NH Anytime eLearning Catalog: Cybersecurity

Your membership includes 24/7 Unlimited Access to on demand video training for over 250 Courses. Earn PDUs, Prepare for certification exams and upgrade your Cyber Security skills, all on your own time. New courses and course upgrades are automatically added to your membership.

Sign Up Today and Have Access To:

  • Self-Paced eLearning Videos in HD Quality 
  • Virtual Instructor Led Content
  • Automatic Updates to your Membership for New Course Releases 
  • Over 12,000 Review Questions to Asses Understanding
  • Printable Workbooks for Notes, Review and Quiz Keys
  • Final Exams to Test Knowledge and Retention
  • Completion Certificates
  • NH Anytime membership access valid for 1 year  

If you want to add ILT Training to Your NH Anytime Membership, check our our new Cybersecurity All Access Pass! Unlimited ILT Training for 6 Months on top of your NH Anytime eLearning Catalog. 

Courses Included in the NH Anytime eLearning Cyber Security Catalog:

CyberSec First Responder: Threat Detection and Response (Exam CFR-210) Series (Logical Operations)
Course 01 - Assessing Information Security Risk
Course 02 - Analyzing the Threat Landscape
Course 03 - Analyzing Reconnaissance Threats to Computing and Network Environments
Course 04 - Analyzing Attacks on Computing and Network Environments
Course 05 - Analyzing Post-Attack Techniques
Course 06 - Evaluating the Organization’s Security Posture
Course 07 - Collecting Cybersecurity Intelligence
Course 08 - Analyzing Log Data
Course 09 - Performing Active Asset and Network Analysis
Course 10 - Responding to Cybersecurity Incidents
Course 11 - Investigating Cybersecurity Incidents

Certified Wireless Network Administrator (CWNA) Series
Course 01 - Overview of Wireless Communications
Course 02 - Fundamentals of RF
Course 03 - Components and Measurements of RF
Course 04 - RF Signal and Antenna Concepts
Course 05 - IEEE 802.11
Course 06 - Spread Spectrum Technologies
Course 07 - WLAN Topologies
Course 08 - Wi-Fi Access
Course 09 - MAC Architecture
Course 10 - WLAN Architecture
Course 11 - WLAN Deployment
Course 12 - Troubleshooting
Course 13 - Security
Course 14 - Types of Wireless Attacks
Course 15 - Fundamentals of Site Surveys
Course 16 - Site Survey Tools
Course 17 - PoE
Course 18 - High Throughput (HT)
Course 19 - Very High Throughput (VHT)
Course 20 - BYOD

Certified Wireless Security Professional (CWSP) Series
Course 01 - WLAN Security Overview
Course 02 - Legacy Security
Course 03 - Encryption Ciphers and Methods
Course 04 - 802.11 Authentication Methods
Course 05 - Dynamic Encryption Key Generation
Course 06 - SOHO 802.11 Security
Course 07 - Fast Secure Roaming
Course 08 - Wireless Security Risks
Course 09 - Wireless LAN Security Auditing
Course 10 - Wireless Security Monitoring
Course 11 - VPNs, Remote Access and Guest Access Services
Course 12 - WLAN Security Infrastructure
Course 13 - Wireless Security Policies

Certified Information Systems Auditor (CISA) Series
Course 01 - The Process of Auditing Information Systems
Course 02 - Governance and Management of IT
Course 03 - Information Systems Acquisition, Development and Implementation
Course 04 - Information Systems Operations, Maintenance and Support
Course 05 - Protection of Information Assets

Certified Information Security Manager (CISM) Series
Course 01 - Information Security Governance
Course 02 - Information Risk Management
Course 03 - Information Security Program Development
Course 04 - Information Security Incident Management

