| Microsoft Clip Training | Microsoft Cybersecurity, Digital Learning, Microsoft, Microsoft Cybersecurity |
| AWS Skill Builder | Amazon Web Services (AWS) AWS Cybersecurity, AWS Digital, Amazon Web Services (AWS), Cybersecurity, Digital Learning |
1000EYES | Design, Configure & Manage Networks Using Thousand Eyes (1000EYES) | Cisco Cybersecurity Cisco, Cisco Cybersecurity, Cybersecurity |
ADMUMB | Administering and Positioning Cisco Umbrella Operations (ADMUMB) | Cisco Cybersecurity Cisco, Cisco Cybersecurity, Cybersecurity |
APT Program | Advanced Penetration Testing Program | Cybersecurity Cybersecurity |
ASAE 3.0 | ASA Essentials 3.0 (ASAE) | Cisco Cybersecurity Cisco, Cisco Cybersecurity, Cybersecurity |
AWS-JAM-SEC | Security Engineering on AWS Jam | AWS Jam Days AWS Cybersecurity, AWS Jam Days, Amazon Web Services (AWS), Cybersecurity |
AWS-SEC-ENG | Security Engineering on AWS (AWS-SEC-ENG) | AWS Operations and Security AWS Cybersecurity, AWS Operations and Security, Amazon Web Services (AWS), Cybersecurity |
AWS-SEC-ESS | AWS Security Essentials (AWS-SEC-ESS) | AWS Essentials AWS Cybersecurity, AWS Essentials, Amazon Web Services (AWS), Army Cool Eligible, Cybersecurity, Promo Eligible |
AWS-SEC-GOV | AWS Security Governance at Scale (AWS-SEC-GOV) | AWS Operations and Security AWS Cybersecurity, AWS Operations and Security, Amazon Web Services (AWS), Cybersecurity |
AZ-500T00 | Microsoft Azure Security Technologies (AZ-500T00) | Microsoft Azure Army Cool Eligible, Cybersecurity, Microsoft, Microsoft Azure, Microsoft Cybersecurity, Microsoft Security |
BIG-IP AFM v14 | F5 Networks Configuring BIG-IP AFM: Advanced Firewall Manager | F5 Cybersecurity, F5, F5 Cybersecurity |
BIG-IP LTM v14 | F5 BIG-IP LTM - F5 Networks Configuring BIG-IP® LTM: Local Traffic Manager | F5 Cybersecurity, F5, F5 Cybersecurity |
BIG-IP WAF v14 | F5 Networks Configuring BIG-IP Advanced WAF: Web Application Firewall | F5 Cybersecurity, F5, F5 Cybersecurity |
BIG-IP v14 | F5 BIG-IP - F5 Networks Administering BIG-IP | F5 Cybersecurity, F5, F5 Cybersecurity |
C-SCRM | Fundamentals of Cybersecurity Supply Chain Risk Management (C-SCRM) | Cybersecurity Cybersecurity |
CASP+ | CompTIA Advanced Security Practitioner (CASP+) | CompTIA Cybersecurity CompTIA, CompTIA Cybersecurity, Cybersecurity |
CBROPS | Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS) | Cisco Cybersecurity Cisco, Cisco Cybersecurity, Cisco Promo Eligible, Cybersecurity, Promo Eligible |
CCNA | Implementing and Administering Cisco Solutions (CCNA) | Cisco Routing and Switching Courses Cisco, Army Cool Eligible, Cisco Cybersecurity, Cisco Promo Eligible, Cisco Routing and Switching Courses, Cybersecurity, Promo Eligible |
CCP 2.0 | CMMC Certified CMMC Professional (CCP) 2.0 | Cybersecurity Cybersecurity |
CEH | Certified Ethical Hacker (CEH) | Cybersecurity Cybersecurity, EC-Council Cybersecurity |
CFR | CyberSec First Responder (CFR) | Cybersecurity Cybersecurity, EC-Council Cybersecurity |
CHFI | Computer Hacking Forensic Investigator (CHFI) | Cybersecurity Cybersecurity |
CISA | ISACA Certified Information Systems Auditor (CISA) | Cybersecurity Cybersecurity |
CISM | Certified Information Security Manager (CISM) | Cybersecurity Cybersecurity |
CISM Prep | Certified Information Security Manager Prep Course (CISM) | Cybersecurity Cybersecurity |
CISSP | Certified Information Systems Security Professional (CISSP) | Cybersecurity Cybersecurity |
CKS | Kubernetes Security Specialist (CKS) | Kubernetes Cybersecurity, DevOps, Kubernetes |
