Popular Topics
CSS
.NET Secure Coding
Introduction to Angular
Data Analyst
Tableau
Introduction to Power BI
Real World Applications of Generative AI
CompTIA Security+
Tableau Server Administration
CISSP
AI
Risk and Compliance
Generative AI for Decision Makers
Generative AI for Architects
Jira
GitHub
Certified in Governance
Ethics and AI
Applying AI for Cost Savings & Efficiency
ASP .Net Web Applications Development
Introduction to Jira
Next Level Power BI
ITIL 4 Certification
.NET Programming
Building a Voice Bot
Automation with Ansible
AWS
Data Science and Big Data
Microsoft Azure
Implementing AI in Automated Enterprise
Administering A SQL Database
ITIL 4 Foundation Certification Training
CompTIA Linux
Certified Cloud Security Professional
Responsive Design
AI Tools in Graphic Design
C++ 20 Programming
Penetration Testing Professional
AI Automation Strategies
UX Design
Privacy and Security in AI
XML Course
Kubernetes
XML Learning
Developing AWS Services and Tools
Attacking and Securing C#
Chief Information Security Officer
Tableau Desktop
Microsoft Azure Data Fundamentals
Machine Learning Fundamentals
CompTIA
Strategic AI Dialogues
CompTIA Cybersecurity Analyst
JavaScript Essentials'
Core Java Programming
SQL Server Performance Tuning
AI Types
Network Defender
Basic Java Programming
SQL Server Performance Optimization
AI Principles
CSS3
Git
react native
How AI Process Images
Java Programming
AI Applications
ASP .NET Core
SQL Data Models
Customer Support with AI
UI/UX Design
SQL Server Integration
Django
JavaScript
MVC Web Application Development by .NET
SQL Data Warehouse
Advanced Angular
Advanced React
Voice Of Innovation
Introduction to Ansible
Cloud Operations on AWS
Mastering React
Implementing AI in Business
Certified in Cybersecurity Training
Hadoop
Certified Secure Software Lifecycle Professional
React Course
Generative AI
Microsoft Office 365 Online
Cloud Computing
CISSP Exam Preparation Course
Modern JavaScript
Microsoft Project 2016 Level 1
Microsoft Project 2016: Level 2
Microsoft Azure Fundamentals Training Certification
Introduction to AI
CompTIA IT Fundamentals
HTML5
Introduction to GitHub
Azure AI Fundamentals
Microsoft Azure Certification
CompTIA Cloud
CompTIA A+ Core 1
Azure Infrastructure Solutions
SQL Database Infrastructure
Full Stack Web Development
Citrix Endpoint Management
Introduction to C++
Azure AI Solution
HTM
CompTIA Server
Python
Citrix
CompTIA PenTest
Citrix Cloud with Amazon Web Services
Advance C++ 20 Programming
CompTIA Data+
CompTIA Cloud Essentials+
Microsoft Azure for SAP Workloads
Microsoft Power BI Data Analyst
PL-600 Power Platform Solution Architect
CompTIA Project
Azure SQL Solutions
SharePoint End User
CompTIA Network
CompTIA A+ Core 2
Microsoft Azure Administrator
Professional Development
Prompt Engineering for Business Users
Cybersecurity Analyst
All `Live Courses by Practice Area Courses
Test descriptionFilter by Topic
Filter by Vendor
Certified Ethical Hacker | CEH
This Certified Ethical Hacker Certification is designed to teach students …
What you'll learn
Information security controls, laws, and standards.
Foot printing, foot printing tools, and countermeasures.
Network scanning techniques and scanning countermeasures.
Enumeration techniques and enumeration countermeasures.
Vulnerability analysis to identify security loopholes in the target organization’s network, communication infrastructure, and end systems.
System hacking methodology, steganography, stag analysis attacks, and covering tracks to discover system and network vulnerabilities.
Different types of malware (Trojan, Virus, worms, etc.), system auditing for malware attacks, malware analysis, and countermeasures.
Packet sniffing techniques to discover network vulnerabilities and countermeasures to defend against sniffing.
Social engineering techniques and how to identify theft attacks to audit human-level vulnerabilities and social engineering countermeasures.
DoS/DDoS attack techniques and tools to audit a target and DoS/DDoS countermeasures.
