INE Courses
With new Networking, Cyber Security, Data Science, and Cloud courses released each month, our in-house instructors and content creators work tirelessly to ensure you and your teams have access to the most accurate training material in the industry.
Looking to test your knowledge? No problem! Our industry leading lab platform will provide you and your teams with the challenges necessary to ensure you are confident with your expertise.
See the Courses in the INE Platform
Begin Your Learning ExperiencePopular courses
Active Directory Protection & Tiering
This on-demand course is intended for IT and security professionals who want to understand the most common attack vectors and security pitfolds in Active Directory such as Kerberoast, kerberos delegat...
Advanced Implementation and Optimization with Border Gateway Protocol
This course covers understanding, optimizing and configuring BGP. In this course, you will learn about different BGP Path attributes as well as how to do path manipulation in BGP using attributes like...
Advanced Network Automation with Python
This course covers advanced Python scripting required for Network automation and managing network devices. In this course, you will learn about taking backups of network devices using Netmiko, Built-i...
Android & Mobile App Pentesting
<br>In this course you will be shown how to perform professional penetration testing activities against Android and iOS mobile applications, by means of reverse engineering, static analysis and dynami...
Applying Data Center ACI Concepts
Application Centric Infrastructure (ACI) is the workhorse of the modern Cisco Data Center design. In this series, we explore the basic operations and concepts of ACI, including Fabric Initialization, ...
AWS Cloud Architect Bootcamp
Join us for this 12 Week AWS Cloud Architect Bootcamp and prepare for the AWS Solutions Architect Associate certification by BUILDING 54 PROJECTS.
AWS Management Concepts
Understanding AWS is more than just services. It's also about best practices when it comes to billing, architectures, monitoring, and so on. This course will cover the fundamentals needed to become ef...
AWS Security & Compliance
AWS is not only a game-changer for companies looking to innovate faster. AWS Cloud also helps you significantly improve your security and compliance practice in ways that would be difficult or financ...
AWS Services Fundamentals
The goal of this course is increasing your confidence and understanding of AWS Cloud. We will cover the essential services from computing, storage, database, and more. When complete, you can begin you...
Azure Administrator (AZ-104) Exam Prep Course
Learn Azure administration with Microsoft MVPs Tim Warner and Mike Pfeiffer and prepare for the Microsoft Azure Administrator (AZ-104) certification exam.
Azure Fundamentals (AZ-900) Accelerated Exam Prep
Learn Azure Fundamentals with Microsoft MVPs Tim Warner and Mike Pfeiffer and prepare for the Azure Fundamentals (AZ-900) certification exam.
Azure Management Concepts
One key to understanding Azure is understanding the management concepts and management tools that you will use while working in Azure. In this course you will cover the fundamental concepts of how Azu...
Azure Pentesting
This on-demand course is intended for IT and security professionals who want to apply the most common attacks and security pitfalls in order to compromise an Azure Tenant. We will discuss different wa...
Azure Services Fundamentals
The primary purpose of Azure is to provide services for customers. In this course, you will get to know many of the most common services provided by Azure. Services covered in this course include infr...
Basic Identity Management Using Cisco ISE
This course covers understanding and implementing basic AAA using ISE. In this course, you will learn about Radius server authentication, MAB, DOT1X, and profiling and controlling management access to...
Become Ansible Workshop
This self-paced on-demand course will show you exactly what you need to know to hit the ground running with Ansible, based on the new book 'become Ansible' by author Josh Duffney.
Beginning Routing with EIGRP
Cisco's Enhanced Interior Gateway Protocol (EIGRP) is categorized as an Interior Gateway Protocol that is used in many networks today. It is also a routing protocol that you must learn, in order to p...
CCIE Enterprise Infrastructure v1 Exam Review
This course serves as a final review of the various topics you've studied as you've progressed through INE's CCIE Enterprise Infrastructure v1.0 Learning Path. Meant to be viewed perhaps two-to-three ...
CCIE Service Provider v5 Exam Review
This course serves as a final review of the various topics you've studied as you've progressed through INE's CCIE Service Provider v5.0 Learning Path of courses. Meant to be viewed perhaps two-to-thre...
CCNP ENCOR Exam Review
This course serves as a final review of the various topics you've studied as you've progressed through INE's CCNP Enterprise Learning Path. Meant to be viewed perhaps two-to-three weeks prior to sitti...
Cisco Firewall Technologies
A firewall is a network security device that monitors incoming and outgoing network traffic and decides how to handle it based on a defined set of security rules. Due to the evolution of networking an...
Cisco SD-Access & DNA Center
This course covers Cisco Software-Defined Networking (SDN) in the Enterprise known as SD-Access. We will delve into the working of the fabric understanding the control plane and data plane. DNA Center...
Cisco SD-WAN Fundamentals
The Cisco SD-WAN Fundamentals is intended to build an understanding of the SD-WAN architecture and its components. We begin by discussing the Cisco SD-WAN fabric and how it is designed. We will learn ...
Cisco SD-WAN Use Design, Cloud & Advanced Features
