Skip to main content
Litmos
  • Client Login
  • Client Support
Search
  • Products
        • Best-in-class training across the enterprise

        • Icon Image

          LMS

        • Icon Image

          Training content

        • Icon Image

          Services

        • Icon Image

          Litmos AI

  • Features
        • Icon Image

          AI Assistant

        • Icon Image

          AI/ML Video Assessments

        • Icon Image

          AI Playlists

        • Icon Image

          Content Authoring Tool

        • Icon Image

          External Training

        • Icon Image

          Instructor-Led Training (ILT/vILT)

        • Icon Image

          Integrations

        • Icon Image

          Gamified Learning

        • Icon Image

          Multilingual Learning

        • Icon Image

          Mobile Learning

        • Icon Image

          Reporting & Analytics

  • Solutions
        • Solutions by Use Case

        • Icon Image

          Compliance training

        • Icon Image

          Onboarding

        • Icon Image

          Customer Training

        • Icon Image

          Sales Training

        • Icon Image

          Employee Development

        • Icon Image

          View All Use Cases

        • Solutions by Industry

        • Icon Image

          Financial services

        • Icon Image

          Healthcare

        • Icon Image

          Manufacturing

        • Icon Image

          Technology

        • Icon Image

          Construction

        • Icon Image

          View All Industries

        • Litmos For

        • Icon Image

          Enterprise

        • Icon Image

          Mid-Market

        • Icon Image

          Small business

        • Icon Image

          View All

  • Customers
        • Customer experience

        • Icon Image

          Customer stories

        • Icon Image

          Reviews

        • Icon Image

          Lenny Awards

        • For our customers

        • Icon Image

          Customer hub

        • Icon Image

          Support

  • Pricing
  • Resources
        • Learning hub

        • Icon Image

          Blog

        • Icon Image

          Resource library

        • Icon Image

          Webinars & events

        • Essential guides

        • Icon Image

          LMS 101

        • Icon Image

          eLearning blueprint

        • Icon Image

          AI learning

  • About
        • We empower learning

        • Icon Image

          About Litmos

        • Icon Image

          Newsroom

        • Icon Image

          Careers

        • Icon Image

          Awards

        • Icon Image

          Find a partner

        • Icon Image

          Become a partner

Free trial

TRAINING COURSE CATALOG

An ever-growing library of relevant training courses

Award-winning training content collections for your employees, customers, and partners across the globe. Our collections include thousands of courses professionally created for a more productive workplace.

Re-skill, upskill, or fill worker skill gaps and minimize risk with compliance training. Support retention and career mobility and best of all, create a positive culture.

Talk to an expert

Filters

Sort

Products

Use Cases

Competencies

Languages

Regions

Duration

CEH v12: Nmap IDLE IPID, UDP, and SCTP Scans

Staying off of the radar of your target's security team is a common goal for many ethical hackers when performing security assessments.
Languages Icon English (US)
Duration Icon 50 Minutes

CEH v12: Nmap TCP Scans

When scanning a target with nmap for open ports and/or services, there are several common types of scans. In this course, you'll explore TCP Connect scans, how to issue a TCP Connect scan with nmap, and pros and cons of using this type of scan.
Languages Icon English (US)
Duration Icon 82 Minutes

CEH v12: NTP, NFS, SMTP, and FTP Enumeration

Having the correct time helps to ensure systems operate properly, especially if you have configured things like time-based access. In this course, you'll explore the Network Time Protocol (NTP), including attributes and enumeration tools.
Languages Icon English (US)
Duration Icon 54 Minutes

CEH v12: Operational Technology Concepts, Attack Tools, and Countermeasures

To be effective at both defending and attacking operational technology (OT) systems, you must first be aware of the basic components and concepts that OT systems are made of.
Languages Icon English (US)
Duration Icon 53 Minutes

CEH v12: Passwords Attacks, Extraction, and Cracking

Passwords are a part of many of today's authentication systems and are therefore prone to attack. In this course, you'll investigate common attack methods and tools used to defeat passwords.
Languages Icon English (US)
Duration Icon 59 Minutes

CEH v12: PKI, Cryptanalysis, and Attack Countermeasures

In today's day and age, data must be encrypted for secure communication with third parties. But how is this accomplished? In this course, you'll examine public key infrastructure (PKI) as an encryption solution.
Languages Icon English (US)
Duration Icon 51 Minutes

CEH v12: Recon Tools and Tactics

Having knowledge of a target's physical location can be useful for social engineering and physical security assessments. In this course, you'll explore tools and tactics used to learn a target's geographical location.
Languages Icon English (US)
Duration Icon 66 Minutes

CEH v12: Risk Management, Cyber Threat Intelligence, and Threat Modeling

At the end of the day, cybersecurity is all about understanding risk. In this course, you'll learn about how risk pertains to cybersecurity, risk levels, and how to use a risk matrix to visualize risk.
Languages Icon English (US)
Duration Icon 53 Minutes

CEH v12: Scan Optimization, OS Identification, and IDS/Firewall Evasion

Running nmap scans can sometimes take a lot of time. In this course, you'll explore a few options and techniques for decreasing the amount of time you wait for nmap to complete its scans.
Languages Icon English (US)
Duration Icon 55 Minutes

CEH v12: SQL Injection and SQLMap

SQL injection (SQLi) is typically used to access sensitive information from a target's database, but under the right circumstances, it can be used to access the remote file system or even allow for remote system shell access.
Languages Icon English (US)
Duration Icon 46 Minutes

