• $720.00
  • Make an offer
    Price alert
    Sold by Newegg

    Shipped by Newegg

    Shop it at NeweggBusiness.

    New Horizon CyberSecurity Collection

    Please note that this product is non-returnable and non-refundable.
    +
    +
    Overview
    Specs
    Reviews
    avatar

    Any questions? Our AI beta will help you find out quickly.


    The New Horizons CyberSecurity Collection offers a vast array of learning options with instant access to hundreds of learning assets across a wide choice of modalities (videos, courses, books, assessments, mentoring, etc.). These learning assets can be used to support cybersecurity professionals' continuous learning needs from solving an immediate technical problem, to building a well-rounded set of skills and preparing for certification exams.


    This is an Online ANYTIME course library and includes multiple individual online courses. The course library will be available for 1 year from the date of purchase. Online ANYTIME gives you access to a self-paced training solution that uses the same core course content as our world-renowned Instructor-Led Training.


    img
    What's Included
    • An Executive's Guide to Security: Understanding Security Threats
    • Android Architecture, Protection, and Development Best Practices
    • Android Security Vulnerabilities, Testing, and Enterprise Considerations
    • Anomaly Detection: Aspects of Anomaly Detection
    • Anomaly Detection: Network Anomaly Detection
    • Attack Vectors and Mitigations
    • Authentication & Encryption: Best Practices
    • CEHv10: SQL Injection
    • CEHv10: Vulnerability Analysis Concepts and Tools
    • CEHv10: Wireless Hacking Concepts
    • Certified Ethical Hacker - CEHv10: Cloud Computer Attacks
    • Certified Ethical Hacker - CEHv10: Clouding Computing Concepts
    • Certified Ethical Hacker - CEHv10: Common Web App Threats Part 2
    • Certified Ethical Hacker - CEHv10: Covert Data Gathering
    • Certified Ethical Hacker - CEHv10: Cracking and Mobile Hacking
    • Certified Ethical Hacker - CEHv10: Cryptography Attacks
    • Certified Ethical Hacker - CEHv10: Cryptography Concepts
    • Certified Ethical Hacker - CEHv10: Cryptography Concepts Part 2
    • Certified Ethical Hacker - CEHv10: Cryptography Concepts Part 3
    • Certified Ethical Hacker - CEHv10: Evading IDS, Firewalls, and Honeypots
    • Certified Ethical Hacker - CEHv10: Evading IDS, Firewalls, and Honeypots Part 3
    • Certified Ethical Hacker - CEHv10: IoT Attacks
    • Certified Ethical Hacker - CEHv10: IoT Concepts
    • Certified Ethical Hacker - CEHv10: Malware Distribution
    • Certified Ethical Hacker - CEHv10: Malware Threats
    • Certified Ethical Hacker - CEHv10: Practical Web App Hacking
    • CISSP: Security Operations Part 1
    • CISSP: Security Operations Part 2
    • CISSP: Security Operations Part 3
    • CISSP: Security Principles, Governance, and Guidelines
    • CISSP: Software Development Security
    • COBIT 5 Principles and Implementation
    • CompTIA CASP CAS-002: Advanced Network Design, Management, and Controls
    • CompTIA CASP CAS-002: Application Vulnerabilities and Security Controls
    • CompTIA CASP CAS-002: Cryptography and Enterprise Storage Concerns
    • CompTIA CASP CAS-002: Industry Influences, Risk Planning, Strategy, and Control
    • CompTIA CASP CAS-002: Integration of Computing, Communications, and Disciplines
    • CompTIA CASP CAS-002: Privacy Policies & Procedures and Incident Recovery
    • CompTIA CASP CAS-002: Research, Analysis and Assessment
    • CompTIA CASP CAS-002: Security Controls for Hosts
    • CompTIA CASP CAS-002: Technical Integration of Enterprise Components
    • CompTIA CASP+ CAS-003: Applying Research Methods for Trend and Impact Analysis
    • CompTIA CASP+ CAS-003: Business and Industry Influences and Risks
    • CS0-002 - CompTIA Cybersecurity Analyst+: Threat Monitoring
    • CS0-002 - CompTIA Cybersecurity Analyst+: User Account Security
    • CSSLP: Secure Software Concepts
    • CSSLP: Secure Software Design
    • CSSLP: Secure Software Implementation and Coding
    • CSSLP: Secure Software Requirements
    • CSSLP: Secure Software Testing
    • CSSLP: Software Acceptance, Deployment, Operations, Maintenance, and Disposal
