INE Courses
With new Networking, Cyber Security, Data Science, and Cloud courses released each month, our in-house instructors and content creators work tirelessly to ensure you and your teams have access to the most accurate training material in the industry.
Looking to test your knowledge? No problem! Our industry leading lab platform will provide you and your teams with the challenges necessary to ensure you are confident with your expertise.
See the Courses in the INE Platform
Begin Your Learning ExperiencePopular courses
Active Directory Protection & Tiering
This on-demand course is intended for IT and security professionals who want to understand the most common attack vectors and security pitfolds in Active Directory such as Kerberoast, kerberos delegat...
Advanced Implementation and Optimization with Border Gateway Protocol
This course covers understanding, optimizing and configuring BGP. In this course, you will learn about different BGP Path attributes as well as how to do path manipulation in BGP using attributes like...
Android & Mobile App Pentesting
In this course you will be shown how to perform professional penetration testing activities against Android and iOS mobile applications, by means of reverse engineering, static analysis and dynamic an...
Applying Data Center ACI Concepts
Application Centric Infrastructure (ACI) is the workhorse of the modern Cisco Data Center design. In this series, we explore the basic operations and concepts of ACI, including Fabric Initialization, ...
AWS Management Concepts
Understanding AWS is more than just services. It's also about best practices when it comes to billing, architectures, monitoring, and so on. This course will cover the fundamentals needed to become ef...
AWS Security & Compliance
AWS is not only a game-changer for companies looking to innovate faster. AWS Cloud also helps you significantly improve your security and compliance practice in ways that would be difficult or financ...
AWS Services Fundamentals
The goal of this course is increasing your confidence and understanding of AWS Cloud. We will cover the essential services from computing, storage, database, and more. When complete, you can begin you...
Azure Management Concepts
One key to understanding Azure is understanding the management concepts and management tools that you will use while working in Azure. In this course you will cover the fundamental concepts of how Azu...
Azure Pentesting
This on-demand course is intended for IT and security professionals who want to apply the most common attacks and security pitfalls in order to compromise an Azure Tenant. We will discuss different wa...
Azure Services Fundamentals
The primary purpose of Azure is to provide services for customers. In this course, you will get to know many of the most common services provided by Azure. Services covered in this course include infr...
Basic Identity Management Using Cisco ISE
This course covers understanding and implementing basic AAA using ISE. In this course, you will learn about Radius server authentication, MAB, DOT1X, and profiling and controlling management access to...
Beginning Routing with EIGRP
Cisco's Enhanced Interior Gateway Protocol (EIGRP) is categorized as an Interior Gateway Protocol that is used in many networks today. It is also a routing protocol that you must learn, in order to p...
CCIE Enterprise Infrastructure v1 Exam Review
This course serves as a final review of the various topics you've studied as you've progressed through INE's CCIE Enterprise Infrastructure v1.0 Learning Path. Meant to be viewed perhaps two-to-three ...
CCIE Service Provider v5 Exam Review
This course serves as a final review of the various topics you've studied as you've progressed through INE's CCIE Service Provider v5.0 Learning Path of courses. Meant to be viewed perhaps two-to-thre...
CCNP ENCOR Exam Review
This course serves as a final review of the various topics you've studied as you've progressed through INE's CCNP Enterprise Learning Path. Meant to be viewed perhaps two-to-three weeks prior to sitti...
Cisco Firewall Technologies
A firewall is a network security device that monitors incoming and outgoing network traffic and decides how to handle it based on a defined set of security rules. Due to the evolution of networking an...
Cisco SD-Access & DNA Center
This course covers Cisco Software-Defined Networking (SDN) in the Enterprise known as SD-Access. We will delve into the working of the fabric understanding the control plane and data plane. DNA Center...
Cisco SD-WAN Fundamentals
The Cisco SD-WAN Fundamentals is intended to build an understanding of the SD-WAN architecture and its components. We begin by discussing the Cisco SD-WAN fabric and how it is designed. We will learn ...
Cisco SD-WAN Use Design, Cloud & Advanced Features
Cisco SD-WAN solutions can be designed in a number of ways, we will explore various use cases to understand the value of different solutions. We will investigate SD-WAN Cloud solutions for connecting ...
Cloud Foundations
