starweaver-logo
LOG INGET STARTED
LOG INGET STARTED
  • Browse
  • Doing

  • On Air
  • Channels
  • Career Paths
  • LEARNING

  • Courses
  • Certifications
  • Curriculum
  • Test Prep
  • CONNECTING

  • How It Works
  • Community
  • Techbytes
  • Podcasts
  • Leaderboards
  • SUPPORT

  • Support & FAQs
  • Starweaver for Business
  • Starweaver for Campus
  • Teach with Starweaver
footer-brand-logo
  • COMPANY
  • About Us
  • Support and Knowledge Base
  • Policies & Terms
  • Contact
  • CONTENT
  • Courses
  • Certifications
  • Journeys
  • Test Prep
  • Meet the Gurus
  • Techbytes
  • FOR ORGANIZATIONS
  • Starweaver for Business
  • Starweaver for Campus
  • Catalogue
  • Pricing
  • Private Classes
  • PARTNER WITH US
  • Instructors & Teachers
  • Books, Writing & Publishing
  • FOLLOW US
    • facebook
    • twitter
    • linkedin
    • pinterest
    • instagram
    • youtube
Our trademarks include Starweaver®, Make genius happen™, Education you can bank on®, People are your most important assets!®, Body of Knowledge™, StarLabs™, LiveLabs™, Journeys™
© Starweaver Group, Inc. All Rights Reserved.
    ×
      Cybersecurity Governance: Integrate NIST and ISO Standards in 16 StepsCybersecurity Governance: Integrate NIST and ISO Standards in 16 Steps
      Pawel MielniczekPawel Mielniczek
      Cybersecurity | intermediate | 9 hrs1k98.8%0Master a 16-step blueprint to integrate ISO 27001/27002/27701 with the NIST Cybersecurity Framework. Build an audit-ready, risk-driven governance program with cloud, privacy, an...COURSE DETAILS
      Advanced Strategic Threat Intelligence Research & ReportingAdvanced Strategic Threat Intelligence Research & Reporting
      Monica McIntireMonica McIntire
      Cybersecurity | intermediate | 9 hrs0Gain advanced threat intelligence skills, collect, analyze, and report cyber threats using tools like Shodan, VirusTotal, and Maltego. Turn data into actionable insights to defe...COURSE DETAILS
      Offensive Cyber OperationsOffensive Cyber Operations
      Gleb MarchenkoGleb Marchenko
      Cybersecurity | intermediate | 8 hrs 20 mins1K96.9%129In this course, you’ll learn to think like an adversary to enhance your cybersecurity skills by exploring attacker methods, attack surfaces, and exploitation techniques while ma...COURSE DETAILS
      Leadership in Cybersecurity OversightLeadership in Cybersecurity Oversight
      Mark PetersMark Peters
      Cybersecurity | advanced | 9 hrs 10 mins1K97.8%131In this course, you’ll learn to lead cybersecurity with clarity and strategy—building actionable plans, communicating effectively with stakeholders, and fostering a security-fir...COURSE DETAILS
      Cyber Risk Management StrategiesCyber Risk Management Strategies
      Ahmed HassanAhmed Hassan
      Cybersecurity | advanced | 8 hrs 50 mins1K97.8%129In this course, you’ll learn how to master advanced cyber risk management by applying structured threat modeling frameworks, quantifying business impacts, and designing strategi...COURSE DETAILS
      Foundations of Cybersecurity OperationsFoundations of Cybersecurity Operations
      Gleb MarchenkoGleb Marchenko
      Cybersecurity | core | 8 hrs 10 mins1K98.2%129In this course, you’ll learn how to strengthen cybersecurity operations by mastering core principles, modern threat management, and security response practices.COURSE DETAILS
      AI Agents for CybersecurityAI Agents for Cybersecurity
      Gleb MarchenkoGleb Marchenko
      Cybersecurity | intermediate | 8 hrs 30 mins1k97.5%130In this concluding module, you’ll apply your knowledge by wrapping up key concepts from the course and completing a comprehensive course-end project. COURSE DETAILS
      Advanced Practices in Application SecurityAdvanced Practices in Application Security
      Derek FisherDerek Fisher
      Cybersecurity | intermediate | 8 hrs 45 mins1K97.8%127In this course, you’ll learn how to implement advanced application security practices by embedding security throughout the software development lifecycle (SDLC). COURSE DETAILS
      Network Defense StrategiesNetwork Defense Strategies
      Ahmed  ElhenedyAhmed Elhenedy
      Networking | intermediate | 8 hrs 15 mins1K97.8%129In this course, you’ll learn how to design, implement, and manage secure network infrastructures that can withstand evolving cyber threats. COURSE DETAILS
      AI in Clinical Decision Support & DiagnosticsAI in Clinical Decision Support & Diagnostics
      Aparajita SudarshanAparajita Sudarshan
      Business | advanced | 9 hrsThis course equips healthcare professionals with the knowledge and practical skills to integrate AI-driven clinical decision support systems into patient care.COURSE DETAILS
      Legal and Ethical Cyber InvestigationsLegal and Ethical Cyber Investigations
      Ashish MohanAshish Mohan
      Cybersecurity | intermediate | 8 hrs 10 mins1K96.2%128In this course, you’ll learn how to conduct professional cyber investigations by mastering digital evidence collection, forensic analysis, and legal presentation. COURSE DETAILS
      AI-Driven Sales Forecasting and Market AnalysisAI-Driven Sales Forecasting and Market Analysis
      Christopher KlausChristopher Klaus
      Business | intermediate | 6 hrs1k98.6%127Master Generative AI to transform sales forecasting and marketing analysis. Learn to predict trends, optimize campaigns, segment customers, and make data-driven decisions using ...COURSE DETAILS
      Previous123...43Next