    • CSSLP: Supply Chain and Software Acquisition
    • Cyber Security Audits
    • Cybersecurity 101: Auditing & Incident Response
    • Cybersecurity 101: Session & Risk Management
    • Data Security Breach Notification Process
    • Defensive Programmer: Advanced Concepts
    • Defensive Programmer: Code Samples
    • Defensive Programmer: Cryptography
    • Defensive Programmer: Defensive Concepts
    • Defensive Programmer: Defensive Techniques
    • Defensive Programmer: Secure Testing
    • Digital Forensic Techniques & Investigative Approaches
    • Pre-Test 5: Network Architecture and Security
    • Pre-Test 6: Cryptography
    • Pre-Test 6: Virtualization, Policies, Risk Management, and Disaster Response/Recovery
    • Preemptive Troubleshooting: Concepts & Strategies
    • Regulation Conformance for Incidence Response
    • Regulatory Mandates: Security Program Regulatory Integration
    • Risk Analysis: Security Risk Management
    • SecOps Engineer: Cloud & IoT security
    • SecOps Engineer: Secure Coding
    • SecOps Engineer: Security Engineering
    • SecOps Engineer: System Infrastructure Security
    • SecOps Engineer: Threat Mitigation
    • Securing Against Threats, Securing for Enterprise, and Jailbreaking Devices
    • Securing Mobile Devices in the Enterprise: Configuring Enterprise-level Security
    • Securing Mobile Devices in the Enterprise: Mobile Security Technologies
    • Securing Mobile Devices in the Enterprise: Mobile Security Threat Mitigation
    • Securing Mobile Devices in the Enterprise: Mobile Security Threats
    • System Security Certified Practitioner (SSCP 2018): Network Fundamentals
    • System Security Certified Practitioner (SSCP 2018): Network Security
    • System Security Certified Practitioner (SSCP 2018): Public Key Infrastructure
    • System Security Certified Practitioner (SSCP 2018): Risk Management
    • System Security Certified Practitioner (SSCP 2018): Securing Environments
    • System Security Certified Practitioner (SSCP 2018): Security Assessments
    • CEHv10: Common Web App Threats
    • CEHv10: Denial of Service
    • CEHv10: Ethical Hacking Overview and Threats
    • CEHv10: Evading IDS, Firewalls, and Honeypots Part 2
    • CEHv10: Footprinting
    • CEHv10: Hacking Concepts
    • CEHv10: Hacking Web Servers
    • CEHv10: Hidden Files and Covering Tracks
    • Certified Ethical Hacker - CEHv10: Privilege Escalation
    • Certified Ethical Hacker - CEHv10: Session Hijacking
    • Certified Ethical Hacker - CEHv10: Social Engineering
    • Certified Ethical Hacker - CEHv10: SQL Injection Types and Tools
    • Certified Ethical Hacker - CEHv10: Wireless Hacking Common Threats
    • Certified Ethical Hacker - CEHv10: Wireless Hacking Tools
    • Certified Information Systems Auditor (CISA) 2019: BCP & Network Security
    • Certified Information Systems Auditor (CISA) 2019: Continuous Monitoring
    • Certified Information Systems Auditor (CISA) 2019: Data Privacy & Risk
    • Certified Information Systems Auditor (CISA) 2019: Data Storage & Malware
    • Certified Information Systems Auditor (CISA) 2019: Digital Asset Protection
    • Certified Information Systems Auditor (CISA) 2019: Digital Evidence Gathering
    • Certified Information Systems Auditor (CISA) 2019: IAM & Data Classification
    • Certified Information Systems Auditor (CISA) 2019: Information System Auditing
    • Certified Information Systems Auditor (CISA) 2019: IT Management Frameworks
    • CompTIA CASP+ CAS-003: Conducting Security Assessments
    • CompTIA CASP+ CAS-003: Implementing Cryptographic Techniques
    • CompTIA CASP+ CAS-003: Implementing Incident Response and Recovery
    • CompTIA CASP+ CAS-003: Implementing Security Activities across the Technology Life Cycle
    • CompTIA CASP+ CAS-003: Integrating and Troubleshooting Advanced AAA Technologies
    • CompTIA CASP+ CAS-003: Integrating Cloud and Virtualization Technologies in the Enterprise
    • CompTIA CASP+ CAS-003: Integrating Controls for Mobile and Small Form Factor Devices
    • CompTIA CASP+ CAS-003: Integrating Hosts, Storage, and Applications in the Enterprise
    • CompTIA CASP+ CAS-003: Integrating Network and Security Components, Concepts, and Architectures
