Our Courses

We offer hundreds of courses in Cybersecurity, IT, Soft Skills, and Management and we’re adding more all the time. Please use the search bar or filter by topic and/or skill level to find your content and get started!

  • Topics

  • Skill Level

Universal Safety Practice

By Cyber Phoenix
1 Lesson

The importance of safety cannot be overstated. Every organization is responsible for the safety of employees while they are working. It is estimated that safety problems cost companies $1 billion a week. Understanding universal safety practices and how to implement them will help keep everyone protected while ensuring the company’s financial security.

Virtual Team Building And Management

By Cyber Phoenix
1 Lesson

There are an estimated one billion virtual workers in 2012, and the number is expected to continue climbing well into the future. With a global workforce, you are provided with a cost-effective and talented pool of employees to draw from. With a virtual team, you are given a Follow the Sun production environment.

VueJS For Beginners

By EC-Council
6 Lessons | 35 Topics | 6 Quizzes

Vue is an open-source, progressive JavaScript framework for building user interfaces. Vue supports the component-based approach to building web Apps. The single-file components are independent and loosely coupled to enable better code reuse and quicker development.    This is a beginner’s course that begins with the fundamentals for Vue JS frameworks. As you move on, […]

Web Security For Enterprises (Practical Training) – Part 1

By EC-Council
7 Lessons | 36 Topics | 7 Quizzes

Do you want to learn web security techniques with hands-on practicals? Do you want to understand how to use vulnerability scanner tools to perform vulnerability assessments? if yes, this course is for you. This course will start from scratch and will provide you with essential knowledge of the most happening and widely used techniques to […]

Web Security For Enterprises (Practical Training) – Part 2

By EC-Council
7 Lessons | 29 Topics

Do you want to learn web security techniques with hands-on practicals? Do you want to understand how to use vulnerability scanner tools to perform vulnerability assessments? if yes, this course is for you. This course will start from scratch and will provide you with essential knowledge of the most happening and widely used techniques to […]

Website Hacking Techniques

By EC-Council
9 Lessons | 32 Topics | 8 Quizzes

Learn Web Application Input Validation and Error Handling Testing to be a Master in Industry Based Web PenTesting Familiarize yourself with major web application attacks such as SQL injection, Cross-Site Scripting, Brute Force, Malicious File Upload, and Encryption attacks on websites. The inclusion of industry-based practicals to learn about web PenTesting can help professionals and […]

Windows Penetration Testing Essentials

By EC-Council
7 Lessons | 28 Topics | 5 Quizzes

Penetration testing is becoming one of the most important roles in information security with the increased need and importance for companies and organizations to secure their digital infrastructure. Windows plays an integral role in the digital infrastructure of a company, as a result, it is one of the most targeted operating systems by attackers. This […]

Wireless Pentesting With The Raspberry Pi

By EC-Council
11 Lessons | 11 Topics | 11 Quizzes

Raspberry pi, a credit card-sized computer chip can help you design open and well-documented projects which are easy to build and modify. Ever thought, your portable raspberry pi tools can be converted into a low-cost hacking tool.  EC-Council’s Mobile Security Toolkit (Better known as the STORM!) is a fully-loaded pen-test platform that comes equipped with […]

Wireshark For Ethical Hackers

By EC-Council
4 Lessons | 31 Topics | 1 Quiz

Wireshark is the de facto standard in network analyzer tools. With more than 500,000 downloads a month, the IT industry has embraced Wireshark as the go-to tool for network troubleshooting, optimization and security. Wireshark is one of the most popular network analyzer tools available worldwide Whether you need to perform a security application analysis or […]

Women In Leadership

By Cyber Phoenix
1 Lesson

Often, people who have never had a leadership role will stand up and take the lead when a situation they care about requires it. Participants will be able to recognize these events and grab the reins with more confidence. This workshop touches on understanding the leadership gap, vital leadership traits, and how to overcome various […]

Word 2016 Essentials

By Phoenix TS
1 Lesson

Participants will gain a fundamental understanding of the Microsoft Word environment and the ability to complete tasks independently. They will demonstrate the correct application of the principal features of Word 2016 by creating and editing documents for a variety of purposes and situations. Document examples include professional-looking reports, multi-column newsletters, resumes, and business correspondence.

Word 2016 Expert

By Phoenix TS
1 Lesson

Participants will learn to proficiently use the advanced features of Microsoft Word for document content management and advanced formatting – critical skills for those in roles such as editors, project managers, business information workers, and educators. Participants will create and manage professional multi-page documents for a variety of specialized purposes and situations. They will customize […]

Work Life Balance

By Cyber Phoenix
1 Lesson

Having a balance between work and home life can be a challenge. With this challenge come great rewards when it is done successfully. By balancing a career with home life it will provide benefits in each environment. You will become healthier, mentally and physically, and you will be able to produce more career-wise.

Working With SSH

By ACI-Learning
1 Lesson

The Working with SSH show aims to remove the intimidation of using the Secure Shell protocol on your network. SSH allows for encrypting network communications to protect from eavesdropping and man-in-the-middle attacks. This series demonstrates how to configure and use SSH to securely manage your systems.

Workplace Diversity

By Cyber Phoenix
1 Lesson

Improving diversity knowledge is a required component of every company. With more and more businesses having global presence workplace diversity is a forgone conclusion. Your participants will be able to use strategies to be proactive and remove barriers. They will be shown how to build and encourage diversity in their workplace and community.

Workplace Harassment

By Cyber Phoenix
1 Lesson

Harassment can be based on a variety of factors such as race, sex, and disability. Experiencing an uncomfortable situation in the workplace may be more than an unpleasant event; it may be against the law. This alone is what makes this topic very important for every organization.

Workplace Violence

By Cyber Phoenix
1 Lesson

Workplace harassment must be identified, discouraged, and prevented in order to keep a hostile work environment from developing. Left unchecked, harassment can escalate into violence. Workplace violence and harassment training are essential to the safety of all employees.

X64 Course

By Illuminati Party
43 Lessons

Reverse Engineering For Everyone! by @mytechnotalent    Wait, what’s reverse engineering? Wikipedia defines it as: Reverse engineering, also called backwards engineering or back engineering, is the process by which an artificial object is deconstructed to reveal its designs, architecture, code, or to extract knowledge from the object. It is similar to scientific research, the only difference […]

X86 Course

By Illuminati Party
40 Lessons

Reverse Engineering For Everyone! by @mytechnotalent    Wait, what’s reverse engineering? Wikipedia defines it as: Reverse engineering, also called backwards engineering or back engineering, is the process by which an artificial object is deconstructed to reveal its designs, architecture, code, or to extract knowledge from the object. It is similar to scientific research, the only difference […]