When passwords are compromised, someone can impersonate you or your organization online and gain access to critical data. With nearly 300 billion passwords being used by people and computers worldwide, long or complex passwords no longer provide enough security.

When password security is compromised, organizations (and individuals) are vulnerable to financial losses and criminal activity. Learn how to protect your personal and organizational data against password exploitation with a course certificate from New Horizons. Our innovative Online LIVE® platform brings the full classroom experience to you, allowing you to learn from the comfort of your home. Get started today.

CyberSec First Responder™

This course covers the duties of those who are responsible for monitoring and detecting security incidents in information systems and networks, and for executing a proper response to such incidents. Depending on the size of the organization, this individual may act alone or may be a member of a cybersecurity incident response team (CSIRT). The course introduces tools and tactics to manage cybersecurity risks, identify various types of common threats, evaluate the organization's security, collect and analyze cybersecurity intelligence, and handle incidents as they occur.

Find a course near you.

EC-Council Certified Ethical Hacker (CEH) v10.0

Students will learn how to scan, test, hack and secure target systems. The course covers the Five Phases of Ethical Hacking, diving into Reconnaissance, Gaining Access, Enumeration, Maintaining Access, and covering your tracks.

Find a course near you.

Certified Information System Security Professional (CISSP)

In this course, students will expand upon their knowledge by addressing the essential elements of the 8 domains that comprise a Common Body of Knowledge (CBK)® for information systems security professionals.

Find a course near you.

CompTIA Penetration Tester (PenTest+) Certification

CompTIA PenTest+ assesses the most up-to-date penetration testing, vulnerability assessment and management skills necessary to determine the resiliency of your network against attacks. After you complete this course, you will have the skills required to customize assessment frameworks to effectively collaborate on and report findings within your organization. You will also have the best practices to communicate recommended strategies to improve the overall state of IT security at your business.

Find a course near you.