CND | Certified Network Defender (CND) | Cybersecurity Cybersecurity |
CSFAF | Cisco Secure Firewall Advanced Features, Operations & Management (CSFAF) | Cisco Cybersecurity Cisco, Cisco Cybersecurity, Cybersecurity, Sunset Learning Exclusives |
CWSP | Certified Wireless Security Professional (CWSP) | Certified Wireless Network Professional (CWNP) CWNP Cybersecurity, Certified Wireless Network Professional (CWNP), Cybersecurity |
CompTIA Sec | CompTIA Security+ | CompTIA Army Cool Eligible, CompTIA, CompTIA Cybersecurity, Cybersecurity, Promo Eligible |
CySA+ | CompTIA Cybersecurity Analyst (CySA+) | CompTIA Cybersecurity CompTIA, CompTIA Cybersecurity, Cybersecurity |
Duo | Deploy, Configure & Manage Cisco Duo (Duo) | Cisco Cybersecurity Cisco, Cisco Cybersecurity, Cybersecurity |
ENTEIT | Implementing and Troubleshooting Networks Using Cisco ThousandEyes 1.0 - (ENTEIT) | Cisco Cybersecurity Cisco, Cisco Cybersecurity, Cybersecurity |
F5 BIG-IP APM v14 | F5 Networks Configuring BIG-IP APM: Access Policy Manager | F5 Cybersecurity, F5, F5 Cybersecurity |
F5 BIG-IP DNS v14 | F5 Conf BIG-IP DNS - F5 Networks Configuring BIG-IP DNS: Domain Name System | F5 Cybersecurity, F5, F5 Cybersecurity |
F5 TS BIG-IP LTM v14 | F5 TS BIG-IP LTM - F5 Networks Troubleshooting BIG-IP LTM | F5 Cybersecurity, F5, F5 Cybersecurity |
ICSFW | Introduction to Cisco Secure Firewall (ICSFW) | Cisco Cybersecurity Cisco, Cisco Cybersecurity, Cybersecurity, Sunset Learning Exclusives |
IPv6 Sec | IPv6 Security and Practices (IPv6) | Cybersecurity Cisco, Cisco Routing and Switching Courses, Cybersecurity |
PAN EDU-210 | Palo Alto Networks: Firewall Essentials: Configuration and Management (EDU-210) | Palo Alto Networks Cybersecurity, Palo Alto Cybersecurity, Palo Alto Networks |
PAN EDU-214 | Firewall 10.1: Improving Security Posture and Hardening PAN-OS Firewalls (EDU-214) | Palo Alto Networks Cybersecurity, Palo Alto Cybersecurity, Palo Alto Networks |
PAN EDU-220 | Palo Alto Networks: Panorama: Managing Firewalls at Scale (EDU-220) | Palo Alto Networks Cybersecurity, Palo Alto Cybersecurity, Palo Alto Networks |
PAN EDU-238 | Palo Alto Networks: Prisma SD-WAN: Design and Operation (EDU-238) | Palo Alto Networks Cybersecurity, Palo Alto Cybersecurity, Palo Alto Networks |
PAN EDU-260 | Palo Alto Networks: Cortex XDR 2: Prevention, Analysis, and Response (EDU-260) | Palo Alto Networks Cybersecurity, Palo Alto Cybersecurity, Palo Alto Networks |
PAN EDU-262 | Cortex™ XDR 3.6: Prevention and Deployment (EDU-262) | Palo Alto Networks Cybersecurity, Palo Alto Cybersecurity, Palo Alto Networks |
PAN EDU-318 | Palo Alto Networks: Prisma Access: Consistent Security Everywhere (EDU-318) | Palo Alto Networks Cybersecurity, Palo Alto Cybersecurity, Palo Alto Networks |
PAN EDU-330 | Palo Alto Networks: Firewall: Troubleshooting (EDU-330) | Palo Alto Networks Cybersecurity, Palo Alto Cybersecurity, Palo Alto Networks |
PAN EDU-380 | Palo Alto Networks: Cortex™ XSOAR 6.8: Automation and Orchestration (EDU-380) | Palo Alto Networks Cybersecurity, Palo Alto Cybersecurity, Palo Alto Networks |
SAUI | Implementing Automation for Cisco Security Solutions (SAUI) | Cisco Cybersecurity Cisco, Cisco Cybersecurity, Cybersecurity |
SC-100T00 | Microsoft Cybersecurity Architect (SC-100T00) | Microsoft Security Cybersecurity, Microsoft, Microsoft Cybersecurity, Microsoft Security |
SC-200T00 | Microsoft Security Operations Analyst (SC-200T00) | Microsoft Security Cybersecurity, Microsoft, Microsoft Cybersecurity, Microsoft Security |