Most enterprises are now turning to the cloud for some, most, or even all of their IT needs. Understanding what the cloud is, what it does, and what it provides at a fundamental level is critical know...
Cloud IP Addressing
Moving to the cloud changes many things. Fortunately, while there are changes to some of the rules and there are some restrictions, IP addressing in the cloud is much like IP addressing on premises. ...
Cloud Management Concepts
This very short course gives you the fundamentals you need to start your cloud journey. The course covers three fundamental management concepts - asset management, monitoring, and access management. ...
Configuration Consistency with Ansible
This course is designed for Network Admins and Network Engineers who are unfamiliar with the world of Ansible and the ways it can assist with Network Automation. By learning some basic concepts of Ans...
Configure & Troubleshooting L2VPN / Carrier Ethernet
This course covers L2VPN, which is one of the topics in the CCNP SPCOR exam. In this course, you will learn about E-Line, E-Lan, E-Tree, and E-Access. You will also learn about ethernet OAM and VLAN t...
Data Analysis with pandas Starter Pass
Data Center Compute Design
This course is targeted at Data Center Network Designers, and CCNP Data Center Candidates alike, covering the newest Designing Cisco Data Center Infrastructure 300-610 (DCID) exam. Topics covered incl...
Data Center Firmware Management
Firmware upgrades are a part of everyday network operations. In this series, you'll see first-hand how to upgrade NX-OS firmware, UCS firmware, and ACI firmware, and learn the differences between disr...
Data Center Management & Monitoring
Managing and monitoring the network is a necessary part of day 2 operations in the network. In this series we explore the management of NX-OS configurations, and how to monitor the network with protoc...
Data Center Network Design
This course is targeted at Data Center Network Designers and CCNP Data Center Candidates alike, covering the newest Designing Cisco Data Center Infrastructure 300-610 (DCID) exam. Topics covered inclu...
Data Center Security
Security is an important part of all Data Center designs. In this series we explore Data Center Network Security, Compute Security, and Storage Security with topics such as AAA, First Hop Security (Dy...
Data Center Storage Design
This course is targeted at Data Center Network Designers, and CCNP Data Center Candidates alike, covering the newest Designing Cisco Data Center Infrastructure 300-610 (DCID) exam. Topics covered incl...
Digital Forensics: File & Disk Analysis
In this course, you will learn how to interact with the lower levels of files and disks. Specifically, you will understand the file’s structure and learn how to identify various file types. File’s met...
Digital Forensics: Introduction & Acquisition
In the first part of this course, you will learn about the fundamentals of digital forensics, digital evidence, and intrusion reconstruction. The challenges an investigator could face are also documen...
Digital Forensics: Logs, Timelines & Reporting
In this course, you will first go through log analysis fundamentals. The various log files, how to extract them, how they can help you during an investigation and the various log analysis tools are al...
Digital Forensics: System & Network Forensics
In this course, you will start by analyzing artifacts at the OS level. Specifically, this section dives deeply into the Windows OS and its artifacts. The location of each artifact, the tools needed fo...
eJPT Exam Preparation
You've now finished all the courses on Penetration Testing Student. Now is time to get ready for the <a href="https://elearnsecurity.com/product/ejpt-certification/">eJPT certification</a>. There's a...
Enterprise & Campus LAN Switching Fundamentals
Candidates studying for Cisco's CCNP Enterprise or Cisco's CCIE Enterprise Infrastructure certifications need to be aware of the usage, configuration, monitoring, and troubleshooting of common LAN Swi...
Firewall Technologies
Firewall systems have been used as a first line of defense in networking since 1980s. They carefully analyze traffic based on a pre-established set of security rules. They are used and programmed to f...
Fundamentals of Cloud Identity, Security, and Compliance
With so many workloads moving into the cloud, it is more important than ever to understand cloud security risks and protection tools. This course covers the basic concepts of cloud security, including...
Fundamentals of Implementing, Optimizing, and Scaling Border Gateway Protocol
This course covers understanding, optimizing and configuring BGP. In this course, you will learn to build EBGP/IBGP neighborship and how route-reflectors work on different platforms like Cisco and Jun...
Fundamentals of Network Automation Using Python
This course covers fundamentals of Python3 required for Network automation. Here in this course, you will learn about Installing Python3, Netmiko, Atom and VIM on Ubuntu Machine, Using the Print Comma...
