Course Catalog

Learning Paths

NICE Specialty Areas

Subject Matter

Developer

Secure Developer (Core)

Learn secure coding best practices for all application types

Secure Developer (Advanced)

Learn secure coding best practices for all application types

Java Developer

Prevent security vulnerabilities that plague Java applications

Python Developer

Build powerful but secure Web, desktop, and mobile applications

C# Developer

Develop desktop, API, and back-end applications with confidence

Node.js Developer

Code defensively for this JavaScript run-time environment

Back-End Developer

Secure Web services & API’s used by front-end developers

Front-End Developer

Code markup languages and client-side scripts securely

Web Developer

Ensure security from Web browser to server

Mobile Developer

Leverage security features to build secure mobile apps

Cloud Developer

Leverage AWS and Azure security features for robust code

Ruby on Rails Developer

Lock down server-side Web logic in Ruby and Rails

C++ Developer

Get defensive with this most challenging language

Golang Developer

Build secure, concurrent applications with Go's statically typed, simple syntax.

PHP Developer

Develop secure server-side web application logic

JavaScript Developer

Master front-end JavaScript security to foil attackers

iOS Developer

Master security features when coding iOS applications

HTML5 Developer

Harden front-end code in today's interactive Web apps

Microsoft SDL Developer

Implement this popular assurance process with ease

IoT & Embedded Developer

Implement secure embedded devices and systems

PCI Developer

Secure cardholder data in code according to PCI-DSS

C Developer

Secure critical code for low-level machine instructions

Swift Developer

Harden iOS/OS X applications and back-end services

Android Developer

Dominate security when coding Android applications

Engineer

Automation Engineer

Securely build, program and test automated machinery

DevOps Practitioner

Streamline operations without compromising security

Embedded Test Engineer

Conduct specialized attacks on embedded software

Network Engineer

Protect infrastructure and the sensitive data it handles

Q/A Test Engineer

Assess software quality to find damaging security bugs

Architect

Embedded Architect

Securely design and implement embedded software

IT Architect

Design and maintain secure computing infrastructure

Software Architect

Make secure design choices and improve coding standards

Analyst

Business Analyst

Define, analyze and document security requirements

Systems Analyst

Construct and analyze IT system security & resiliency

Admin

Database Administrator

Deploy, monitor, and troubleshoot database security

Linux Administrator

Develop skills to securely manage and maintain a Linux environment

Systems Administrator

Prevent and mitigate IT security breaches

Other

Application Security Champion

Adopt a “Security Built-in” process and culture

Cyber Security Professional

Learn key security policy, threat, and technology concepts

Development Manager

Incorporate and track security in development projects

Ethical Hacker

Test your security skills whether you are seeking core, advanced or elite paths

Information Security Specialist

Define, assess and improve cybersecurity defenses

Operations/IT Manager

Confidently monitor and report on application security

Product Owner

Define and assess security throughout development

Project Manager

Learn security essentials to reduce organizational risk

Systems Leadership

Get smarter about application security to reduce risk

Securely Provision

Risk Management (RSK)

Oversees programs that assure systems meet requirements.

Software Development (DEV)

Develops software applications following assurance best practices.

Systems Architecture (ARC)

Develops system security concepts and and designs.

Systems Development (SYS)

Works on development phases of the systems life cycle.

Systems Requirements Planning (SRP)

Gathers requirements and translates into technical solutions.

Technology R&D (TRD)

Conducts technology assessment & integration processes.

Test and Evaluation (TST)

Conducts system tests to evaluate compliance with requirements.

Collect and Operate

Cyber Operational Planning (OPL)

In-depth targeting, cybersecurity planning, info gathering, and operational-level planning.

Operate & Maintain

Customer Service and Technical Support (STS)

Addresses problems, installs/configures, troubleshoots, maintains, and trains. Provides incident information to Incident Response.

Data Administration (DTA)

Develops & manages databases or data management systems.

Knowledge Management (KMG)

Manages processes & tools for content management.

Network Services (NET)

Manages networks, firewalls, hardware & software.

Systems Administration (ADM)

Manages servers, access control, and account administration.

Systems Analysis (ANA)

Designs solutions that improve operational security & efficiency.

Protect & Defend

Customer Service and Technical Support (STS)

Addresses problems, installs/configures, troubleshoots, maintains, and trains. Provides incident information to Incident Response.

Data Administration (DTA)

Develops & manages databases or data management systems.

Knowledge Management (KMG)

Manages processes & tools for content management.

Network Services (NET)

Manages networks, firewalls, hardware & software.

Systems Administration (ADM)

Manages servers, access control, and account administration.

Systems Analysis (ANA)

Designs solutions that improve operational security & efficiency.

Oversee & Govern

Cybersecurity Management (MGT)

Oversees the security program of an information system.

Executive Cyber Leadership (EXL)

Leads cybersecurity-related work or workers.

Project Management, Acquisition and Program (PMA)

Applies knowledge to manage acquisition programs.

Strategic Planning and Policy (SPP)

Develops policies, plans, and advocates for cyberspace initiatives and policy changes.

Analyze

All-Source Analysis (ASA)

Analyzes threat information from multiple sources

Exploitation Analysis (EXP)

Analyzes information to identify vulnerabilities and potential for exploitation.

Targets (TGT)

Applies knowledge of regions, countries, entities, or technologies.

Threat Analysis (TWA)

Identifies, assesses and produces findings on cybersecurity criminals and foreign intelligence entities for investigations.

Platform

Android

18 Courses

APEX

1 Courses

API

2 Courses

Appian

1 Courses

AWS

8 Courses

Azure

10 Courses

Back-End Server

14 Courses

Cloud

69 Courses

Database

4 Courses

Desktop

17 Courses

Embedded

12 Courses

Enterprise

8 Courses

iOS

18 Courses

IoT

24 Courses

Linux

23 Courses

Mendix

1 Courses

Mobile

22 Courses

NoSQL

1 Courses

OutSystems

1 Courses

Pega

1 Courses

Standard

401 Courses

Web Services

219 Courses

Standard

CWE

202 Courses

GDPR

4 Courses

ISO 27001

1 Courses

Microsoft SDL

5 Courses

MITRE ATT&CK

51 Courses

NICE

262 Courses

NIST

193 Courses

OWASP API

7 Courses

OWASP ASVS

39 Courses

OWASP IoT

10 Courses

OWASP LCNC

4 Courses

OWASP LLM

1 Courses

OWASP Mobile

12 Courses

OWASP Web

179 Courses

PCI

37 Courses

Technology

.NET

5 Courses

.NET MVC

1 Courses

AJAX

1 Courses

Angular

5 Courses

API

31 Courses

ASP.NET

4 Courses

Bash

3 Courses

Blockchain

2 Courses

C

17 Courses

C-SCRM

1 Courses

C#

27 Courses

C++

10 Courses

Django

2 Courses

GO

7 Courses

HTML5

4 Courses

Java

46 Courses

Javascript

14 Courses

jQuery

1 Courses

Kotlin

1 Courses

Kubernetes

5 Courses

Node.js

27 Courses

Objective C

12 Courses

Open-Source

3 Courses

Perl

4 Courses

PHP

4 Courses

Powershell

4 Courses

Python

28 Courses

React.js

3 Courses

Ruby

4 Courses

Ruby on Rails

2 Courses

Scripting

9 Courses

Swift

14 Courses

TypeScript

10 Courses

Unity

1 Courses