Cisco SD-WAN solutions can be designed in a number of ways, we will explore various use cases to understand the value of different solutions. We will investigate SD-WAN Cloud solutions for connecting ...
Cloud Foundations
Most enterprises are now turning to the cloud for some, most, or even all of their IT needs. Understanding what the cloud is, what it does, and what it provides at a fundamental level is critical know...
Cloud IP Addressing
Moving to the cloud changes many things. Fortunately, while there are changes to some of the rules and there are some restrictions, IP addressing in the cloud is much like IP addressing on premises. ...
Cloud Management Concepts
This very short course gives you the fundamentals you need to start your cloud journey. The course covers three fundamental management concepts - asset management, monitoring, and access management. ...
Configuration Consistency with Ansible
This course is designed for Network Admins and Network Engineers who are unfamiliar with the world of Ansible and the ways it can assist with Network Automation. By learning some basic concepts of Ans...
Configure & Troubleshooting L2VPN / Carrier Ethernet
This course covers L2VPN, which is one of the topics in the CCNP SPCOR exam. In this course, you will learn about E-Line, E-Lan, E-Tree, and E-Access. You will also learn about ethernet OAM and VLAN t...
Cyber Security Vulnerabilities Training Library
We turn the tools over to you and walk through the lab environment to show how to use the most current exploits and ways to defend against them.
Data Analysis with pandas Starter Pass
Data Center Compute Design
This course is targeted at Data Center Network Designers, and CCNP Data Center Candidates alike, covering the newest Designing Cisco Data Center Infrastructure 300-610 (DCID) exam. Topics covered incl...
Data Center Firmware Management
Firmware upgrades are a part of everyday network operations. In this series, you'll see first-hand how to upgrade NX-OS firmware, UCS firmware, and ACI firmware, and learn the differences between disr...
Data Center Management & Monitoring
Managing and monitoring the network is a necessary part of day 2 operations in the network. In this series we explore the management of NX-OS configurations, and how to monitor the network with protoc...
Data Center Network Design
This course is targeted at Data Center Network Designers and CCNP Data Center Candidates alike, covering the newest Designing Cisco Data Center Infrastructure 300-610 (DCID) exam. Topics covered inclu...
Data Center Security
Security is an important part of all Data Center designs. In this series we explore Data Center Network Security, Compute Security, and Storage Security with topics such as AAA, First Hop Security (Dy...
Data Center Storage Design
This course is targeted at Data Center Network Designers, and CCNP Data Center Candidates alike, covering the newest Designing Cisco Data Center Infrastructure 300-610 (DCID) exam. Topics covered incl...
DevOps Foundations
Learn the foundations of DevOps and how to collaborate on projects within your team.
eCPPTv2 Exam Preparation
You've now finished all the courses on Penetration Testing Professional. Now is time to get ready for the <a href="https://elearnsecurity.com/product/ecpptv2-certification/">eCPPTv2 certification</a>....
eJPT Exam Preparation
You've now finished all the courses on Penetration Testing Student. Now is time to get ready for the <a href="https://elearnsecurity.com/product/ejpt-certification/">eJPT certification</a>. There's a...
eWPT Exam Preparation
Now that you've finished <b>Web Application Penetration Testing Professional</b>, is time to get ready for the <a href="https://elearnsecurity.com/product/ewpt-certification/"> eWPT certification</a>....
Firewall Technologies
Firewall systems have been used as a first line of defense in networking since 1980s. They carefully analyze traffic based on a pre-established set of security rules. They are used and programmed to f...
Fundamentals of Cloud Identity, Security, and Compliance
With so many workloads moving into the cloud, it is more important than ever to understand cloud security risks and protection tools. This course covers the basic concepts of cloud security, including...
Fundamentals of Implementing, Optimizing, and Scaling Border Gateway Protocol
This course covers understanding, optimizing and configuring BGP. In this course, you will learn to build EBGP/IBGP neighborship and how route-reflectors work on different platforms like Cisco and Jun...
Fundamentals of Network Automation Using Python
This course covers fundamentals of Python3 required for Network automation. Here in this course, you will learn about Installing Python3, Netmiko, Atom and VIM on Ubuntu Machine, Using the Print Comma...
Fundamentals of Penetration Testing Concepts
This on-demand course is intended for entry level security professionals who want to understand and build a strong foundation of common concepts before diving into more complex topics. We will discuss...
HTTP Using Python
This course will explain the basics of client-server communications, introduce the requests library, and explain how HTTP works (stateless, resource oriented, etc). It also explores the structure of r...
IGP Routing Control with Filtering & Redistribution
As IP networks continue to grow and routing protocols are tasked with maintaining more and more routing entries, there sometimes comes a need to implement route filtering. This course will introduce y...
Implementing Cisco Application Centric Infrastructure (ACI)
INE’s Implementing Cisco Application Centric Infrastructure Course is based off of the CCNP Data Center Certification Exam DCACI 300-620. This course covers the configuration, implementation, and mana...
Implementing High Availability
