Our Courses
We offer hundreds of courses in Cybersecurity, IT, Soft Skills, and Management and we’re adding more all the time. Please use the search bar or filter by topic and/or skill level to find your content and get started!
Website Hacking Techniques
By EC-CouncilLearn Web Application Input Validation and Error Handling Testing to be a Master in Industry Based Web PenTesting Familiarize yourself with major web application attacks such as SQL injection, Cross-Site Scripting, Brute Force, Malicious File Upload, and Encryption attacks on websites. The inclusion of industry-based practicals to learn about web PenTesting can help professionals and […]
Windows Penetration Testing Essentials
By EC-CouncilPenetration testing is becoming one of the most important roles in information security with the increased need and importance for companies and organizations to secure their digital infrastructure. Windows plays an integral role in the digital infrastructure of a company, as a result, it is one of the most targeted operating systems by attackers. This […]
Wireless Pentesting With The Raspberry Pi
By EC-CouncilRaspberry pi, a credit card-sized computer chip can help you design open and well-documented projects which are easy to build and modify. Ever thought, your portable raspberry pi tools can be converted into a low-cost hacking tool. EC-Council’s Mobile Security Toolkit (Better known as the STORM!) is a fully-loaded pen-test platform that comes equipped with […]
Wireshark For Ethical Hackers
By EC-CouncilWireshark is the de facto standard in network analyzer tools. With more than 500,000 downloads a month, the IT industry has embraced Wireshark as the go-to tool for network troubleshooting, optimization and security. Wireshark is one of the most popular network analyzer tools available worldwide Whether you need to perform a security application analysis or […]
Women In Leadership
By Cyber PhoenixOften, people who have never had a leadership role will stand up and take the lead when a situation they care about requires it. Participants will be able to recognize these events and grab the reins with more confidence. This workshop touches on understanding the leadership gap, vital leadership traits, and how to overcome various […]
Word 2016 Essentials
By Phoenix TSParticipants will gain a fundamental understanding of the Microsoft Word environment and the ability to complete tasks independently. They will demonstrate the correct application of the principal features of Word 2016 by creating and editing documents for a variety of purposes and situations. Document examples include professional-looking reports, multi-column newsletters, resumes, and business correspondence.
Word 2016 Expert
By Phoenix TSParticipants will learn to proficiently use the advanced features of Microsoft Word for document content management and advanced formatting – critical skills for those in roles such as editors, project managers, business information workers, and educators. Participants will create and manage professional multi-page documents for a variety of specialized purposes and situations. They will customize […]
Work Life Balance
By Cyber PhoenixHaving a balance between work and home life can be a challenge. With this challenge come great rewards when it is done successfully. By balancing a career with home life it will provide benefits in each environment. You will become healthier, mentally and physically, and you will be able to produce more career-wise.
Working With SSH
By ACI-LearningThe Working with SSH show aims to remove the intimidation of using the Secure Shell protocol on your network. SSH allows for encrypting network communications to protect from eavesdropping and man-in-the-middle attacks. This series demonstrates how to configure and use SSH to securely manage your systems.
Workplace Diversity
Improving diversity knowledge is a required component of every company. With more and more businesses having global presence workplace diversity is a forgone conclusion. Your participants will be able to use strategies to be proactive and remove barriers. They will be shown how to build and encourage diversity in their workplace and community.
Workplace Harassment
Harassment can be based on a variety of factors such as race, sex, and disability. Experiencing an uncomfortable situation in the workplace may be more than an unpleasant event; it may be against the law. This alone is what makes this topic very important for every organization.
Workplace Violence
Workplace harassment must be identified, discouraged, and prevented in order to keep a hostile work environment from developing. Left unchecked, harassment can escalate into violence. Workplace violence and harassment training are essential to the safety of all employees.
X64 Course
By Illuminati PartyReverse Engineering For Everyone! by @mytechnotalent Wait, what’s reverse engineering? Wikipedia defines it as: Reverse engineering, also called backwards engineering or back engineering, is the process by which an artificial object is deconstructed to reveal its designs, architecture, code, or to extract knowledge from the object. It is similar to scientific research, the only difference […]
X86 Course
By Illuminati PartyReverse Engineering For Everyone! by @mytechnotalent Wait, what’s reverse engineering? Wikipedia defines it as: Reverse engineering, also called backwards engineering or back engineering, is the process by which an artificial object is deconstructed to reveal its designs, architecture, code, or to extract knowledge from the object. It is similar to scientific research, the only difference […]