Virtual Instructor-Led Training
Get certified or simply improve your skills with our virtual Instructors.

Categories
- Agile
- AI/ML
- All Courseware
- Application & Infrastructure
- Application and Infrastructure
- Business Analysis
- Cloud
- Data & Analytics
- Design Multimedia
- Developer
- DevOps
- End User Application
- IT Service Management
- Leadership & Professional Development
- Modern Workplace
- Networking & Wireless
- Networking and Wireless
- Office Applications
- Programming
- Project Management
- Security
- Uncategorized
- Virtualization
- Workplace Fundamentals
Vendors
- Adobe
- Agile
- Amazon
- Business Analysis
- Business Process
- CertNexus
- Cisco
- CompTIA
- Crystal Reports
- CyberSecurity Professionals
- Development
- DevOps Institute
- EC-Council
- ISACA
- ISC2
- Java
- JavaScript
- Leadership & Professional Development
- Microsoft
- Microsoft Apps
- Microsoft Technical
- PeopleCert
- PMI
- Project Management
- Python
- Red Hat
- Scrum
- SHRM
- Six Sigma
- Tableau
- VMware
- Web Development
- Workplace Fundamentals
Security
CompTIA
Cybersecurity leaders aren’t just defenders—they’re strategists. The global cybersecurity workforce gap reached 4 million professionals in 2023, highlighting urgent demand for experts who can secure and lead at the enterprise level.
CompTIA SecurityX (formerly CASP+) is the only advanced-level, hands-on cybersecurity certification designed for senior security engineers and architects who lead cybersecurity readiness, design secure architectures, and implement resilient enterprise defenses.
SecurityX is the capstone certification in the CompTIA Cybersecurity Pathway and now forms part of the CompTIA Xpert Series. This updated CAS-005 version includes performance-based questions and maps to 19 NICE Framework roles and 19 DoD Cyber Workforce roles, making it an ideal credential for defense contractors and enterprise security leaders alike.
- 5 Days Course
- Live Virtual
$4,464.89CertNexus
The stakes for software security are very high, and yet many development teams deal with software security only after the code has been developed and the software is being prepared for delivery. As with any aspect of software quality, to ensure successful implementation, security and privacy issues should be managed throughout the entire software development lifecycle. This course presents an approach for dealing with security and privacy throughout the entire software development lifecycle. You will learn about vulnerabilities that undermine security, and how to identify and remediate them in your own projects. You will learn general strategies for dealing with security defects and misconfiguration, how to design software to deal with the human element in security, and how to incorporate security into all phases of development.- 3 Days Course
- Live Virtual
$2,825.28CertNexus
Cyber threats are constant—and escalating. To defend networks and critical assets, today’s IT professionals need more than just awareness—they need structured, tested methods to detect, respond, and recover. The average breach costs $4.45 million—making fast, skilled response more critical than ever.
The CyberSec First Responder (CFR) course from CertNexus equips practitioners with the skills to assess risk, monitor for intrusions, analyze threats, and respond to incidents in real time. Built around leading frameworks like NIST 800-61r2 and PPD-41, this 5-day course prepares learners to protect information systems and carry out Defensive Cyber Operations (DCO) effectively.
This course also prepares candidates for the CFR-410 certification exam, validating their ability to detect, contain, analyze, and recover from cybersecurity incidents across modern network environments.
- 5 Days Course
- Live Virtual
$4,735.90EC-Council
EC-Council’s C|HFI program prepares cybersecurity professionals with the knowledge and skills to perform effective digital forensics investigations and bring their organization into a state of forensic readiness. Establishing the forensics process, lab, evidence handling procedures, and investigation techniques are required to validate/triage incidents and point the incident response teams in the right direction. Forensic readiness is crucial as it can differentiate between a minor incident and a major cyber-attack that brings a company to its knees.
This intense hands-on digital forensics program immerses students in over 68 forensic labs, working on crafted evidence files utilizing the tools of the world’s top digital forensics professionals. Students will go beyond traditional hardware and memory forensics, covering current topics in cloud forensics, mobile and IoT, and investigating web application attacks and malware forensics. The C|HFI presents a methodological approach to computer forensics, including searching and seizing, chain-of-custody, acquisition, preservation, analysis, and reporting of digital evidence. Students learn various forensic investigation techniques and standard forensic tools. As they learn how to acquire and manage evidence through various operating environments, students also learn the chain of custody and legal procedures required to preserve evidence and ensure it is admissible in court, enabling the eventual prosecution of cyber criminals and containing liability on the victim organization.
