Which Path is   Right for You?

Are you an End User? IT Professional who doesn't work on cybersecurity? IT Cybersecurity Professional looking to advance your career or stay up-to-date on the latest technological advances? In any case, you have come to the right place!

Welcome to the New Horizons Cybersecurity Interactive Map. Click on the job role/function that best describes you now or best describes where you would like to advance.

Each section offers a series of courses that best fit the role and experience level chosen. Hover over the course titles to see further information that will assist you in making the most informed decisions.

The information obtained through this map can be used when having a conversation with any of our Cybersecurity Sales Experts in designing the best learning path for you!

End User

You have nothing to do with the cybersecurity implementation or policy of your company but you have access to mail and databases through company servers on both company-owned and personal devices.

View Courses  

CompTIA
CyberSecure
Who Should Attend
All employees at any level of an organization who require a fundamental overview of security issues.

What Is This Course About?
CompTIA CyberSecure is a self-paced training course that teaches employees how to follow security practices vital to protecting the business.
The 60-minute training focuses on situations relevant to everyone from the receptionist to the CEO …not just the IT department.
Coming Soon
CyberSAFE
(Securing Assets for
the End User)
Who Should Attend
This course is designed for non-technical end-users of computers, mobile devices, networks, and the Internet, to enable them to use technology more securely.

What Is This Course About?
This course will help you to understand security compliance considerations, social engineering, malware, and various other data security-related concepts. In this course, you will explore the hazards and pitfalls and learn how to use technology safely.
Learn More
RESILIA™
Foundation
Who Should Attend:
The RESILIA Foundation course audience includes all teams across the IT and Risk functions, including IT Service Management, Business Analysts and Designers, Development teams, IT Project & Program Management teams, and Risk and Compliance teams.

What Is This Course About?
In this course, students learn key terms, the distinction between resilience and security, and the benefits of implementing cyber resilience. This course also introduces risk management and the key activities needed to address risks and opportunities.
Learn More
IT Professional
(non-security)

Your primary responsibilities involve the design, implementation, management, and administration of network servers and other company devices. Security is not part of your job function but cybersecurity knowledge would be beneficial.
View Courses  

CompTIA A+
Who Should Attend
Those who are getting ready for a career as an entry-level information technology (IT) professional or personal computer (PC) service technician.

What Is This Course About?
In this course, you will acquire the essential skills and information you will need to install, upgrade, repair, configure, troubleshoot, optimize, and perform preventative maintenance of basic personal computer hardware and operating systems.
Learn More
CompTIA
Security+
Who Should Attend
This course is targeted toward the information technology (IT) professional who has networking and administrative skills in Windows®-based Transmission Control Protocol/Internet Protocol (TCP/IP) networks; familiarity with other operating systems, such as Mac OS X, Unix, or Linux; and who wants to further a career in IT by acquiring foundational knowledge of security topics; prepare for the CompTIA Security+ certification examination; or use Security+ as the foundation for advanced security certifications or career roles.

What Is This Course About?
In this course, students will implement, monitor, and troubleshoot infrastructure, application, information, and operational security. Students will prepare for the CompTIA Security+ certification examination (SY0-401).
Learn More
RESILIA™
Practictioner
Who Should Attend:
The RESILIA Practitioner course audience includes all teams across the Business, IT and Risk functions, including IT Service Management, Business Analysts and Designers, Development teams, IT Project and Program Management teams, and Risk & Compliance Teams.

