Improve your experience. We are very sorry but this website does not support Internet Explorer. We recommend using a different browser that is supported such as Google Chrome or Mozilla Firefox.

header image

NGN Learning

Start learning today! Anytime, anywhere.

Complete online at your own pace

Clear filters

Introduction to Cybersecurity

By the end of this course, you will have a solid understanding of a wide variety of cybersecurity-related areas for home and work. This course is designed to give you the knowledge and skills to identify, mitigate, and prevent cybersecurity-related issues. The course is highly practical and designed to follow along at home.

More information

Getting Started with Kali Linux Penetration Testing

This course will start from scratch and will provide you with essential knowledge of the most happening and widely used tools available in Kali Linux by performing real-world practicals. You will learn information gathering and scanning, perform vulnerability analysis, and learn database attacks and password attacks

More information

Identity And Access Management

This comprehensive course covers the key areas of IAM, with including fundamental concepts, but also the technologies and the different approaches to implementing effective IAM across the enterprise, web services and government.

More information

Securing Your Network From Attacks

Attacks on enterprise networks and home networks are a growing problem with daily targeted attacks that can result in crippling results. These attacks have become more aggressive, sophisticated, and more dangerous over the years.

More information

Metasploit Like a Pro

Metasploit is the most common command and control (C2) framework used by penetration testers and red team operators around the globe. It is a framework that is a “must-know” and will give you the confidence to successfully operate on a target network.

More information

Hands-on Password Attacks and Security

Passwords have become the top authentication factor in today’s world. You use it in combination with an email or username to sign into almost any service. Big Corporations like Google, Microsoft, Amazon, and Facebook still widely use passwords as an authentication mechanism today.

More information

Common Cybersecurity Attacks And Defense Strategies

Bad actors are constantly hunting for your personal and proprietary information to use against you for their profit. Attacks are becoming more and more sophisticated, so you must learn to recognize their methods and start defending your cyberspace today.

More information

Black Hat Python: Python for Pentesters

Starting from scratch this course will enable you on all the latest tools and techniques available for Python pen testing. By the end of the course you'll be successfully able to use to Python scripts for penetration testing a variety of system.

More information

Introduction to OOP Programming in Java EE

Learn to build reliable, maintainable, and extensible code in Java EE. This course starts your journey by refreshing your knowledge of basic OOP concepts and how to implement them in real Java code.

More information

Secure Programming With C++

The C++ programming language is widely used, but C++ programs are often insecure. A number of different vulnerabilities can exist in C++ code and make it vulnerable to exploitation.

More information

The Complete Guide on SQL Injection

Injection attacks have been #1 on the Open Web Application Security Project (OWASP) Top Ten list for years. Even in 2020, SQL injection (SQLi) attacks are still finding their way into production applications and allow an attacker to wreak havoc.

More information

Deep Dive into the World of Malware

This course aims to look at modern malware families and techniques, as well as how they are being used in the “real world". By the end of this course, you will learn some basic activities that you can do at home to help reduce your risk.

More information

OWASP Top 10 Security Fundamentals

To become a better professional, you should have a great understanding of the most critical web application security risks. This is mandatory for IT students, job seekers, software developers, testers, and application managers.

More information

Hands-On Android Security

This course focuses on the practical aspect of penetration testing. The course will begin with teaching you the core concepts of Android OS, hardware security components, and native applications. Further, you'll learn to analyze existing android apps, understand vulnerabilities, and test your work to fully secure your android environment.

More information

Cybercrime And You Staying Safe in a Hyper-Connected World

In our hyper-connected world, where instant communication between people, data and machines occurs over global, open networks, cybercrime has become an inescapable part of our daily lives.

More information

Mastering Web and Infrastructure Reconnaissance

When you perform a penetration test, finding one target is easy. Detecting them all plus identifying the supporting infrastructure and other services is hard and needs a more structured approach. And you need the experience to analyze and understand what your tools and techniques are telling you so that you can pivot around on the information to detect even more.

More information

Introduction to Cloud Computing

You will learn about the evolution of cloud, cloud models, data distribution in cloud data centres etc.

More information

Open Source Intelligence

You will understand what Open Source Intelligence is and how you can use it to your advantage and protection in a virtual Linux environment. Also, you will learn about exciting tools like theHarvester, Spiderfoot, where to find breach information, what is the structure of the Internet and many more. More than often, all that will give you a scare of how much information is exposed on the Internet.

More information

CompTIA Security+ Exam Prep

The CompTIA Security+ Exam Prep will be targeted towards both new learners and even professionals. One of the major issues within the cybersecurity realm is that IT professionals are not able to identify both internal and external threats that are affecting their organization.

More information

Windows Penetration Testing Essentials

Penetration testing is becoming one of the most important roles in information security with the increased need and importance for companies and organizations to secure their digital infrastructure. Windows plays an integral role in the digital infrastructure of a company, as a result, it is one of the most targeted operating systems by attackers. This has led to an increased demand for skilled penetration testers experienced in testing and exploiting the Windows operating system.

More information

Press enter to see more results