INE Courses
With new Networking, Cyber Security, Data Science, and Cloud courses released each month, our in-house instructors and content creators work tirelessly to ensure you and your teams have access to the most accurate training material in the industry.
Looking to test your knowledge? No problem! Our industry leading lab platform will provide you and your teams with the challenges necessary to ensure you are confident with your expertise.
See the Courses in the INE Platform
Begin Your Learning ExperiencePopular courses
Advanced ISE Deployments and Integrations
This course covers understanding and implementing Guest Access for Wired and Wireless networks using ISE. In this course, you will also learn how to configure BYOD using ISE and how to configure HotSp...
Advanced Network Automation with Python
This course covers advanced Python scripting required for Network automation and managing network devices. In this course, you will learn about taking backups of network devices using Netmiko, Built-i...
Architect Network Connectivity Strategies
Welcome to the Architecting network solutions course explicitly designed for individuals preparing to take the AWS Solutions Architect Professional certification test. This course focuses on crucial n...
Assessment Methodologies: Information Gathering
Information gathering is the first step of any penetration test and is arguably the most important as all other phases rely on the information obtained about the target during the information gatherin...
Authentication, Authorization, Accounting, Roles (AAA)
Authentication, authorization and accounting (AAA, pronounced triple A) is a special standard-based system designed to intelligently control access to network & computer resources. This control is per...
Automating Cisco ACI with Python Bootcamp
Automating Cisco ACI with Python is just one of the many use cases for today’s Network Engineers to learn programming. In this course, we start with a hands-on Introduction to Python to learn the pra...
AWS Cloud Architect Bootcamp
Join us for this 12 Week AWS Cloud Architect Bootcamp and prepare for the AWS Solutions Architect Associate certification by BUILDING 54 PROJECTS.
AWS Cloud Security Bootcamp
Enterprises are increasingly running their IT and application infrastructure natively in the cloud. This fundamentally changes security models and the enterprise threatscape. It’s important that as a ...
AWS Compute Services
As more and more companies migrate to the cloud, they are leveraging the power and versatility of virtual machines like those available using the AWS Amazon EC2 service. In the course, you will dive i...
AWS Infrastructure as Code
Being a consummate cloud engineer requires many skills needed at various times: network troubleshooting, tuning virtual machines, and diagnosing poor application performance, just to name a few. But t...
AWS Networking
Building a networking environment in the cloud is quite different than building one on-premises. As a cloud engineer, you need to understand how to set up a basic networking environment on AWS. In thi...
AWS Security Basics
The AWS Security Basics course covers the basics of the AWS Identity Access Management service's users, groups, roles, policies, and shared responsibility in the cloud. This course is a basic introduc...
AWS Security & Compliance
AWS is not only a game-changer for companies looking to innovate faster. AWS Cloud also helps you significantly improve your security and compliance practice in ways that would be difficult or financ...
Azure Administrator (AZ-104) Exam Prep Course
Learn Azure administration with Microsoft MVPs Tim Warner and Mike Pfeiffer and prepare for the Microsoft Azure Administrator (AZ-104) certification exam.
Azure Fundamentals (AZ-900) Accelerated Exam Prep
Learn Azure Fundamentals with Microsoft MVPs Tim Warner and Mike Pfeiffer and prepare for the Azure Fundamentals (AZ-900) certification exam.
Azure Fundamentals: Cloud Concepts
This on-demand course is intended for managers, directors, and IT professionals who need an overview of cloud computing and the Microsoft Azure cloud. This course focuses on understanding what cloud c...
Azure Identity Management & Governance for Administrators
This INE on-demand course is intended for IT professionals who administer Azure implementations as well as those preparing for the AZ-104 certification exam. This course focuses on basic resource mana...
Azure Management Concepts
One key to understanding Azure is understanding the management concepts and management tools that you will use while working in Azure. In this course you will cover the fundamental concepts of how Azu...
Azure Network Services
The infrastructure as a service (IaaS) market is expected to reach over $201 billion US by 2027 (source: datamation.com). The focus is often on computing with IaaS, but all the computing power must ru...
Azure Network Services Bootcamp
In this bootcamp we will cover how to create, manage, protect. and connect Azure virtual networks. You will learn the components of virtual networks, as well as the services that are available for net...
Azure Security & Compliance Fundamentals
This on-demand course is intended for managers, directors, and IT professionals who need to understand how information security concepts are implemented in the Microsoft Azure cloud. This course focus...
