Role-Based Cybersecurity Programs

Choose a target role and follow a structured program designed to build the capabilities that role requires.

How Role-Based Tracks Work

Each program is designed around a specific cybersecurity role. You follow a defined sequence of modules, hands-on labs, and assessments aligned to real-world responsibilities of that role.

1
Choose a Target Role
2
Build Role-Specific Capabilities
3
Demonstrate Readiness Through Practice

Browse Role Tracks

Explore role-aligned programs. Each card includes a short summary and skill focus. The button stays consistent at the bottom for clear action.

Cybersecurity Fundamentals
Starter Path
Build core security knowledge and foundational skills before choosing a specialization.
Skill Focus: Security basics, risk thinking, systems awareness
Application Security Engineer
Secure web, mobile, and API-based applications across the development lifecycle.
Skill Focus: Secure coding, vulnerability analysis, threat modeling
Ethical Hacker / Penetration Tester
Identify and exploit vulnerabilities to assess real-world security posture.
Skill Focus: Offensive testing, exploitation, reporting
Cloud Security Practitioner
Secure cloud environments, services, and identities.
Skill Focus: Cloud IAM, configuration security, monitoring
SOC Analyst / Incident Response Associate
Monitor, detect, and respond to security incidents.
Skill Focus: Threat detection, alert triage, response workflows
Digital Forensics & Incident Response (DFIR)
Investigate breaches and analyze evidence after security incidents.
Skill Focus: Forensics, incident investigation, response coordination
GRC / Risk & Compliance Associate
Align security controls with business, regulatory, and risk requirements.
Skill Focus: Risk assessment, compliance frameworks, governance
IAM / Access Management Foundations
Design and manage secure access controls and identity systems.
Skill Focus: Identity lifecycle, access models, privilege management
Threat Intelligence Foundations
Analyze adversaries, campaigns, and threat data to inform defense.
Skill Focus: Threat analysis, intelligence lifecycle, reporting
AI / Agentic AI Application Security Specialist
Secure AI-driven and agent-based applications from misuse and abuse.
Skill Focus: AI threat modeling, control design, monitoring

Not Sure Which Role Fits You?

If you’re unsure which role to choose, start with fundamentals or speak with an advisor to map your background and interests to the right track.