Improve your experience. We are very sorry but this website does not support Internet Explorer. We recommend using a different browser that is supported such as Google Chrome or Mozilla Firefox.

header image

NGN Learning

Start learning today! Anytime, anywhere.

Complete online at your own pace

Clear filters

Introduction to Cybersecurity

By the end of this course, you will have a solid understanding of a wide variety of cybersecurity-related areas for home and work. This course is designed to give you the knowledge and skills to identify, mitigate, and prevent cybersecurity-related issues. The course is highly practical and designed to follow along at home.

More information

Getting Started with Kali Linux Penetration Testing

This course will start from scratch and will provide you with essential knowledge of the most happening and widely used tools available in Kali Linux by performing real-world practicals. You will learn information gathering and scanning, perform vulnerability analysis, and learn database attacks and password attacks

More information

Identity And Access Management

This comprehensive course covers the key areas of IAM, with including fundamental concepts, but also the technologies and the different approaches to implementing effective IAM across the enterprise, web services and government.

More information

Securing Your Network From Attacks

Attacks on enterprise networks and home networks are a growing problem with daily targeted attacks that can result in crippling results. These attacks have become more aggressive, sophisticated, and more dangerous over the years.

More information

Metasploit Like a Pro

Metasploit is the most common command and control (C2) framework used by penetration testers and red team operators around the globe. It is a framework that is a “must-know” and will give you the confidence to successfully operate on a target network.

More information

Hands-on Password Attacks and Security

Passwords have become the top authentication factor in today’s world. You use it in combination with an email or username to sign into almost any service. Big Corporations like Google, Microsoft, Amazon, and Facebook still widely use passwords as an authentication mechanism today.

More information

Common Cybersecurity Attacks And Defense Strategies

Bad actors are constantly hunting for your personal and proprietary information to use against you for their profit. Attacks are becoming more and more sophisticated, so you must learn to recognize their methods and start defending your cyberspace today.

More information

Black Hat Python: Python for Pentesters

Starting from scratch this course will enable you on all the latest tools and techniques available for Python pen testing. By the end of the course you'll be successfully able to use to Python scripts for penetration testing a variety of system.

More information

Introduction to OOP Programming in Java EE

Learn to build reliable, maintainable, and extensible code in Java EE. This course starts your journey by refreshing your knowledge of basic OOP concepts and how to implement them in real Java code.

More information

Secure Programming With C++

The C++ programming language is widely used, but C++ programs are often insecure. A number of different vulnerabilities can exist in C++ code and make it vulnerable to exploitation.

More information

Press enter to see more results