INE Courses
With new Networking, Cyber Security, Data Science, and Cloud courses released each month, our in-house instructors and content creators work tirelessly to ensure you and your teams have access to the most accurate training material in the industry.
Looking to test your knowledge? No problem! Our industry leading lab platform will provide you and your teams with the challenges necessary to ensure you are confident with your expertise.
See the Courses in the INE Platform
Begin Your Learning ExperiencePopular courses
Advanced ISE Deployments and Integrations
This course covers understanding and implementing Guest Access for Wired and Wireless networks using ISE. In this course, you will also learn how to configure BYOD using ISE and how to configure HotSp...
Advanced Network Automation with Python
This course covers advanced Python scripting required for Network automation and managing network devices. In this course, you will learn about taking backups of network devices using Netmiko, Built-i...
Assessment Methodologies: Auditing Fundamentals
This course covers Auditing Fundamentals. Here in this course, you will learn about the core cybersecurity concepts and the basis and reasoning behind penetration testing. Cybersecurity fulfills busin...
Assessment Methodologies: Footprinting & Scanning
This course covers Host and Network Fingerprinting and Scanning. In this course, you will learn about different methods for endpoint detection and identification. This is the first step for pentesters...
Assessment Methodologies: Information Gathering
Information gathering is the first step of any penetration test and is arguably the most important as all other phases rely on the information obtained about the target during the information gatherin...
Assessment Methodologies: Vulnerability Assessment
This course covers Vulnerability Assessment. Here in this course, you will learn about technical and nontechnical vulnerabilities, as well as the system for tracking and researching vulnerabilities ac...
Authentication, Authorization, Accounting, Roles (AAA)
Authentication, authorization and accounting (AAA, pronounced triple A) is a special standard-based system designed to intelligently control access to network & computer resources. This control is per...
Automating Cisco ACI with Python Bootcamp
Automating Cisco ACI with Python is just one of the many use cases for today’s Network Engineers to learn programming. In this course, we start with a hands-on Introduction to Python to learn the pra...
AWS Cloud Architect Bootcamp
Join us for this 12 Week AWS Cloud Architect Bootcamp and prepare for the AWS Solutions Architect Associate certification by BUILDING 54 PROJECTS.
AWS Infrastructure as Code
Being a consummate cloud engineer requires many skills needed at various times: network troubleshooting, tuning virtual machines, and diagnosing poor application performance, just to name a few. But ...
AWS Networking
Building a networking environment in the cloud is quite different than building one on-premises. As a cloud engineer, you need to understand how to set up a basic networking environment on AWS. In thi...
AWS Security Basics
The AWS Security Basics course covers the basics of the AWS Identity Access Management service's users, groups, roles, policies, and shared responsibility in the cloud. This course is a basic introduc...
AWS Security & Compliance
AWS is not only a game-changer for companies looking to innovate faster. AWS Cloud also helps you significantly improve your security and compliance practice in ways that would be difficult or financ...
Azure Administrator (AZ-104) Exam Prep Course
Learn Azure administration with Microsoft MVPs Tim Warner and Mike Pfeiffer and prepare for the Microsoft Azure Administrator (AZ-104) certification exam.
Azure Fundamentals (AZ-900) Accelerated Exam Prep
Learn Azure Fundamentals with Microsoft MVPs Tim Warner and Mike Pfeiffer and prepare for the Azure Fundamentals (AZ-900) certification exam.
Azure Fundamentals: Cloud Concepts
This on-demand course is intended for managers, directors, and IT professionals who need an overview of cloud computing and the Microsoft Azure cloud. This course focuses on understanding what cloud c...
Azure Management Concepts
One key to understanding Azure is understanding the management concepts and management tools that you will use while working in Azure. In this course you will cover the fundamental concepts of how Azu...
Azure Network Services
The infrastructure as a service (IaaS) market is expected to reach over $201 billion US by 2027 (source: datamation.com). The focus is often on computing with IaaS, but all the computing power must ru...
Azure Network Services Bootcamp