What Is This Course About?
In this course, students begin by revisiting the concepts acquired in the Foundation course. Then, students learn to distinguish between key terms & determine the activities needed to address risks & opportunities, as well as create a risk treatment plan.
Learn More
IT Professional
(some security)

Your primary responsibilities involve the design, implementation, management, and administration of network servers and other company devices. Fundamental aspects of cybersecurity is currently a part of, or is becoming a part of, your job role.
View Courses  

CyberSec
First Responder
Threat Detection
and Response
Who Should Attend
This course is designed for IT professionals who perform job functions related to the development, operation, management, and enforcement of security

What Is This Course About?
In this course, students develop, operate, manage, and enforce security capabilities for systems and networks, including assessing information security risk in computing and network environments, designing and operating secure computing and network environments, and collecting cybersecurity intelligence information.
Learn More
Cisco
Interconnecting Cisco
Networking Devices
Part 1
(ICND1)
Who Should Attend
This course is designed for network administrators, support engineers, engineer associates, network specialists, analysts, and those pursing the CCNA Security certification.

What Is This Course About?
In this course, you will learn how to install, operate, configure, and verify a basic IPv4 and IPv6 network, including configuring a LAN switch, configuring an IP router, managing network devices, and identifying basic security threats. The goal of the course is to provide you with the knowledge and skills necessary to install, configure, and operate a small- to medium-sized network.
Learn More
Implementing
Cisco IOS
Network Security
(IINS)
Who Should Attend:
This course is of benefit to network designers, network, systems, and security engineers, network and security managers, and those looking to complete their CCNA Security certification.

What Is This Course About?
In this course, you will learn about the design, implementation, and monitoring of a comprehensive security policy using Cisco IOS security features and technologies as examples. You will also learn about security controls of Cisco IOS devices as well as a functional introduction to the Cisco Adaptive Security Appliance (ASA). This course enables you to perform basic tasks to secure a network using Cisco IOS security features, which are available through web-based GUIs on the Cisco ASA, and the command-line interface (CLI) on Cisco routers and switches.
Learn More
Firewall
Installation,
Configuration and
Management
Essentials I
(PAN-201)
Who Should Attend:
This course is suited for Security Engineers, Network Engineers, and support staff who want to install, configure, and manage the entire line of Palo Alto Networks Next-Generation firewalls.

What Is This Course About?
Students attending this introductory-level class will gain an in-depth knowledge of how to install, configure, and manage their firewall, as well as configuration steps for the security, networking, threat prevention, logging, and reporting features of the Palo Alto Networks Operating System.
Learn More
Firewall
Installation,
Configuration and
Management
Essentials II
(PAN-205)
Who Should Attend:
This course is suited for Security Engineers, Network Engineers, and support staff who wish to expand on the concepts taught in Course PAN-201 and explore many new features and functions of Palo Alto Networks Next-Generation firewalls.

What Is This Course About?
Successful completion of this two-day, instructor-led course will enhance the student’s understanding of how to install, configure, manage, and perform basic troubleshooting on the entire line of Palo Alto Networks Next-Generation firewalls. Additionally, students will be instructed on the basics of implementing and managing GlobalProtect and Active/Active High Availability. Students will gain an in-depth knowledge of how to optimize their visibility and control over applications, users, and content.
Learn More
IT Cybersecurity Professional
(0-2 years experience)

Your primary focus is on the cybersecurity of your organization's data and equipment. You are involved in the day-to-day implementation and compliance of your organization's security policies. You have six months to less than two years experience as a Cybersecurity Professional.
View Courses  

CompTIA
Security+
Who Should Attend
This course is targeted toward the information technology (IT) professional who has networking and administrative skills in Windows®-based Transmission Control Protocol/Internet Protocol (TCP/IP) networks; familiarity with other operating systems, such as Mac OS X, Unix, or Linux; and who wants to further a career in IT by acquiring foundational knowledge of security topics; prepare for the CompTIA Security+ certification examination; or use Security+ as the foundation for advanced security certifications or career roles.

What Is This Course About?
In this course, students will implement, monitor, and troubleshoot infrastructure, application, information, and operational security. Students will prepare for the CompTIA Security+ certification examination (SY0-401).
Learn More
Certified Network
Defender (CND)
Who Should Attend
This course is designed for network administrators, security administrators and engineers, network defense technicians, CND analysts and security analysts, security operators, as well as anyone involved in network operations.

