Which Path is   Right for You?

Are you an End User? IT Professional who doesn't work on cybersecurity? IT Cybersecurity Professional looking to advance your career or stay up-to-date on the latest technological advances? In any case, you have come to the right place!

Welcome to the New Horizons Cybersecurity Interactive Map. Click on the job role/function that best describes you now or best describes where you would like to advance.

Each section offers a series of courses that best fit the role and experience level chosen. Hover over the course titles to see further information that will assist you in making the most informed decisions.

The information obtained through this map can be used when having a conversation with any of our Cybersecurity Sales Experts in designing the best learning path for you!

End User

You have nothing to do with the cybersecurity implementation or policy of your company but you have access to mail and databases through company servers on both company-owned and personal devices.

View Courses  

CompTIA
CyberSecure
Who Should Attend
All employees at any level of an organization who require a fundamental overview of security issues.

What Is This Course About?
CompTIA CyberSecure is a self-paced training course that teaches employees how to follow security practices vital to protecting the business.
The 60-minute training focuses on situations relevant to everyone from the receptionist to the CEO …not just the IT department.
Coming Soon
CyberSAFE
(Securing Assets for
the End User)
Who Should Attend
This course is designed for non-technical end-users of computers, mobile devices, networks, and the Internet, to enable them to use technology more securely.

What Is This Course About?
This course will help you to understand security compliance considerations, social engineering, malware, and various other data security-related concepts. In this course, you will explore the hazards and pitfalls and learn how to use technology safely.
Learn More
RESILIA™
Foundation
Who Should Attend:
The RESILIA Foundation course audience includes all teams across the IT and Risk functions, including IT Service Management, Business Analysts and Designers, Development teams, IT Project & Program Management teams, and Risk and Compliance teams.

What Is This Course About?
In this course, students learn key terms, the distinction between resilience and security, and the benefits of implementing cyber resilience. This course also introduces risk management and the key activities needed to address risks and opportunities.
Learn More
IT Professional
(non-security)

Your primary responsibilities involve the design, implementation, management, and administration of network servers and other company devices. Security is not part of your job function but cybersecurity knowledge would be beneficial.
View Courses  

CompTIA A+
Who Should Attend
Those who are getting ready for a career as an entry-level information technology (IT) professional or personal computer (PC) service technician.

What Is This Course About?
In this course, you will acquire the essential skills and information you will need to install, upgrade, repair, configure, troubleshoot, optimize, and perform preventative maintenance of basic personal computer hardware and operating systems.
Learn More
CompTIA
Security+
Who Should Attend
This course is targeted toward the information technology (IT) professional who has networking and administrative skills in Windows®-based Transmission Control Protocol/Internet Protocol (TCP/IP) networks; familiarity with other operating systems, such as Mac OS X, Unix, or Linux; and who wants to further a career in IT by acquiring foundational knowledge of security topics; prepare for the CompTIA Security+ certification examination; or use Security+ as the foundation for advanced security certifications or career roles.

What Is This Course About?
In this course, students will implement, monitor, and troubleshoot infrastructure, application, information, and operational security. Students will prepare for the CompTIA Security+ certification examination (SY0-401).
Learn More
RESILIA™
Practictioner
Who Should Attend:
The RESILIA Practitioner course audience includes all teams across the Business, IT and Risk functions, including IT Service Management, Business Analysts and Designers, Development teams, IT Project and Program Management teams, and Risk & Compliance Teams.

What Is This Course About?
In this course, students begin by revisiting the concepts acquired in the Foundation course. Then, students learn to distinguish between key terms & determine the activities needed to address risks & opportunities, as well as create a risk treatment plan.
Learn More
IT Professional
(some security)

Your primary responsibilities involve the design, implementation, management, and administration of network servers and other company devices. Fundamental aspects of cybersecurity is currently a part of, or is becoming a part of, your job role.
View Courses  

CyberSec
First Responder
Threat Detection
and Response
Who Should Attend
This course is designed for IT professionals who perform job functions related to the development, operation, management, and enforcement of security

What Is This Course About?
In this course, students develop, operate, manage, and enforce security capabilities for systems and networks, including assessing information security risk in computing and network environments, designing and operating secure computing and network environments, and collecting cybersecurity intelligence information.
Learn More
Cisco
Interconnecting Cisco
Networking Devices
Part 1
(ICND1)
Who Should Attend
This course is designed for network administrators, support engineers, engineer associates, network specialists, analysts, and those pursing the CCNA Security certification.