    • CompTIA CASP+ CAS-003: Integrating Security Controls for Host Devices
    • CompTIA CASP+ CAS-003: Interacting across Diverse Business Units
    • CompTIA CASP+ CAS-003: Organizational Security and Privacy Policies
    • CompTIA CASP+ CAS-003: Risk Metric Scenarios for Enterprise Security
    • CompTIA CASP+ CAS-003: Risk Mitigation Strategies and Controls
    • Encore Session 1: Threats and Attacks
    • Encore Session 1: Understanding Network Security
    • Encore Session 2: Compliance and Operational Security
    • Encore Session 2: Vulnerabilities and Organizational Security
    • Encore Session 3: Cryptography, Keys, and Wireless Security
    • Encore Session 3: Threats and Vulnerabilities
    • Encore Session 4: Application, Host and Data Security
    • Encore Session 4: Security Protocols and Issues, Identity and Access
    • Encore Session 5: Access Control and Identity Management
    • Encore Session 5: Network Architecture and Security
    • Encore Session 6: Cryptography
    • Encore Session 6: Virtualization, Policies, Risk Management, and Disaster Response/Recovery
    • End-User Security: Securing End Users against Attackers
    • End-User Security: The End-User Perspective
    • End-User Security: The Security Administrator Perspective
    • Ethical Hacker: Account Creation
    • Ethical Hacker: Hacking Techniques
    • Ethical Hacker: Incident Response
    • Ethical Hacker: Risk Assessment
    • Ethical Hacker: Scanning
    • Securing User Accounts: Authorization, Registration, and Passwords
    • Securing User Accounts: Fundamental Security Concepts
    • Securing User Accounts: Logon, Logoff, Account Changes, and Attack Mitigation
    • Security Architect: Ethical Hacking Best Practices
    • Security Architectures: Defensible Security
    • Security Best Practices: Network Appliance Security
    • Security Fundamentals: Authentication
    • Security Fundamentals: Authentication, Passwords & Audit Policies
    • Security Fundamentals: Client and Email Security
    • Security Fundamentals: Core Security
    • Security Fundamentals: Encryption and Malware
    • Security Fundamentals: Firewalls
    • Security Fundamentals: Internet and Wireless Security
    • Security Fundamentals: Network Isolation
    • Security Fundamentals: Permissions
    • Security Fundamentals: Protocol Security
    • Security Fundamentals: Server Protection
    • Security Incident Triage
    • Security Measures: Implementing Security Controls
    • System Security Certified Practitioner (SSCP 2018): Security Concepts
    • System Security Certified Practitioner (SSCP 2018): Security Controls
    • Systems Security Certified Practitioner: Access Controls
    • Systems Security Certified Practitioner: Cryptography
    • Systems Security Certified Practitioner: Incident Response and Recovery
    • Systems Security Certified Practitioner: Network and Communications Security
    • CEHv10: Host Discovery and Scanning with Nmap
    • CEHv10: IoT Hacking and Countermeasures
    • CEHv10: Network Sniffing
    • CEHv10: Password Attacks
    • CEHv10: Password Attacks Part 2
    • CEHv10: Pentesting, Laws, and Standards
    • CEHv10: ProxyChains and Enumeration
    • CEHv10: Security Controls
    • CEHv10: Security Controls Part 2
    • Certified Information Systems Auditor (CISA) 2019: Performance & Management
    • Certified Information Systems Auditor (CISA) 2019: PKI & Data Protection
    • Certified Information Systems Auditor (CISA) 2019: Scenario-Based Practice
    • Certified Information Systems Auditor (CISA) 2019: System Design & Analysis
    • Certified Information Systems Auditor (CISA) 2019: Testing & Vulnerability
    • Certified Information Systems Auditor (CISA) 2019: Virtualization & Cloud
    • Certified Secure Software Lifecycle Professional (CSSLP) 2019: Abuse Cases & RTMs
    • Certified Secure Software Lifecycle Professional (CSSLP) 2019: Architectural Risk Assessment, Secure
    • Certified Secure Software Lifecycle Professional (CSSLP) 2019: Core Concepts
    • Certified Secure Software Lifecycle Professional (CSSLP) 2019: Data Classification
    • Certified Secure Software Lifecycle Professional (CSSLP) 2019: Governance, Risk, & Compliance
    • Certified Secure Software Lifecycle Professional (CSSLP) 2019: Privacy