Azure Services Fundamentals
The primary purpose of Azure is to provide services for customers. In this course, you will get to know many of the most common services provided by Azure. Services covered in this course include infr...
Azure Solutions Architect (AZ-30x) Exam Prep Course
Learn Azure architecture with Microsoft MVPs Tim Warner and Mike Pfeiffer and prepare for the AZ-303 and AZ-304 certification exams.
Become Ansible Workshop
This self-paced on-demand course will show you exactly what you need to know to hit the ground running with Ansible, based on the new book 'become Ansible' by author Josh Duffney.
Best Practices for Implementing BGP Bootcamp
The Implementing BGP with Best Practices course will provide students with an in-depth understanding of Border Gateway Protocol v4 (BGP), the protocol that runs the Internet. With Best Common Practice...
BGP for the Enterprise
As Enterprise, Government and Campus networks grow, it becomes increasingly necessary to implement the Border Gateway Protocol (BGP). BGP might be required due to scalability concerns, multihoming req...
Call Control Tactics
This course covers Call Control required when building the dial plan and preventing toll fraud. In this course, you will learn about Understanding the Need for Globalized Call Routing, Implementing Gl...
CCNA 200-301 Practice Labs
Whether preparing to take Cisco CCNA 200-301 exam, or just trying to refresh your skills, hands-on practice within a lab environment is a must. This course provides you with exactly that. In this cour...
CCNA Exam Assessment: Network Fundamentals
So you think you're ready to schedule your Cisco CCNA exam? This self-assessment will help you determine if that is true. This assessment covers all topics within Section-1 (Network Fundamentals) of C...
CCNP Enterprise - ENARSI Practice Labs
Are you considering pursuing a Cisco CCNP Enterprise certification? If so, then after passing Cisco’s “Enterprise Core” exam (ENCOR), you’ll also need to pass one “Concentration” exam, and the Cisco ...
CCNP Enterprise - ENCOR Practice Labs
Ask anyone and they’ll tell you…Cisco’s CCNP Enterprise Core 350-401 exam (aka “ENCOR”) is a beast when one considers the scope and depth of topics contained within the exam. Once you have completed w...
Check Point Firewall Fundamentals
As cyber-attacks become increasingly evasive, more controls are added, making security more complicated and tedious to the point that user workflows are affected. Not any longer with Check Point. Chec...
Cisco Telemetry Concepts: Overview & Design
A foundation of network management is the ability to retrieve statistical data from your networking devices so that you can establish baselines and trends, and hopefully identify problems before they ...
Cloud Fundamentals Bootcamp
This is a course on cloud fundamentals. It introduces students to the cloud and is intended to familiarize students with basic operations within the cloud. The course covers a wide array of concepts a...
Cloud Pentesting Bootcamp
Around the globe, cloud solutions have become more mainstream in organizations large and small. Cloud has been seen as a more secure alternative to on-premises solutions, but with cloud not being well...
Collaboration Solutions: IM&P, Protocols, Codecs & Endpoints
This course covers the critical elements in the design for implementing the Cisco Collaboration Solution. Here in this course, you will learn about Jabber logins, Phone registrations, Audio Codecs, Vi...
Deploying BGP on Cisco and Juniper Routers Bootcamp
Join INE instructor Rohit Pardasani for an interactive course on Deploying BGP on Cisco and Juniper routers. This course is ideal for those who: *Are preparing for the CCIE Enterprise Infrastructur...
Deploying BGP on Juniper Routers
This course covers Deploying BGP on Juniper Routers. In this course, you will learn about basics of BGP, eBGP rules vs iBGP rules, Route Reflectors, BGP Path Attributes, Local Preference, AS-Path Prep...
Deploying IS-IS on Juniper Routers
This course covers understanding and implementing ISIS on Juniper Routers. In this course, you will learn about single-level ISIS implementation, Multilevel ISIS implementation, ISIS network types, IS...
Deploying OSPF on Cisco and Juniper Routers Bootcamp
OSPF is arguably the most widely deployed interior gateway routing protocol and is ubiquitous across the platforms of numerous networking equipment vendors. For someone seeking employment as a Network...
DevOps Foundations
Learn the foundations of DevOps and how to collaborate on projects within your team.
DevSecOps Bootcamp
In today’s world of continuous integration and continuous delivery, it has become imperative to involve security checks at every step of the process. The automation of build, deployment, and setup pre...
