Our Courses
We offer hundreds of courses in Cybersecurity, IT, Soft Skills, and Management and we’re adding more all the time. Please use the search bar or filter by topic and/or skill level to find your content and get started!
CompTIA CySA+ (CS0-002)
By ACI-LearningWelcome to the CompTIA CySA+ series. This series is intended to explore the topics necessary to prepare for the CySA+ exam. Here we cover many computer security related concepts and tools, exploring their best practices and practical application. This includes threats, threat management, reconnaissance, and countermeasures, common vulnerabilities, penetration testing, incident response, security architectures, and […]
CompTIA Network+ Exam Prep
By 30 Bird MediaThe purpose of this Test Prep is to provide you with test questions that will make you familiar with the questions on the CompTIA Network+ certification exams. Designed by IT experts, this test prep is a great way to prepare for your CompTIA Network+ Certification exam and excel.
CompTIA PenTest + (PT0-002)
By ACI-LearningPenTest+ assesses the most up-to-date penetration testing, and vulnerability assessment and management skills necessary to determine the resiliency of the network against attacks.
CompTIA PenTest+Exam Prep
By 30 Bird MediaThe purpose of this Test Prep is to provide you with test questions that will make you familiar with the questions on the CompTIA PenTest+ Exam PT0-001 certification exams. Designed by IT experts, this test prep is a great way to prepare for your PenTest+ Certification exam and excel.
CompTIA Security+ (SY0-601)
By ACI-LearningThis series is focused on CompTIA’s Security+ certifications. Security+ is a vendor-neutral certification that is recognized worldwide as a benchmark for information system security best practices. The series is intended for aspiring IT security professionals entering into security. The series follows the CompTIA specified objectives for the SY0-601 exam
CompTIA Security+ 601 Exam Prep
The purpose of this Test Prep is to provide you with test questions that will make you familiar with the questions on the CompTIA Security+ certification exams. Designed by IT experts, this test prep is a great way to prepare for your Security+ Certification exam and excel.
CompTIA Security+ Certification Training
Welcome to the Phoenix TS Learning Portal hosted by Cyber Phoenix! This site contains all the information and links you will need to attend your class. Please refer to the Job Aid which accompanied your welcome letter which will assist you in navigating the Portal for specific topics. If you have any questions pertaining to your […]
CompTIA Security+ Exam Prep
The purpose of this Test Prep is to provide you with test questions that will make you familiar with the questions on the CompTIA Security+ certification exams. Designed by IT experts, this test prep is a great way to prepare for your Security+ Certification exam and excel.
CompTIA Security+ Exam Prep
By EC-CouncilThe CompTIA Security+ Exam Prep will be targeted toward both new learners and even professionals. One of the major issues within the cybersecurity realm is that IT professionals are not able to identify both internal and external threats that are affecting their organization. By completing this video series, you will be able to understand the […]
CompTIA Server+ Exam Prep
By 30 Bird MediaThe purpose of this Test Prep is to provide you with test questions that will make you familiar with the questions on the CompTIA Server+ certification exams. Designed by IT experts, this test prep is a great way to prepare for your Server+ Certification exam and excel.
Computer Forensics Best Practices
By EC-CouncilThere are five main components to computer forensics these being: identification; collection; preservation; analysis and presentation; of computer forensic evidence and each one of these components is important on its own. The underlying concept in computer forensics is to ensure limited or no handling of the original evidence and to make certain all the steps […]
Computer Vision With Python
By EC-CouncilThe goal of computer vision is to derive descriptive information about a scene by computer analysis of images of the scene. Vision algorithms can often serve as computational models for biological visual processes, and they also have many practical uses; this course treats computer vision as a subject in its own right. Vision problems are […]
Conducting Annual Employee Reviews
By Cyber PhoenixAn annual review can help you keep your employees happy, engaged, and focused. It is human nature to want to succeed. Giving your employees feedback on their positive and negative attributes is part of the pathway to success. A poorly designed annual review can have the reverse effect.
Configuration Management (CMMC)
Master the processes for managing and securing system configurations to prevent unauthorized changes and maintain compliance with CMMC.
Configure Juniper SRX Router Using J-Web
By EC-CouncilAre you curious to know how to configure Juniper SRX router to provide internet service? Then, you’ve just landed on the right platform. In this course, you will discover how you can connect to the Juniper SRX router using console and J-Web, and how to configure the router using J-Web to share internet to the […]
Contact Center Traning
By Cyber PhoenixCustomers want a well-educated agent when they contact a business. They want to know that the person answering their questions knows what they are talking about. Training staff, and giving them the information that is needed to effectively assist your customer base is paramount.
Continuous Integration And Continuous Deployment With Azure
By EC-CouncilTo help and support a team with continuous integration and delivery pipeline that helps to test and deliver software/infrastructure in a quick span of time with the fully integrated build and release pipelines with proper testing. This course has been tailor-made for the audience who have no or little prior experience in any DevOps tools […]
Contract Management
It is easy to overlook the importance of contract management because it seems to be a boring, mundane topic. Contracts, however, are the basis of most business relationships. If contracts are managed well, business relationships will flourish. If they are not, companies face financial loss, relationship harm, and damaged reputations.
Creating A Great Webinar
By Phoenix TSWebinars are a great inexpensive way to reach a large number of people. Webinars are great tools if you want to market a new or improved product, train employees, demonstrate a new task, or have a meeting with employees located throughout the globe. Being an interactive form of media, Webinars provides a great environment for […]
Creating A Job Listing App Using Flutter And Firebase
By EC-CouncilTo reach a wider segment of audience, an app must be present on multiple platforms. But maintaining multiple codebases for the corresponding platforms is a difficult task. Google has created Flutter to solve this problem, using Flutter you can create an Android app, an iOS app, a Web app and also a Desktop app from […]
Customer Service
By Cyber PhoenixCourse Description Each and every one of us serves customers, whether we realize it or not. Maybe you’re on the front lines of a company, serving the people who buy your products. Perhaps an accountant serves the employees by producing their paychecks and keeping the company running. Or maybe a company owner, serving staff and […]
Customer Support
By Cyber PhoenixCustomer support used to mean a face-to-face conversation with a customer or a phone call. Today, technology has changed how we approach customer support. It now encompasses the internet, websites, webchats, and even smartphone apps. The customer experience begins long before the purchase is made.
Cyber Secure Coder (CSC-110)
By ACI-LearningCyber Secure Coder will aid in developing an appropriate understanding of secure development practices and how those practices protect against various types of vulnerabilities. You will learn the types of vulnerabilities, the exploits that can occur from those vulnerabilities, and the programming practices that will help prevent exploitation in an application.
Cyber Security
Every organization is responsible for ensuring Cyber Security. The ability to protect its information systems from impairment or even theft is essential to success. Implementing effective security measures will not only offer liability protection; it will also increase efficiency and productivity.
Cyberbullying And You: Beating-The-Bully Guidelines
By EC-CouncilCyberbullying – which refers to incidents where digital technologies are used to harass, threaten, and humiliate others – is one of the most common types of online harassment. Cyberbullying is on the rise worldwide. According to a UNICEF report in 2019, one in three young people (aged 13-24 years) in 30 countries said they have been a victim of cyberbullying. Cyberbullying […]