starweaver-logo
LOG INGET STARTED
LOG INGET STARTED
  • Browse
  • Doing

  • On Air
  • Channels
  • Career Paths
  • LEARNING

  • Courses
  • Certifications
  • Curriculum
  • Test Prep
  • CONNECTING

  • How It Works
  • Community
  • Techbytes
  • Podcasts
  • Leaderboards
  • SUPPORT

  • Support & FAQs
  • Starweaver for Business
  • Starweaver for Campus
  • Teach with Starweaver
footer-brand-logo
  • COMPANY
  • About Us
  • Support and Knowledge Base
  • Policies & Terms
  • Contact
  • CONTENT
  • Courses
  • Certifications
  • Journeys
  • Test Prep
  • Meet the Gurus
  • Techbytes
  • FOR ORGANIZATIONS
  • Starweaver for Business
  • Starweaver for Campus
  • Catalogue
  • Pricing
  • Private Classes
  • PARTNER WITH US
  • Instructors & Teachers
  • Books, Writing & Publishing
  • FOLLOW US
    • facebook
    • twitter
    • linkedin
    • pinterest
    • instagram
    • youtube
Our trademarks include Starweaver®, Make genius happen™, Education you can bank on®, People are your most important assets!®, Body of Knowledge™, StarLabs™, LiveLabs™, Journeys™
© Starweaver Group, Inc. All Rights Reserved.
    ×
      Incident Response FrameworksIncident Response Frameworks
      Brett MoffettBrett Moffett
      Cybersecurity | intermediate | 9 hrsLearn to plan, implement, and manage cybersecurity incident response using NIST, SANS, and ISO frameworks. Build a customized, testable response plan to detect, contain, and rec...COURSE DETAILS
      Basics of Cyber Threat IntelligenceBasics of Cyber Threat Intelligence
      Tom ThemelesTom Themeles
      Cybersecurity | intermediate | 9 hrsLearn the fundamentals of Cyber Threat Intelligence (CTI), including its lifecycle, key tools, and practical applications for proactive defense against evolving cyber threats. I...COURSE DETAILS
      Cyber Espionage and CounterintelligenceCyber Espionage and Counterintelligence
      Hanniel JafaruHanniel Jafaru
      Cybersecurity | intermediate | 9 hrsLearn how cyber espionage operations work and how to counter them. Analyze APT tactics, detect data exfiltration, design counter-intelligence strategies, and deploy deception to...COURSE DETAILS
      Application Security Testing and DebuggingApplication Security Testing and Debugging
      Sonali Sen BaidyaSonali Sen Baidya
      Cybersecurity | intermediate | 9 hrsApplication Security Testing and Debugging involves finding software vulnerabilities through testing and fixing issues to ensure secure, functional code, protecting against pote...COURSE DETAILS
      Strategic Cyber Effects ManagementStrategic Cyber Effects Management
      Mark PetersMark Peters
      Cybersecurity | intermediate | 9 hrsThis course teaches cybersecurity professionals to move from reactive tasks to strategic operations, aligning cyber actions with organizational goals, measuring impact, and appl...COURSE DETAILS
      Cybersecurity Governance: Integrate NIST and ISO Standards in 16 StepsCybersecurity Governance: Integrate NIST and ISO Standards in 16 Steps
      Pawel MielniczekPawel Mielniczek
      Cybersecurity | intermediate | 9 hrs1k98.8%0Master a 16-step blueprint to integrate ISO 27001/27002/27701 with the NIST Cybersecurity Framework. Build an audit-ready, risk-driven governance program with cloud, privacy, an...COURSE DETAILS
      Advanced Strategic Threat Intelligence Research & ReportingAdvanced Strategic Threat Intelligence Research & Reporting
      Monica McIntireMonica McIntire
      Cybersecurity | intermediate | 9 hrs0Gain advanced threat intelligence skills, collect, analyze, and report cyber threats using tools like Shodan, VirusTotal, and Maltego. Turn data into actionable insights to defe...COURSE DETAILS
      Offensive Cyber OperationsOffensive Cyber Operations
      Gleb MarchenkoGleb Marchenko
      Cybersecurity | intermediate | 8 hrs 20 mins1K96.9%129In this course, you’ll learn to think like an adversary to enhance your cybersecurity skills by exploring attacker methods, attack surfaces, and exploitation techniques while ma...COURSE DETAILS
      Leadership in Cybersecurity OversightLeadership in Cybersecurity Oversight
      Mark PetersMark Peters
      Cybersecurity | advanced | 9 hrs 10 mins1K97.8%131In this course, you’ll learn to lead cybersecurity with clarity and strategy—building actionable plans, communicating effectively with stakeholders, and fostering a security-fir...COURSE DETAILS
      Cyber Risk Management StrategiesCyber Risk Management Strategies
      Ahmed HassanAhmed Hassan
      Cybersecurity | advanced | 8 hrs 50 mins1K97.8%129In this course, you’ll learn how to master advanced cyber risk management by applying structured threat modeling frameworks, quantifying business impacts, and designing strategi...COURSE DETAILS
      Foundations of Cybersecurity OperationsFoundations of Cybersecurity Operations
      Gleb MarchenkoGleb Marchenko
      Cybersecurity | core | 8 hrs 10 mins1K98.2%129In this course, you’ll learn how to strengthen cybersecurity operations by mastering core principles, modern threat management, and security response practices.COURSE DETAILS
      AI Agents for CybersecurityAI Agents for Cybersecurity
      Gleb MarchenkoGleb Marchenko
      Cybersecurity | intermediate | 8 hrs 30 mins1k97.5%130In this concluding module, you’ll apply your knowledge by wrapping up key concepts from the course and completing a comprehensive course-end project. COURSE DETAILS
      Previous123...44Next