In this bootcamp we will cover how to create, manage, protect. and connect Azure virtual networks. You will learn the components of virtual networks, as well as the services that are available for net...
Azure PowerShell: The Ultimate Beginners Course
Delivered by Microsoft MVPs Mike Pfeiffer, Tim Warner, and Jeff Hicks
Azure Security & Compliance Fundamentals
This on-demand course is intended for managers, directors, and IT professionals who need to understand how information security concepts are implemented in the Microsoft Azure cloud. This course focus...
Azure Services Fundamentals
The primary purpose of Azure is to provide services for customers. In this course, you will get to know many of the most common services provided by Azure. Services covered in this course include infr...
Azure Solutions Architect (AZ-30x) Exam Prep Course
Learn Azure architecture with Microsoft MVPs Tim Warner and Mike Pfeiffer and prepare for the AZ-303 and AZ-304 certification exams.
Become Ansible Workshop
This self-paced on-demand course will show you exactly what you need to know to hit the ground running with Ansible, based on the new book 'become Ansible' by author Josh Duffney.
Best Practices for Implementing BGP Bootcamp
The Implementing BGP with Best Practices course will provide students with an in-depth understanding of Border Gateway Protocol v4 (BGP), the protocol that runs the Internet. With Best Common Practice...
CCNA 200-301 Practice Labs
Whether preparing to take Cisco CCNA 200-301 exam, or just trying to refresh your skills, hands-on practice within a lab environment is a must. This course provides you with exactly that. In this cour...
CCNA Exam Assessment: Network Fundamentals
So you think you're ready to schedule your Cisco CCNA exam? This self-assessment will help you determine if that is true. This assessment covers all topics within Section-1 (Network Fundamentals) of C...
CCNP Enterprise - ENARSI Practice Labs
Are you considering pursuing a Cisco CCNP Enterprise certification? If so, then after passing Cisco’s “Enterprise Core” exam (ENCOR), you’ll also need to pass one “Concentration” exam, and the Cisco ...
CCNP Enterprise - ENCOR Practice Labs
Ask anyone and they’ll tell you…Cisco’s CCNP Enterprise Core 350-401 exam (aka “ENCOR”) is a beast when one considers the scope and depth of topics contained within the exam. Once you have completed w...
Cisco Telemetry Concepts: Overview & Design
A foundation of network management is the ability to retrieve statistical data from your networking devices so that you can establish baselines and trends, and hopefully identify problems before they ...
Cloud Fundamentals Bootcamp
This is a course on cloud fundamentals. It introduces students to the cloud and is intended to familiarize students with basic operations within the cloud. The course covers a wide array of concepts a...
Cloud Pentesting Bootcamp
Around the globe, cloud solutions have become more mainstream in organizations large and small. Cloud has been seen as a more secure alternative to on-premises solutions, but with cloud not being well...
Cyber Security Vulnerabilities Training Library
We turn the tools over to you and walk through the lab environment to show how to use the most current exploits and ways to defend against them.
DevOps Foundations
Learn the foundations of DevOps and how to collaborate on projects within your team.
Digital Forensics: File & Disk Analysis
In this course, you will learn the basic about interacting with the lower levels of files and disks. We will cover the involved technology and foundational disk concepts. You will understand the file ...
Digital Forensics & Incident Response in the Cloud Bootcamp
Digital forensic and incident response is an ever-changing field. With the transition to the cloud, new challenges to cyber forensic practitioners have been unveiled. Cloud forensic techniques are sim...
Digital Forensics: Introduction & Acquisition
Digital Forensics Intro & Acquisitions will get you on your way to understanding the important processes, procedures, and why we do things in the forensics world. You will exit the course with a grasp...
Digital Resistance: Basic Incident Response with a Wartime Focus Bootcamp
The modern cyber threat landscape has changed with the current conflict between Ukraine and Russia. This course will get you up to speed with the relevant incident response techniques including: 1. A...
Docker JumpStart Virtual Workshop
Learn everything you need to know to become proficient with Docker containers and orchestration with Mike Pfeiffer and Dan Wahlin.
Docker & Kubernetes 101
Learn how to hit the ground running with Docker and Kubernetes on Azure.
eCPPTv2 Exam Preparation
You've now finished all the courses on Penetration Testing Professional. Now is time to get ready for the <a href="https://elearnsecurity.com/product/ecpptv2-certification/">eCPPTv2 certification</a>....