Session hijacking techniques to discover network-level session management, authentication/authorization, and cryptographic weaknesses and countermeasures.
Web Server attacks and a comprehensive attack methodology to audit vulnerabilities in web server infrastructure, and countermeasures.
Web application attacks, comprehensive web application hacking methodology to audit vulnerabilities in web applications, and countermeasures.
SQL injection attack techniques, injection detection tools to detect SQL injection attempts, and countermeasures.
Wireless encryption, wireless hacking methodology, wireless hacking tools, and Wi-Fi security tools.
Mobile platform attack vector, android vulnerability exploitations, and mobile security guidelines and tools.
Firewall, IDS and honeypot evasion techniques, evasion tools and techniques to audit a network perimeter for weaknesses, and countermeasures.
Cloud computing concepts (Container technology, serverless computing), the working of various threats and attacks, and security techniques and tools.
Penetration testing, security audit, vulnerability assessment, and penetration testing roadmap.
Threats to IoT and OT platforms and defending IoT and OT devices.
Cryptography ciphers, Public Key Infrastructure (PKI), cryptography attacks, and cryptanalysis tools.
CSSLP – Certified Secure Software Lifecycle Professional
What Will You Learn From Our CSSLP Training? To become …
What you'll learn
The course on CSSLP teaches how to secure your applications. After having CSSLP certification from (ISC) ², your application security capability within the software development lifecycle will be authorized. In-depth coverage of the eight domains required to pass the CSSLP exam.
Domain 1: Secure Software Concepts
Domain 2: Security Software Requirements
Domain 3: Secure Software Design
Domain 4: Secure Software Implementation/Coding
Domain 5: Secure Software Testing
Domain 6: Software Acceptance
Domain 7: Software Deployment, Operation, Maintenance and Disposal
Domain 8: Supply Chain and Software Acquisition
SSCP – Systems Security Certified Practitioner
Is SSCP A Good Certification Training? Professionals who work with …
What you'll learn
In-depth coverage of the seven domains required to pass the SSCP exam.
Domain 1: Access Control
Domain 2: Security Operations and Administration
Domain 3: Risk Identification, Monitoring, and Analysis
Domain 4: Incident Response and Recovery
Domain 5: Cryptography
Domain 6: Networks and Communications Security
Domain 7: Systems and Application Security
Project Management Institute – Risk Management Professional (PMI-RMP)
Course Description PMI’s Risk Management Professional (PMI-RMP®) credential is a …
CompTIA Network+
Course Description This instructor-led, online CompTIA Network+ (N10-008) certification course …
What you'll learn
Explain the OSI and TCP/IP Models.
Explain the properties of network traffic.
Install and configure switched networks.
Configure IP networks.
Install and configure routed networks.
Configure and monitor ports and protocols.
Explain network application and storage issues.
Monitor and troubleshoot networks.
Explain network attacks and mitigations.
Install and configure security devices.
Explain authentication and access controls.
Deploy and troubleshoot cabling solutions.
Implement and troubleshoot wireless technologies.
Compare and contrast WAN technologies.
Use remote access methods.
Identify site policies and best practices.
Certified Associate in Project Management (CAPM)
Course Description In this CAPM exam prep training course, you …
What you'll learn
Prepare to pass the CAPM exam while completing the required 23 contact hours/PDUs
Decipher PMBOK® Guide processes and knowledge areas
Identify significant steps of the project life cycle
Examine the PMBOK® Guide tools and techniques for exam success
Evaluate your exam preparedness and create a study plan
CompTIA Project+
Course Description If you are taking this course, you probably …
What you'll learn
Identify the fundamentals of project management.
Initiate a project.
Create project plans, stakeholder strategies, and scope statements.
Develop a Work Breakdown Structure and activity lists.
Develop a project schedule and identify the critical path.
Plan project costs.
Create project staffing and quality management plans.
Create an effective communication plan.
Create a risk management plan, perform a risk analysis, and develop a risk response plan.
Plan project procurements.
Develop change management and transition plans.
Assemble and launch the project team to execute the plan.
Execute the project procurement plan.
Monitor and control project performance.
Monitor and control project constraints.
Monitor and control project risks.
Monitor and control procurements.
Perform project closure activities.
CompTIA Cloud Essentials+
CompTIA Cloud Essentials+ (CLO-002) is the only internationally recognized, vendor-neutral …