Skip to main content
Litmos
  • Client Login
  • Client Support
Search
  • Products
        • Best-in-class training across the enterprise

        • Icon Image

          LMS

        • Icon Image

          Training content

        • Icon Image

          Services

        • Icon Image

          Litmos AI

  • Features
        • Icon Image

          AI Assistant

        • Icon Image

          AI/ML Video Assessments

        • Icon Image

          AI Playlists

        • Icon Image

          Content Authoring Tool

        • Icon Image

          External Training

        • Icon Image

          Instructor-Led Training (ILT/vILT)

        • Icon Image

          Integrations

        • Icon Image

          Gamified Learning

        • Icon Image

          Multilingual Learning

        • Icon Image

          Mobile Learning

        • Icon Image

          Reporting & Analytics

  • Solutions
        • Solutions by Use Case

        • Icon Image

          Compliance training

        • Icon Image

          Onboarding

        • Icon Image

          Customer Training

        • Icon Image

          Sales Training

        • Icon Image

          Employee Development

        • Icon Image

          View All Use Cases

        • Solutions by Industry

        • Icon Image

          Financial services

        • Icon Image

          Healthcare

        • Icon Image

          Manufacturing

        • Icon Image

          Technology

        • Icon Image

          Construction

        • Icon Image

          View All Industries

        • Litmos For

        • Icon Image

          Enterprise

        • Icon Image

          Mid-Market

        • Icon Image

          Small business

        • Icon Image

          View All

  • Customers
        • Customer experience

        • Icon Image

          Customer stories

        • Icon Image

          Reviews

        • Icon Image

          Lenny Awards

        • For our customers

        • Icon Image

          Customer hub

        • Icon Image

          Support

  • Pricing
  • Resources
        • Learning hub

        • Icon Image

          Blog

        • Icon Image

          Resource library

        • Icon Image

          Webinars & events

        • Essential guides

        • Icon Image

          LMS 101

        • Icon Image

          eLearning blueprint

        • Icon Image

          AI learning

  • About
        • We empower learning

        • Icon Image

          About Litmos

        • Icon Image

          Newsroom

        • Icon Image

          Careers

        • Icon Image

          Awards

        • Icon Image

          Find a partner

        • Icon Image

          Become a partner

Free trial

TRAINING COURSE CATALOG

An ever-growing library of relevant training courses

Award-winning training content collections for your employees, customers, and partners across the globe. Our collections include thousands of courses professionally created for a more productive workplace.

Re-skill, upskill, or fill worker skill gaps and minimize risk with compliance training. Support retention and career mobility and best of all, create a positive culture.

Talk to an expert

Filters

Sort

Products

Use Cases

Competencies

Languages

Regions

Duration

CISSP 2024: Risk Management Concepts

Security risk management involves the continual process of identifying security risks and implementing strategy and tactics to mitigate them.
Languages Icon English (US)
Duration Icon 45 Minutes

CISSP 2024: Secure Design Principles & Models

This course prepares learners for the CISSP exam by covering Domain 3 objectives related to security design principles and practices.
Languages Icon English (US)
Duration Icon 40 Minutes

CISSP 2024: Secure Design Principles in Network Architectures (Part 1)

In the digital era, understanding network protocols and their impact on performance is crucial for IT professionals tasked with maintaining robust and efficient communication systems.
Languages Icon English (US)
Duration Icon 47 Minutes

CISSP 2024: Secure Design Principles in Network Architectures (Part 2)

In today's increasingly complex threat landscape, securing physical sites and facilities is paramount for safeguarding assets, data, and personnel.
Languages Icon English (US)
Duration Icon 47 Minutes

ChatGPT Prompt Engineering Examples & Use Cases

This course explores practical prompt engineering within generative AI, focusing on designing effective input prompts for natural language processing applications such as ChatGPT.
Languages Icon English (US)
Duration Icon 65 Minutes

CISM 2022: Security Standards

This course examines global and local security standards, laws, and regulations that guide enterprise security controls.
Languages Icon English (US)
Duration Icon 53 Minutes

CISM 2022: Social Engineering & Malware

Modern day IT device users must have an awareness of the deception by malicious actors through their devices.
Languages Icon English (US)
Duration Icon 42 Minutes

CISSP 2024: Assessing Software Security & Coding Guidelines

It is one thing to implement application security controls, managed services, and cloud services; it is another thing to assess the ongoing success and failure of those initiatives.
Languages Icon English (US)
Duration Icon 27 Minutes

CISSP 2024: Asset Classification, Handling, & Provisioning

It is an established principle that before risk can be assessed and analyzed, an organization must know what physical and software resources they have.
Languages Icon English (US)
Duration Icon 23 Minutes

CISSP 2024: Authorization Mechanisms & Identity Management

This course explores the implementation and management of authorization mechanisms and the identity and access provisioning lifecycle.
Languages Icon English (US)
Duration Icon 35 Minutes

CISSP 2024: Business Continuity Planning & Exercises

Business continuity planning is a systematic and comprehensive strategy and set of tactics for ensuring that an organization can prevent or quickly recover from a significant disruption to its operations at a pre-determined acceptable level.
Languages Icon English (US)
Duration Icon 35 Minutes

