CEH WITH AI - CERTIFIED ETHICAL HACKER WITH AI
EC-Council Certified Network Defender Training
Certified Cybersecurity Technician
ICS/SCADA: ICS Network Security | Cyber Security Certifications
COMPUTER HACKING FORENSICS INVESTIGATOR
Dark Web Forensics Deep Dive For Ethical Hackers Workshop
Mobile Forensics Deep Dive Workshop
EC-Council Certified Threat Intelligence Analyst
EC-Council Certified Incident Handler
Certified SOC Analyst
EC-Council Threat Intelligence Essentials
Certified Penetration Testing Profesional
Web Application Hacking and Security
CASE JAVA
CASE .NET
EC-Council DevSecOps Engineer
EC-Council DevSecOps Essentials
EC-Council Certified Encryption Specialist
Certified Chief Information Security Officer
Certified Risk Management Approach & Practice
Certified Cloud Security Engineer
Certified Secure Computer User
Cloud Security Essentials
Digital Forensics Essentials
EC-Council IoT Security Essentials
EC-Council SOC Essentials
Ethical Hacking Essentials
Network Defense Essentials
Certified HW, SW and System Administration
Certified Cloud Management and Implementation
Certified Cybersecurity Analyst
Certified Data Management and Implementation
Certified Network Administration
Certified Pen Tester
Certified Security Management and Implementation
Certified Server Administration
Using COBIT to implement the NIST Cybersecurity Framework
Certified Professional in Business Analysis
Agile Certified Practitioner
Certified Associate in Project Management
PMI Project Management Professional (PMP) Certification
Certified Project Management Professional Exam Simulation
ESCM Expert Scrum Master Certified (180 day e-learning access + exam)
CDMP Data Management Fundamentals DAMA.org
Certified CLOUD SECURITY Knowledge Plus
Certified CLOUD SECURITY Knowledge
Certified CLOUD ZERO TRUST
IAPP Artificial Intelligence Governance Professional Certification
EXP-301: Windows User Mode Exploit Development
IR-200: Foundational Incident Response
PEN-103: Kali Linux Revealed
PEN-200: Penetration Testing with Kali Linux
PEN-210: Wireless Network Attacks
PEN-300: Evasion Techniques and Breaching Defenses
SEC-100: Cybersecurity Essentials
SJD-100: Secure Java Development Essentials
SOC-200: Security Operations and Defensive Analysis
TH-200: Foundational Threat Hunting
WEB-200: Web Attacks with Kali Linux
WEB-300: Advanced Web Attacks and Exploitation
ECBA - ENTRY CERTIFICATE IN BUSINESS ANALYSIS - IIBA®
DevOps Institute Foundation Certification Preparation Course
DevOps Institute Foundation Certification Online Course
DevOps Institute Leader Certification Preparation Course
DevOps Institute Leader Certification Online Course
DevOps Institute's DevSecOps Foundation Certification Preparation Course
DevOps Institute's online DevSecOps Foundation Certification course
Advanced Artificial Intelligence Audit
Fundamentals of Artificial Intelligence
Blockchain Fundamentals
ISACA CCAK Certification Exam Preparation
Certified in the Governance of Enterprise IT
Certified Information System Auditor
Certified Information Security Manager
Cloud Fundamentals
Cobit2019 Foundation Certificate Course
Certified in Risk & Information Systems Control
Hands-on cybersecurity labs and preparation for the ISACA CSX Practitioner (CSX-P) certification exam
Cybersecurity Fundamentals for Auditors and Non-Technicians
ISACA Cybersecurity Fundamentals (formerly CSX Fundamentals) certification exam preparation course
Fundamentals of Data Science
Fundamentals of IT Audit
Fundamentals of IT Risk
33 certification courses to advance your career
Are you visiting from Italy? We have a dedicated Italian website for you!