SC-300T00 | Microsoft Identity and Access Administrator (SC-300T00) | Microsoft Security Cybersecurity, Microsoft, Microsoft Cybersecurity, Microsoft Security |
SC-400T00 | Administering Information Protection and Compliance in Microsoft 365 (SC-400T00) | Microsoft Security Cybersecurity, Microsoft, Microsoft Cybersecurity, Microsoft Security |
SC-5001 | Configure SIEM Security Operations Using Microsoft Sentinel (SC-5001) | Microsoft Security Cybersecurity, Microsoft, Microsoft Applied Skills, Microsoft Cybersecurity, Microsoft Security |
SC-5002 | Secure Azure Services and Workloads with Microsoft Defender for Cloud Regulatory Compliance Controls (SC-5002) | Microsoft Security Cybersecurity, Microsoft, Microsoft Applied Skills, Microsoft Cybersecurity, Microsoft Security |
SC-5003 | Implement Information Protection and Data Loss Prevention by Using Microsoft Purview (SC-5003) | Microsoft Security Cybersecurity, Microsoft, Microsoft Applied Skills, Microsoft Cybersecurity, Microsoft Security |
SC-5006 | Get Started with Microsoft Copilot for Security (SC-5006) | Microsoft Security Cybersecurity, Microsoft, Microsoft Cybersecurity, Microsoft Security |
SC-5007 | Implement Retention, eDiscovery, & Communication Compliance in MS Purview (SC-5007) | Microsoft Security Cybersecurity, Microsoft Applied Skills, Microsoft Cybersecurity, Microsoft Security |
SC-5008 | Configure & Manage Entitlement with Microsoft Entra ID (SC-5008) | Microsoft Security Cybersecurity, Microsoft Cybersecurity, Microsoft Security |
SC-900T00 | Microsoft Security, Compliance, and Identity Fundamentals (SC-900) | Microsoft Foundations Cybersecurity, Microsoft, Microsoft Cybersecurity, Microsoft Foundations, Microsoft Security |
SCAZT | Designing & Implementing Secure Cloud Access for Users & Endpoints (SCAZT) | Cisco Cybersecurity Cisco Cybersecurity, Cisco Multi-Cloud, Cybersecurity |
SCOR | Implementing and Operating Cisco Security Core Technologies (SCOR) | Cisco Cybersecurity Cisco, Army Cool Eligible, Cisco Cybersecurity, Cisco Promo Eligible, Cybersecurity, Promo Eligible |
SDAFND | Understanding Cisco SDA Fundamentals (SDAFND) | Cisco Cybersecurity Cisco, Cisco Cybersecurity, Cybersecurity |
SESA 3.1 | Securing Email with Cisco Email Security Appliance (SESA) | Cisco Cybersecurity Cisco, Cisco Cybersecurity, Cybersecurity |
SFWIPA | Securing Data Center Networks and VPNs with Cisco Secure Firewall Threat Defense (SFWIPA) | Cisco Cybersecurity Cisco, Cisco Cybersecurity, Cybersecurity |
SFWIPF | Fundamentals of Cisco Firewall Threat Defense and Intrusion Prevention (SFWIPF) | Cisco Cybersecurity Cisco, Cisco Cybersecurity, Cybersecurity |
SISE 4.0 | Implementing and Configuring Cisco Identity Services Engine (SISE) | Cisco Cybersecurity Cisco, Army Cool Eligible, Cisco Cybersecurity, Cisco Promo Eligible, Cybersecurity, Professional Services, Promo Eligible |
SSFAMP 6.0 | Protecting Against Malware Threats with Cisco AMP for Endpoints (SSFAMP) | Cisco Cybersecurity Cisco, Cisco Cybersecurity, Cybersecurity |
SSFRULES | Securing Cisco Networks with Snort Rule Writing Best Practices (SSFRULES) | Cisco Cybersecurity Cisco, Cisco Cybersecurity, Cybersecurity |
SVPN | Implementing Secure Solutions with Virtual Private Networks (SVPN) | Cisco Cybersecurity Cisco, Cisco Cybersecurity, Cybersecurity |
SWSA | Securing the Web with Cisco Web Security Appliance (SWSA) | Cisco Cybersecurity Cisco, Cisco Cybersecurity, Cybersecurity |