HTTP Using Python
This course will explain the basics of client-server communications, introduce the requests library, and explain how HTTP works (stateless, resource oriented, etc). It also explores the structure of r...
Implementing Cisco Application Centric Infrastructure (ACI)
INE’s Implementing Cisco Application Centric Infrastructure Course is based off of the CCNP Data Center Certification Exam DCACI 300-620. This course covers the configuration, implementation, and mana...
Implementing High Availability
This course covers high availability which is one of the topics in the CCNP SPCOR exam. Here in this course, you will learn how to configure etherchannels for obtaining high availability for link fail...
Implementing Intermediate System to System (IS-IS)
Intermediate System to Intermediate System (IS-IS) is the foundation of many Service Provider MPLS networks, and has been growing in popularity in the past few years as a viable alternative to running...
Implementing IPSec
You never know who's listening. Implementing IPsec for encrypting communication between sites is one of the first lines of defense in a Network Security Engineer's toolkit to prevent a data breach. In...
Implementing Multicast Services
This course covers L3VPN Multicast Services which is one of the topics in the CCNP SPCOR Exam. In this course, you will learn about IGMP v1/v2/v3, PIM Sparse mode, SSM, PIM Bidir, and Multicast Listen...
Implementing & Optimizing ISIS Protocol
This course covers implementing Integrated System-Integrated System (ISIS) routing protocol which is the core IGP in the CCNP SPCOR Exam. Here in this course, you will learn ISIS basics, Implementing ...
Implementing & Optimizing OSPF v2/v3 Protocol
This course covers implementing OSPF routing protocol which is the core IGP in the CCNP SPCOR Exam. Here in this course, you will learn OSPF basics, Implementing OSPF with IPv4 and IPv6, LSA Types, Ne...
Incident Handling & Response: Network Traffic & Flow Analysis
The Network Traffic & Flow Analysis course will cover how you can detect intrusions or intrusion attempts by analyzing network traffic and network flows. This section consists of three modules that ar...
Incident Handling & Response Overview
The Incident Handling Overview course will introduce you to the Incident Handling Process. Specifically, the Preparation -> Detection & Analysis -> Containment, Eradication & Recovery -> Post-Incident...
Incident Handling & Response: SOC 3.0 Operations & Analytics
The focus of the Practical Incident Handling course is to educate you on the techniques, tactics, and procedures that modern adversaries use, as well as teach you how to detect them. Now, it is time t...
Introduction to Microsoft 365: Teams Administrator
Microsoft Teams is Microsoft 365's communication and collaboration platform allowing for chat, screen sharing, calling, meetings, file sharing, and more. When you purchase a Microsoft 365 subscription...
Introduction to Network Defense
The introductory course will provide you with the background knowledge you need to succeed in information security. These topics will add to and reinforce what you already know, and help to ensure tha...
Introduction to Threat Hunting
This course will introduce you to the world of threat hunting, which will include a brief overview of what threat hunting is and why companies are seeking to establish this capability within their org...
iOS & Mobile App Pentesting
In this course, you will learn all about the attack surface of iOS applications and the techniques to exploit each covered vulnerability (incl. reverse engineering). Specifically, iOS fundamentals (se...
IP Services Every Engineer Should Know
As a Network Administrator or Engineer, there are certain IP Services that you will encounter on almost a daily basis. IP Services that are critical for basic network and host functionality. This co...
IPv4 Routing With OSPF
OSPF is arguably the most popular and widely implemented interior gateway routing protocol in the world. As a network administrator or engineer, if you're not already working with OSPF, chances are yo...
Linux Exploit Development
The Linux Exploit Development course is the most comprehensive and practical online course on exploit development, since it provides not only the fundamentals of Windows and Linux exploit development ...
Log4j Vulnerability (Log4Shell)
In this quick INE Live session, we review the Log4J (also known as the Log4Shell) vulnerability, its use in networks currently, and demo the exploit in a sandboxed environment. We then turn the tools ...
Malware Analysis
Malware Analysis is an online, self-paced training course that teaches students the knowledge and skills necessary to dissect malicious software in order to understand its mechanics and purpose. In th...
Network Defense: Endpoint Security
In addition to network security, securing the endpoints is equally as important. This course will cover everything you need to get started in hardening your Windows environment. When it comes to secur...