What Is This Course About?
In this course, you will learn how to install, operate, configure, and verify a basic IPv4 and IPv6 network, including configuring a LAN switch, configuring an IP router, managing network devices, and identifying basic security threats. The goal of the course is to provide you with the knowledge and skills necessary to install, configure, and operate a small- to medium-sized network.
Learn More
Implementing
Cisco IOS
Network Security
(IINS)
Who Should Attend:
This course is of benefit to network designers, network, systems, and security engineers, network and security managers, and those looking to complete their CCNA Security certification.

What Is This Course About?
In this course, you will learn about the design, implementation, and monitoring of a comprehensive security policy using Cisco IOS security features and technologies as examples. You will also learn about security controls of Cisco IOS devices as well as a functional introduction to the Cisco Adaptive Security Appliance (ASA). This course enables you to perform basic tasks to secure a network using Cisco IOS security features, which are available through web-based GUIs on the Cisco ASA, and the command-line interface (CLI) on Cisco routers and switches.
Learn More
Firewall
Installation,
Configuration and
Management
Essentials I
(PAN-201)
Who Should Attend:
This course is suited for Security Engineers, Network Engineers, and support staff who want to install, configure, and manage the entire line of Palo Alto Networks Next-Generation firewalls.

What Is This Course About?
Students attending this introductory-level class will gain an in-depth knowledge of how to install, configure, and manage their firewall, as well as configuration steps for the security, networking, threat prevention, logging, and reporting features of the Palo Alto Networks Operating System.
Learn More
Firewall
Installation,
Configuration and
Management
Essentials II
(PAN-205)
Who Should Attend:
This course is suited for Security Engineers, Network Engineers, and support staff who wish to expand on the concepts taught in Course PAN-201 and explore many new features and functions of Palo Alto Networks Next-Generation firewalls.

What Is This Course About?
Successful completion of this two-day, instructor-led course will enhance the student’s understanding of how to install, configure, manage, and perform basic troubleshooting on the entire line of Palo Alto Networks Next-Generation firewalls. Additionally, students will be instructed on the basics of implementing and managing GlobalProtect and Active/Active High Availability. Students will gain an in-depth knowledge of how to optimize their visibility and control over applications, users, and content.
Learn More
IT Cybersecurity Professional
(0-2 years experience)

Your primary focus is on the cybersecurity of your organization's data and equipment. You are involved in the day-to-day implementation and compliance of your organization's security policies. You have six months to less than two years experience as a Cybersecurity Professional.
View Courses  

CompTIA
Security+
Who Should Attend
This course is targeted toward the information technology (IT) professional who has networking and administrative skills in Windows®-based Transmission Control Protocol/Internet Protocol (TCP/IP) networks; familiarity with other operating systems, such as Mac OS X, Unix, or Linux; and who wants to further a career in IT by acquiring foundational knowledge of security topics; prepare for the CompTIA Security+ certification examination; or use Security+ as the foundation for advanced security certifications or career roles.

What Is This Course About?
In this course, students will implement, monitor, and troubleshoot infrastructure, application, information, and operational security. Students will prepare for the CompTIA Security+ certification examination (SY0-401).
Learn More
Certified Network
Defender (CND)
Who Should Attend
This course is designed for network administrators, security administrators and engineers, network defense technicians, CND analysts and security analysts, security operators, as well as anyone involved in network operations.

What Is This Course About?
Certified Network Defender (CND) is a vendor-neutral, comprehensive network security certification training program. CND is based on a job-task analysis and cybersecurity education framework presented by the National Initiative of Cybersecurity Education (NICE). The course has also been mapped to global job roles and responsibilities and the Department of Defense (DoD) job roles for system/network administrators. CND prepares network administrators on network security technologies and operations to attain Defense-in-Depth network security preparedness
Coming Soon
CyberSec
First Responder
Threat Detection
and Response
Who Should Attend
This course is designed for IT professionals who perform job functions related to the development, operation, management, and enforcement of security capabilities for systems and networks.

What Is This Course About?
In this course, students develop, operate, manage, and enforce security capabilities for systems and networks, including assessing information security risk in computing and network environments, designing and operating secure computing and network environments, and collecting cybersecurity intelligence information.
Learn More
CSX Practitioner:
Identification
and Protection
Who Should Attend:
The Identification and Protection course is ideal for individuals in the field of cyber security who are interested in gaining hands-on technical skills.

What Is This Course About?
The first course in the CSX Practitioner series focuses on key cyber security skills and includes foundational, real world instruction in the Identify and Protect domains. Topics range from preliminary network scanning to security control implementation. Through the completion of multiple lab-reinforced modules, students will learn how to apply industry-developed, experience-based methods to the identification of key networks and learn to develop appropriate protection mechanisms.
Coming Soon
CSX Practitioner:
Detection
Who Should Attend:
The Detection course is ideal for individuals in the field of cybersecurity who are interested in gaining hands-on technical skills.

