Course Catalog
Search through our cybersecurity training catalog to find courses, labs, and learning journeys by role, technology, or skill level.
Learning Journeys
NICE Categories
Subject Matter
Developer
Secure Developer (Core)
Learn secure coding best practices for all application types
Secure Developer (Advanced)
Learn secure coding best practices for all application types
Java Developer
Prevent security vulnerabilities that plague Java applications
Python Developer
Build powerful but secure Web, desktop, and mobile applications
C# Developer
Develop desktop, API, and back-end applications with confidence
Node.js Developer
Code defensively for this JavaScript run-time environment
Back-End Developer
Secure Web services & API’s used by front-end developers
Front-End Developer
Code markup languages and client-side scripts securely
Web Developer
Ensure security from Web browser to server
Mobile Developer
Leverage security features to build secure mobile apps
Cloud Developer
Leverage AWS and Azure security features for robust code
Ruby on Rails Developer
Lock down server-side Web logic in Ruby and Rails
C++ Developer
Get defensive with this most challenging language
Golang Developer
Build secure, concurrent applications with Go's statically typed, simple syntax.
PHP Developer
Develop secure server-side web application logic
JavaScript Developer
Master front-end JavaScript security to foil attackers
iOS Developer
Master security features when coding iOS applications
HTML5 Developer
Harden front-end code in today's interactive Web apps
Microsoft SDL Developer
Implement this popular assurance process with ease
IoT & Embedded Developer
Implement secure embedded devices and systems
PCI Developer
Secure cardholder data in code according to PCI-DSS
C Developer
Secure critical code for low-level machine instructions
Swift Developer
Harden iOS/OS X applications and back-end services
Android Developer
Dominate security when coding Android applications
Engineer
Automation Engineer
Securely build, program and test automated machinery
DevOps Practitioner
Streamline operations without compromising security
Embedded Test Engineer
Conduct specialized attacks on embedded software
Network Engineer
Protect infrastructure and the sensitive data it handles
Q/A Test Engineer
Assess software quality to find damaging security bugs
Architect
Embedded Architect
Securely design and implement embedded software
IT Architect
Design and maintain secure computing infrastructure
Software Architect
Make secure design choices and improve coding standards
Analyst
Business Analyst
Define, analyze and document security requirements
Systems Analyst
Construct and analyze IT system security & resiliency
Admin
Database Administrator
Deploy, monitor, and troubleshoot database security
Linux Administrator
Develop skills to securely manage and maintain a Linux environment
Systems Administrator
Prevent and mitigate IT security breaches
Other
Application Security Champion
Adopt a “Security Built-in” process and culture
Cyber Security Professional
Learn key security policy, threat, and technology concepts
Development Manager
Incorporate and track security in development projects
Ethical Hacker
Test your security skills whether you are seeking core, advanced or elite paths
Information Security Specialist
Define, assess and improve cybersecurity defenses
Operations/IT Manager
Confidently monitor and report on application security
Product Owner
Define and assess security throughout development
Project Manager
Learn security essentials to reduce organizational risk
Systems Leadership
Get smarter about application security to reduce risk
NICE Work Role Categories
Oversight and Governance (OG)
Provides leadership, management, direction, and advocacy so the organization may effectively manage cybersecurity-related risks to the enterprise and conduct cybersecurity work.
Design and Development (DD)
Conducts research, conceptualizes, designs, develops, and tests secure technology systems, including on perimeter and cloud-based networks.
Implementation and Operation (IO)
Provides implementation, administration, configuration, operation, and maintenance to ensure effective and efficient technology system performance and security.
Protection and Defense (PD)
Protects against, identifies, and analyzes risks to technology systems or networks. Includes investigation of cybersecurity events or crimes related to technology systems and networks.
Cyberspace Intelligence (CI)
Collects, processes, analyzes, and disseminates information from all sources of intelligence on foreign actors' cyberspace programs, intentions, capabilities, research and development, and operational activities.
Cyberspace Effects (CE)
Plans, supports, and executes cyberspace capabilities where the primary purpose is to externally defend or conduct force projection in or through cyberspace.