What Is This Course About?
Certified Network Defender (CND) is a vendor-neutral, comprehensive network security certification training program. CND is based on a job-task analysis and cybersecurity education framework presented by the National Initiative of Cybersecurity Education (NICE). The course has also been mapped to global job roles and responsibilities and the Department of Defense (DoD) job roles for system/network administrators. CND prepares network administrators on network security technologies and operations to attain Defense-in-Depth network security preparedness
Coming Soon
CyberSec
First Responder
Threat Detection
and Response
Who Should Attend
This course is designed for IT professionals who perform job functions related to the development, operation, management, and enforcement of security capabilities for systems and networks.

What Is This Course About?
In this course, students develop, operate, manage, and enforce security capabilities for systems and networks, including assessing information security risk in computing and network environments, designing and operating secure computing and network environments, and collecting cybersecurity intelligence information.
Learn More
CSX Practitioner:
Identification
and Protection
Who Should Attend:
The Identification and Protection course is ideal for individuals in the field of cyber security who are interested in gaining hands-on technical skills.

What Is This Course About?
The first course in the CSX Practitioner series focuses on key cyber security skills and includes foundational, real world instruction in the Identify and Protect domains. Topics range from preliminary network scanning to security control implementation. Through the completion of multiple lab-reinforced modules, students will learn how to apply industry-developed, experience-based methods to the identification of key networks and learn to develop appropriate protection mechanisms.
Coming Soon
CSX Practitioner:
Detection
Who Should Attend:
The Detection course is ideal for individuals in the field of cybersecurity who are interested in gaining hands-on technical skills.

What Is This Course About?
The second course in the CSX Practitioner series goes deeper into skills focused in the Detect domain. Students will learn the basic concepts, methods and tools used to leverage cybersecurity controls in order to identify system events and non-event level incidents. By completing multiple lab-reinforced modules, students will gain the skills necessary to detect potential network events and incidents. Topics range from incident packet analysis to Incident Response (IR) report drafting and generation.
Coming Soon
CSX Practitioner:
Respond
and Recover
Who Should Attend:
The Respond and Recover course is ideal for individuals in the field of cybersecurity who are interested in gaining hands-on technical skills.

What Is This Course About?
The final course in the CSX Practitioner series provides hands-on instruction in the Respond and Recover domains. With course lecture backed up by lab sequences, students will learn how to apply professional methodology to respond and recover from network incidents or disasters. Students will discover how to contain an event and protect assets and infrastructure, and learn the components and procedures required for a comprehensive incident response plan.

The Respond domain shows students the basic concepts, methods and tools required to draft and execute comprehensive incident response plans, provide proper isolation response documentation, and how to document and maintain information related to Incident Response.

In the Recover domain, students will master the basic concepts, methods and tools required to recuperate a system or network, as well as learn how to implement continuity and contingency plans.
Coming Soon
RESILIA™
Practictioner
Who Should Attend:
The RESILIA Practitioner course audience includes all teams across the Business, IT and Risk functions, including IT Service Management, Business Analysts and Designers, Development teams, IT Project and Program Management teams, and Risk & Compliance Teams.

What Is This Course About?
In this course, students begin by revisiting the concepts acquired in the Foundation course. Then, students learn to distinguish between key terms & determine the activities needed to address risks & opportunities, as well as create a risk treatment plan.
Learn More
Implementing
Cisco IOS
Network Security
(IINS)
Who Should Attend:
This course is of benefit to network designers, network, systems, and security engineers, network and security managers, and those looking to complete their CCNA Security certification.

