Course Catalog
Learning Paths
NICE Specialty Areas
Subject Matter
Developer
Secure Developer (Core)
Learn secure coding best practices for all application types
Secure Developer (Advanced)
Learn secure coding best practices for all application types
Java Developer
Prevent security vulnerabilities that plague Java applications
Python Developer
Build powerful but secure Web, desktop, and mobile applications
C# Developer
Develop desktop, API, and back-end applications with confidence
Node.js Developer
Code defensively for this JavaScript run-time environment
Back-End Developer
Secure Web services & API’s used by front-end developers
Front-End Developer
Code markup languages and client-side scripts securely
Web Developer
Ensure security from Web browser to server
Mobile Developer
Leverage security features to build secure mobile apps
Cloud Developer
Leverage AWS and Azure security features for robust code
Ruby on Rails Developer
Lock down server-side Web logic in Ruby and Rails
C++ Developer
Get defensive with this most challenging language
Golang Developer
Build secure, concurrent applications with Go's statically typed, simple syntax.
PHP Developer
Develop secure server-side web application logic
JavaScript Developer
Master front-end JavaScript security to foil attackers
iOS Developer
Master security features when coding iOS applications
HTML5 Developer
Harden front-end code in today's interactive Web apps
Microsoft SDL Developer
Implement this popular assurance process with ease
IoT & Embedded Developer
Implement secure embedded devices and systems
PCI Developer
Secure cardholder data in code according to PCI-DSS
C Developer
Secure critical code for low-level machine instructions
Swift Developer
Harden iOS/OS X applications and back-end services
Android Developer
Dominate security when coding Android applications
Engineer
Automation Engineer
Securely build, program and test automated machinery
DevOps Practitioner
Streamline operations without compromising security
Embedded Test Engineer
Conduct specialized attacks on embedded software
Network Engineer
Protect infrastructure and the sensitive data it handles
Q/A Test Engineer
Assess software quality to find damaging security bugs
Architect
Embedded Architect
Securely design and implement embedded software
IT Architect
Design and maintain secure computing infrastructure
Software Architect
Make secure design choices and improve coding standards
Analyst
Business Analyst
Define, analyze and document security requirements
Systems Analyst
Construct and analyze IT system security & resiliency
Admin
Database Administrator
Deploy, monitor, and troubleshoot database security
Linux Administrator
Develop skills to securely manage and maintain a Linux environment
Systems Administrator
Prevent and mitigate IT security breaches
Other
Application Security Champion
Adopt a “Security Built-in” process and culture
Cyber Security Professional
Learn key security policy, threat, and technology concepts
Development Manager
Incorporate and track security in development projects
Ethical Hacker
Test your security skills whether you are seeking core, advanced or elite paths
Information Security Specialist
Define, assess and improve cybersecurity defenses
Operations/IT Manager
Confidently monitor and report on application security
Product Owner
Define and assess security throughout development
Project Manager
Learn security essentials to reduce organizational risk
Systems Leadership
Get smarter about application security to reduce risk
Securely Provision
Risk Management (RSK)
Oversees programs that assure systems meet requirements.
Software Development (DEV)
Develops software applications following assurance best practices.
Systems Architecture (ARC)
Develops system security concepts and and designs.
Systems Development (SYS)
Works on development phases of the systems life cycle.
Systems Requirements Planning (SRP)
Gathers requirements and translates into technical solutions.
Technology R&D (TRD)
Conducts technology assessment & integration processes.
Test and Evaluation (TST)
Conducts system tests to evaluate compliance with requirements.
Collect and Operate
Cyber Operational Planning (OPL)
In-depth targeting, cybersecurity planning, info gathering, and operational-level planning.
Operate & Maintain
Customer Service and Technical Support (STS)
Addresses problems, installs/configures, troubleshoots, maintains, and trains. Provides incident information to Incident Response.
Data Administration (DTA)
Develops & manages databases or data management systems.
Knowledge Management (KMG)
Manages processes & tools for content management.
Network Services (NET)
Manages networks, firewalls, hardware & software.
Systems Administration (ADM)
Manages servers, access control, and account administration.
Systems Analysis (ANA)
Designs solutions that improve operational security & efficiency.
Protect & Defend
Customer Service and Technical Support (STS)
Addresses problems, installs/configures, troubleshoots, maintains, and trains. Provides incident information to Incident Response.
Data Administration (DTA)
Develops & manages databases or data management systems.
Knowledge Management (KMG)
Manages processes & tools for content management.
Network Services (NET)
Manages networks, firewalls, hardware & software.
Systems Administration (ADM)
Manages servers, access control, and account administration.
Systems Analysis (ANA)
Designs solutions that improve operational security & efficiency.
Oversee & Govern
Cybersecurity Management (MGT)
Oversees the security program of an information system.
Executive Cyber Leadership (EXL)
Leads cybersecurity-related work or workers.
Legal Advice and Advocacy (LGA)
Provides legal recommendations to technical staff.
Project Management, Acquisition and Program (PMA)
Applies knowledge to manage acquisition programs.
Strategic Planning and Policy (SPP)
Develops policies, plans, and advocates for cyberspace initiatives and policy changes.
Analyze
All-Source Analysis (ASA)
Analyzes threat information from multiple sources
Exploitation Analysis (EXP)
Analyzes information to identify vulnerabilities and potential for exploitation.
Targets (TGT)
Applies knowledge of regions, countries, entities, or technologies.
Threat Analysis (TWA)
Identifies, assesses and produces findings on cybersecurity criminals and foreign intelligence entities for investigations.