Our Courses

We offer hundreds of courses in Cybersecurity, IT, Soft Skills, and Management and we’re adding more all the time. Please use the search bar or filter by topic and/or skill level to find your content and get started!

  • Topics

  • Skill Level

premium courses

pfSense 2.4.4: Open Source Firewall (2019)

By ACI-Learning
1 Lesson

This show covers the basics of pfSense, the “World’s Most Trusted Open Source Firewall”. It will help IT professionals to install, configure and manage & maintain the rich features in pfSense 2.4.4 for a production environment. It will also be helpful to the novice IT professional who needs to start working with a firewall

Physical And Technical Safeguards In HIPAA

By ecfirst
2 Lessons

In this course, participants will examine Physical and Technical Safeguards and how they address security issues. Participants will study the different types of Physical and Technical Safeguards, control and accountability, Business Associate Contracts (BAC’s), and other standard policies, procedures, and documentation requirements.

PowerPoint 2016 Essentials

1 Lesson

Participants will learn to create, edit, and enhance slideshow presentations to create professional-looking sales presentations, employee training, instructional materials, and kiosk slideshows. Learners will gain a fundamental understanding of the PowerPoint 2016 environment and the correct use of key features of this application.

Practical Applications Of Machine Learning

By EC-Council
7 Lessons | 26 Topics | 6 Quizzes

Machine learning (ML) is the study of computer algorithms that improve automatically through experience and by the use of data. It is seen as a part of artificial intelligence. Machine learning algorithms build a model based on sample data, known as “training data”, in order to make predictions or decisions without being explicitly programmed to […]

Practical Pentesting: Featuring Brad Stine

By ACI-Learning
1 Lesson

In this series, Daniel and Brad will take a look at what a pentesting engagement looks like through the lens of Brad’s experience as a pentester. Here they will cover all the important and requisite activities from pre-engagement to delivering the final report. You’ll see what it takes to properly pre-engage for an assessment, explore […]

Practical Visit To Data Mining

By EC-Council
8 Lessons | 24 Topics | 8 Quizzes

Are you a Data Science Enthusiast or Professional looking to understand how ‘Data MIning’ can be very useful for you & how it is being one of the best tools in the industry? We are going to focus on the real-time application of different data mining concepts which helps us to drive in a different […]

Presentation Skills

By Cyber Phoenix
1 Lesson

Many studies have found that public speaking is the number one fear among most people; outranking flying, snakes, insects, and even death. Ironically, it is also one of the skills that can make or break a person’s career. Participants will be provided with a strong set of skills that will complement their current presentation skill […]

Project Management

1 Lesson

In the past few decades, organizations have discovered something incredible: the principles that have been used to create enormous successes in large projects can be applied to projects of any size to create amazing success. As a result, many employees are expected to understand project management techniques and how to apply them to projects of […]

Proposal Writing

By Cyber Phoenix
1 Lesson

A good proposal doesn”t just outline what product or service you would like to create or deliver. It does so in such a way that the reader feels it is the only logical choice. Participants will explore the proposal writing process including the most common types of proposals.

Prospecting and Lead Generation

By Cyber Phoenix
1 Lesson

Prospecting and lead generation is the method of making links which may lead to a sale or other promising result. The leads may come from various sources or undertakings, for example, via the Internet, through personal referrals, through telephone calls either by telemarketers, through advertisements, events, and purchase of lists of potential clients. These and […]

Public Speaking

By Cyber Phoenix
1 Lesson

According to a 1973 survey by the Sunday Times of London, 41% of people list public speaking as their biggest fear. Forget small spaces, darkness, and spiders, standing up in front of a crowd and talking is far more terrifying for most people. Through this workshop, participants will become more confident and relaxed in front […]

Python For Absolute Beginners

By EC-Council
3 Lessons | 23 Topics | 2 Quizzes

If you want to learn how to program, you will LOVE this course! This course was designed for complete beginners with little to no understanding of programming and will give you the knowledge to get started coding using Python 3.  We will cover the following topics in this course: Python installation Running Python scripts in […]

Raspberry Pi Based Smart Emergency Alert System Helmet

By EC-Council
4 Lessons | 17 Topics

This course is for anyone interested in building projects that help solve real-time problems. The course requires basic knowledge of Python & PHP programming. If you are new to Raspberry Pi, we would recommend enrolling to our previous course, “Introduction to Raspberry Pi”, which is also available on the platform. Helmets are necessary safety gear to prevent […]