What Is This Course About?
In this course, you will learn about the design, implementation, and monitoring of a comprehensive security policy using Cisco IOS security features and technologies as examples. You will also learn about security controls of Cisco IOS devices as well as a functional introduction to the Cisco Adaptive Security Appliance (ASA). This course enables you to perform basic tasks to secure a network using Cisco IOS security features, which are available through web-based GUIs on the Cisco ASA, and the command-line interface (CLI) on Cisco routers and switches.
Learn More
Firewall
Installation,
Configuration and
Management
Essentials I
(PAN-201)
Who Should Attend:
This course is suited for Security Engineers, Network Engineers, and support staff who want to install, configure, and manage the entire line of Palo Alto Networks Next-Generation firewalls.

What Is This Course About?
Students attending this introductory-level class will gain an in-depth knowledge of how to install, configure, and manage their firewall, as well as configuration steps for the security, networking, threat prevention, logging, and reporting features of the Palo Alto Networks Operating System.
Learn More
Firewall
Installation,
Configuration and
Management
Essentials II
(PAN-205)
Who Should Attend:
This course is suited for Security Engineers, Network Engineers, and support staff who wish to expand on the concepts taught in Course PAN-201 and explore many new features and functions of Palo Alto Networks Next-Generation firewalls.

What Is This Course About?
Successful completion of this two-day, instructor-led course will enhance the student’s understanding of how to install, configure, manage, and perform basic troubleshooting on the entire line of Palo Alto Networks Next-Generation firewalls. Additionally, students will be instructed on the basics of implementing and managing GlobalProtect and Active/Active High Availability. Students will gain an in-depth knowledge of how to optimize their visibility and control over applications, users, and content.
Learn More
IT Cybersecurity Professional
(2-5 years experience)

Your primary focus is on the cybersecurity of your organization's data and equipment. You are involved in the day-to-day implementation and compliance of your organization's security policies. You are possibly in some kind of management or oversight position. You have more than two years experience and less than five years experience as a Cybersecurity Professional.
View Courses  

EC-Council
Certified Ethical
Hacker (CEH)
Who Should Attend
The Certified Ethical Hacking course will significantly benefit security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure.

What Is This Course About?
In 18 comprehensive modules, the course covers 270 attack technologies, commonly used by hackers. Throughout the CEH course, you will be immersed in a hacker's mindset, evaluating not just logical, but physical security.
Learn More
CompTIA Advanced
Security
Practioner
(CASP)
Who Should Attend
This course is designed for IT professionals who want to acquire the technical knowledge and skills needed to conceptualize, engineer, integrate, and implement secure solutions across complex enterprise environments. The target student should aspire to apply critical thinking and judgment across a broad spectrum of security disciplines to propose and implement sustainable security solutions that map to organizational strategies; translate business needs into security requirements; analyze risk impact; and respond to security incidents. This course is also designed for students who are seeking the CompTIA Advanced Security Practitioner (CASP) certification and who want to prepare for Exam CAS-002. Students seeking CASP certification should have at least 10 years of experience in IT management, with at least 5 years of hands-on technical security experience.

What Is This Course About?
In this course, you will expand on your knowledge of information security to apply more advanced principles that will keep your organization safe from the many ways it can be threatened. This course prepares students for the CAS-002 exam.
Learn More
CompTIA
Cybersecurity
Analyst
(CSA+)
Who Should Attend
IT professionals with (or seeking) job roles such as IT Security Analyst, Security Operations Center (SOC) Analyst, Vulnerability Analyst, Cybersecurity Specialist, Threat Intelligence Analyst, and Security Engineer.

What Is This Course About?
CompTIA’s Cybersecurity Analyst (CSA+) training from New Horizons teaches students to apply behavioral analytics to improve the overall state of IT security, providing critical knowledge and skills that are required to prevent, detect and combat cybersecurity threats.
Learn More
CSX Specialist:
Identify
and Protect
Who Should Attend:
The Identify and Protect course is ideal for experienced individuals in the field of cyber security who are interested in gaining hands-on technical skills.