What Is This Course About?
The second course in the CSX Practitioner series goes deeper into skills focused in the Detect domain. Students will learn the basic concepts, methods and tools used to leverage cybersecurity controls in order to identify system events and non-event level incidents. By completing multiple lab-reinforced modules, students will gain the skills necessary to detect potential network events and incidents. Topics range from incident packet analysis to Incident Response (IR) report drafting and generation.
Coming Soon
CSX Practitioner:
Respond
and Recover
Who Should Attend:
The Respond and Recover course is ideal for individuals in the field of cybersecurity who are interested in gaining hands-on technical skills.

What Is This Course About?
The final course in the CSX Practitioner series provides hands-on instruction in the Respond and Recover domains. With course lecture backed up by lab sequences, students will learn how to apply professional methodology to respond and recover from network incidents or disasters. Students will discover how to contain an event and protect assets and infrastructure, and learn the components and procedures required for a comprehensive incident response plan.

The Respond domain shows students the basic concepts, methods and tools required to draft and execute comprehensive incident response plans, provide proper isolation response documentation, and how to document and maintain information related to Incident Response.

In the Recover domain, students will master the basic concepts, methods and tools required to recuperate a system or network, as well as learn how to implement continuity and contingency plans.
Coming Soon
RESILIA™
Practictioner
Who Should Attend:
The RESILIA Practitioner course audience includes all teams across the Business, IT and Risk functions, including IT Service Management, Business Analysts and Designers, Development teams, IT Project and Program Management teams, and Risk & Compliance Teams.

What Is This Course About?
In this course, students begin by revisiting the concepts acquired in the Foundation course. Then, students learn to distinguish between key terms & determine the activities needed to address risks & opportunities, as well as create a risk treatment plan.
Learn More
Implementing
Cisco IOS
Network Security
(IINS)
Who Should Attend:
This course is of benefit to network designers, network, systems, and security engineers, network and security managers, and those looking to complete their CCNA Security certification.

What Is This Course About?
In this course, you will learn about the design, implementation, and monitoring of a comprehensive security policy using Cisco IOS security features and technologies as examples. You will also learn about security controls of Cisco IOS devices as well as a functional introduction to the Cisco Adaptive Security Appliance (ASA). This course enables you to perform basic tasks to secure a network using Cisco IOS security features, which are available through web-based GUIs on the Cisco ASA, and the command-line interface (CLI) on Cisco routers and switches.
Learn More
Firewall
Installation,
Configuration and
Management
Essentials I
(PAN-201)
Who Should Attend:
This course is suited for Security Engineers, Network Engineers, and support staff who want to install, configure, and manage the entire line of Palo Alto Networks Next-Generation firewalls.

What Is This Course About?
Students attending this introductory-level class will gain an in-depth knowledge of how to install, configure, and manage their firewall, as well as configuration steps for the security, networking, threat prevention, logging, and reporting features of the Palo Alto Networks Operating System.
Learn More
Firewall
Installation,
Configuration and
Management
Essentials II
(PAN-205)
Who Should Attend:
This course is suited for Security Engineers, Network Engineers, and support staff who wish to expand on the concepts taught in Course PAN-201 and explore many new features and functions of Palo Alto Networks Next-Generation firewalls.

What Is This Course About?
Successful completion of this two-day, instructor-led course will enhance the student’s understanding of how to install, configure, manage, and perform basic troubleshooting on the entire line of Palo Alto Networks Next-Generation firewalls. Additionally, students will be instructed on the basics of implementing and managing GlobalProtect and Active/Active High Availability. Students will gain an in-depth knowledge of how to optimize their visibility and control over applications, users, and content.
Learn More
IT Cybersecurity Professional
(2-5 years experience)

Your primary focus is on the cybersecurity of your organization's data and equipment. You are involved in the day-to-day implementation and compliance of your organization's security policies. You are possibly in some kind of management or oversight position. You have more than two years experience and less than five years experience as a Cybersecurity Professional.
View Courses  

EC-Council
Certified Ethical
Hacker (CEH)
Who Should Attend
The Certified Ethical Hacking course will significantly benefit security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure.

What Is This Course About?
In 18 comprehensive modules, the course covers 270 attack technologies, commonly used by hackers. Throughout the CEH course, you will be immersed in a hacker's mindset, evaluating not just logical, but physical security.
Learn More
CompTIA Advanced
Security
Practioner
(CASP)
Who Should Attend
This course is designed for IT professionals who want to acquire the technical knowledge and skills needed to conceptualize, engineer, integrate, and implement secure solutions across complex enterprise environments. The target student should aspire to apply critical thinking and judgment across a broad spectrum of security disciplines to propose and implement sustainable security solutions that map to organizational strategies; translate business needs into security requirements; analyze risk impact; and respond to security incidents. This course is also designed for students who are seeking the CompTIA Advanced Security Practitioner (CASP) certification and who want to prepare for Exam CAS-002. Students seeking CASP certification should have at least 10 years of experience in IT management, with at least 5 years of hands-on technical security experience.

