Our Courses
We offer hundreds of courses in Cybersecurity, IT, Soft Skills, and Management and we’re adding more all the time. Please use the search bar or filter by topic and/or skill level to find your content and get started!
information security

Accredited Management of Risk® Practitioner**
By ACI-LearningIn the Management of Risk¬Æ Practitioner series we explore the application of Management of Risk¬Æ Foundation through a deeper understanding of context. Download the case study and exercises contained in the series to gain insight into how Risk Management is implemented and utilised. This series will prepare you for the Management of Risk¬Æ Practitioner exam […]

Advanced Open Source Intelligence and Privacy
This course is a natural and logical extent of the previous Open source intelligence course where we placed a good foundation to move to more advanced topics concerning OSINT and the Privacy perspective of your digital life. This course assumes you are familiar with basic search operators and generic OSINT processes (requirements planning, keyword indexing, […]

An Introduction to OWASP Top 10 Vulnerabilities
The online community for freely available tools and technologies in Web Application Security known as OWASP deals with tools, and technologies in the field of web application security. The purpose of this course is to provide students with a fundamental understanding of computer security, through the study of the top 10 most common security vulnerabilities, […]

Black Hat Python: Python For Pentesters
Bored of using automated testing tools, it is the right time to switch to Python. Packed with many reverse engineering and exploitation libraries, Python is a great language to learn if you want to flirt with information security tasks. This course will teach you how to read and write new packets, sniff the network, and […]

Build Your Own NetApp Storage Lab, for Free
This course walks you through how to build a fully ready and complete NetApp simulator lab from scratch, using NetApp’s latest operating system ONTAP 9. The lab features two NetApp simulator clusters with Windows and Linux clients in separate IP subnets to make it as close to a real-world environment as possible… and best of […]

Burp Suite: Web Application Penetration Testing
Expand your knowledge of Burp Suite beyond just capturing the request and responses. Burp Suite is one of the freely available and most widely accepted penetration testing tools to discover vulnerabilities and attacks. Burp suite as an integrated platform has an advanced set of tools and interfaces to perform security testing. Its various tools work […]

Business Continuity and Disaster Recovery
By ACI-LearningPlanning, creating, maintaining and testing a Business Continuity Disaster Recovery plan can be a daunting task. If you have been assigned this responsibility, you are in the right place. We have Rob Carson from SemperSec in the studios to lend his considerable expertise. With 10+ years in the Information Security industry, Rob is able to […]

Certified Incident Handler (ECIH) v2
By ACI-LearningThis course covers the exam objectives of EC-Council’s Certified Incident Handler v2 (E|CIH) program. It discusses the basic skills to handle and respond to security events and addresses various underlying principles and techniques for detecting and responding to current and emerging computer security threats. The incident handling skills taught in E|CIH are complementary to the […]

Certified Information Systems Security Professional – CISSP 2021
By ACI-LearningThe Certified Information Systems Security Professional (CISSP) certification is the gold standard in the IT Security field. Security professionals that have achieved their CISSP designation are regarded as some of the most talented and knowledgeable people in their field. The certification demonstrates that the holder has been working in IT Security for over five years, […]

Cisco CCNP Security SCOR (Exam 350-701)
By ACI-LearningCisco CCNP Security SCOR course at ITPro is ideal for any learner that wants to understand enterprise-level approaches to defense in depth security of systems and data. This course targets implementers and lead architects of security solutions with a bias toward the use of Cisco security hardware and software releases. From a certification perspective, this […]