starweaver-logo
LOG INGET STARTED
LOG INGET STARTED
  • Browse
  • Doing

  • On Air
  • Channels
  • Career Paths
  • LEARNING

  • Courses
  • Certifications
  • Journeys
  • Test Prep
  • CONNECTING

  • How It Works
  • Community
  • Techbytes
  • Podcasts
  • Leaderboards
  • SUPPORT

  • Support & FAQs
  • Starweaver for Business
  • Starweaver for Campus
  • Teach with Starweaver
footer-brand-logo
  • COMPANY
  • About Us
  • Support and Knowledge Base
  • Policies & Terms
  • Contact
  • CONTENT
  • Courses
  • Certifications
  • Journeys
  • Test Prep
  • Meet the Gurus
  • Techbytes
  • FOR ORGANIZATIONS
  • Starweaver for Business
  • Starweaver for Campus
  • Catalogue
  • Pricing
  • Private Classes
  • PARTNER WITH US
  • Instructors & Teachers
  • Books, Writing & Publishing
  • FOLLOW US
    • facebook
    • twitter
    • linkedin
    • pinterest
    • instagram
    • youtube
Our trademarks include Starweaver®, Make genius happen™, Education you can bank on®, People are your most important assets!®, Body of Knowledge™, StarLabs™, LiveLabs™, Journeys™
© Starweaver Group, Inc. All Rights Reserved.
    ×
      Strategic Cyber Effects ManagementStrategic Cyber Effects Management
      Mark PetersMark Peters
      Cybersecurity | intermediate | 9 hrsThis course teaches cybersecurity professionals to move from reactive tasks to strategic operations, aligning cyber actions with organizational goals, measuring impact, and appl...COURSE DETAILS
      Cybersecurity Governance: Integrate NIST and ISO Standards in 16 StepsCybersecurity Governance: Integrate NIST and ISO Standards in 16 Steps
      Pawel MielniczekPawel Mielniczek
      Cybersecurity | intermediate | 9 hrs0Master a 16-step blueprint to integrate ISO 27001/27002/27701 with the NIST Cybersecurity Framework. Build an audit-ready, risk-driven governance program with cloud, privacy, an...COURSE DETAILS
      Advanced Strategic Threat Intelligence Research & ReportingAdvanced Strategic Threat Intelligence Research & Reporting
      Monica McIntireMonica McIntire
      Cybersecurity | intermediate | 9 hrs0Gain advanced threat intelligence skills, collect, analyze, and report cyber threats using tools like Shodan, VirusTotal, and Maltego. Turn data into actionable insights to defe...COURSE DETAILS
      Offensive Cyber OperationsOffensive Cyber Operations
      Gleb MarchenkoGleb Marchenko
      Cybersecurity | intermediate | 8 hrs 20 mins1K96.9%129In this course, you’ll learn to think like an adversary to enhance your cybersecurity skills by exploring attacker methods, attack surfaces, and exploitation techniques while ma...COURSE DETAILS
      Leadership in Cybersecurity OversightLeadership in Cybersecurity Oversight
      Mark PetersMark Peters
      Cybersecurity | advanced | 9 hrs 10 mins1K97.8%130In this course, you’ll learn to lead cybersecurity with clarity and strategy—building actionable plans, communicating effectively with stakeholders, and fostering a security-fir...COURSE DETAILS
      Cyber Risk Management StrategiesCyber Risk Management Strategies
      Ahmed HassanAhmed Hassan
      Cybersecurity | advanced | 8 hrs 50 mins1K97.8%129In this course, you’ll learn how to master advanced cyber risk management by applying structured threat modeling frameworks, quantifying business impacts, and designing strategi...COURSE DETAILS
      Foundations of Cybersecurity OperationsFoundations of Cybersecurity Operations
      Gleb MarchenkoGleb Marchenko
      Cybersecurity | core | 8 hrs 10 mins1K98.2%129In this course, you’ll learn how to strengthen cybersecurity operations by mastering core principles, modern threat management, and security response practices.COURSE DETAILS
      AI Agents for CybersecurityAI Agents for Cybersecurity
      Gleb MarchenkoGleb Marchenko
      Cybersecurity | intermediate | 8 hrs 30 mins1k97.5%130In this concluding module, you’ll apply your knowledge by wrapping up key concepts from the course and completing a comprehensive course-end project. COURSE DETAILS
      Advanced Practices in Application SecurityAdvanced Practices in Application Security
      Derek FisherDerek Fisher
      Cybersecurity | intermediate | 8 hrs 45 mins1K97.8%127In this course, you’ll learn how to implement advanced application security practices by embedding security throughout the software development lifecycle (SDLC). COURSE DETAILS
      Network Defense StrategiesNetwork Defense Strategies
      Ahmed  ElhenedyAhmed Elhenedy
      Networking | intermediate | 8 hrs 15 mins1K97.8%129In this course, you’ll learn how to design, implement, and manage secure network infrastructures that can withstand evolving cyber threats. COURSE DETAILS
      Healthcare Data Security & Risk ManagementHealthcare Data Security & Risk Management
      Business | intermediate | 9 hrsIn today’s digital healthcare ecosystem, patient data represents both an invaluable asset for advancing care and a prime target for malicious actors. COURSE DETAILS
      AI in Clinical Decision Support & DiagnosticsAI in Clinical Decision Support & Diagnostics
      Aparajita SudarshanAparajita Sudarshan
      Business | intermediate | 9 hrsThis course equips healthcare professionals with the knowledge and practical skills to integrate AI-driven clinical decision support systems into patient care.COURSE DETAILS
      Previous123...43Next