Our Courses
We offer hundreds of courses in Cybersecurity, IT, Soft Skills, and Management and we’re adding more all the time. Please use the search bar or filter by topic and/or skill level to find your content and get started!
premium courses
pfSense 2.4.4: Open Source Firewall (2019)
By ACI-LearningThis show covers the basics of pfSense, the “World’s Most Trusted Open Source Firewall”. It will help IT professionals to install, configure and manage & maintain the rich features in pfSense 2.4.4 for a production environment. It will also be helpful to the novice IT professional who needs to start working with a firewall
Physical And Technical Safeguards In HIPAA
By ecfirstIn this course, participants will examine Physical and Technical Safeguards and how they address security issues. Participants will study the different types of Physical and Technical Safeguards, control and accountability, Business Associate Contracts (BAC’s), and other standard policies, procedures, and documentation requirements.
PMP Exam Prep
By Phoenix TSWelcome to the Phoenix TS portal page for the PMP (Project Management Professional) Exam Prep! We are excited to have you here as you embark on your learning journey.
PowerPoint 2016 Essentials
Participants will learn to create, edit, and enhance slideshow presentations to create professional-looking sales presentations, employee training, instructional materials, and kiosk slideshows. Learners will gain a fundamental understanding of the PowerPoint 2016 environment and the correct use of key features of this application.
Practical Applications Of Machine Learning
By EC-CouncilMachine learning (ML) is the study of computer algorithms that improve automatically through experience and by the use of data. It is seen as a part of artificial intelligence. Machine learning algorithms build a model based on sample data, known as “training data”, in order to make predictions or decisions without being explicitly programmed to […]
Practical Pentesting: Featuring Brad Stine
By ACI-LearningIn this series, Daniel and Brad will take a look at what a pentesting engagement looks like through the lens of Brad’s experience as a pentester. Here they will cover all the important and requisite activities from pre-engagement to delivering the final report. You’ll see what it takes to properly pre-engage for an assessment, explore […]
Practical Visit To Data Mining
By EC-CouncilAre you a Data Science Enthusiast or Professional looking to understand how ‘Data MIning’ can be very useful for you & how it is being one of the best tools in the industry? We are going to focus on the real-time application of different data mining concepts which helps us to drive in a different […]
Presentation Skills
By Cyber PhoenixMany studies have found that public speaking is the number one fear among most people; outranking flying, snakes, insects, and even death. Ironically, it is also one of the skills that can make or break a person’s career. Participants will be provided with a strong set of skills that will complement their current presentation skill […]
Project Management
In the past few decades, organizations have discovered something incredible: the principles that have been used to create enormous successes in large projects can be applied to projects of any size to create amazing success. As a result, many employees are expected to understand project management techniques and how to apply them to projects of […]
Proposal Writing
By Cyber PhoenixA good proposal doesn”t just outline what product or service you would like to create or deliver. It does so in such a way that the reader feels it is the only logical choice. Participants will explore the proposal writing process including the most common types of proposals.
Prospecting and Lead Generation
By Cyber PhoenixProspecting and lead generation is the method of making links which may lead to a sale or other promising result. The leads may come from various sources or undertakings, for example, via the Internet, through personal referrals, through telephone calls either by telemarketers, through advertisements, events, and purchase of lists of potential clients. These and […]
Public Speaking
By Cyber PhoenixAccording to a 1973 survey by the Sunday Times of London, 41% of people list public speaking as their biggest fear. Forget small spaces, darkness, and spiders, standing up in front of a crowd and talking is far more terrifying for most people. Through this workshop, participants will become more confident and relaxed in front […]
Python For Absolute Beginners
By EC-CouncilIf you want to learn how to program, you will LOVE this course! This course was designed for complete beginners with little to no understanding of programming and will give you the knowledge to get started coding using Python 3. We will cover the following topics in this course: Python installation Running Python scripts in […]
Raspberry Pi Based Smart Emergency Alert System Helmet
By EC-CouncilThis course is for anyone interested in building projects that help solve real-time problems. The course requires basic knowledge of Python & PHP programming. If you are new to Raspberry Pi, we would recommend enrolling to our previous course, “Introduction to Raspberry Pi”, which is also available on the platform. Helmets are necessary safety gear to prevent […]
Requested Documentation For HIPAA
By ecfirstIn this course, we will learn about the forms and documentation, authorization, and core data elements. This also prepares you for the Notice of Privacy Practice Guidelines, other Notice Requirements, Health Plan NPP Final Rule Updates, and other Non-Business Associates information. This course teaches Minimum and Non-Minimum Necessary Standards and Marketing, the Final Rule updates, […]
Reverse Engineering – Part 1
By EC-CouncilReverse engineering is the art of understanding how a system works and meddling with it. An expert reverse engineer can change a binary (compiled) or non-binary (interpreted) application in any way s/he wants, pretty much like having access to the source code. Throughout this course, you will learn about what computers are, how assembly programming […]
Reverse Engineering – Part 2
By EC-CouncilReverse engineering is the art of understanding how a system works and meddling with it. An expert reverse engineer can change a binary (compiled) or non-binary (interpreted) application in any way s/he wants, pretty much like having access to the source code. We will begin with understanding what protected binaries are. We will get to […]
Risk Assessment And Management
By Cyber PhoenixIt is not possible to control or manage 100% of the risk, but knowing what to do before, during, and after an event will mitigate the damage and harm. Identifying potential hazards and risks and making them part of the day-to-day business is important. Safety should be the first priority as every business must face […]
Ruby On Rails – Security
By EC-CouncilMany developers, at the start of their career, know how to write code but not how to avoid security flaws in their code and end up writing poor quality code with security loopholes in them such as SQL Injections, etc. This will in turn lead to a codebase that has a lot of security issues […]
Safety In The Workplace
By Cyber PhoenixWorkplace safety is the responsibility of everyone in an organization. Companies have legal obligations to meet certain safety requirements, but many go further than the minimum obligations. Safety standards and procedures must be put in place, and everyone needs to follow the standards in order for them to be effective.
Sales Fundamentals
By Cyber PhoenixAlthough the definition of a sale is simple enough, the process of turning someone into a buyer can be very complex. It requires convincing someone with a potential interest that there is something for them in making their interest concrete – something that merits spending some of their hard-earned money.
Secure Full Stack MEAN Developer
By EC-CouncilMEAN stack development is a modern approach to building dynamic web applications. It is an open-source JavaScript framework that harnesses four major technologies: MongoDB, Express, Angular, and Node.js. Given the rise of the ever-increasing demand for full-stack JavaScript developers, this course will help you master both front-end and back-end development. This course will begin with […]
Secure Programming With C
By EC-CouncilSecure coding with C is a top concern. Although the C programming language, which is commonly used in numerous applications and operating systems is popular, flexible, and versatile, it is inherently vulnerable to exploitation. Writing a secure code is crucial. Because there is no direct method to handle the exception (no inbuilt try and […]
Secure Programming With C++
By EC-CouncilThe C++ programming language is widely used, but C++ programs are often insecure. A number of different vulnerabilities can exist in C++ code and make it vulnerable to exploitation. If you want to write secure C++ code, you need to be able to identify and understand the numerous potential errors that can be made in […]
Secure Programming With Java
By EC-CouncilSecure designs are essential to building and deploying secure Java programs. But, even the best designs can result in insecure programs if developers are not aware of the numerous potential security pitfalls in Java programming. This course begins with a detailed explanation of common programming errors encountered in Java. Further, it takes you through security […]