Network Defense: Network Security
The network security course covers many aspects of securing the network through network design, several network appliances and properly hardening those appliances.
Networking Labs - Beta Testing
Test
Overview and Preparation for Microsoft Certification Exam AZ-104 - Microsoft Certified Azure Admin
This on-demand course is intended for Azure Administrators and IT professionals who plan on taking the AZ-104 certification exam. This short course focuses on exam preparation and serves as a roadmap...
Palo Alto Firewall Advanced Policies
Securing an enterprise starts with a firewall. Palo Alto Next-Generation Firewall is recognized as one of the industry's leading security systems that you can easily deploy and operate. This course di...
Palo Alto Firewall Advanced Technologies
Securing an enterprise starts with a firewall. Palo Alto Next-Generation Firewall is recognized as one of the industry's leading security systems that you can easily deploy and operate. This course ai...
Palo Alto Firewall Policies
Securing your enterprise starts with your firewall. Palo Alto Next-Generation Firewall is recognized as one of the industry's leading security systems that you can easily deploy and operate. This cour...
Palo Alto Firewall Technologies
Securing your enterprise starts with your firewall. Palo Alto Next-Generation Firewall is recognized as one of the industry's leading security systems that you can easily deploy and operate. This cour...
Penetration Testing Basics
The Penetration Testing Basics course covers the most important technical aspects of penetration testing. You will learn techniques, tools, and a professional penetration testing methodology. This cou...
Penetration Testing: Evasion
The majority of organizations base their defenses in multiple security solutions. During an engagement, a red team member may come across multiple defense layers, from IDS/IPS and firewalls all the wa...
Penetration Testing: Linux Exploitation
Linux and other variants of UNIX make up a very large segment of the overall internet infrastructure (including Critical Infrastructure), not to mention the exponentially expanding “Internet of Things...
Penetration Testing: Metasploit & Ruby
The Ruby for Pentesters and Metasploit course covers Ruby programming from the very basics to advanced techniques, in addition to penetration testing topics. This course also covers topics such as exp...
Penetration Testing: Network Security
The Network Security course will cover security testing methodology, techniques, and tools for networked PC and devices.
Penetration Testing: Preliminary Skills & Programming
Performing a penetration test means attacking software and systems. Understanding and mastering basic programming techniques not only make Pentesters better professionals but also helps in automating ...
Penetration Testing: Preparing the Attack
In this course, you will be shown how to attack the human factor via advanced social engineering attacks, while remaining under the radar. Then, you will see advanced usages of the established toolkit...
Penetration Testing Prerequisites
The Penetration Testing Prerequisites course introduces you to information security, providing foundational skills on computer networks, protocols, web applications, and the penetration testing proces...
Penetration Testing: Red Teaming Active Directory
In this course, you will learn how to find your way to a domain administrator inside an organization’s network. First, you will perform stealthy reconnaissance and enumeration to identify hosts, serve...
Penetration Testing: Red Teaming Critical Domain Infrastructure
In this course, you will learn about leveraging MS SQL Server, Exchange and Windows Update to gain an initial foothold, stealthily move laterally or spread the compromise into an organization’s networ...
Penetration Testing: System Security
The System Security course will provide you with a thorough understanding of x86 Architecture and its weaknesses.
Penetration Testing: Web App Security
Today’s penetration testers must master web application attack techniques; this lab intensive course will teach the student how to conduct a thorough Penetration test against web applications.
Penetration Testing: Wi-Fi Security
The Wi-Fi Security course is an extremely in-depth course covering the most important attack techniques used against Wi-Fi networks. The student will learn the security mechanisms implemented in Wi-Fi...
PowerShell for Pentesters
PowerShell is a powerful built-in shell and scripting environment we can utilize as penetration testers considering its wide-spread availability on all modern Windows based systems. The use of PowerSh...
Practical Incident Handling
he Practical Incident Handling course will cover how you can prepare and defend against each stage of the cyber kill chain. The goal of this is to first educate you on the techniques, tactics, and pro...
Practical Reverse Engineering