What Is This Course About?
In this course, you will expand on your knowledge of information security to apply more advanced principles that will keep your organization safe from the many ways it can be threatened. This course prepares students for the CAS-002 exam.
Learn More
CSX Specialist:
Identify
and Protect
Who Should Attend:
The Identify and Protect course is ideal for experienced individuals in the field of cyber security who are interested in gaining hands-on technical skills.

What Is This Course About?
This week-long course will help students gain an intermediate-level understanding of the concepts, skills and tools required to identify threats and weaknesses and protect an organization from cyber attacks.  They will learn how to analyze and assess cyber threats against multiple levels of infrastructure, from host to system-level, using industry accepted methods and tools as governed by the NIST and ISO publication guidelines.  In addition, students will learn to establish, maintain, and develop a holistic protection policy for the networks under their responsibility – including network protection techniques, such as Intrusion Detection System (IDS) implementation and firewall rule configuration – and how to use specific tools in protecting a network.
Coming Soon
CSX Specialist:
Detect
Who Should Attend:
The Detect course is ideal for experienced individuals in the field of cyber security who are interested in gaining hands-on technical skills.

What Is This Course About?
This week-long course will help students gain an intermediate-level understanding of the concepts, skills and tools required to discover and differentiate incidents and events on their networks of responsibility. They will learn threat detection techniques, such as traffic monitoring and analysis, false positive minimization, and false negative eradication. In addition, they will learn how to utilize specialized tools, such as Wireshark and TCPdump to detect threats.

The Detect domain teaches students to distinguish network and system incidents and events. Students will learn to identify compromise indicators, assess potential damage, and provide appropriate data to first response teams.
Learn More
CSX Specialist:
Respond
and Recover
Who Should Attend:
The Respond and Recover course is ideal for experienced individuals in the field of cyber security who are interested in gaining hands-on technical skills.

What Is This Course About?
This week-long course will help students gain an intermediate-level understanding of the concepts, skills and tools required to maintain, enact and develop organizationally unique incident response plans. They will learn response techniques, such as malware removal, account deletion, and access revocation. In addition, they will understand how to utilize specialized malware identification and removal tools. In addition, students will learn how to execute tasks identified in organizational Business Continuity Plans (BCP) and Disaster Recovery Plans (DRP). They will learn to utilize recovery techniques, such as data integrity evaluation, alternative site maintenance and post event restoration. In addition, they will learn how to use specialized integrity evaluation and backup dispersion tools.
Coming Soon
Firewall: Advanced
Threat
Management
(PAN-231)
Who Should Attend:
This course is suited for firewall administrators, network security administrators, and other technical professionals who have completed PAN-201 and have an understanding of network concepts, including routing, switching, and IP addressing. They also will need in-depth knowledge of port-based security and security technologies such as IPS, proxy, and content filtering.

What Is This Course About?
This two-day, instructor-led course teaches strategies in defense against cyberthreats. Successful completion of this course enables administrators to better understand the threat landscape. Students will learn the use of Palo Alto Networks next-generation firewalls, including the WildFire product.
Learn More
Implementing
Core Cisco
ASA Security
(SASAC)
Who Should Attend:
Network engineers supporting Cisco ASA 9.x implementations

What Is This Course About?
Implementing Core Cisco ASA Securityis designed designed to provide students with the necessary knowledge and skills to implement core Cisco ASA including the new ASA 9.0 and 9.1 features.
Learn More
Implementing
Advanced Cisco
ASA Security
(SASAA)
Who Should Attend:
Network administrators, managers, coordinators, anyone who requires advanced training on the ASA 5500-X Security technicians, administrators, and engineers

What Is This Course About?
This course provides advanced training on the key Cisco Adaptive Security Appliance (ASA)
Learn More
Implementing and
Configuring
Cisco Identity
Services Engine
for Wireless
Engineers (SISE)
Who Should Attend:
Security architects, design engineers, network designers, network administrators, field enginers, who implement and maintain Cisco ISE networks

What Is This Course About?
This course discusses the Cisco Identity Services Engine (ISE),and provides students with the knowledge and skills to enforce security posture compliance for wired and wireless endpoints and enhance infrastructure security using the Cisco ISE.
Learn More
IT Cybersecurity Professional
(5+ years experience)

Your primary focus is on the cybersecurity of your organization's data and equipment. You are involved in the implementation and compliance of your organization's security policies. You are possibly in some kind of senior management or cybersecurity strategy position. You have more than five years experience as a Cybersecurity Professional.
View Courses