Dial Plan Elements in Action
This course covers the critical elements required when building the dial plan. In this course, you will learn about the need for device pools, configuring device pools, interdigit timeouts, translatio...
Digital Forensics: File & Disk Analysis
In this course, you will learn the basics about interacting with the lower levels of files and disks. We will cover the involved technology and foundational disk concepts. You will understand the file...
Digital Forensics & Incident Response in the Cloud Bootcamp
Digital forensic and incident response is an ever-changing field. With the transition to the cloud, new challenges to cyber forensic practitioners have been unveiled. Cloud forensic techniques are sim...
Digital Forensics: Introduction & Acquisition
Digital Forensics Intro & Acquisitions will get you on your way to understanding the important processes, procedures, and why we do things in the forensics world. You will exit the course with a grasp...
Digital Resistance: Basic Incident Response with a Wartime Focus Bootcamp
The modern cyber threat landscape has changed with the current conflict between Ukraine and Russia. This course will get you up to speed with the relevant incident response techniques including: 1. A...
Docker JumpStart Virtual Workshop
Learn everything you need to know to become proficient with Docker containers and orchestration with Mike Pfeiffer and Dan Wahlin.
Docker & Kubernetes 101
Learn how to hit the ground running with Docker and Kubernetes on Azure.
eJPT Exam Preparation
You've now finished all the courses on Penetration Testing Student. Now is time to get ready for the <a href="https://elearnsecurity.com/product/ejpt-certification/">eJPT certification</a>. There's...
Encryption Fundamentals
Encryption can be defined as a process of encoding information. This process converts or scrambles the original data into an alternative form, known as ciphertext, which is unreadable to untrusted par...
Engineering Cisco Meraki Solutions (ECMS)
The Engineering Cisco Meraki Solutions (ECMS) course is designed for candidates who are looking to take the Cisco Meraki Solutions Specialist certification, as well as for the everyday Network Enginee...
Final Lab Practice for CCIE Enterprise Infrastructure
This course is the last step in your preparation for achieving the prestigious CCIE certification. This lab-oriented course consists of 60+ tasks focusing on technologies like LAN switching, IGPs like...
Final Lab Practice for CCIE Security
This course is the last step in your preparation for achieving the prestigious CCIE certification. This lab-oriented course comprises 30+ labs and 50+ tasks focusing on technologies like ASA, VPNs, FT...
Final Lab Practice for CCNP CLCOR
Welcome to the immersive and dynamic learning experience of CLCOR Labs! This course is designed to take your theoretical knowledge to the next level by providing a hands-on, practical approach to lear...
FortiGate Advanced Policies
With a constantly expanding attack surface, enterprises are looking for proven protection, without limiting the speed or capacity of network operations. FortiGate's next-generation Firewall is recogni...
FortiGate Essentials
As the threat landscape rapidly expands, traditional firewalls fall further behind and are unable to offer protection at scale which leads to poor user experience and weak security posture. Next-gener...
FortiGate Technologies
With a constantly expanding attack surface, enterprises are looking for proven protection, without limiting the speed or capacity of network operations. FortiGate's next-generation Firewall is recogni...
Foundations Of Juniper Routing
If you need to learn about IP Routing from the ground up, and you need to implement this feature on Juniper routers...this course is for you. This course begins by explaining why routing is necessary ...
Fundamentals of Network Automation Using Python
This course covers fundamentals of Python3 required for Network automation. Here in this course, you will learn about Installing Python3, Netmiko, Atom and VIM on Ubuntu Machine, Using the Print Comma...
GitHub for Everyone Bootcamp
This is a beginner-friendly course that will teach you the basics of GitHub. You will learn how to use GitHub as a collaboration platform for your projects, implement repository access rules, communic...
Host & Network Penetration Testing: Exploitation
Exploitation consists of the tactics, techniques, and procedures that attackers/adversaries utilize to gain an initial foothold on a target system and consequently the target network. The ability to i...
Host & Network Penetration Testing: Network-Based Attacks
This course covers Vulnerability Assessment. Here in this course, you will learn about technical and nontechnical vulnerabilities, as well as the system for tracking and researching vulnerabilities ac...
Host & Network Penetration Testing: Post-Exploitation
Post-exploitation is the final phase of the penetration testing process and consists of the tactics, techniques, and procedures that attackers/adversaries undertake after obtaining initial access to a...