In this course, things will get practical. You will start by learning all about string references and basic patching. Specifically, you will be shown the usage of data strings in order to locate an al...
Practical Web Defense
The Practical Web Defense course is a fully guided and practical self-study course about how web applications are attacked in the real world and what you can do to mitigate every attack. Configuration...
Preparing for the AZ-500: Azure Security Engineer Associate Exam
This on-demand course is intended for IT and security professionals who plan on taking the AZ-500 certification exam. This short course focuses on exam preparation and serves as a roadmap for those p...
Python Starter Pass
Reverse Engineering Foundations
The Reverse Engineering Professional course will introduce you to the world of software Reverse Engineering. After explaining what Reverse Engineering is and the reasons why someone may need it you wi...
SD-WAN Configuration & Troubleshooting
In Cisco SD-WAN Configuration & Troubleshooting, we start by discussing the two major types of templates and how to use them to deploy 10's or 100's of devices. Cisco SD-WAN supports numerous types of...
Segmenting Traffic with VLANs & Trunks
As a Network Administrator or Network Engineer (or one who aspires to those roles) it is virtually certain that you will run across a situation that requires you to understand, implement and troublesh...
SQL Fundamentals: Working with Data
This course is designed to introduce learners to the fundamental concepts of working with data in relational database systems. The course covers a brief introduction to what relational databases are ...
SSH/SSL/TLS
Virtual Private Networks can be built using many different technologies. The same holds true for remote access, no matter what the ultimate goal is - management, automation or simple data transfer. At...
Threat Hunting: Hunting the Endpoint & Endpoint Analysis
In this course, you will dive into the workstation. You will be introduced to the Windows OS where you will learn how to detect what’s in plain sight, and whether it is normal or potentially malicious...
Threat Hunting: Hunting the Network & Network Analysis
In this course, we’ll go over the TCP/IP stack and learn how to recognize normal network traffic. We will then use that foundation and attempt to detect suspicious network traffic patterns. Additional...
Troubleshooting Routing Protocols & Connectivity Issues
This course covers troubleshooting and establishing connectivity, which is one of the topics in the CCNP SPCOR Exam. Here in this course, you will learn how to troubleshoot OSPF adjacency issues and e...
Understanding and Implementing MPLS, Traffic Engineering & Segment Routing
This course covers MPLS Traffic Engineering basics and the basics of Segment Routing, which is one of the topics in the CCNP SPCOR Exam. In this course, you will learn about LDP, RSVP TE, Segment Rout...
Understanding, Configuring & Troubleshooting L3VPN
This course covers L3VPN which is one of the topics in the CCNP SPCOR Exam. In this course, you will learn about Intra-As L3VPN, Inter-AS L3VPN using Option A, Inter-AS L3VPN using Option B, Inter-AS ...
Understanding NAT44, NAT64, 6RD, MAP & DS Lite
This course covers understanding NAT44, NAT64, 6RD, Mapping Address and Port, and DS-Lite which is are core topics in the CCNP SPCOR Exam. Students who are preparing for the CCNP SPCOR Exam or profess...
Understanding, Optimizing & Configuring Border Gateway Protocol
This course covers understanding, optimizing and configuring BGP, which is the core topic in the CCNP SPCOR Exam. In this course, you will learn to build EBGP/IBGP neighborship, how route-reflectors w...
Understanding Service Provider Architecture
This course covers Service Provider Architecture basics. In this course, you will learn about service provider types, different types of physical connectivity and transport mechanisms, different locat...
Web Application Penetration Testing
The Web Application Penetration Testing course provides all the advanced skills necessary to carry out a thorough and professional penetration test against modern web applications. The Penetration Tes...
Web Application Penetration Testing eXtreme
This course brings students into a new world of advanced exploitation techniques using real-world scenarios, with challenging and extremely hands-on laboratories in which to put the covered techniques...
Windows Exploit Development
Exploit development against Windows targets is another important skill to have. In this course you will learn about Windows stack smashing (incl. bad char identification), SEH-based overflows, Windows...
All courses
Learning Paths
With INE’s Learning Paths, our experts lead you through each critical step of the certification study process. All the courses you need for your exams are gathered in one, easy-to-track location, ensuring your time is spent on the most critical study topics.
How we help you get there
More than 900k tech jobs remain unfilled and it is our goal to prepare you to claim your spot in the IT field.