eJPT Exam Preparation
You've now finished all the courses on Penetration Testing Student. Now is time to get ready for the <a href="https://elearnsecurity.com/product/ejpt-certification/">eJPT certification</a>. There's...
Encryption Fundamentals
Encryption can be defined as a process of encoding information. This process converts or scrambles the original data into an alternative form, known as ciphertext, which is unreadable to untrusted par...
Engineering Cisco Meraki Solutions (ECMS)
The Engineering Cisco Meraki Solutions (ECMS) course is targeted at candidates who are looking to take the Cisco Meraki Solutions Specialist certification and for the everyday Network Engineer that wa...
eWPT Exam Preparation
Now that you've finished <b>Web Application Penetration Testing Professional</b>, is time to get ready for the <a href="https://elearnsecurity.com/product/ewpt-certification/"> eWPT certification</a>....
Final Lab Practice for CCIE Enterprise Infrastructure
This course is the last step in your preparation for achieving the prestigious CCIE certification. This lab-oriented course consists of 60+ tasks focusing on technologies like LAN switching, IGPs like...
FortiGate Advanced Policies
With a constantly expanding attack surface, enterprises are looking for proven protection, without limiting the speed or capacity of network operations. FortiGate Next-generation Firewall is recognize...
FortiGate Essentials
As the threat landscape rapidly expands, traditional firewalls fall further behind and are unable to offer protection at scale which leads to poor user experience and weak security posture. Next-gener...
FortiGate Technologies
With a constantly expanding attack surface, enterprises are looking for proven protection, without limiting the speed or capacity of network operations. FortiGate Next-generation Firewall is recognize...
Foundations Of Juniper Routing
If you need to learn about IP Routing from the ground-up, and you need to implement this feature on Juniper routers...this course is for you. This course begins by explaining why routing is necessary ...
Fundamentals of Network Automation Using Python
This course covers fundamentals of Python3 required for Network automation. Here in this course, you will learn about Installing Python3, Netmiko, Atom and VIM on Ubuntu Machine, Using the Print Comma...
GitHub for Everyone Bootcamp
This is a beginner-friendly course that will teach you the basics of GitHub. You will learn how to use GitHub as a collaboration platform for your projects, implement repository access rules, communi...
Host & Network Penetration Testing: Exploitation
Exploitation consists of the tactics, techniques and procedures that attackers/adversaries utilize in order to gain an initial foothold on a target system and consequently the target network. The abil...
Host & Network Penetration Testing: Network-Based Attacks
This course covers Vulnerability Assessment. Here in this course, you will learn about technical and nontechnical vulnerabilities, as well as the system for tracking and researching vulnerabilities ac...
Host & Network Penetration Testing: Post-Exploitation
Post-exploitation is the final phase of the penetration testing process and consists of the tactics, techniques and procedures that attackers/adversaries undertake after obtaining initial access on a ...
Host & Network Penetration Testing: Social Engineering
This course covers Social Engineering fundamentals and introductory tactics, techniques, and procedures. Here in this course, you will learn about the basics of attacks against individuals and organiz...
Identity Management using Cisco ISE Bootcamp
Join INE instructor Rohit Pardasani for this interactive course on Deploying Security Features using Cisco ISE. This course is ideal for those who: * Are preparing for the CCIE Security Lab exam * A...
Implementing Cisco Application Centric Infrastructure (ACI) Bootcamp
Cisco Application Centric Infrastructure (ACI) is one of the industry-leading software-defined networking (SDN) solutions for the Data Center. In INE’s Implementing ACI course, you will learn both the...
Implementing Cisco SD-WAN Bootcamp
In this course, you will learn the technical details of how to configure, verify, and troubleshoot a Cisco SD-WAN based environment. From building the test topology on a hypervisor, to implementing t...
Implementing Cisco SD-WAN II Bootcamp
Cisco’s SD-WAN overlay WAN architecture allows us to connect remote sites to data centers and hybrid cloud environments through a single fabric and single management “pane of glass”. In this course, ...
Implementing Cisco Unified Computing System (UCS) Bootcamp
The Implementing Cisco Unified Computing System (UCS) course will take you from zero to hero in deploying the solutions that power the next-generation of Enterprise Data Centers. From the Day-0 planni...