Requested Documentation For HIPAA

By ecfirst
2 Lessons

In this course, we will learn about the forms and documentation, authorization, and core data elements. This also prepares you for the Notice of Privacy Practice Guidelines, other Notice Requirements, Health Plan NPP Final Rule Updates, and other Non-Business Associates information. This course teaches Minimum and Non-Minimum Necessary Standards and Marketing, the Final Rule updates, […]

Reverse Engineering – Part 1

By EC-Council
2 Lessons | 16 Topics | 1 Quiz

Reverse engineering is the art of understanding how a system works and meddling with it. An expert reverse engineer can change a binary (compiled) or non-binary (interpreted) application in any way s/he wants, pretty much like having access to the source code. Throughout this course, you will learn about what computers are, how assembly programming […]

Reverse Engineering – Part 2

By EC-Council
3 Lessons | 18 Topics | 3 Quizzes

Reverse engineering is the art of understanding how a system works and meddling with it. An expert reverse engineer can change a binary (compiled) or non-binary (interpreted) application in any way s/he wants, pretty much like having access to the source code. We will begin with understanding what protected binaries are. We will get to […]

Risk Assessment And Management

By Cyber Phoenix
1 Lesson

It is not possible to control or manage 100% of the risk, but knowing what to do before, during, and after an event will mitigate the damage and harm. Identifying potential hazards and risks and making them part of the day-to-day business is important. Safety should be the first priority as every business must face […]

Ruby On Rails – Security

By EC-Council
7 Lessons | 29 Topics | 5 Quizzes

Many developers, at the start of their career, know how to write code but not how to avoid security flaws in their code and end up writing poor quality code with security loopholes in them such as SQL Injections, etc. This will in turn lead to a codebase that has a lot of security issues […]

Safety In The Workplace

By Cyber Phoenix
1 Lesson

Workplace safety is the responsibility of everyone in an organization. Companies have legal obligations to meet certain safety requirements, but many go further than the minimum obligations. Safety standards and procedures must be put in place, and everyone needs to follow the standards in order for them to be effective.

Sales Fundamentals

By Cyber Phoenix
1 Lesson

Although the definition of a sale is simple enough, the process of turning someone into a buyer can be very complex. It requires convincing someone with a potential interest that there is something for them in making their interest concrete – something that merits spending some of their hard-earned money.

Secure Full Stack MEAN Developer

By EC-Council
9 Lessons | 60 Topics | 7 Quizzes

MEAN stack development is a modern approach to building dynamic web applications.  It is an open-source JavaScript framework that harnesses four major technologies:  MongoDB, Express, Angular, and Node.js. Given the rise of the ever-increasing demand for full-stack JavaScript developers, this course will help you master both front-end and back-end development. This course will begin with […]

Secure Programming With C

By EC-Council
6 Lessons | 17 Topics | 6 Quizzes

Secure coding with C is a top concern. Although the C programming language, which is commonly used in numerous applications and operating systems is popular, flexible, and versatile, it is inherently vulnerable to exploitation.    Writing a secure code is crucial. Because there is no direct method to handle the exception (no inbuilt try and […]

Secure Programming With C++

By EC-Council
8 Lessons | 35 Topics | 1 Quiz

The C++ programming language is widely used, but C++ programs are often insecure. A number of different vulnerabilities can exist in C++ code and make it vulnerable to exploitation.  If you want to write secure C++ code, you need to be able to identify and understand the numerous potential errors that can be made in […]

Secure Programming With Java

By EC-Council
8 Lessons | 29 Topics | 1 Quiz

Secure designs are essential to building and deploying secure Java programs. But, even the best designs can result in insecure programs if developers are not aware of the numerous potential security pitfalls in Java programming. This course begins with a detailed explanation of common programming errors encountered in Java. Further, it takes you through security […]

Secure Software Architecture And Design Patterns In Java EE – Part 1

By EC-Council
9 Lessons | 43 Topics | 9 Quizzes

Is exploring the Java Enterprise Edition the next step you are planning in your Java learning journey? Then this course is for you, where you will get acquainted with the Java Enterprise Edition, its architecture, components, the core design patterns, and even build your very first Java Enterprise Application. Further, you will be knowledgeable about […]