Our Courses
We offer hundreds of courses in Cybersecurity, IT, Soft Skills, and Management and we’re adding more all the time. Please use the search bar or filter by topic and/or skill level to find your content and get started!
Secure Full Stack MEAN Developer
By EC-CouncilMEAN stack development is a modern approach to building dynamic web applications. It is an open-source JavaScript framework that harnesses four major technologies: MongoDB, Express, Angular, and Node.js. Given the rise of the ever-increasing demand for full-stack JavaScript developers, this course will help you master both front-end and back-end development. This course will begin with […]
Secure Programming With C
By EC-CouncilSecure coding with C is a top concern. Although the C programming language, which is commonly used in numerous applications and operating systems is popular, flexible, and versatile, it is inherently vulnerable to exploitation. Writing a secure code is crucial. Because there is no direct method to handle the exception (no inbuilt try and […]
Secure Programming With C++
By EC-CouncilThe C++ programming language is widely used, but C++ programs are often insecure. A number of different vulnerabilities can exist in C++ code and make it vulnerable to exploitation. If you want to write secure C++ code, you need to be able to identify and understand the numerous potential errors that can be made in […]
Secure Programming With Java
By EC-CouncilSecure designs are essential to building and deploying secure Java programs. But, even the best designs can result in insecure programs if developers are not aware of the numerous potential security pitfalls in Java programming. This course begins with a detailed explanation of common programming errors encountered in Java. Further, it takes you through security […]
Secure Software Architecture And Design Patterns In Java EE – Part 1
By EC-CouncilIs exploring the Java Enterprise Edition the next step you are planning in your Java learning journey? Then this course is for you, where you will get acquainted with the Java Enterprise Edition, its architecture, components, the core design patterns, and even build your very first Java Enterprise Application. Further, you will be knowledgeable about […]
Securing Your Network From Attacks
By EC-CouncilAttacks on enterprise networks and home networks are a growing problem with daily targeted attacks that can result in crippling results. These attacks have become more aggressive, sophisticated, and dangerous over the years. This course is designed to give you the knowledge and skills to identify, mitigate, and prevent these attacks and help you secure […]
SECURITY ASSESSMENT (CMMC)
Gain expertise in conducting comprehensive security assessments to identify vulnerabilities and ensure compliance with CMMC guidelines.
Security Awareness
By ACI-LearningThis is a non-technical course designed for every end user. Our experts explain very common security topics that are critical to be aware of in today‚Äôs work environment, but explains in the ‚Äúend-users‚Äù non-technical language, so everyone can understand. Many stories are told as examples for easier understanding. One might think this is super easy […]
Security Awareness Onboarding
By ACI-LearningThis course is designed to help bring new employees up to speed on the various IT security issues facing companies to day. Its primary use is intended to be as an instructional video shown during the new-hire on-boarding process. By increasing a new-hire’s IT security awareness, companies can help to avoid security incidents before they […]
Selenium Automation Testing For Beginners
By EC-CouncilOver the last decade, the Selenium automation tool has gained a lot of popularity in the automation testing world due to its unique features like – Multiple operating support, multiple language support, multiple browsers support, open-source, and community support. MNCs to Startups all big and large organizations are investing a lot in automation testing which […]
Self-Leadership
By Cyber PhoenixAs we grow, we learn to become leaders. Being a leader is natural for some, and learning for others. No matter how we have become a leader, it is important to remember we must lead ourselves before we lead others. Take the time to motivate yourself and realize that you can do it.
Servant Leadership
By Phoenix TSServant leadership can seem like a contradicting term, but it is becoming a very popular tool in many businesses. Servant leadership is a philosophy that involves focusing on others, on their success, and in turn to build better relationships that benefit both manager and employee. Servant leadership shows that managers can be great leaders while […]
Serverless Computing On AWS With Lambda, API Gateway, S3 And DynamoDB
By EC-CouncilLooking to jump into the world of serverless computing on AWS but don’t know where to start? This is the course you need! Serverless computing is high in demand but it’s hard to find a way to get started with technologies like Lambda, API Gateway, S3, or DynamoDB. The search is over, this course will […]
Session Hijacking And Prevention Techniques
By EC-CouncilUnderstanding the bare bones of Session, and how it can be broken to gain access to accounts. As an ethical hacker how to identify the design flaws that are being exploited and to be addressed them to secure the system and/or application. With multiple, users/systems interconnected the attack surface is huge and has a high-risk […]
Shell Scripting With Bash
By EC-CouncilHave you wanted to improve your Linux and Bash Scripting skills but don’t know where to start? Due to the proliferation of Linux, this is an increasingly important skill to have. This course is the best solution because it will take you from beginner level to Linux Power User. Thus, laying the groundwork to become […]
SOC Analyst and the Security Operations Center
This course will help to equip you with the knowledge and skills required to operate in the dynamic and fast-paced environment of a Security Operations Center (SOC.) In addition to cybersecurity fundamentals such as risk management, data classification, and governance and compliance, you will learn how to monitor network activity, detect and mitigate threats, respond […]
Social Intelligence
By Phoenix TSSocial Intelligence is about understanding the environment and having a positive influence. Participants will become more confident in their social situations by learning how to express and interpret social cues. They will create positive connections and increase their influence during social situations.
Social Learning
By Phoenix TSSocial Learning is an effective way to train your employees through modeling positive behaviors. It is a great way to promote cohesion and involvement as it builds a culture of learning. Participants will learn the best way to conduct role plays, share best practices, and provide constant and immediate feedback.
Social Media In The Workplace
By Phoenix TSWe are being flooded with Social Media invitations and updates. Web-based communication icons like Twitter, Facebook, YouTube, and LinkedIn are dominating the way we interact with each other. People are feeling the need to be updated at all times. It has become a time-eater, and businesses are quickly becoming aware of the drain it can […]
Social Media Marketing
By Phoenix TSSocial media is a staple of modern life. It is so enmeshed in the way we communicate that companies have little choice but to engage social media as part of their marketing strategy. Before implementing any social media strategies, you should take the time to understand the benefits as well as the risks.
Software Architecture And Design Patterns With C# And .NET
By EC-CouncilSoftware architecture and design patterns are the fundamental building blocks of crafting scalable and maintainable software applications. Without catering to the right architecture or the appropriate pattern for solving the problem at hand, most of the applications don’t survive in the long run. Hence to create high-quality software, it’s quite important to consider the right […]
Software Development Life Cycle
SQL Injection Attacks
By EC-CouncilSQL Injection (SQLi) refers to an injection attack wherein an attacker can execute malicious SQL statements (also commonly referred to as a malicious payload) that control a web application’s database server. The impact SQL injection can have on a business is far-reaching. A successful attack may result in the unauthorized viewing of user lists, the […]
Stress Management
By Phoenix TSPositive and negative stress is a constant influence on all of our lives. The trick is to maximize the positive stress and minimize the negative stress. Participants will be shown how stress can be positive and negative, and we’ll look at the Triple-A approach that will form the basis of this workshop.
Supervising Others
By Phoenix TSSupervising others can be a tough job. Between managing your own time and projects, helping your team members solve problems and complete tasks, and helping other supervisors, your day can fill up before you know it.