CISSP 2024: Collecting & Analyzing Security Process Data

Collecting and analyzing security process data is a key aspect of maintaining and improving the overall security of a business or organization, and there is a vast array of sources and metrics that must be considered.
Languages Icon English (US)
Duration Icon 22 Minutes

CISSP 2024: Controlling Asset Access, Device Identification, and Authentication

Traditionally, access control has been described as AAA services. Authentication, authorization, and accounting (AAA) is a security framework that controls access to computer resources, enforces policies, and audits usage.
Languages Icon English (US)
Duration Icon 45 Minutes

CISSP 2024: Cryptographic Solutions & Cryptanalytic Attacks

Cryptology is the science of securing all communications. Cryptography generates messages with hidden meaning whereas cryptanalysis is the science of breaking those encrypted messages to recover their meaning.
Languages Icon English (US)
Duration Icon 48 Minutes

CEH v12: SQL Injection Concepts and Attacks

Many web applications store data in a back-end database and the data is then retrieved as the end user requests it from the front end.
Languages Icon English (US)
Duration Icon 69 Minutes

CEH v12: Steganography and Avoiding Detection

Exfiltration of sensitive data is a common goal of many hacks. In this course, you'll explore how hackers are able to avoid detection when exfiltrating data by using steganography techniques and tools.
Languages Icon English (US)
Duration Icon 46 Minutes

CEH v12: Vulnerability Assessment Types, Models, Tools, and Reports

Performing a vulnerability assessment allows you to locate potential weaknesses in systems, networks, and channels of communication. This is a vital step in defending systems against attacks.
Languages Icon English (US)
Duration Icon 66 Minutes

CEH v12: Vulnerability Assessment, Management, and Classification

One of the main job duties of many ethical hackers is performing vulnerability assessments. In this course, you'll explore the basic concepts of vulnerability assessments, as well as tools and resources commonly used when performing one.
Languages Icon English (US)
Duration Icon 68 Minutes

CEH v12: Web App Hacking Methodology, CSRF Attacks, and Input Filter Evasion

Common attack vectors such as cross-site scripting are becoming more difficult to exploit due to the implementation of defenses. The key to success when security testing a web application is making sure you have an effective plan.
Languages Icon English (US)
Duration Icon 68 Minutes

CEH v12: Web Application Attacks and Vulnerabilities

Web applications are typically the face of most organizations today. It's how customers interact with an organization's services, which makes for an inviting target for attackers.
Languages Icon English (US)
Duration Icon 68 Minutes

CEH v12: Web Server Hacking, Attacks, and Attack Methodologies

Having a web presence is almost a necessity in today's business age, but web applications can be very complicated and difficult to build securely. This includes the web server that runs the app.
Languages Icon English (US)
Duration Icon 67 Minutes

CEH v12: Windows Authentication

When it comes to ethical hacking, repeatable successful tactics and processes, as well as secure authentication, are the name of the game. In this course, you'll learn about Windows authentication methods and the process behind them.
Languages Icon English (US)
Duration Icon 24 Minutes

CEH v12: Wireless Concepts, Threats, and Hacking Tools

Wireless technologies abound in today's networks, making them a prime target for attack. In this course, you'll explore the features of Wi-Fi, common standards, authentication types, antennas, and encryption schemes.
Languages Icon English (US)
Duration Icon 66 Minutes

CEH v12: Wireless Hacking and Countermeasures

There are a few common attack vectors when targeting Wi-Fi networks that you should be aware of.
Languages Icon English (US)
Duration Icon 49 Minutes
  • 1
  • …
  • 185
  • 186
  • 187
  • …
  • 670

Start Your Free Trial Today

Start your 14-day free trial with absolutely zero risk or obligation to purchase. Test drive our Premier LMS and see for yourself how our learning solution can improve your learning program outcomes! We have flexible purchase options, including an option to buy directly through the trial!

Free Trial
Litmos Free Trial

Request more information

To learn how Litmos can meet your needs, fill out the form below.

Content Request Courses

"*" indicates required fields

Consent*
Litmos US, L.P. will use any of the data provided hereunder in accordance with the Privacy Policy.
This field is hidden when viewing the form
This field is hidden when viewing the form
This field is for validation purposes and should be left unchanged.
Litmos
Contact sales
Solutions by Use Case
  • Company
  • Newsroom
  • Awards
  • Customers
  • Careers
  • Customer portal
  • Partner portal
Products
  • Products
  • LMS
  • Courses
  • Services
  • Enterprise
  • Mid-Market
  • Small business
Features
  • Features
  • AI solutions
  • Content authoring tool
  • External training
  • Gamification
  • Multilingual learning
Solutions
  • Solutions
  • Employee development
  • Customer training
  • Sales enablement
  • Compliance training
  • Onboarding training
Resources
  • Resources
  • Blog
  • LMS 101
  • eLearning
  • AI learning
  • Webinars
© 2026 Litmos US, L.P. and affiliates. All rights reserved.
  • Privacy Statement
  • Terms & Conditions
  • AI Principles
  • Website Terms
  • Modern Slavery Statement
  • Accessibility Statement
x-logo x-logo Linkedin-logo Facebook Instagram
Register for early access to Litmos Features

Release Notes feedback

"*" indicates required fields

Please provide your email and indicate which domain(s) you'd like the new features enabled.