This course covers high availability which is one of the topics in the CCNP SPCOR exam. Here in this course, you will learn how to configure etherchannels for obtaining high availability for link fail...
Implementing Intermediate System to System (IS-IS)
Intermediate System to Intermediate System (IS-IS) is the foundation of many Service Provider MPLS networks, and has been growing in popularity in the past few years as a viable alternative to running...
Implementing IPSec
You never know who's listening. Implementing IPsec for encrypting communication between sites is one of the first lines of defense in a Network Security Engineer's toolkit to prevent a data breach. In...
Implementing Multicast Services
This course covers L3VPN Multicast Services which is one of the topics in the CCNP SPCOR Exam. In this course, you will learn about IGMP v1/v2/v3, PIM Sparse mode, SSM, PIM Bidir, and Multicast Listen...
Implementing & Optimizing ISIS Protocol
This course covers implementing Integrated System-Integrated System (ISIS) routing protocol which is the core IGP in the CCNP SPCOR Exam. Here in this course, you will learn ISIS basics, Implementing ...
Implementing & Optimizing OSPF v2/v3 Protocol
This course covers implementing OSPF routing protocol which is the core IGP in the CCNP SPCOR Exam. Here in this course, you will learn OSPF basics, Implementing OSPF with IPv4 and IPv6, LSA Types, Ne...
Incident Handling in the Cloud Fundamentals
Computer security incident response has become an essential component of information technology (IT) programs. Because performing incident response effectively is a complex undertaking, establishing a...
INE Live!
INE Live is an engaging and interactive new online feature, free to all, and expertly designed to connect clients and students directly with INE’s world-renowned experts, instructors, and executive le...
INE Networking Labs Demo
INE introduces the first set of Networking virtual-based labs! more labs and feature functionality is coming to the platform soon. You can find these and many other labs in courses and learning paths ...
Introduction to Microsoft 365: Teams Administrator
Microsoft Teams is Microsoft 365's communication and collaboration platform allowing for chat, screen sharing, calling, meetings, file sharing, and more. When you purchase a Microsoft 365 subscription...
iOS & Mobile App Pentesting
<br>In this course, you will learn all about the attack surface of iOS applications and the techniques to exploit each covered vulnerability (incl. reverse engineering). Specifically, iOS fundamentals...
IP Services Every Engineer Should Know
As a Network Administrator or Engineer, there are certain IP Services that you will encounter on almost a daily basis. IP Services that are critical for basic network and host functionality. This co...
IPv4 Routing With OSPF
OSPF is arguably the most popular and widely implemented interior gateway routing protocol in the world. As a network administrator or engineer, if you're not already working with OSPF, chances are yo...
Kubernetes: Day One for Absolute Beginners
Learn the foundations of Kubernetes, including cluster architecture, deployments, and DevOps delivery with MVPs Dan Wahlin, Mike Pfeiffer, and Anthony Nocentino.
Machine Learning Fundamentals
This course introduces the fundamental concepts of Machine Learning and explores the basic modeling workflow needed to get into different Machine Learning applications. This course also makes an intro...
Machine Learning with scikit-learn Starter Pass
Microsoft Certified Azure Security Engineer AZ-500
Learn Azure Security with Microsoft MVPs Tim Warner and Mike Pfeiffer and prepare for the Microsoft Azure Security Engineer (AZ-500) certification exam.
MySQL and MariaDB for Python Developers
Relational databases are the default storage and access system for most stored data in applications, and for data science. MySQL/MariaDB is one of the top two most popular open source RDBMSs. This cou...
Overview and Preparation for Microsoft Certification Exam AZ-104 - Microsoft Certified Azure Admin
This on-demand course is intended for Azure Administrators and IT professionals who plan on taking the AZ-104 certification exam. This short course focuses on exam preparation and serves as a roadmap...
Palo Alto Firewall Advanced Policies
Securing an enterprise starts with a firewall. Palo Alto Next-Generation Firewall is recognized as one of the industry's leading security systems that you can easily deploy and operate. This course di...
Palo Alto Firewall Advanced Technologies
Securing an enterprise starts with a firewall. Palo Alto Next-Generation Firewall is recognized as one of the industry's leading security systems that you can easily deploy and operate. This course ai...
Palo Alto Firewall Policies
Securing your enterprise starts with your firewall. Palo Alto Next-Generation Firewall is recognized as one of the industry's leading security systems that you can easily deploy and operate. This cour...
Palo Alto Firewall Technologies
Securing your enterprise starts with your firewall. Palo Alto Next-Generation Firewall is recognized as one of the industry's leading security systems that you can easily deploy and operate. This cour...
Penetration Testing Basics
The Penetration Testing Basics course covers the most important technical aspects of penetration testing. You will learn techniques, tools, and a professional penetration testing methodology. This cou...
Penetration Testing: Linux Exploitation
<br>Linux and other variants of UNIX make up a very large segment of the overall internet infrastructure (including Critical Infrastructure), not to mention the exponentially expanding “Internet of Th...
Penetration Testing: Metasploit & Ruby
<br>The Ruby for Pentesters and Metasploit course covers Ruby programming from the very basics to advanced techniques, in addition to penetration testing topics. This course also covers topics such as...