Implementing IPSec
You never know who's listening. Implementing IPsec for encrypting communication between sites is one of the first lines of defense in a Network Security Engineer's toolkit to prevent a data breach. In...
Incident Handling and Response Process for AWS Cloud Bootcamp
Learn the ins and outs of the uniqueness of performing incident response in the AWS environment. We will be covering performing IR with native AWS services and technologies such as GuardDuty, Security...
Incident Handling in the Cloud Fundamentals
Computer security incident response has become an essential component of information technology (IT) programs. Because performing incident response effectively is a complex undertaking, establishing a...
INE Networking Labs Demo
INE introduces the first set of Networking virtual-based labs! more labs and feature functionality is coming to the platform soon. You can find these and many other labs in courses and learning paths ...
Introduction to Cyber Security Hardening
As the world becomes more and more connected and technology becomes even more ingrained into business and home life, properly protecting that infrastructure has become more important than ever before....
Introduction to Identity & Access Management (IAM)
User and system accounts are a necessary part of any IT infrastructure, and properly securing those identities is a critical piece to any successful cyber security program. This course will take you t...
Introduction to Ransomware
Ransomware has been a plague the world has been experiencing for a nearly a decade. This course will introduce you to ransomware at a high level and expose you to its history. You will leave this cour...
Introduction to Security Engineering & Change Management
In the past, cybersecurity has been an often neglected area of an organization. With the rise of ransomware and other cyber attacks, skilled security professionals are in high demand. Security engin...
Introduction to Security & Risk Management
Before security controls can be selected and implemented, a proper assessment must be conducted to see what an organization needs. But how does an organization go about this process? This course disc...
Introduction to Security Sensors & Logging Management
Security sensors are a necessary, and critical part of any complete security infrastructure. They are the "data collectors" in a network, and are responsible for gathering the critical information req...
Introduction to Vulnerability Management
Vulnerabilities are the cracks in the castle walls of the IT world - if not quickly discovered and properly remediated, they can lead to disaster. Proper understanding of vulnerabilities and knowing h...
Investigating Juniper's Junos CLI
If a Network Administrator is working for an Internet Service Provider it's highly likely they will encounter routers, switches and firewalls from Juniper Networks at some point. Juniper devices are e...
IPv6 Addressing & Subnetting
IPv6 is here, and if your organization isn't using it now...it will be soon. Critical to an understanding and implementation of IPv6 is knowledge of the IPv6 addressing structure and subnetting. Thi...
Kubernetes From Scratch
Learn the internals of Kubernetes, breaking down each component while practicing on 30 real-world project-focused challenges.
Load Balancing with the Multiple Spanning Tree Protocol (MSTP)
Layer-2 loop prevention through the implementation of the 802.1d Spanning-Tree protocol (also called Rapid Spanning-Tree) has been used for decades by network engineers. However, unless one is using s...
Loop-Free Switching with Spanning-Tree, VLANs and Trunks Bootcamp
Any Layer-2 switched network with two or more switches providing redundant paths between endpoints will have to deal with the problem of bridging loops. It was for this reason that Spanning-Tree was ...
Mastering IP Addressing, Subnetting & Services Bootcamp
Join INE instructor Keith Bogart for an interactive course on Mastering IPv4/v6 Addressing, Subnetting & Services. This course is ideal for those who: * Are preparing for the CCNA exam * Want to lea...
Microsoft Azure Network Engineer Certification AZ-700
Learn Azure networking with Microsoft MVP Tim Warner and prepare for the Microsoft Azure Network Engineer (AZ-700) certification exam.
Microsoft Certified Azure Security Engineer AZ-500
Learn Azure Security with Microsoft MVPs Tim Warner and Mike Pfeiffer and prepare for the Microsoft Azure Security Engineer (AZ-500) certification exam.
MPLS for Network Engineers
This course covers MPLS from basics to advanced which allows engineers to deploy and maintain MPLS within the Enterprise or Service Provider environment. Here in this course, you will learn about the ...
