentoring DoD 8570.1 KnowledgeCenter
  • Mentoring IT Security KnowledgeCenter
  • Mentoring Systems Security Certified Practitioner (SSCP)
  • Mitigating LAN Security Threats
  • Mitigating WAN Link Security Threats
  • Mitigating WLAN security threats
  • OWASP A10 and A9: API and Component Attacks
  • OWASP A4 and A2: Broken Applications
  • OWASP A5 and A1: Security and Injection
  • OWASP A7 and A6: Leaky and Unprepared Applications
  • OWASP A8 and A3: Cross-site Attacks
  • OWASP Overview
  • OWASP Top 10: List Item Overview
  • Securing Against Threats, Securing for Enterprise, and Jailbreaking Devices
  • Securing Mobile Devices in the Enterprise: Configuring Enterprise-level Security
  • Securing Mobile Devices in the Enterprise: Mobile Security Technologies
  • Securing Mobile Devices in the Enterprise: Mobile Security Threat Mitigation
  • Securing Mobile Devices in the Enterprise: Mobile Security Threats
  • Securing User Accounts: Authorization, Registration, and Passwords
  • Securing User Accounts: Fundamental Security Concepts
  • Securing User Accounts: Logon, Logoff, Account Changes, and Attack Mitigation
  • Security Fundamentals: Authentication
  • Security Fundamentals: Authentication, Passwords & Audit Policies
  • Security Fundamentals: Client and Email Security
  • Security Fundamentals: Core Security
  • Security Fundamentals: Encryption and Malware
  • Security Fundamentals: Firewalls
  • Security Fundamentals: Internet and Wireless Security
  • Security Fundamentals: Network Isolation
  • Security Fundamentals: Permissions
  • Security Fundamentals: Protocol Security
  • Security Fundamentals: Server Protection
  • System Security Certified Practitioner (SSCP 2018): Asset & Change Management
  • System Security Certified Practitioner (SSCP 2018): Business Continuity
  • System Security Certified Practitioner (SSCP 2018): Controlling Resource Access
  • System Security Certified Practitioner (SSCP 2018): Cryptography Primer
  • System Security Certified Practitioner (SSCP 2018): Digital Forensics
  • System Security Certified Practitioner (SSCP 2018): Identity Management
  • System Security Certified Practitioner (SSCP 2018): Malware & Endpoint Security
  • System Security Certified Practitioner (SSCP 2018): Network Fundamentals
  • System Security Certified Practitioner (SSCP 2018): Network Security
  • System Security Certified Practitioner (SSCP 2018): Public Key Infrastructure
  • System Security Certified Practitioner (SSCP 2018): Risk Management
  • System Security Certified Practitioner (SSCP 2018): Securing Environments
  • System Security Certified Practitioner (SSCP 2018): Security Assessments
  • System Security Certified Practitioner (SSCP 2018): Security Concepts
  • System Security Certified Practitioner (SSCP 2018): Security Controls
  • Systems Security Certified Practitioner: Access Controls
  • Systems Security Certified Practitioner: Cryptography
  • Systems Security Certified Practitioner: Incident Response and Recovery
  • Systems Security Certified Practitioner: Network and Communications Security
  • Systems Security Certified Practitioner: Risk Management
  • Systems Security Certified Practitioner: Security Administration
  • Systems Security Certified Practitioner: Security Operations
  • Systems Security Certified Practitioner: Systems and Application Security
  • TestPrep Certified Information Systems Security Professional (CISSP)
  • Understanding Malware
  • Vulnerabilities and Exploits

Online ANYTIME Testimonial

I am really enjoying the class learning about the new features in Server 2008. I enjoy the hands on element of the virtual labs and your very flexible method of instruction. Being able to ask questions at any time is a great thing IMO.

Thanks for the class and I will definitely push my Dept for more training dollars to take more classes.
Charlie P.