Penetration Testing: System Security
<br>The System Security course will provide you with a thorough understanding of x86 Architecture and its weaknesses.</br> <br>This course is part of the Penetration Testing Professional Learning pat...
Penetration Testing: Web App Security
<br>Today’s penetration testers must master web application attack techniques; this lab intensive course will teach the student how to conduct a thorough Penetration test against web applications.</br...
Penetration Testing: Wi-Fi Security
<br>The Wi-Fi Security course is an extremely in-depth course covering the most important attack techniques used against Wi-Fi networks. The student will learn the security mechanisms implemented in W...
PowerShell for Pentesters
<br>PowerShell is a powerful built-in shell and scripting environment we can utilize as penetration testers considering its wide-spread availability on all modern Windows based systems. The use of Pow...
Practical Reverse Engineering
<br>In this course, things will get practical. You will start by learning all about string references and basic patching. Specifically, you will be shown the usage of data strings in order to locate a...
Preparing for the AZ-500: Azure Security Engineer Associate Exam
This on-demand course is intended for IT and security professionals who plan on taking the AZ-500 certification exam. This short course focuses on exam preparation and serves as a roadmap for those p...
Python Starter Pass
Reverse Engineering Foundations
</br>The Reverse Engineering Professional course will introduce you to the world of software Reverse Engineering. After explaining what Reverse Engineering is and the reasons why someone may need it y...
SD-WAN Configuration & Troubleshooting
In Cisco SD-WAN Configuration & Troubleshooting, we start by discussing the two major types of templates and how to use them to deploy 10's or 100's of devices. Cisco SD-WAN supports numerous types of...
Secure RESTful APIs using Python
In this course, you will learn how to design and work with RESTful and “cloud native” web services, including considerations of choosing serialization formats. You will also explore the tools and alg...
Segmenting Traffic with VLANs & Trunks
As a Network Administrator or Network Engineer (or one who aspires to those roles) it is virtually certain that you will run across a situation that requires you to understand, implement and troublesh...
Software Development with Python
This course will summarize and explore tools used for Python software development and debugging, with a focus on those in the standard library. It will demonstrate pdb, timeit, trace, parser, code, tr...
SQL Fundamentals: Working with Data
This course is designed to introduce learners to the fundamental concepts of working with data in relational database systems. The course covers a brief introduction to what relational databases are ...
SSH/SSL/TLS
Virtual Private Networks can be built using many different technologies. The same holds true for remote access, no matter what the ultimate goal is - management, automation or simple data transfer. At...
Troubleshooting Routing Protocols & Connectivity Issues
This course covers troubleshooting and establishing connectivity, which is one of the topics in the CCNP SPCOR Exam. Here in this course, you will learn how to troubleshoot OSPF adjacency issues and e...
Understanding and Implementing MPLS, Traffic Engineering & Segment Routing
This course covers MPLS Traffic Engineering basics and the basics of Segment Routing, which is one of the topics in the CCNP SPCOR Exam. In this course, you will learn about LDP, RSVP TE, Segment Rout...
Understanding, Configuring & Troubleshooting L3VPN
This course covers L3VPN which is one of the topics in the CCNP SPCOR Exam. In this course, you will learn about Intra-As L3VPN, Inter-AS L3VPN using Option A, Inter-AS L3VPN using Option B, Inter-AS ...
Understanding NAT44, NAT64, 6RD, MAP & DS Lite
This course covers understanding NAT44, NAT64, 6RD, Mapping Address and Port, and DS-Lite which is are core topics in the CCNP SPCOR Exam. Students who are preparing for the CCNP SPCOR Exam or profess...
Understanding Service Provider Architecture
This course covers Service Provider Architecture basics. In this course, you will learn about service provider types, different types of physical connectivity and transport mechanisms, different locat...
Unit Testing with Python
This course is designed to show students the importance and reasoning behind writing unit tests; explain how to get started with the standard library unittest and doctest modules; explain and compare ...
Version Control & GitHub
When developing either application code or data science artifacts, such as Jupyter notebooks or R Markdown files, reproducibility, tracking, and collaboration depend on good use of version control sof...
Web Application Penetration Testing
<br>The Web Application Penetration Testing course provides all the advanced skills necessary to carry out a thorough and professional penetration test against modern web applications. The Penetration...
Web Scraping using Python
In this course you will learn how to use beautiful soup to parse HTML documents, use Scrapy or Mechanize to scrape websites, learn what 'robots.txt' is, follow and analyze meta tags and consider legal...
All courses
Learning Paths
With INE’s Learning Paths, our experts lead you through each critical step of the certification study process. All the courses you need for your exams are gathered in one, easy-to-track location, ensuring your time is spent on the most critical study topics.
How we help you get there
More than 900k tech jobs remain unfilled and it is our goal to prepare you to claim your spot in the IT field.

