All current Information Security (InfoSec) Courses courses in 2024
205 Courses
AI for SOC Teams: What's Real and What's Next
Explore how AI transforms security operations through demos and case studies, learning to migrate SIEMs, onboard data sources, and triage alerts with advanced AI features.
AI and Cybersecurity: Shaping the Future of the Digital Economy
Explore AI's dual role in cybersecurity through expert insights and case studies, gaining actionable strategies to optimize operations and strengthen security in the digital economy.
Microsoft Security Copilot Conditional Access Optimization Agent
Discover how Microsoft Security Copilot's Conditional Access Agent autonomously scans policies, recommends changes, and reduces risk windows from months to minutes, all while maintaining human oversight and continuous learning.
Actionable Insights from 2025 Verizon Data Breach Investigations Report
Explore key findings from Verizon's 2025 DBIR, including cybercrime trends across organizations, the impact of GenAI, and supply chain security considerations.
Revisiting Layered Security: A Robust Approach to Blocking Network Threats
Explore a multi-layered security strategy that blocks threats before reaching critical network layers using real-time detection with ML and AI, improving network efficiency and resilience.
Securing the Food Supply: A Cyber Threat Briefing on the Food and Ag Sector
Explore cybersecurity threats in the food and agriculture sector, including active threat groups, industry dangers, and emerging trends in this critical infrastructure.
Accelerate AI Adoption with Stronger Security
Discover key AI adoption trends, emerging risks, and actionable steps to secure and govern AI systems, enabling confident innovation while addressing security challenges.
Threats That Keep Defenders Up at Night - Typhoons, Bears, and Ransomware Gangs
Explore the latest activities of notorious cyberthreat groups, from Chinese telco hacking to Russian operations, and learn how these adversaries innovate and what defenders should watch for.
Taking the Fight Upstream: Pursuing Systemic Defense Against Phishing
Explore systemic defense strategies against phishing attacks, including AI-enhanced threats, and discover upstream protection methods that can create ecosystem-wide impact.
Silent Patching: Harnessing LLMs to Detect Hidden Vulnerabilities
Discover how to leverage AI for detecting silently patched security vulnerabilities in software supply chains by analyzing public changelog data.