Chief Information Security Officer
A CISO is a c-suite level executive responsible for maintaining an organization’s information and data / cyber security.

Cloud Administrator
Cloud Administrators configure and monitor cloud management services, working with the IT department to develop and support Windows, Cloud, or Linux infrastructure, as well as providing technical assistance for cloud-based systems.

Cloud Administrator
Cloud Administrators configure and monitor cloud management services, working with the IT department to develop and support Windows, Cloud, or Linux infrastructure, as well as providing technical assistance for cloud-based systems.

Cloud Architect
A Cloud Architect is responsible for deploying and overseeing an organization’s cloud computing strategy, including cloud adoption plans, cloud application design, and cloud management and monitoring.

Cloud Developer
Generally a DevOps position, Cloud Developers are skilled in a variety of areas, working as technicians, architects, engineers, and analysts, all while providing application development.

Cloud Software Engineer
Responsible for any technological duties with regards to cloud computing, Cloud Engineers design and plan cloud services, while also providing support and maintenance.

Data Analyst
A Data Analyst uses data to acquire information about specific topics. This may involve finding survey participants, gathering data, interpreting data, and then presenting it in forms such as charts or reports.

Data Architect
A Senior Software Engineer usually has a strong background in computer science, web development, and/or engineering. Knowledge and familiarity with web coding such as Javascript, HTML, and CSS are a necessity.

Data Engineer
Data Engineers are responsible for developing and translating computer algorithms into code. They are also responsible for maintaining, organizing, and identifying trends in large data sets.

Data Scientist
Data Scientists are responsible for mining complex data and designing new ways to manage statistical data using models.

Information Security Analyst
These positions are responsible for protecting sensitive information by creating plans and implementing strategies to prevent attacks.

Network Administrator
Network Administrators are responsible for the upkeep of both computer hardware and software systems, focusing on the network components within their company.

Network Architect
A Network Architect is responsible for designing and reviewing network requirements and capabilities for their organization.

Networking Security Engineer
A Networking Security Engineer solves existing security issues, tests systems for vulnerabilities, and maintains virtual private networks, firewalls, email security, and web protocols.

Penetration Tester
Penetration testers are in charge of identifying vulnerabilities in an organization’s network through an authorized and simulated attack.

Security Architect
A security architect analyzes security threats and develops solutions to protect information and data.

Wireless Network Engineer
A Wireless Network Engineer designs, implements, and optimizes a company’s wireless LAN and additional wireless technologies.
Common Course Questions
If you have a question you don’t see on this list, please visit our Frequently Asked Questions page by clicking the button below. If you’d prefer getting in touch with one of our experts, we encourage you to call one of the numbers above or fill out our contact form.
Do you offer training for all student levels?
Are the training videos downloadable?
I only want to purchase access to one training course, not all of them, is this possible?
Are there any fees or penalties if I want to cancel my subscription?