Identity Management using Cisco ISE Bootcamp
Join INE instructor Rohit Pardasani for this interactive course on Deploying Security Features using Cisco ISE. This course is ideal for those who: * Are preparing for the CCIE Security Lab exam * A...
Implementing Cisco Application Centric Infrastructure (ACI) v5
Implementing Cisco Application Centric Infrastructure (ACI) v5 is designed to equip participants with extensive knowledge and hands-on skills in designing, deploying, and managing ACI, Cisco’s cutting...
Implementing Cisco SD-WAN Bootcamp
In this course, you will learn the technical details of how to configure, verify, and troubleshoot a Cisco SD-WAN based environment. From building the test topology on a hypervisor to implementing tr...
Implementing Cisco Unified Computing System (UCS) Bootcamp
The Implementing Cisco Unified Computing System (UCS) course will take you from zero to hero in deploying the solutions that power the next-generation of Enterprise Data Centers. From the Day-0 planni...
Implementing IOS Gateways & Media Resources
This course covers the IOS Gateways, and Media Resources required when building the dial plan. In this course, you will learn about H.323 Trunks, Gatekeepers and Gateways, Introduction to MGCP, Introd...
Implementing IPSec
You never know who's listening. Implementing IPsec for encrypting communication between sites is one of the first lines of defense in a Network Security Engineer's toolkit to prevent a data breach. In...
Incident Handling and Response Process for AWS Cloud Bootcamp
Learn the ins and outs of the uniqueness of performing incident response in the AWS environment. We will be covering performing IR with native AWS services and technologies such as GuardDuty, Security...
Incident Handling in the Cloud Fundamentals
Computer security incident response has become an essential component of information technology (IT) programs. Because performing incident response effectively is a complex undertaking, establishing a...
INE Networking Labs Demo
INE introduces the first set of Networking virtual-based labs! more labs and feature functionality is coming to the platform soon. You can find these and many other labs in courses and learning paths ...
Infrastructure & Design for Collaboration
This course covers the critical elements in the design for implementing the Cisco Collaboration Solution. In this course, you will learn about Cisco Collaboration Infrastructure, Cisco Collaboration D...
Introduction to Content & Endpoint Security
Common vectors of attack in the world of Information Security include email and web-based attacks. Understanding the nature of these attacks and some of the available Cisco solutions and products desi...
Introduction to Cyber Security Hardening
As the world becomes more and more connected and technology becomes even more ingrained into business and home life, properly protecting that infrastructure has become more important than ever before....
Introduction to Identity & Access Management (IAM)
User and system accounts are a necessary part of any IT infrastructure, and properly securing those identities is a critical piece to any successful cyber security program. This course will take you t...
Introduction to Ransomware
Ransomware has been a plague the world has been experiencing for a nearly a decade. This course will introduce you to ransomware at a high level and expose you to its history. You will leave this cour...
Introduction to SD-Access
Introduction to Security & Risk Management
Before security controls can be selected and implemented, a proper assessment must be conducted to see what an organization needs. But how does an organization go about this process? This course disc...
Introduction to Security Sensors & Logging Management
Security sensors are a necessary, and critical part of any complete security infrastructure. They are the "data collectors" in a network and are responsible for gathering the critical information requ...
Introduction to Vulnerability Management
Vulnerabilities are the cracks in the castle walls of the IT world - if not quickly discovered and properly remediated, they can lead to disaster. Proper understanding of vulnerabilities and knowing h...
Investigating Juniper's Junos CLI
If a Network Administrator is working for an Internet Service Provider they will likely encounter routers, switches, and firewalls from Juniper Networks at some point. Juniper devices are even becomin...
Juniper SRX Technologies
With the increasing reliance on technology, it is becoming more and more essential to secure every aspect of online information and data. The INE's JNCIA-SEC series provides you with the opportunity t...
Kubernetes From Scratch
Learn the internals of Kubernetes, breaking down each component while practicing on 30 real-world project-focused challenges.
Loop-Free Switching with Spanning-Tree, VLANs and Trunks Bootcamp
Any Layer-2 switched network with two or more switches providing redundant paths between endpoints will have to deal with the problem of bridging loops. It was for this reason that Spanning-Tree was ...
Managing Check Point Firewalls
As cyber-attacks become increasingly evasive, more controls are added, making security more complicated and tedious to the point that user workflows are affected. Not any longer with Check Point. Chec...
Mastering Collaboration Applications
This course covers Collaboration Applications required when building the Collaboration Infrastructure. This course teaches you about Configuring Unity Connection using SIP, Configuring Unity Connectio...