    • Certified Secure Software Lifecycle Professional (CSSLP) 2019: Secure Coding Practices
    • Certified Secure Software Lifecycle Professional (CSSLP) 2019: Secure Design Principles
    • CompTIA CASP+ CAS-003: Secure Communication and Collaboration Solutions
    • CompTIA CASP+ CAS-003: Selecting Software Security Controls
    • CompTIA Cybersecurity Analyst+ CS0-001: Investigate Security Incidents
    • CompTIA Cybersecurity Analyst+ CS0-001: Monitoring for Security Issues
    • CompTIA Cybersecurity Analyst+ CS0-001: Network Architecture and Reconnaissance
    • CompTIA Cybersecurity Analyst+ CS0-001: Reducing Vulnerabilities
    • CompTIA Cybersecurity Analyst+ CS0-001: Threat Identification
    • CompTIA Cybersecurity Analyst+ CS0-001: Threat Mitigation
    • CompTIA PenTest+: Analyzing Tool and Script Output
    • CompTIA PenTest+: Application-Based vulnerabilities
    • CompTIA PenTest+: Information Gathering
    • CompTIA PenTest+: Local Host Vulnerabilities
    • CompTIA PenTest+: Network-Based Exploits
    • CompTIA PenTest+: Penetration Testing Tools
    • CompTIA PenTest+: Planning for an Engagement
    • CompTIA PenTest+: Post-Exploitation and Facilities Attacks
    • CompTIA PenTest+: Reporting and Communication
    • Ethical Hacker: Secure Technology & Applications
    • Ethical Hacker: Security Standards
    • Ethics & Privacy: Digital Forensics
    • Incident Tracking & Response
    • Information Security Incident Management (Part 1)
    • Information Security Program Development and Management (Part 2)
    • Information Security: APT Defenses
    • Information Security: Continual Infrastructure Testing
    • Information Security: Hardened Security Topologies
    • Information Security: Honeypots
    • Information Security: NACs & Gateways
    • Information Security: Pen Testing
    • Information Security: Securing Networking Protocols
    • Information Security: Security Governance
    • Information Security: Subnetting & DNS for Security Architects
    • Information Systems Security and Audit Professional
    • Intelligent Orchestration: Automating Security Incident Processing
    • Introduction to COBIT 5
    • Intrusion Detection: Best Practices
    • Intrusion Prevention: Best Practices
    • iOS Security Architecture and Application Data Protection
    • Security Rules: Rules of Engagement
    • Security Software Assessments: Security Software Assessments
    • Security Strategy: Patch Management Strategies
    • Security Topologies: Developing Secure Networks
    • Security Vulnerabilities: Managing Threats & Vulnerabilities
    • SSCP Domain : Networks and Telecommunications Part 2
    • SSCP Domain: Access Controls
    • SYO-601 - CompTIA Security+: Analyzing Application & Network Attacks
    • SYO-601 - CompTIA Security+: Social Engineering Techniques & Attack Types
    • System Security Certified Practitioner (SSCP 2018): Asset & Change Management
    • System Security Certified Practitioner (SSCP 2018): Business Continuity
    • System Security Certified Practitioner (SSCP 2018): Controlling Resource Access
    • System Security Certified Practitioner (SSCP 2018): Cryptography Primer
    • System Security Certified Practitioner (SSCP 2018): Digital Forensics
    • System Security Certified Practitioner (SSCP 2018): Identity Management
    • System Security Certified Practitioner (SSCP 2018): Malware & Endpoint Security
    • Systems Security Certified Practitioner: Risk Management
    • Systems Security Certified Practitioner: Security Administration
    • Systems Security Certified Practitioner: Security Operations
    • Systems Security Certified Practitioner: Systems and Application Security
    • TestPrep Certified Information Systems Security Professional (CISSP)
    • Unified Security: Playbook Approach to Security
    • Vulnerabilities and Exploits
    • Wi-Fi Penetration Testing

    Warranty & Returns

    Warranty, Returns, And Additional Information

    Return Policies

    • Return for refund within: non-refundable
    • Return for replacement within: non-replaceable
    • This item is covered by Newegg.com's Digital Products Return Policy. Read full return policy for details.

    Manufacturer Contact Info

    LOADING...