Multicast Routing for Network Engineers
This course covers Implementing and enabling basic Multicast services for Enterprise or Service Provider environments. Here in this course, you will learn about Multicast basics and its components. Yo...
Network Services for Predictability & Reliability
To transfer data across a network, basic things such as IP addressing, VLANs and Routing Protocols need to be configured on network devices. But above-and-beyond these basic features and protocols, ce...
Optimizing Networks with MPLS and Segment Routing Bootcamp
Join INE instructor Rohit Pardasani for an interactive course on Optimizing Networks with MPLS and Segment Routing. This course is ideal for those who: * Are preparing for the CCIE Enterprise Infrast...
PKI Design
Understanding and implementing a secure infrastructure is a key skill for any security engineer, and PKI is a core component of any secure environment. In this course, you'll take a look at a brief h...
Recon and Vulnerability Detection Bootcamp
Reconnaissance and vulnerability detection are foundational skills required for penetration testing, vulnerability assessments, and vulnerability management. These skills are the first steps of conduc...
Remote Access VPN
This course covers Remote Access VPN technologies, which is required for allowing remote employees to connect to the corporate network. In this course, you will learn about Clientless SSL VPN and also...
RSTP for Network Associates
Any Layer-2 switched network with two or more switches providing redundant paths between endpoints will have to deal with the problem of bridging loops. It was for this reason that Spanning-Tree was ...
Secure Architecture Design
Knowing how to properly design a secure infrastructure is just as important as being able to properly configure the security controls themselves. In this course, we go through what should be consider...
Security Engineering and System Hardening Bootcamp
As the world becomes more and more connected and technology becomes even more ingrained into business and home life, properly protecting that infrastructure has become more important than ever before....
Security Engineering for Business Operations
Now that you've completed the Enterprise Defense Administrator learning path, let's take a few minutes and go over what we've covererd so far. In this course, we'll take a look at two different scena...
SNMP
This course covers Simple Network Management Protocol (SNMP). Here in this course, you will learn about the use-case of SNMP, SNMP components and architecture, and SNMP versions. You will also learn h...
Terraform on Azure (2021)
Learn how to use Terraform to provision and manage Azure infrastructure in this LIVE virtual workshop event. Discover the patterns and best-practices for writing infrastructure code to manage Azure vi...
The Metasploit Framework Bootcamp
The Metasploit Framework is one of the most widely utilized exploitation tools used by penetration testers and security researchers. For anyone looking to get started with a career in cybersecurity an...
Understanding Juniper JunOS OS Architecture
Everyone has to start somewhere, and if you're considering working with Juniper devices, or pursuing their JNCIA-Junos certification, this course is for you. In this course you'll be explosed to a hig...
Understanding Service Provider Virtualization
This course covers Service Provider Virtualization basics. Here in this course, you will learn about VNF workloads, OpenStack and NFVI. Students who are preparing for the CCNP Service Provider exam or...
Understanding Virtualized Infrastructure
This course covers designing NFVI, Cloud scale networking infrastructure, IaaS, and network slicing. Students who are preparing for the CCIE Service Provider v5 Lab exam or professionals who are worki...
Web Application Penetration Testing: Introduction to the Web and HTTP Protocol
This course covers Intro to the Web and HTTP Protocol. In this course, you will learn about the basics of attacks against a web server hosting a website. Websites are the primary way a company represe...
Web Application Penetration Testing: Web Fingerprinting and Enumeration
Information gathering is the first step of any penetration test and is arguably the most important as all other phases rely on the information obtained about the target during the information gatherin...
All courses
Learning Paths
With INE’s Learning Paths, our experts lead you through each critical step of the certification study process. All the courses you need for your exams are gathered in one, easy-to-track location, ensuring your time is spent on the most critical study topics.
How we help you get there
More than 900k tech jobs remain unfilled and it is our goal to prepare you to claim your spot in the IT field.