- 5 Days Course
- Live Virtual
$4,735.90Cisco
The Implementing and Configuring Cisco Identity Services Engine (SISE) v4.0 course teaches you to deploy and use Cisco® Identity Services Engine (ISE) v3.x, an identity and access control policy platform that simplifies the delivery of consistent, highly secure access control across wired, wireless, and VPN connections. This 5-day hands-on course provides you with the knowledge and skills to implement and apply Cisco ISE capabilities to support use cases for Zero Trust security posture. These use cases include tasks such as policy enforcement, profiling services, web authentication and guest access services, BYOD, endpoint compliance services, and Terminal Access Controller Access Control Server (TACACS+) device administration. Through hands-on practice via lab exercises, you will learn how to use Cisco ISE to gain visibility into what is happening in your network, streamline security policy management, and contribute to operational efficiency.- 5 Days Course
- Live Virtual
$5,413.42CertNexus
The Internet of Things (IoT) allows organization to collect an extraordinary volume of data and new analysis tools can enable you to use this data to make well-informed decisions to be made quickly. But before you can successfully plan and implement an IoT solution, you must understand the various factors that will drive your decisions. Putting IoT systems into place can be a complicated proposition with unique considerations distinctly different from traditional IT solutions. This course will familiarize you with IoT components, understand the challenges that you may face, and make design decisions about your IoT projects. This course prepares students for taking the CertNexus® IoTBIZ Credential (IOZ-110). This course includes a FREE exam voucher for IOZ-110.- 0.5 Course
- Live Virtual
$474.27CyberSecurity Professionals
The NIST Cybersecurity Professional 800-53 Specialist looks at the impact of adapting a principled approach to enterprise risk management framework to better support cybersecurity decisions within the context of the NIST 800-53 informative reference.
It guides students on the best approach to adapt, implement, and operate (AIO) a comprehensive cybersecurity program that integrates into existing organizational capabilities incorporating NIST 800-53. Study includes lectures, informative supplemental reference materials, workshops, and a formal examination – workshops are a critical aspect of the course and develop examinable material.
Accredited through APMG International, certified in the UK by the National Cyber Security Centre (NCSC) and listed as qualified cyber training by Department of Homeland Security Cybersecurity and Infrastructure Security Agency (DHS CISA) in the US, the NIST Cyber Security Professional training program teaches individuals and organizations how to engineer, operationalize and continually improve a NIST Cyber Security Framework (NIST-CSF) Program.
- 5 Days Course
- Live Virtual
$4,058.37 – $4,952.71CyberSecurity Professionals
Accredited through APMG International, certified in the UK by the National Cyber Security Centre (NCSC) and listed as qualified cyber training by Department of Homeland Security Cybersecurity and Infrastructure Security Agency (DHS CISA) in the USA, the NIST Cyber Security Professional training program teaches individuals and organizations how to engineer, operationalize and continually improve a NIST Cybersecurity Framework program. This NIST Cybersecurity Professional Foundation Certificate course is designed to teach IT, Business and Cybersecurity professionals the fundamentals of digital transformation, cyber security risk management and the NIST Cybersecurity Framework (NIST-CSF). Accredited through APMG International, certified in the UK by the National Cyber Security Centre (NCSC) and listed as qualified cyber training by Department of Homeland Security Cybersecurity and Infrastructure Security Agency (DHS CISA) in the US, the NIST Cyber Security Professional (NCSP®) training program teaches individuals and organizations how to engineer, operationalize and continually improve a NIST Cyber Security Framework (NIST-CSF) Program.- 2 Days Course
- Live Virtual
$2,723.65 – $2,974.33Microsoft Technical
This is an advanced, expert-level course. Although not required to attend, students are strongly encouraged to have taken and passed another associate level certification in the security, compliance and identity portfolio (such as AZ-500, SC-200 or SC-300) before attending this class. This course prepares students with the expertise to design and evaluate cybersecurity strategies in the following areas: Zero Trust, Governance Risk Compliance (GRC), security operations (SecOps), and data and applications. Students will also learn how to design and architect solutions using zero trust principles and specify security requirements for cloud infrastructure in different service models (SaaS, PaaS, IaaS).
- 4 Days Course
- Live Virtual
$3,225.02 – $3,380.85Microsoft Technical
Learn how to investigate, respond to, and hunt for threats using Microsoft Sentinel, Microsoft Defender XDR and Microsoft Defender for Cloud. In this course you will learn how to mitigate cyberthreats using these technologies. Specifically, you will configure and use Microsoft Sentinel as well as utilize Kusto Query Language (KQL) to perform detection, analysis, and reporting. The course was designed for people who work in a Security Operations job role and helps learners prepare for the exam SC-200: Microsoft Security Operations Analyst.
- 4 Days Course
- Live Virtual
$3,225.02 – $3,380.85Microsoft Technical
The Microsoft Identity and Access Administrator course explores how to design, implement, and operate an organization’s identity and access management systems by using Microsoft Entra ID. Learn to manage tasks such as providing secure authentication and authorization access to enterprise applications. You will also learn to provide seamless experiences and self-service management capabilities for all users. Finally, learn to create adaptive access and governance of your identity and access management solutions ensuring you can troubleshoot, monitor, and report on your environment. The Identity and Access Administrator may be a single individual or a member of a larger team. Learn how this role collaborates with many other roles in the organization to drive strategic identity projects. The end goal is to provide you knowledge to modernize identity solutions, to implement hybrid identity solutions, and to implement identity governance.
- 4 Days Course
- Live Virtual
$3,225.02 – $3,380.85Microsoft Technical
Learn how to protect information in your Microsoft 365 deployment. This course focuses on data lifecycle management and information protection and compliance within your organization. The course covers implementation of data loss prevention policies, sensitive information types, sensitivity labels, data retention policies, Microsoft Purview Message Encryption, audit, eDiscovery, and insider risk among other related topics. The course helps learners prepare for the Microsoft Information Protection Administrator exam (SC-400).
- 4 Days Course
- Live Virtual
$3,225.02 – $3,380.85