Mastering IP Addressing, Subnetting & Services Bootcamp
Join INE instructor Keith Bogart for an interactive course on Mastering IPv4/v6 Addressing, Subnetting & Services. This course is ideal for those who: * Are preparing for the CCNA exam * Want to lea...
Microsoft Azure Network Engineer Certification AZ-700
Learn Azure networking with Microsoft MVP Tim Warner and prepare for the Microsoft Azure Network Engineer (AZ-700) certification exam.
Microsoft Certified Azure Security Engineer AZ-500
Learn Azure Security with Microsoft MVPs Tim Warner and Mike Pfeiffer and prepare for the Microsoft Azure Security Engineer (AZ-500) certification exam.
Multicast Routing for Network Engineers
This course covers Implementing and enabling basic Multicast services for Enterprise or Service Provider environments. Here in this course, you will learn about Multicast basics and its components. Yo...
Optimizing Networks with MPLS and Segment Routing Bootcamp
Join INE instructor Rohit Pardasani for an interactive course on Optimizing Networks with MPLS and Segment Routing. This course is ideal for those who: * Are preparing for the CCIE Enterprise Infrast...
PKI Design
Understanding and implementing a secure infrastructure is a key skill for any security engineer, and PKI is a core component of any secure environment. In this course, you'll take a look at a brief h...
Practical Design for Enterprise IP Routing
You've taken the time to learn how to configure, implement and troubleshoot your favorite routing protocol. Perhaps it's EIGRP or OSPF. Maybe you're a BGP configuration expert. But do you know the bes...
QOS for Cisco Collaboration
This course covers Quality of Service. This course teaches you about QOS Mechanisms, Methods and Models, Congestion Avoidance, and Congestion Management Mechanisms.
Recon and Vulnerability Detection Bootcamp
Reconnaissance and vulnerability detection are foundational skills required for penetration testing, vulnerability assessments, and vulnerability management. These skills are the first steps of conduc...
Secure Architecture Design
Knowing how to properly design a secure infrastructure is just as important as being able to properly configure the security controls themselves. In this course, we go through what should be considere...
Security+ Domain 1: General Security Concepts
The CompTIA Security+ is an industry-standard, well recognized certification that covers the skills needed to succeed in a cybersecurity career. In this course, covering the first knowledge domain - G...
Security+ Domain 2: Threats, Vulnerabilities & Mitigations
The CompTIA Security+ is an industry-standard, well-recognized certification that covers the skills needed to succeed in a cybersecurity career. In this course, we'll go over the second domain of topi...
Security+ Domain 3: Security Architecture
The CompTIA Security+ is an industry-standard, well recognized certification that covers the skills needed to succeed in a cybersecurity career. In this course, we'll go over the third domain of topic...
Security+ Domain 4: Security Operations I
The CompTIA Security+ is an industry-standard, well-recognized certification that covers the skills needed to succeed in a cybersecurity career. In this course, we'll cover the first half of the fourt...
Security Engineering and System Hardening Bootcamp
As the world becomes more and more connected and technology becomes even more ingrained into business and home life, properly protecting that infrastructure has become more important than ever before....
Security Engineering for Business Operations
Now that you've completed the Enterprise Defense Administrator learning path, let's take a few minutes and go over what we've covered so far. In this course, we'll take a look at two different scenar...
Security & Risk Management for CISSP
The first domain of CISSP covers Security and Risk Management. This course will get you up to speed on all of the key concepts related to that topic, including the CIA triad, risk management concepts,...
SNMP
This course covers Simple Network Management Protocol (SNMP). Here in this course, you will learn about the use-case of SNMP, SNMP components and architecture, and SNMP versions. You will also learn h...
The Metasploit Framework Bootcamp
The Metasploit Framework is one of the most widely utilized exploitation tools used by penetration testers and security researchers. For anyone looking to get started with a career in cybersecurity an...
Understanding Juniper JunOS OS Architecture
Everyone has to start somewhere, and if you're considering working with Juniper devices, or pursuing their JNCIA-Junos certification, this course is for you. In this course you'll be explosed to a hig...
Understanding Service Provider Virtualization
This course covers Service Provider Virtualization basics. Here in this course, you will learn about VNF workloads, OpenStack and NFVI. Students who are preparing for the CCNP Service Provider exam or...