Chief Information Security Officer
A CISO is a c-suite level executive responsible for maintaining an organization’s information and data / cyber security.

Cloud Administrator
Cloud Administrators configure and monitor cloud management services, working with the IT department to develop and support Windows, Cloud, or Linux infrastructure, as well as providing technical assistance for cloud-based systems.

Cloud Administrator
Cloud Administrators configure and monitor cloud management services, working with the IT department to develop and support Windows, Cloud, or Linux infrastructure, as well as providing technical assistance for cloud-based systems.

Cloud Architect
A Cloud Architect is responsible for deploying and overseeing an organization’s cloud computing strategy, including cloud adoption plans, cloud application design, and cloud management and monitoring.

Cloud Developer
Generally a DevOps position, Cloud Developers are skilled in a variety of areas, working as technicians, architects, engineers, and analysts, all while providing application development.

Cloud Software Engineer
Responsible for any technological duties with regards to cloud computing, Cloud Engineers design and plan cloud services, while also providing support and maintenance.

Data Analyst
A Data Analyst uses data to acquire information about specific topics. This may involve finding survey participants, gathering data, interpreting data, and then presenting it in forms such as charts or reports.

Data Architect
A Senior Software Engineer usually has a strong background in computer science, web development, and/or engineering. Knowledge and familiarity with web coding such as Javascript, HTML, and CSS are a necessity.

Data Engineer
Data Engineers are responsible for developing and translating computer algorithms into code. They are also responsible for maintaining, organizing, and identifying trends in large data sets.

Data Scientist
Data Scientists are responsible for mining complex data and designing new ways to manage statistical data using models.

Information Security Analyst
These positions are responsible for protecting sensitive information by creating plans and implementing strategies to prevent attacks.

Network Administrator
Network Administrators are responsible for the upkeep of both computer hardware and software systems, focusing on the network components within their company.

Network Architect
A Network Architect is responsible for designing and reviewing network requirements and capabilities for their organization.

Networking Security Engineer
A Networking Security Engineer solves existing security issues, tests systems for vulnerabilities, and maintains virtual private networks, firewalls, email security, and web protocols.

Penetration Tester
Penetration testers are in charge of identifying vulnerabilities in an organization’s network through an authorized and simulated attack.

Security Architect
A security architect analyzes security threats and develops solutions to protect information and data.

Wireless Network Engineer
A Wireless Network Engineer designs, implements, and optimizes a company’s wireless LAN and additional wireless technologies.
Common Course Questions
If you have a question you don’t see on this list, please visit our Frequently Asked Questions page by clicking the button below.
If you’d prefer getting in touch with one of our experts, we encourage you to call one of the numbers above or fill out our contact form.
Do you offer training for all student levels?
Are the training videos downloadable?
I only want to purchase access to one training course, not all of them, is this possible?
Are there any fees or penalties if I want to cancel my subscription?