Our Courses
We offer hundreds of courses in Cybersecurity, IT, Soft Skills, and Management and we’re adding more all the time. Please use the search bar or filter by topic and/or skill level to find your content and get started!
Getting Started With Blazor
By EC-CouncilBlazor is a free and open-source web framework that enables developers to create web applications using C# and HTML. Blazor uses open web standards without plugins or code transpilation. Blazor works in all modern web browsers, including mobile browsers. Code running in the browser executes in the same security sandbox as JavaScript frameworks. The course […]
Getting Started With Kali Linux Penetration Testing
By EC-CouncilDo you want to learn the tools that Kali Linux offers to perform vulnerability assessment and penetration testing? Then this course is for you! This course will start from scratch and will provide you with essential knowledge of the most happening and widely used tools available in Kali Linux by performing real-world practicals. You will […]
Getting Started With Reinforcement Learning
By EC-CouncilReinforcement learning is an important paradigm shift in Artificial Intelligence, and it opens the path for AGI, from the finance industry to robotics RL can play a key role in shaping the future of AI. In this course, you will understand everything you need to know about reinforcement learning from understanding basic building blocks & […]
GIAC Security Essentials (GSEC)
By ACI-LearningGIAC is a registered trademark of the Escal Institute of Advanced Technologies, Inc. SANS is not affiliated with these courses. GIAC has been an industry leader in information security certifications for years. The GIAC Security Essentials (GSEC) is designed for Security Professionals who want to demonstrate that they are qualified for IT systems hands-on roles […]
Goal Setting And Getting Things Done
By Phoenix TSGoal Setting is one of the most basic and essential skills someone can develop. We touch on goal characteristics, time management, and what to do when setbacks occur. This workshop will provide the knowledge and skills participants need to complete more tasks and get things done.
Google Cloud ACE Exam Prep
By 30 Bird MediaThe purpose of this Test Prep is to provide you with test questions that will make you familiar with the questions on the Google Cloud ACE certification exams. Designed by IT experts, this test prep is a great way to prepare for your Google Cloud ACE Certification exam and excel.
Hands-On Android Security
By EC-CouncilEmpowering the world with a million applications and users, Android is one of the most preferred mobile operating systems. Rise in number of users and devices opens the opportunity for threats, which can lead to security breaches. This course focuses on the practical aspect of penetration testing. The course will begin with teaching you the […]
Hands-On Azure Data Factory And Security
By EC-CouncilAs more and more data get stored and evolved over the time, the problem is generally how do you use that data and how to churn meaningful data out. In this course you will learn about how to use Azure data factory to process, structure and streamline datasets and build a reliable end to end […]
Hands-On Azure Databricks And Security
By EC-CouncilAs more and more data is getting stored and evolved over time, the problem is generally how do you use that data and how to churn meaningful data out. Azure Databricks is a fast, easy and collaborative Apache Spark-based big data analytics service designed for data science and data engineering. In this course you will […]
Hands-On Hacking
By ACI-LearningTo become a well-rounded Ethical Hacker and/or Penetration Tester, not only must you be familiar with the appropriate tools and techniques, but you must also craft your methodology for applying said skills. One of the best ways of accomplishing that goal is by way of practical application. In this series, you’ll be instructed on how […]
Hands-On Network Security
By EC-CouncilNetwork analysis has become a powerful tool for criminal investigation, identifying the three principal areas of study and applications of social networks in criminological research. Network Analysis methods are a group of unique analytical methods used in a case where it is necessary to analyze and optimize a network of interconnected and related elements that […]
Hands-On Password Attacks And Security
By EC-CouncilPasswords have become the top authentication factor in today’s world. You use it in combination with an email or username to sign into almost any service. Big Corporations like Google, Microsoft, Amazon, and Facebook still widely use passwords as an authentication mechanism today. But how secure are passwords? This course focuses on the practical attacks […]
Hands-On Web App Pentesting
By ACI-LearningThis course is designed for those looking to gain skills related to penetration testing web applications. We start by covering topics that will help you understand some of the basics of web technologies which are the foundation of modern web applications. Next we will gain familiarity with common web app pentesting tools as well as […]
Hardware Projects Using Raspberry Pi
By EC-CouncilThis is an intermediate course about the credit card-sized computer Raspberry Pi. This course is ideal for those who are interested in exploring the possibilities of physical computing with Raspberry Pi. The course assumes basic knowledge on computer programming. However, knowledge of the Linux operating system and Python programming language would greatly help you in […]
HDN Certified SOC Analyst -Team Member Course
By Illuminati PartyBecome a highly skilled and sought-after SOC (Security Operations Center) Analyst or Team Member with our HDN Certified training program. This comprehensive course equips you with the knowledge and practical skills needed to excel in the field of cybersecurity. You’ll learn how to effectively monitor and respond to security incidents, detect and mitigate threats, and […]
High-Performance Teams Inside The Company
By Phoenix TSHigh-Performance Teams (Inside the Company) are organizations, teams, or groups working inside an office environment that is focused on achieving the same goals. Bringing team members together can sometimes be a challenging task. This workshop identifies these challenges and helps participants push through to success.
High-Performance Teams Remote Workforce
By Phoenix TSHigh-Performance Teams (Remote Workforce) are organizations, teams, or groups working in a virtual environment that are focused on achieving the same goals. Bringing team members together through a virtual environment can be a challenging task. This workshop identifies these challenges and helps your participants push through to success
HIPPA Security Rule
By ecfirstOn February 20, 2003, the Final Rule was published. The Rule specifies a series of administrative, technical, and physical security procedures for covered entities to use to assure the confidentiality, integrity, and availability of e-PHI. This rule is commonly known as the Security Rule. This course teaches your responsibility in Security Privacy. COURSE OBJECTIVES At […]
Hiring Strategies
By Cyber PhoenixSuccessful companies are made up of great employees, so why not hire great employees? Hiring and training employees is an expensive venture. Hiring the right person is more about skills and abilities; it is about finding the right combination of skills, attitude, and fit for your organization”s culture.
Human Resource Management
By Phoenix TSRecently tasks that were originally thought to fall under the responsibility of the human resources department have become a part of many managers’ job descriptions. The sharing and diffusion of these tasks throughout the organization have had an impact, particularly on those that are not equipped with the skills or knowledge to deal with these […]
Identification & Authentication
Learn to manage and verify user identities and credentials, ensuring secure access to systems and data in accordance with CMMC requirements.
Identification & Authentication (CMMC)
Learn to manage and verify user identities and credentials, ensuring secure access to systems and data in accordance with CMMC requirements.
IDENTIFICATION & AUTHENTICATION (CMMC)
Learn to manage and verify user identities and credentials, ensuring secure access to systems and data in accordance with CMMC requirements.
Identity And Access Management
By EC-CouncilIn an increasingly connected world, Identity and Access Management is critical to securing the access and availability of enterprise assets. Effective IAM ensures that the right people have access to the right assets.This comprehensive course covers the key areas of IAM, including fundamental concepts, but also the technologies and the different approaches to implementing effective […]
Implementing and Administering Cisco Solutions: CCNA 200-301
By EC-CouncilThe “Implementing and Administering Cisco Solutions: CCNA 200-301” video course is targeted toward both beginners and seasoned professionals. One of the major issues within the industry is there are persons who want to start a career in network engineering but don’t have training materials that are mapped directly to the certification standard and there are […]