Library
Filter by content type
Filter by partner
102 results found
Security Operations
This learning series provides knowledge pertaining to understanding Threat Detection and Incident Response fundamentals to enhance threat detection, response, and mitigation across diverse cyber security environments. In addition, you will learn the basics about network security and how next-generation firewalls (NGFW) fits in and establish a baseline knowledge to help aid you through the Next-Generation Firewall learning paths.
Learning Series
LLM Security
In this learning path, you will gain a fundamental understanding of Large Language Model (LLM) security. Through a series of articles and videos you will explore topics like what is an LLM, data security risks, the OWASP Top 10 for LLMs, strategies for defending LLM systems, and the critical role users play in maintaining security.
Learning Path
AI Security
In this learning path you will gain a fundamental understanding of AI security by exploring topics such as the AI development lifecycle, data flow during this lifecycle, as well as attack surfaces present in the AI development lifecycle. You will also learn about topics such as the attacks that AI models face and the risks of user data and privacy when it comes to AI.
Learning Path
Wiz Cloud Security
Learn the fundamentals of Wiz's Cloud Security Platform, including their Security Graph and Integrations. Dive into Investigations using Wiz's tools to learn more about security threats, following possible attack chains and learn to secure the cloud before attacks take place.
Learning Path
Palo Alto Networks Next-Generation Firewall (NGFW)
Learn the basics about network security and how next-generation firewalls (NGFW) fits in and establish a baseline knowledge to help aid you through the Next-Generation Firewall learning paths. Throughout this learning path you will learn network security, tools and techniques used to help secure your network, and how the NGFW fits into your security requirements. You will have the opportunity to explore these concepts that will help you walk the NGFW learning path with ease and comfort to aid you on your successful journey of learning NGFW! Now let's get started!
Learning Path
Threat Detection and Incident Response Essentials
As cyber threats grow increasingly sophisticated, the need for skilled SOC Analysts has never been greater. This learning path follows Samantha, a SOC operator, as she embarks on a journey to acquire the skills and analytical mindset of a SOC analyst. Each module immerses learners in real-world SOC scenarios, blending theory with hands-on practice, to prepare them for today's dynamic cybersecurity landscape.
Learning Path
Cyber Range Red Team Tools
In this learning series, you will familiarize yourself with the basics of some of the key tools you may need during a Cyber Range red team event. A red team in cybersecurity is responsible for finding weaknesses and vulnerabilities inside a system and exploiting them for educational purposes. This learning series will teach you the fundamentals of network reconnaissance, password cracking, and exploitation tools.
Learning Series
Armis OT Security
Learn the basics of OT security, and how Armis aims to protect and manage OT devices across a network through complete asset visibility and control. Throughout this learning path, you will learn the basics of the Armis architecture, as well as explore the ways that Armis is able to provide complete asset visibility, track asset activity, and report on asset health. You will also explore some of the key security capabilities that the Armis platform provides by leveraging the Armis Knowledge Base and the Armis Vulnerability Management (AVM).
Learning Path
🎤 MicDrop - Rubrik CTF
The MicDrop Capture the Flag (CTF) event will highlight Rubrik Security Cloud's (RSC) key features, helping customers understand how RSC provides cyber resiliency for their organizations.
Features highlighted include:
Data Protection – Learn how to back up and recover files, databases, and virtual machines to ensure data availability and ransomware resilience.
Data Threat Analytics – Use IOCs, including file patterns, YARA rules, and hashes, to identify and analyze potential threats.
Cyber Recovery – Explore automated and network-isolated recovery methods to restore operations securely and perform forensic analysis.
Data Security Posture – Identify and monitor sensitive data exposure to improve security and compliance.
This hands-on experience will provide insight into how these tools work together to protect, detect, and recover from cyber threats by demonstrating their value in an engaging CTF format using a real-world ransomware scenario.
Cyber Range
•
Mar 20, 2025 • 8am
🎤 MicDrop - Rubrik CTF
The MicDrop Capture the Flag (CTF) event will highlight Rubrik Security Cloud's (RSC) key features, helping customers understand how RSC provides cyber resiliency for their organizations.
Features highlighted include:
Data Protection – Learn how to back up and recover files, databases, and virtual machines to ensure data availability and ransomware resilience.
Data Threat Analytics – Use IOCs, including file patterns, YARA rules, and hashes, to identify and analyze potential threats.
Cyber Recovery – Explore automated and network-isolated recovery methods to restore operations securely and perform forensic analysis.
Data Security Posture – Identify and monitor sensitive data exposure to improve security and compliance.
This hands-on experience will provide insight into how these tools work together to protect, detect, and recover from cyber threats by demonstrating their value in an engaging CTF format using a real-world ransomware scenario.
Cyber Range
•
Apr 3, 2025 • 8am
Akamai Guardicore Centra Foundations Lab
The Akamai Guardicore Centra Foundations Lab aims to give people a hands-on experience with the central segmentation solution through a variety of use cases.
Foundations Lab
•
132 launches
Palo Alto NGFW Foundations Version 10 Lab
The Palo Alto NGFW Foundations Lab is a capability of the Advanced Technology Center (ATC) designed to provide an environment to gain hands-on experience with the fundamental features of Palo Alto's solution. The environment that supports the lab is completely virtual, removing any hardware dependencies associated with physical infrastructure.
Foundations Lab
•
1774 launches
…