Our Courses
We offer hundreds of courses in Cybersecurity, IT, Soft Skills, and Management and we’re adding more all the time. Please use the search bar or filter by topic and/or skill level to find your content and get started!

Access 2016 Essentials
By Phoenix TSLearners will gain a fundamental understanding of this database application’s environment and basic database principles. They will be able to demonstrate the correct use of key features and the ability to create and maintain tables, relationships, forms, reports, and queries.

Access Control (CMMC)
Understand and implement essential access control measures to protect sensitive information, focusing on user permissions, authentication, and monitoring in compliance with CMMC.

Accredited ISO/IEC 20,000:2018
By ACI-LearningISO/IEC 20000, often referred to simply as ISO 20000, is the international IT service management (ITSM) standard that enables IT organizations (whether in-house, outsourced, or external) to ensure that their ITSM processes are aligned both with the needs of the business and with international best practice.In this training, you will learn how ISO 20000 helps […]

Accredited ISO/IEC 27,001 Foundation
By ACI-LearningIn this series we explore the concepts of the ISO / IEC 27,000 standard and prepare for the ISO / IEC 27,000 Information Security Management examination accredited by EXIN.

Accredited SIAM Foundation
By ACI-LearningService Integration and Management (SIAM) is a management methodology for environments where services are sourced from multiple service providers and not just a single service provider. In this series we explore the SIAM Eco-system including the business case for SIAM, the benefits of the methodology, the processes involved, and the challenges to implementing and maintaining […]

Administrative Office Procedures
Administrative office procedures may not be glamorous, but they are essential to the success of any enterprise. A well run office reduces miscommunications and helps to eliminate common errors. By making the administrative office a priority, you will establish clear policies and procedures with employee understanding and buy-in, which ensures that your work environment runs […]

Administrative Safeguards For HIPAA
By ecfirstLearners in this self-paced, on-demand, online course gain a thorough understanding of how Insider Threats Awareness is an essential component of a comprehensive cyber security program. Using case studies and real-life examples, the course teaches the common indicators which highlight actions and behaviors that can signify an insider threat within the place of duty. Upon […]

Administrative Support
By Cyber PhoenixAdministrative assistants are a key part of most office environments. They work quietly in the background, ensuring that the business runs smoothly and efficiently. This workshop will give new administrative assistants tools that will make them that person that the office can’t live without. Experienced administrative assistants will learn new tools that will make them […]

Amazon Web Services Exam Prep (AWS)
The purpose of this Test Prep is to provide you with test questions that will make you familiar with the questions on the Amazon Web Services certification exams. Designed by IT experts, this test prep is a great way to prepare for your Amazon Web Services certification exam and excel.

Archiving And Records Management
By Cyber PhoenixEvery organization is responsible for maintaining records. The ability to create, organize, and maintain records and archives is essential to success. Correct records keeping will not only offer liability protection; it will also increase efficiency and productivity. To put it simply, maintaining records and archives will improve the bottom line.

ARM-32 COURSE 1
By Illuminati PartyReverse Engineering For Everyone! — by @mytechnotalent Wait, what’s reverse engineering? Wikipedia defines it as: Reverse engineering, also called backwards engineering or back engineering, is the process by which an artificial object is deconstructed to reveal its designs, architecture, code, or to extract knowledge from the object. It is similar to scientific research, the only […]

ARM-32 COURSE 2
By Illuminati PartyReverse Engineering For Everyone! by @mytechnotalent Wait, what’s reverse engineering? Wikipedia defines it as: Reverse engineering, also called backwards engineering or back engineering, is the process by which an artificial object is deconstructed to reveal its designs, architecture, code, or to extract knowledge from the object. It is similar to scientific research, the only difference […]

ARM-64 Course
By Illuminati PartyReverse Engineering For Everyone! by @mytechnotalent Wait, what’s reverse engineering? Wikipedia defines it as: Reverse engineering, also called backwards engineering or back engineering, is the process by which an artificial object is deconstructed to reveal its designs, architecture, code, or to extract knowledge from the object. It is similar to scientific research, the only difference […]

Assertive And Self-Confidence
By Cyber PhoenixSelf-confidence and assertiveness are two skills that are crucial for success in life. If an individual don”t feel worthy, and/or they don”t know how to express their self-worth when communicating with others, life can be very painful. These skills will provide opportunities and benefits to your participants in their professional and personal lives.

Attention Management
By Cyber PhoenixA distracted employee is a less effective employee. Employees who do not pay attention can waste valuable time and make careless mistakes. Your participants will be more efficient at their job, make fewer mistakes, and be more productive overall.

Audit & Accountability (CMMC)
Learn the principles of auditing and accountability to ensure all actions on your information systems are traceable, aiding compliance with CMMC standards.

Awareness & Training (CMMC)
Equip your team with the knowledge and skills to recognize and respond to security threats, fostering a culture of cybersecurity awareness and training in line with CMMC standards.

AZ-104T00 Microsoft Azure Administrator
Welcome to the Phoenix TS Learning Portal hosted by Cyber Phoenix! This Microsoft course teaches IT Professionals how to manage their Azure subscriptions, secure identities, administer the infrastructure, configure virtual networking, connect Azure and on-premises sites, manage network traffic, implement storage solutions, create and scale virtual machines, implement web apps and containers, back up and […]

Basic Bookkeping
By Cyber PhoenixNumbers! Numbers! Numbers! Wherever you go, you are bound to see them. On addresses, license plates, phones, prices, and of course, money! Numbers connect us all to each other in many more ways than we might imagine. Essentially, our world revolves around numbers.

Business Acumen
By Cyber PhoenixThrough our Business Acumen course, participants will improve their judgment and decisiveness skills. Business Acumen is all about seeing the big picture and recognizing that all decisions no matter how small can have an effect on the bottom line. Participants will increase their financial literacy and improve their business sense.

Business Continuity And Disaster Recovery
By ACI-LearningPlanning, creating, maintaining and testing a Business Continuity Disaster Recovery plan can be a daunting task. If you have been assigned this responsibility, you are in the right place. We have Rob Carson from SemperSec in the studios to lend his considerable expertise. With 10+ years in the Information Security industry, Rob is able to […]

Business Ethics
By Cyber PhoenixA company”s ethics will determine its reputation. Good business ethics are essential for the long-term success of an organization. Implementing an ethical program will foster successful company culture and increase profitability. Developing a Business Ethics program takes time and effort, but doing so will do more than improve business, it will change lives.

Business Etiguette
By Cyber PhoenixThis course examines the basics, most importantly to be considerate of others, dress/appearance, the workplace versus social situations, business meetings, proper introductions and “the handshake”, conversation skills/small talk, cultural differences affecting international business opportunities, dealing with interruptions, and proper business email and telephone etiquette. Have you ever been in a situation where:

Business Succession Planing
By Cyber PhoenixBusiness succession planning is all about being prepared. The loss of valuable leadership can cripple even the strongest of companies. Succession planning is an essential component to the survival and growth of any business. Whether it is grooming employees to become leaders, or preparing for an employee”s retirement your participants will identify common obstacles and […]

Business Writing
By Cyber PhoenixWriting is a key method of communication for most people, and it’s one that many people struggle with. Writing and communication skills have degraded with more and more people communicating through email and text messaging. Developing writing skills is still important in the business world as creating proper documents (such as proposals, reports, and agendas), […]