What Is This Course About?
This week-long course will help students gain an intermediate-level understanding of the concepts, skills and tools required to identify threats and weaknesses and protect an organization from cyber attacks.  They will learn how to analyze and assess cyber threats against multiple levels of infrastructure, from host to system-level, using industry accepted methods and tools as governed by the NIST and ISO publication guidelines.  In addition, students will learn to establish, maintain, and develop a holistic protection policy for the networks under their responsibility – including network protection techniques, such as Intrusion Detection System (IDS) implementation and firewall rule configuration – and how to use specific tools in protecting a network.
Coming Soon
CSX Specialist:
Detect
Who Should Attend:
The Detect course is ideal for experienced individuals in the field of cyber security who are interested in gaining hands-on technical skills.

What Is This Course About?
This week-long course will help students gain an intermediate-level understanding of the concepts, skills and tools required to discover and differentiate incidents and events on their networks of responsibility. They will learn threat detection techniques, such as traffic monitoring and analysis, false positive minimization, and false negative eradication. In addition, they will learn how to utilize specialized tools, such as Wireshark and TCPdump to detect threats.

The Detect domain teaches students to distinguish network and system incidents and events. Students will learn to identify compromise indicators, assess potential damage, and provide appropriate data to first response teams.
Learn More
CSX Specialist:
Respond
and Recover
Who Should Attend:
The Respond and Recover course is ideal for experienced individuals in the field of cyber security who are interested in gaining hands-on technical skills.

What Is This Course About?
This week-long course will help students gain an intermediate-level understanding of the concepts, skills and tools required to maintain, enact and develop organizationally unique incident response plans. They will learn response techniques, such as malware removal, account deletion, and access revocation. In addition, they will understand how to utilize specialized malware identification and removal tools. In addition, students will learn how to execute tasks identified in organizational Business Continuity Plans (BCP) and Disaster Recovery Plans (DRP). They will learn to utilize recovery techniques, such as data integrity evaluation, alternative site maintenance and post event restoration. In addition, they will learn how to use specialized integrity evaluation and backup dispersion tools.
Coming Soon
Firewall: Advanced
Threat
Management
(PAN-231)
Who Should Attend:
This course is suited for firewall administrators, network security administrators, and other technical professionals who have completed PAN-201 and have an understanding of network concepts, including routing, switching, and IP addressing. They also will need in-depth knowledge of port-based security and security technologies such as IPS, proxy, and content filtering.

What Is This Course About?
This two-day, instructor-led course teaches strategies in defense against cyberthreats. Successful completion of this course enables administrators to better understand the threat landscape. Students will learn the use of Palo Alto Networks next-generation firewalls, including the WildFire product.
Learn More
Implementing
Core Cisco
ASA Security
(SASAC)
Who Should Attend:
Network engineers supporting Cisco ASA 9.x implementations

What Is This Course About?
Implementing Core Cisco ASA Securityis designed designed to provide students with the necessary knowledge and skills to implement core Cisco ASA including the new ASA 9.0 and 9.1 features.
Learn More
Implementing
Advanced Cisco
ASA Security
(SASAA)
Who Should Attend:
Network administrators, managers, coordinators, anyone who requires advanced training on the ASA 5500-X Security technicians, administrators, and engineers

What Is This Course About?
This course provides advanced training on the key Cisco Adaptive Security Appliance (ASA)
Learn More
Implementing and
Configuring
Cisco Identity
Services Engine
for Wireless
Engineers (SISE)
Who Should Attend:
Security architects, design engineers, network designers, network administrators, field enginers, who implement and maintain Cisco ISE networks

What Is This Course About?
This course discusses the Cisco Identity Services Engine (ISE),and provides students with the knowledge and skills to enforce security posture compliance for wired and wireless endpoints and enhance infrastructure security using the Cisco ISE.
Learn More
IT Cybersecurity Professional
(5+ years experience)

Your primary focus is on the cybersecurity of your organization's data and equipment. You are involved in the implementation and compliance of your organization's security policies. You are possibly in some kind of senior management or cybersecurity strategy position. You have more than five years experience as a Cybersecurity Professional.
View Courses  