Chief Information Security Officer
A CISO is a c-suite level executive responsible for maintaining an organization’s information and data / cyber security.

Cloud Administrator
Cloud Administrators configure and monitor cloud management services, working with the IT department to develop and support Windows, Cloud, or Linux infrastructure, as well as providing technical assistance for cloud-based systems.

Cloud Administrator
Cloud Administrators configure and monitor cloud management services, working with the IT department to develop and support Windows, Cloud, or Linux infrastructure, as well as providing technical assistance for cloud-based systems.

Cloud Architect
A Cloud Architect is responsible for deploying and overseeing an organization’s cloud computing strategy, including cloud adoption plans, cloud application design, and cloud management and monitoring.

Cloud Developer
Generally a DevOps position, Cloud Developers are skilled in a variety of areas, working as technicians, architects, engineers, and analysts, all while providing application development.

Cloud Software Engineer
Responsible for any technological duties with regards to cloud computing, Cloud Engineers design and plan cloud services, while also providing support and maintenance.

Data Analyst
A Data Analyst uses data to acquire information about specific topics. This may involve finding survey participants, gathering data, interpreting data, and then presenting it in forms such as charts or reports.

Data Architect
A Senior Software Engineer usually has a strong background in computer science, web development, and/or engineering. Knowledge and familiarity with web coding such as Javascript, HTML, and CSS are a necessity.

Data Engineer
Data Engineers are responsible for developing and translating computer algorithms into code. They are also responsible for maintaining, organizing, and identifying trends in large data sets.

Data Scientist
Data Scientists are responsible for mining complex data and designing new ways to manage statistical data using models.

Information Security Analyst
These positions are responsible for protecting sensitive information by creating plans and implementing strategies to prevent attacks.

Network Administrator
Network Administrators are responsible for the upkeep of both computer hardware and software systems, focusing on the network components within their company.

Network Architect
A Network Architect is responsible for designing and reviewing network requirements and capabilities for their organization.

Networking Security Engineer
A Networking Security Engineer solves existing security issues, tests systems for vulnerabilities, and maintains virtual private networks, firewalls, email security, and web protocols.

Penetration Tester
Penetration testers are in charge of identifying vulnerabilities in an organization’s network through an authorized and simulated attack.

Security Architect
A security architect analyzes security threats and develops solutions to protect information and data.

Wireless Network Engineer
A Wireless Network Engineer designs, implements, and optimizes a company’s wireless LAN and additional wireless technologies.
Common Course Questions
If you have a question you don’t see on this list, please visit our Frequently Asked Questions page by clicking the button below.
If you’d prefer getting in touch with one of our experts, we encourage you to call one of the numbers above or fill out our contact form.
Do you offer training for all student levels?
Are the training videos downloadable?
I only want to purchase access to one training course, not all of them, is this possible?
Are there any fees or penalties if I want to cancel my subscription?