RSA Courses
Advanced Security Operations Center
RSA Security Analytics Introduction     RSA Security Analytics 10.5
What's New Overview
RSA Security Analytics Core Administration     RSA Security Analytics Foundations
RSA ECAT Fundamentals     RSA Security Analytics 10.5 Installation and Configuration
RSA Security Analytics Hunting   RSA Security Analytics Event Sources
RSA Security Analytics Incident Management   RSA Security Analytics Log Parsers Overview
RSA Security Analytics Introduction to ESA   RSA Security Analytics ESA EPL Rules
RSA ECAT Hunting   RSA Troubleshooting Security Analytics ESA Rules
RSA Security Operations Management Essentials   RSA Security Operations Management Solution Basics
RSA Hunting Workshop for Analysts RSA Security Analytics Introduction to Troubleshooting for Customers
Cyber Defense
RSA Incident Handling and Response   RSA Threat Intelligence
RSA Malware Analysis   RSA Cyber Defense Workshop
RSA Intelligence-Driven Event Analysis   RSA SOC Simulation Challenge ("SOCSim")
Governance, Risk and Compliance
GRC Overview                
RSA Getting Started with Policy and Compliance Management
RSA Archer 5.5 Administration                
RSA Getting Started with Enterprise Risk Management
RSA Archer GRC 6 Administration I RSA Archer 5.5 Advanced Administration
RSA Archer GRC 6 Administration II RSA Archer Solution Area Audit Management
RSA Archer Solutions Overview RSA Archer Solution Area IT Security Risk Management
RSA Archer Solution Area Business Resiliency RSA Archer Solution Area Regulatory and Corporate Compliance Management
RSA Archer Solution Area Operational Risk Management RSA Archer Solution Area Third Party Governance
RSA Authentication Manager 8.x Administration   RSA Via Lifecycle and Governance Administration
RSA Authentication Manager 6.1 to 8.x Data Migration     RSA Business Role Manager
RSA Authentication Manager 7.1 to 8.x Data Migration     RSA Data Access Governance Basics
RSA Authentication Manager 8.x Installation and Configuration  
Fraud Prevention
RSA Adaptive Authentication
On-Premise Administration
  RSA Adaptive Authentication 12
Security Concepts and Principles
RSA Certified Information Systems Security Professional (CISSP) Certification Boot Camp
Training Options

Cancellation Policy - All training courses are non-refundable. Rescheduling requests must be received in writing at least ten (10) days prior to the start date for the scheduled course. 100% tuition will be charged for any requests received less than ten (10) business days prior to the start date of a scheduled course. The same rules apply to web-based training courses. Please note that once a web-based training course is activated, it cannot be rescheduled.

Please read our full cancellation policy for details.

Instructor-led - Classroom training delivered globally by experienced training professionals.

Video ILT (VILT) - Provides the student with instructor-led video learning that is streamed over the internet with an intuitive navigation menu. Lecture content, lab exercises, and student materials are identical to classroom training.

E-Learning - Offers students the ability to start and stop their learning at will and participate at a pace that suits their schedule. RSA's eLearning offerings are interspersed with lecture segments as well as practical simulations.

SecurWorld Academy - eLearning for RSA Channel Partners to minimize time out of field; offers channel partners the resources and tools to make the most of their relationship with RSA.

RSA Education Course Catalog


Additional Training Available