Popular Topics
CSS
Data Analyst
.NET Secure Coding
Introduction to Angular
Tableau
CompTIA Security+
Real World Applications of Generative AI
Introduction to Power BI
Risk and Compliance
Tableau Server Administration
CISSP
Certified in Governance
Generative AI for Decision Makers
Generative AI for Architects
Certified in Cybersecurity Training
Jira
AI
Ethics and AI
Applying AI for Cost Savings & Efficiency
ASP .Net Web Applications Development
GitHub
.NET Programming
Building a Voice Bot
Automation with Ansible
AWS
Data Science and Big Data
Microsoft Azure
Implementing AI in Automated Enterprise
Introduction to Jira
CompTIA Cybersecurity Analyst
Next Level Power BI
ITIL 4 Certification
AI Tools in Graphic Design
C++ 20 Programming
Penetration Testing Professional
AI Automation Strategies
UX Design
Privacy and Security in AI
XML Course
Kubernetes
Advanced React
XML Learning
Introduction to Ansible
Developing AWS Services and Tools
Attacking and Securing C#
Chief Information Security Officer
Tableau Desktop
CISSP Exam Preparation Course
Administering A SQL Database
ITIL 4 Foundation Certification Training
CompTIA Linux
Certified Cloud Security Professional
Responsive Design
HTM
ASP .NET Core
SQL Data Models
Customer Support with AI
UI/UX Design
SQL Server Integration
Django
JavaScript
MVC Web Application Development by .NET
SQL Data Warehouse
Advanced Angular
Voice Of Innovation
Cloud Operations on AWS
Mastering React
Implementing AI in Business
Hadoop
Certified Secure Software Lifecycle Professional
React Course
Generative AI
Microsoft Office 365 Online
Cloud Computing
Cybersecurity Analyst
Modern JavaScript
Microsoft Azure Data Fundamentals
Machine Learning Fundamentals
CompTIA
Strategic AI Dialogues
JavaScript Essentials'
Core Java Programming
SQL Server Performance Tuning
AI Types
Network Defender
Basic Java Programming
SQL Server Performance Optimization
AI Principles
CSS3
Git
react native
How AI Process Images
Java Programming
AI Applications
Azure AI Solution
CompTIA Server
Python
Citrix
CompTIA PenTest
Citrix Cloud with Amazon Web Services
Advance C++ 20 Programming
CompTIA Data+
CompTIA Cloud Essentials+
Microsoft Azure for SAP Workloads
Microsoft Power BI Data Analyst
PL-600 Power Platform Solution Architect
CompTIA Project
Azure SQL Solutions
SharePoint End User
CompTIA Network
CompTIA A+ Core 2
Microsoft Azure Administrator
Professional Development
Prompt Engineering for Business Users
Microsoft Project 2016 Level 1
Microsoft Project 2016: Level 2
Microsoft Azure Fundamentals Training Certification
Introduction to AI
CompTIA IT Fundamentals
HTML5
Introduction to GitHub
Azure AI Fundamentals
Microsoft Azure Certification
CompTIA Cloud
CompTIA A+ Core 1
Azure Infrastructure Solutions
SQL Database Infrastructure
Full Stack Web Development
Citrix Endpoint Management
Introduction to C++
All `Live Courses by Practice Area Courses
Test descriptionFilter by Topic
Filter by Vendor
Time Management
Course Description Overwhelmed by all the demands on your time? …
Effective Communication Basics
Description In this Training, you learn how to achieve results …
Emotional Intelligence
Course Description Emotional intelligence, also referred to as Emotional Quotient …
CyberSec First Responder® (CFR)
Course Description This course covers network defense and incident response …
What you'll learn
Compare and contrast various threats and classify threat profile
Explain the purpose and use of attack tools and technique
Explain the purpose and use of post exploitation tools and tactic
Explain the purpose and use of social engineering tactic
Given a scenario, perform ongoing threat landscape research and use data to prepare for incident
Explain the purpose and characteristics of various data source Given a scenario, use appropriate tools to analyze log
Given a scenario, use regular expressions to parse log files and locate meaningful data
Given a scenario, use Windows tools to analyze incidents
Given a scenario, use Linux-based tools to analyze incidents
Summarize methods and tools used for malware analysis
Given a scenario, analyze common indicators of potential compromise
Explain the importance of best practices in preparation for incident response
Given a scenario, execute incident response process
Explain the importance of concepts that are unique to forensic analysis
Explain general mitigation methods and devices
GIAC Security Leadership (GSLC)
Course Description The GIAC Security Leadership (GSLC) certification validates a …
Six Sigma Green Belt
Instructor-Led Vendor: PECB Quality Management What You’ll Learn This training …
What you'll learn
Learn the fundamental principles of process improvement
Manage projects using the familiar DMAIC methodology
Leverage the GRES methodology for problem-solving
Apply basic statistical analyses when appropriate to support improvement efforts
Learn how to verify process improvements by using statistical and common sense methods
Facilitate Green Belt process improvement projects
Learn how to shift processes, reduce variation, stabilize processes, and improve their capabilities
Six Sigma Yellow Belt
Six Sigma Yellow Belt training enables you to learn about …
What you'll learn
Understand the basic concepts of Six Sigma Yellow Belt
Acknowledge the value of Six Sigma to an organization
Understand the Six Sigma Yellow Belt tools and techniques used to improve processes, customer satisfaction and efficiency
ISO/IEC 27701 Lead Implementer
Course Description The ISO/IEC 27701 Lead Implementer training course enables …
What you'll learn
Master the concepts, approaches, methods and techniques used for the implementation and effective management of a PIMS.
Learn about the correlation between ISO/IEC 27701, ISO/IEC 27001, ISO/IEC 27002 and other standards and regulatory frameworks.
Understand the operation of a PIMS based on ISO/IEC 27701 and its principal processes.
Learn how to interpret the requirements of ISO/IEC 27701 in the specific context of an organization.
Develop the expertise to support an organization in effectively planning, implementing, managing, monitoring and maintaining a PIMS.