Stellar Cyber Academy

Stellar Cyber Academy provides you with the knowledge you need to effectively use the Stellar Cyber Open XDR Platform
Next Gen SIEM

On-demand Instruction

The Stellar Cyber Learning Management System
offers courses on-demand and regularly
scheduled online instructor-led courses

Courses and Certification

Learners can take the Stellar Cyber Open XDR 101 and Stellar Cyber for SOC Analyst Certification courses online on-demand and register for instructor-led courses at: Stellar Cyber Academy
Open XDR
SIEM application

Enabling Access for All

  • All team members are welcome to join Stellar Cyber Academy.
  • Learning path content is mapped to your job role.
  • Navigation is supported in the language of your choice.
  • Closed captioning for learning modules supporting multiple languages.

Useful Resources

Securing Your Oracle  Cloud Infrastructure  with Stellar Cyber
Data Sheet

Securing Your Oracle Cloud Infrastructure with Stellar Cyber

Oracle Cloud Infrastructure (OCI) is becoming popular among many organizations due to its flexibility, performance, and cost. As adoption grows,...
Read More >
Stellar Cyber SaaS –  Open XDR Delivered Immediately, Scalably and Securely
Data Sheet

Stellar Cyber SaaS – Open XDR Delivered Immediately, Scalably and Securely

Stellar Cyber’s SaaS offering is available in any Oracle Cloud Infrastructure (OCI) available region. Regions are available in North America,...
Read More >
Stellar Cyber Open-XDR Appliances
Data Sheet

Stellar Cyber Open-XDR Appliances

The appliance delivers steady data ingestion and processing performance due to its custom hardware and software design surpassing any off-theshelf...
Read More >
Stellar Cyber’s Sensors – See the Whole Picture With 360º Visibility
Data Sheet

Stellar Cyber’s Sensors – See the Whole Picture With 360º Visibility

Stellar Cyber’s Photon Sensors can identify over thousands of protocols at line-rate speeds and decode packet payloads to form useful...
Read More >

Bring Hidden
Threats to Light

Expose threats hiding in the gaps left by your
current security products, making it harder for
attackers to harm your business

Firewall Traffic Analysis