Understanding Virtualized Infrastructure
This course covers designing NFVI, Cloud scale networking infrastructure, IaaS, and network slicing. Students who are preparing for the CCIE Service Provider v5 Lab exam or professionals who are worki...
WAPT: Web Proxies and Web Information Gathering
Testing and modifying web requests being sent to web servers or web applications make up the majority of Web Application Penetration Testing. In order to intercept and modify the requests being sent b...
Web Application Penetration Testing: SQL Injection Attacks
SQL Injection is one of the most commonly exploited injection vulnerabilities in web applications and poses a serious security risk to organizations. As a web application pentester or bug bounty hunte...
Web Application Penetration Testing: Web Fingerprinting and Enumeration
Information gathering is the first step of any penetration test and is arguably the most important as all other phases rely on the information obtained about the target during the information gatherin...
Web Application Security Testing: Encoding, Filtering & Evasion Basics
In the ever evolving world of cybersecurity, web applications continue to be prime targets for cyberattacks. To effectively attack and defend against these threats and vulnerabilities, you need to go...
Web Application Security Testing: Web Service Security Testing
In the complex world of web applications, web services play a pivotal role in enabling the seamless exchange of data and functionality between applications over the internet. Web services, particularl...
Windows System Programming: Security
In this course, we will start with fundamental concepts in Windows security, followed by learning how to work with security IDs and access tokens. Finally, we will look at how to secure kernel objects...
All courses
Learning Paths
With INE’s Learning Paths, our experts lead you through each critical step of the certification study process. All the courses you need for your exams are gathered in one, easy-to-track location, ensuring your time is spent on the most critical study topics.
How we help you get there
More than 900k tech jobs remain unfilled and it is our goal to prepare you to claim your spot in the IT field.
Chief Information Security Officer
A CISO is a c-suite level executive responsible for maintaining an organization’s information and data / cyber security.
Cloud Administrator
Cloud Administrators configure and monitor cloud management services, working with the IT department to develop and support Windows, Cloud, or Linux infrastructure, as well as providing technical assistance for cloud-based systems.
Cloud Administrator
Cloud Administrators configure and monitor cloud management services, working with the IT department to develop and support Windows, Cloud, or Linux infrastructure, as well as providing technical assistance for cloud-based systems.
Cloud Architect
A Cloud Architect is responsible for deploying and overseeing an organization’s cloud computing strategy, including cloud adoption plans, cloud application design, and cloud management and monitoring.
Cloud Developer
Generally a DevOps position, Cloud Developers are skilled in a variety of areas, working as technicians, architects, engineers, and analysts, all while providing application development.
Cloud Software Engineer
Responsible for any technological duties with regards to cloud computing, Cloud Engineers design and plan cloud services, while also providing support and maintenance.
Data Analyst
A Data Analyst uses data to acquire information about specific topics. This may involve finding survey participants, gathering data, interpreting data, and then presenting it in forms such as charts or reports.
Data Architect
A Senior Software Engineer usually has a strong background in computer science, web development, and/or engineering. Knowledge and familiarity with web coding such as Javascript, HTML, and CSS are a necessity.
Data Engineer
Data Engineers are responsible for developing and translating computer algorithms into code. They are also responsible for maintaining, organizing, and identifying trends in large data sets.
Data Scientist
Data Scientists are responsible for mining complex data and designing new ways to manage statistical data using models.
Information Security Analyst
These positions are responsible for protecting sensitive information by creating plans and implementing strategies to prevent attacks.
Network Administrator
Network Administrators are responsible for the upkeep of both computer hardware and software systems, focusing on the network components within their company.
Network Architect
A Network Architect is responsible for designing and reviewing network requirements and capabilities for their organization.
Networking Security Engineer
A Networking Security Engineer solves existing security issues, tests systems for vulnerabilities, and maintains virtual private networks, firewalls, email security, and web protocols.
Penetration Tester
Penetration testers are in charge of identifying vulnerabilities in an organization’s network through an authorized and simulated attack.
Security Architect
A security architect analyzes security threats and develops solutions to protect information and data.
Wireless Network Engineer
A Wireless Network Engineer designs, implements, and optimizes a company’s wireless LAN and additional wireless technologies.
Common Course Questions
If you have a question you don’t see on this list, please visit our Frequently Asked Questions page by clicking the button below.
If you’d prefer getting in touch with one of our experts, we encourage you to call one of the numbers above or fill out our contact form.
Do you offer training for all student levels?