Certified Information Systems Security Officer (CISSO) Series*
*This entire course series is to be taken with CISSP for full certification exam prep
Course 01 - Risk Management
Course 02 - Security Management
Course 03 - Authentication
Course 04 - Access Control
Course 05 - Security Models
Course 06 - Operations Security
Course 07 - Symmetric Cryptography and Hashing
Course 08 - Asymmetric Cryptography and PKI
Course 09 - Network Connections
Course 10 - Network Protocols and Devices
Course 11 - Telephony, VPNs and Wireless
Course 12 - Security Architecture
Course 13 - Software Development Security
Course 14 - Database Security and System Development
Course 15 - Malware and Software Attacks
Course 16 - Business Continuity
Course 17 - Disaster Recovery
Course 18 - Incident Management, Law, and Ethics
Course 19 - Physical

Certified Information Systems Security Professional (CISSP) Series*
*This entire course series is to be taken with CISSO for full certification exam prep
Course 01 - Security and Risk Management
Course 02 - Asset Security
Course 03 - Security Engineering
Course 04 - Communication and Network Security
Course 05 - Identity and Access Management
Course 06 - Security Assessment and Testing
Course 07 - Security Operations
Course 08 - Software Development Security

Shon Harris Certified Information Systems Security Professional (CISSP) Series
Course 01 - Information Security and Risk Management
Course 02 - Access Control
Course 03 - Cryptography
Course 04 - Physical Security
Course 05 - Security Architecture and Design
Course 06 - Law, Investigation and Ethics
Course 07 - Telecommunications and Networking
Course 08 - Business Continuity
Course 09 - Application Security
Course 10 - Operations Security

Certified Healthcare Information Systems Security Practitioner (CHISSP) Series
Course 01 - The Healthcare Industry
Course 02 - The Healthcare Regulatory Environment
Course 03 - Privacy and Security in Healthcare
Course 04 - Information Governance and Risk Management
Course 05 - Information Risk Assessment
Course 06 - Third-Party Risk Management

Certified Disaster Recovery Engineer (CDRE) Series
Course 01 - Welcome to Disaster Recovery Training
Course 02 - Business Impact Analysis
Course 03 - Risk Analysis
Course 04 - BDP Strategies
Course 05 - IT Recovery Strategies
Course 06 - Implementation Phase
Course 07 - Testing and Exercise
Course 08 - Maintenance and Updating
Course 09 - Execution Phase

Certified Digital Forensics Examiner (CDFE) Series
Course 01 - Introduction
Course 02 - Computer Forensic Incidents
Course 03 - Investigation Process
Course 04 - Disk Storage Concepts
Course 05 - Digital Acquisition & Analysis
Course 06 - Forensic Examination Protocols
Course 07 - Digital Evidence Protocols
Course 08 - CFI Theory
Course 09 - Digital Evidence Presentation
Course 10 - Computer Forensic Laboratory Protocols
Course 11 - Computer Forensic Processing
Course 12 - Digital Forensics Reporting
Course 13 - Specialized Artifact Recovery
Course 14 - e-Discovery and ESI
Course 15 - Cell Phone Forensics
Course 16 - USB Forensics
Course 17 - Incident Handling
Course 18 - PDA Forensics
Course 19 - Investigating Harassment

Certified Incident Handling Engineer (CIHE) Series
Course 01 - Course Introduction
Course 02 - Threats, Vulnerabilities and Exploits
Course 03 - IH Preparation
Course 04 - Request Tracker for Incident Handling
Course 05 - Preliminary Response
Course 06 - Identification and Initial Response
Course 07 - Sysinternals
Course 08 - Containment
Course 09 - Eradication
Course 10 - Follow-up
Course 11 - Recovery
Course 12 - Virtualization Security
Course 13 - Malware Incident Handling

Ethical Hacker Series
*This entire course series is to be taken with CPEH for full certification exam prep
Course 01 - Overview
Course 02 - Reconnaissance
Course 03 - Protocols
Course 04 - Windows Hacking
Course 05 - Attacking Web Technologies
Course 06 - Pen Testing Wireless Networks

