Our Courses
We offer hundreds of courses in Cybersecurity, IT, Soft Skills, and Management and we’re adding more all the time. Please use the search bar or filter by topic and/or skill level to find your content and get started!
cloud computing
A Practical Introduction To Cloud Computing
By EC-CouncilThe 2nd top hit for ‘Cloud Computing’ on Google says, ‘Cloud computing is a general term for the delivery of hosted services over the internet.’ Unfortunately, that definition is completely wrong. This course is designed to clear up the many misunderstandings about Cloud Computing and to give you a crystal clear and easy-to-understand explanation of […]
AZ-104T00 Microsoft Azure Administrator
Welcome to the Phoenix TS Learning Portal hosted by Cyber Phoenix! This Microsoft course teaches IT Professionals how to manage their Azure subscriptions, secure identities, administer the infrastructure, configure virtual networking, connect Azure and on-premises sites, manage network traffic, implement storage solutions, create and scale virtual machines, implement web apps and containers, back up and […]
Azure Web Service With Front Door
By EC-CouncilThis course is for anyone who is looking forward to developing and hosting solutions/applications in Azure — this course is dedicated to them. Covering the fundamentals of Azure Web app services to build administrator applications at scale. Get to know what’s inside the Azure App Services, and what holds inside the service. In this course, […]
Build Microservices With Spring Cloud And Spring Boot
By EC-CouncilAre you stuck with monolith applications that serve a host of business functionalities? Does maintaining such huge applications give you nightmares? If yes, this is just the course you were looking for. It is vital that you break that monolith into small chunks of highly maintainable and modular code which provide you greater control and […]
Continuous Integration And Continuous Deployment With Azure
By EC-CouncilTo help and support a team with continuous integration and delivery pipeline that helps to test and deliver software/infrastructure in a quick span of time with the fully integrated build and release pipelines with proper testing. This course has been tailor-made for the audience who have no or little prior experience in any DevOps tools […]
Hands-On Azure Data Factory And Security
By EC-CouncilAs more and more data get stored and evolved over the time, the problem is generally how do you use that data and how to churn meaningful data out. In this course you will learn about how to use Azure data factory to process, structure and streamline datasets and build a reliable end to end […]
Hands-On Azure Databricks And Security
By EC-CouncilAs more and more data is getting stored and evolved over time, the problem is generally how do you use that data and how to churn meaningful data out. Azure Databricks is a fast, easy and collaborative Apache Spark-based big data analytics service designed for data science and data engineering. In this course you will […]
Pico Hacking Course
By Illuminati PartyReverse Engineering For Everyone! by @mytechnotalent Wait, what’s reverse engineering? Wikipedia defines it as: Reverse engineering, also called backwards engineering or back engineering, is the process by which an artificial object is deconstructed to reveal its designs, architecture, code, or to extract knowledge from the object. It is similar to scientific research, the only difference […]
Serverless Computing On AWS With Lambda, API Gateway, S3 And DynamoDB
By EC-CouncilLooking to jump into the world of serverless computing on AWS but don’t know where to start? This is the course you need! Serverless computing is high in demand but it’s hard to find a way to get started with technologies like Lambda, API Gateway, S3, or DynamoDB. The search is over, this course will […]
Working With SSH
By ACI-LearningThe Working with SSH show aims to remove the intimidation of using the Secure Shell protocol on your network. SSH allows for encrypting network communications to protect from eavesdropping and man-in-the-middle attacks. This series demonstrates how to configure and use SSH to securely manage your systems.