Our Courses
We offer hundreds of courses in Cybersecurity, IT, Soft Skills, and Management and we’re adding more all the time. Please use the search bar or filter by topic and/or skill level to find your content and get started!
Transactions, Code Sets & Identifiers in HIPAA
By ecfirstThe purpose of HIPAA transactions and code set standards is to simplify the processes used and decrease the costs associated with healthcare services. This course teaches code sets and transactions, including new updates. This course will discuss the different Drug Codes, Data Segments and Transaction sets, and who is eligible to use NPI.
Tunnels In Networking
By EC-CouncilA technique of internetworking called Tunneling is used when the source and destination networks of the same type are connected through a network of a different kind. It involves allowing private network communications to be sent across a public network (such as the Internet) through encapsulation. Tunneling provides VPNs with VPNs over public data networks […]
Typescript For Absolute Beginners
By EC-CouncilJavaScript(JS) is one of the most popular languages for creating web applications. Every JS developer is enticed by its simplicity, easy implementation as well as flexibility but as your application’s complexity increases your application becomes difficult to debug, maintain and develop. You waste a lot of time finding and fixing those TypeErrors, and Reference Errors. […]
Ultimate JavaScript Strings
By EC-CouncilFrom the code-nificent minds that brought you Ultimate JavaScript Arrays and Ultimate JavaScript Objects, presenting… Ultimate JavaScript Strings is the best, comprehensive primer on JavaScript strings that you can complete in UNDER an hour. We cover all the important points including Your skills will be tested with an array of quizzes and tests suitable for students of all skill […]
Universal Safety Practice
By Cyber PhoenixThe importance of safety cannot be overstated. Every organization is responsible for the safety of employees while they are working. It is estimated that safety problems cost companies $1 billion a week. Understanding universal safety practices and how to implement them will help keep everyone protected while ensuring the company’s financial security.
Virtual Team Building And Management
By Cyber PhoenixThere are an estimated one billion virtual workers in 2012, and the number is expected to continue climbing well into the future. With a global workforce, you are provided with a cost-effective and talented pool of employees to draw from. With a virtual team, you are given a Follow the Sun production environment.
VueJS For Beginners
By EC-CouncilVue is an open-source, progressive JavaScript framework for building user interfaces. Vue supports the component-based approach to building web Apps. The single-file components are independent and loosely coupled to enable better code reuse and quicker development. This is a beginner’s course that begins with the fundamentals for Vue JS frameworks. As you move on, […]
Web Security For Enterprises (Practical Training) – Part 1
By EC-CouncilDo you want to learn web security techniques with hands-on practicals? Do you want to understand how to use vulnerability scanner tools to perform vulnerability assessments? if yes, this course is for you. This course will start from scratch and will provide you with essential knowledge of the most happening and widely used techniques to […]
Web Security For Enterprises (Practical Training) – Part 2
By EC-CouncilDo you want to learn web security techniques with hands-on practicals? Do you want to understand how to use vulnerability scanner tools to perform vulnerability assessments? if yes, this course is for you. This course will start from scratch and will provide you with essential knowledge of the most happening and widely used techniques to […]
Website Hacking Techniques
By EC-CouncilLearn Web Application Input Validation and Error Handling Testing to be a Master in Industry Based Web PenTesting Familiarize yourself with major web application attacks such as SQL injection, Cross-Site Scripting, Brute Force, Malicious File Upload, and Encryption attacks on websites. The inclusion of industry-based practicals to learn about web PenTesting can help professionals and […]
Windows Penetration Testing Essentials
By EC-CouncilPenetration testing is becoming one of the most important roles in information security with the increased need and importance for companies and organizations to secure their digital infrastructure. Windows plays an integral role in the digital infrastructure of a company, as a result, it is one of the most targeted operating systems by attackers. This […]
Wireless Pentesting With The Raspberry Pi
By EC-CouncilRaspberry pi, a credit card-sized computer chip can help you design open and well-documented projects which are easy to build and modify. Ever thought, your portable raspberry pi tools can be converted into a low-cost hacking tool. EC-Council’s Mobile Security Toolkit (Better known as the STORM!) is a fully-loaded pen-test platform that comes equipped with […]
Wireshark For Ethical Hackers
By EC-CouncilWireshark is the de facto standard in network analyzer tools. With more than 500,000 downloads a month, the IT industry has embraced Wireshark as the go-to tool for network troubleshooting, optimization and security. Wireshark is one of the most popular network analyzer tools available worldwide Whether you need to perform a security application analysis or […]
Women In Leadership
By Cyber PhoenixOften, people who have never had a leadership role will stand up and take the lead when a situation they care about requires it. Participants will be able to recognize these events and grab the reins with more confidence. This workshop touches on understanding the leadership gap, vital leadership traits, and how to overcome various […]
Word 2016 Essentials
By Phoenix TSParticipants will gain a fundamental understanding of the Microsoft Word environment and the ability to complete tasks independently. They will demonstrate the correct application of the principal features of Word 2016 by creating and editing documents for a variety of purposes and situations. Document examples include professional-looking reports, multi-column newsletters, resumes, and business correspondence.
Word 2016 Expert
By Phoenix TSParticipants will learn to proficiently use the advanced features of Microsoft Word for document content management and advanced formatting – critical skills for those in roles such as editors, project managers, business information workers, and educators. Participants will create and manage professional multi-page documents for a variety of specialized purposes and situations. They will customize […]
Work Life Balance
By Cyber PhoenixHaving a balance between work and home life can be a challenge. With this challenge come great rewards when it is done successfully. By balancing a career with home life it will provide benefits in each environment. You will become healthier, mentally and physically, and you will be able to produce more career-wise.
Working With SSH
By ACI-LearningThe Working with SSH show aims to remove the intimidation of using the Secure Shell protocol on your network. SSH allows for encrypting network communications to protect from eavesdropping and man-in-the-middle attacks. This series demonstrates how to configure and use SSH to securely manage your systems.
Workplace Diversity
Improving diversity knowledge is a required component of every company. With more and more businesses having global presence workplace diversity is a forgone conclusion. Your participants will be able to use strategies to be proactive and remove barriers. They will be shown how to build and encourage diversity in their workplace and community.
Workplace Harassment
Harassment can be based on a variety of factors such as race, sex, and disability. Experiencing an uncomfortable situation in the workplace may be more than an unpleasant event; it may be against the law. This alone is what makes this topic very important for every organization.
Workplace Violence
Workplace harassment must be identified, discouraged, and prevented in order to keep a hostile work environment from developing. Left unchecked, harassment can escalate into violence. Workplace violence and harassment training are essential to the safety of all employees.
X64 Course
By Illuminati PartyReverse Engineering For Everyone! by @mytechnotalent Wait, what’s reverse engineering? Wikipedia defines it as: Reverse engineering, also called backwards engineering or back engineering, is the process by which an artificial object is deconstructed to reveal its designs, architecture, code, or to extract knowledge from the object. It is similar to scientific research, the only difference […]
X86 Course
By Illuminati PartyReverse Engineering For Everyone! by @mytechnotalent Wait, what’s reverse engineering? Wikipedia defines it as: Reverse engineering, also called backwards engineering or back engineering, is the process by which an artificial object is deconstructed to reveal its designs, architecture, code, or to extract knowledge from the object. It is similar to scientific research, the only difference […]