Certified Professional Ethical Hacker (CPEH) Series
*This entire course series is to be taken with Ethical Hacker for full certification exam prep
Course 01 - Security Fundamentals
Course 02 - Access Controls
Course 03 - Protocols
Course 04 - Cryptography
Course 05 - Why Vulnerability Assessments?
Course 06 - Vulnerability Tools of the Trade
Course 07 - Output Analysis and Reports
Course 08 - Reconnaisance, Enumeration and Scanning
Course 09 - Gaining Access
Course 10 - Maintaining Access
Course 11 - Covering Tracks
Course 12 - Malware
Course 13 - Buffer Overflows
Course 14 - Password Cracking

 


Certified Penetration Testing Consultant (CPTC) Series
Course 01 - Packet Capturing
Course 02 - Layer 2 Attacks
Course 03 - Layer 3 Attacks on Cisco Based Infrastructures
Course 04 - Pivoting and Relays
Course 05 - IPv6 Attacks
Course 06 - VPN Attacks
Course 07 - Defeating SSL
Course 08 - IDS/IPS Evasion

Certified Penetration Testing Engineer (CPTE) Series
Course 01 - Logistics of Pen Testing
Course 02 - Linux Fundamentals
Course 03 - Information Gathering
Course 04 - Detecting Live Systems
Course 05 - Enumeration
Course 06 - Vulnerability Assessments
Course 07 - Malware Goes Undercover
Course 08 - Windows Hacking
Course 09 - Hacking UNIX/Linux
Course 10 - Advanced Exploitation Techniques
Course 11 - Pen Testing Wireless Networks
Course 12 - Networks, Sniffing and IDS
Course 13 - Injecting the Database
Course 14 - Attacking Web Technologies
Course 15 - Project Documentation

Certified Secure Web Application Engineer (CSWAE) Series
Course 01 - Web Application Security
Course 02 - Secure SDLC
Course 03 - OWASP TOP 10
Course 04 - Risk Management
Course 05 - Threat Modeling
Course 06 - Authentication and Authorization Attacks
Course 07 - Session Management
Course 08 - Security Architecture
Course 09 - Input Validation and Data Sanitization
Course 10 - AJAX Security
Course 11 - Insecurity Code Discovery and Mitigation
Course 12 - Application Mapping
Course 13 - Cryptography
Course 14 - Testing Methodologies

Certified Security Leadership Officer (CSLO) Series
Course 01 - Security Management
Course 02 - Risk Management
Course 03 - Encryption
Course 04 - Information Security - Access Control Concepts
Course 05 - Incident Handling and Evidence
Course 06 - Operations Security
Course 07 - Knowing Network Security

Certified Security Sentinel (CSS) Series
Course 01 - Basic Security
Course 02 - User Awareness
Course 03 - Implementing Countermeasures
Course 04 - Certified Security Sentinel
Course 05 - Using the Internet at Work
Course 06 - Accessing the Company's Network Through Your Assigned Computer
Course 07 - Accessing the Corporate Network Remotely
Course 08 - Social Engineering
Course 09 - Understanding and Manipulating our Target
Course 10 - Researching Our Target

Certified Vulnerability Assessor (CVA) Series
Course 01 - Why Vulnerability Assessment
Course 02 - Vulnerability Types
Course 03 - Assessing the Network
Course 04 - Assessing Web Servers & Applications
Course 05 - Assessing Remote & VPN Services
Course 06 - Vulnerability Assessment Tools of the Trade
Course 07 - Output Analysis

IS20 Controls Series
Course 01 - Inventory of Authorized and Unauthorized Devices
Course 02 - Inventory of Authorized and Unauthorized Software
Course 03 - Secure Configurations for Hardware and Software on Laptops, Workstations and Servers
Course 04 - Secure Configurations for Hardware Network Devices such as Firewalls, Routers and Switches
Course 05 - Boundary Defense
Course 06 - Maintenance, Monitoring, and Analysis of Audit Logs
Course 07 - Application Software Security
Course 08 - Controlled Use of Administrative Privileges
Course 09 - Controlled Access Based on Need to Know
Course 10 - Continuous Vulnerability Assessment and Remediation
Course 11 - Account Monitoring and Control
Course 12 - Malware Defenses
Course 13 - Limitation and Control of Network Ports, Protocols and Services
Course 14 - Wireless Device Control
Course 15 - Data Loss Prevention
Course 16 - Secure Network Engineering
Course 17 - Penetration Tests and Red Team Exercises
Course 18 - Incident Response Capability
Course 19 - Data Recovery Capability
Course 20 - Security Skills Assessment and Appropriate Training to Fill Gaps