Certified
Information System
Security Professional
(CISSP)
Who Should Attend
This course is intended for experienced IT security-related practitioners, auditors, consultants, investigators, or instructors, including network or security analysts and engineers, network administrators, information security specialists, and risk management professionals, who are pursuing CISSP training and certification to acquire the credibility and mobility to advance within their current computer security careers or to migrate to a related career. Through the study of all 10 CISSP CBK domains, students will validate their knowledge by meeting the necessary preparation requirements to qualify to sit for the CISSP certification exam. The CISSP exam is intentionally difficult and should not be taken lightly. Even students with years of security experience should assume that they will have additional study time after class. Because the domains are so varied, it is unlikely that any one student will have experience in all 10 domains.

What Is This Course About?
In this course, students will analyze a wide range of information systems security subjects that are organized into 10 domains for CISSP exam certification.
Learn More
Implementing
Cisco Edge
Network Security
Solutions (SENSS)
Who Should Attend
Network security engineers looking for specific insight into Cisco product security and those working toward the CCNP Security certification. Holding the CCNA Security certification or possessing equivalent knowledge is assumed.

What Is This Course About?
The student will gain hands-on experience with configuring various perimeter security solutions for mitigating outside threats and securing network zones.
Learn More
Implementing
Cisco Threat
Control Solutions
(SITCS1)
Who Should Attend:
Network security engineers looking for specific insight into Cisco product security and those working toward the CCNP Security certification. Holding the CCNA Security certification or possessing equivalent knowledge is assumed.

What Is This Course About?
This course is designed to prepare security engineers with the knowledge and hands-on experience so that they can deploy Cisco's Next Generation Firewall (NGFW) as well as Web Security, Email Security and Cloud Web Security.
Learn More
Implementing
Cisco Secure
Access Solutions
(SISAS)
Who Should Attend:
Network security engineers looking for specific insight into Cisco product security and those working toward the CCNP Security certification. Holding the CCNA Security certification or possessing equivalent knowledge is assumed.

What Is This Course About?
This course provides the student with foundational knowledge and the capabilities to implement and managed network access security by utilizing Cisco ISE appliance product solution.
Learn More
Implementing
Cisco Secure
Mobility Solutions
(SIMOS)
Who Should Attend:
Who Should Attend Network security engineers looking for specific insight into Cisco product security and those working toward the CCNP Security certification. Holding the CCNA Security certification or possessing equivalent knowledge is assumed.

What Is This Course About?
Students of this course will gain hands-on experience with configuring and troubleshooting remote access and site-to-site VPN solutions, using Cisco ASA adaptive security appliances and Cisco IOS routers.
Learn More
Securing Cisco
Networks with
Threat Detection
and Analysis
(SCYBER)
Who Should Attend:
This course is designed for technical and security professionals who need to know how to monitor, analyze, and respond to network security threats and attacks.

What Is This Course About?
This course is designed to teach students how a network security operations center (SOC) works and how to begin to monitor, analyze, and respond to security threats within the network.
Learn More
EC-Council
Computer Hacking
Forensics
Investigator (CHFI)
Who Should Attend:
The CHFI course will benefit police and other laws enforcement personnel, defense and military personnel, e-Business security professionals, systems administrators, legal professionals, banking, insurance and other professionals, and those who work for or with government agencies.

What Is This Course About?
This course will provide participants the necessary skills to identify an intruders footprints and to properly gather the necessary evidence to prosecute in the court of law.
Learn More
EC-Council
Certified Security
Analyst (ECSA)
Who Should Attend:
Ethical Hackers, Penetration Testers, Network Server Administrators, Firewall Administrators, Security Testers, System Administrators and Risk Assessment Professionals.

What Is This Course About?
In this course will provide students will conduct a penetration test on a company that has various departments, subnets and servers, and multiple operating systems with defense mechanisms architecture that has both militarized and non-militarized zones.
Learn More