ISCAP Series
Course 01 - Introduction to the Risk Management Framework
Course 02 - The Software Development Life Cycle
Course 03 - Categorize Information System
Course 04 - Select Security Controls
Course 05 - Implement Security Controls
Course 06 - Assess Security Controls
Course 07 - Authorize Information System
Course 08 - Monitor Security Controls

Forensic Investigator (Coming Soon)
Course 01 - Computer Forensic Basics
Course 02 - The Investigation Process
Course 03 - Hard Disks and File Systems
Course 04 - Data and Anti-Forensics
Course 05 - Operating System Forensics
Course 06 - Malware Forensics
Course 07 - Database Forensics
Course 08 - Network and Email Forensics

Forensics Investigator Advanced (Coming Soon)
Coming Soon

Security Analyst (Coming Soon)
Course 01 - Security Analyst Overview
Course 02 - Penetration Testing Overview

OWASP (Coming Soon)

Course 01 - Avoiding Hacker Tricks
Course 02 - Forgery and Phishing
Course 03 - Threats and Session Security
Course 04 - Misconfiguration and Data Encryption
OWASP Proactive Controls (Coming Soon)

Course 01 - Controls 1 through 5
Course 02 - Controls 6 through 10

CompTIA Security+ (Exam SYO-501) Certification Series
Course 01 - Identifying Security Fundamentals
Course 02 - Analyzing Risk
Course 03 - Identifying Security Threats
Course 04 - Conducting Security Assessments
Course 05 - Implementing Host and Software Security
Course 06 - Implementing Network Security
Course 07 - Managing Identity and Access
Course 08 - Implementing Cryptography
Course 09 - Implementing Operational Security
Course 10 - Addressing Security Issues
Course 11 - Ensuring Business Continuity

CompTIA Security+ Certification Series
Course 01 - Security Fundamentals
Course 02 - Identifying Security Threats and Vulnerabilities
Course 03 - Managing Data, Application, and Host Security
Course 04 - Implementing Network Security
Course 05 - Implementing Access Control, Authentication, and Account Management
Course 06 - Managing Certificates
Course 07 - Implementing Compliance and Operational Security
Course 08 - Risk Management
Course 09 - Troubleshooting and Managing Security Incidents
Course 10 - Business Continuity and Disaster Recovery Planning

CompTIA Advanced Security Practitioner (CASP) Series
Course 01 - The Enterprise Security Architecture
Course 02 - The Enterprise Security Technology
Course 03 - Enterprise Resource Technology
Course 04 - Security Design and Solutions
Course 05 - Managing Risk in Projects
Course 06 - Integrating Advanced Authentication and Authorization Techniques
Course 07 - Implementing Cryptographic Techniques
Course 08 - Integrating Hosts, Storage, Networks, and Applications in a Secure Enterprise Architecture
Course 09 - Security Research and Analysis
Course 10 - Disaster Recovery and Business Continuity
Course 11 - Responding to and Recovering from Incidents
Course 12 - Legal Issues
Course 13 - Judgment and Decision-Making

Digital Security Awareness Training for Business and Home Users Series
Course 00 - Course Overview
Course 01 - Types of Security Threats
Course 02 - Social Engineering
Course 03 - Identity Theft
Course 04 - Data Classification
Course 05 - Protecting Your Digital Information
Course 06 - Malware
Course 07 - Security from End-to-End
Course 08 - Piracy
Course 09 - Security Policies
Course 10 - Moving Forward

NH Anytime eLearning Catalog: Cybersecurity

$500

Need Help Picking the Right Course? Give us a call! (888) 825-6684