CEH v12: Footprinting, Google Dorks, Search Engines, and Subdomains

Knowledge is power and in the ethical hacking game, the more you know about your target, the more likely you are to find a weakness in their security.
Languages Icon English (US)
Duration Icon 82 Minutes

CEH v12: Hacking Methodology, MITRE ATT&CK Framework, and Diamond Model

Being an ethical hacker means, in some ways, that you'll need to assume the identity of a unscrupulous hacker. In this course, you'll learn what it means to be a hacker, the common hacker classes, and the five phases of hacking.
Languages Icon English (US)
Duration Icon 65 Minutes

CEH v12: Hijacking Concepts and Countermeasures

Sessions are like a verified conversation between trusted systems, which makes session hijacking a common form of attack. In this course, you'll learn about session hijacking, including how it's accomplished and the different types.
Languages Icon English (US)
Duration Icon 82 Minutes

CEH v12: IDOR Attacks, File Inclusion Attacks, Web APIs, and Webhooks

Direct Object Reference and Local and Remote File Inclusion attacks can prove very harmful to web applications. In this course, you'll examine how these attacks work and how to recognize them.
Languages Icon English (US)
Duration Icon 52 Minutes

CEH v12: Intrusion Detection and Prevention, Firewalls, and Honeypots

Intrusion detection and prevention systems are security controls that provide alerts and protection for many organizations today.
Languages Icon English (US)
Duration Icon 71 Minutes

CEH v12: IoT Threats, Vulnerabilities, Attack Tools, and Countermeasures

Internet of Things (IoT) devices make our lives convenient and that makes them more prevalent every day.
Languages Icon English (US)
Duration Icon 60 Minutes

CEH v12: Malware, Threats, Trojans, and Viruses

Malware is a common threat used to attack, compromise, and even destroy computer systems. In this course, you'll learn about common malware types and components so you can properly defend against malicious software.
Languages Icon English (US)
Duration Icon 83 Minutes

CEH v12: Mobile Hacking, OS Security, and Device Management

Mobile devices are one of the core components of today's network environments, so it's vital to know how and where they are possibly vulnerable.
Languages Icon English (US)
Duration Icon 90 Minutes

CEH v12: NetBIOS, SMB, SNMP, and LDAP Enumeration

To be a successful ethical hacker, you need to be good at gathering information. In this course, you'll explore the concept of enumeration, including what it is, how it's done, and the importance of the details gathered during this process.
Languages Icon English (US)
Duration Icon 59 Minutes

CEH v12: Network Scanning, TCP, Host Discovery, and Port/Service Scanning

An ethical hacker can be most effective when employing the right tools for the job. In this course, you'll learn about networking scanning types and the various flags used in TCP communication.
Languages Icon English (US)
Duration Icon 81 Minutes

CEH v12: AD Enumeration, Mimikatz, and Pivoting Techniques

Enumerating the Active Directory (AD) during a pentest is important to identify vulnerabilities and attack vectors that may be used to gain unauthorized access to the network.
Languages Icon English (US)
Duration Icon 74 Minutes

CEH v12: App Layer Attacks, Botnets, and DoS Countermeasures

The application layer is another prime target for denial-of-service (DoS) attacks. In this course, you'll explore common application layer DoS attacks like SlowLoris, the Reddit Hug of Death, and UDP app-layer attacks.
Languages Icon English (US)
Duration Icon 58 Minutes

CEH v12: Buffer Overflows, Privilege Escalation, and System Access

Buffer overflows can be one of the more mysterious and difficult techniques to understand and employ, but when successful they can be highly useful when gaining access to target systems.
Languages Icon English (US)
Duration Icon 90 Minutes

CEH v12: Cloud Computing, Containers, Hacking, and Security Controls

Many of today's systems are becoming cloud-based at a rapid pace. In this course, you'll explore different cloud services, deployment models, responsibility areas, and architectures relevant to your CEH exam.
Languages Icon English (US)
Duration Icon 89 Minutes
  • 1
  • …
  • 186
  • 187
  • 188
  • …
  • 670

Start Your Free Trial Today

Start your 14-day free trial with absolutely zero risk or obligation to purchase. Test drive our Premier LMS and see for yourself how our learning solution can improve your learning program outcomes! We have flexible purchase options, including an option to buy directly through the trial!

Free Trial
Litmos Free Trial

Request more information

To learn how Litmos can meet your needs, fill out the form below.

Content Request Courses

"*" indicates required fields

Consent*
Litmos US, L.P. will use any of the data provided hereunder in accordance with the Privacy Policy.
This field is hidden when viewing the form
This field is hidden when viewing the form
This field is for validation purposes and should be left unchanged.
Litmos
Contact sales
Solutions by Use Case
  • Company
  • Newsroom
  • Awards
  • Customers
  • Careers
  • Customer portal
  • Partner portal
Products
  • Products
  • LMS
  • Courses
  • Services
  • Enterprise
  • Mid-Market
  • Small business
Features
  • Features
  • AI solutions
  • Content authoring tool
  • External training
  • Gamification
  • Multilingual learning
Solutions
  • Solutions
  • Employee development
  • Customer training
  • Sales enablement
  • Compliance training
  • Onboarding training
Resources
  • Resources
  • Blog
  • LMS 101
  • eLearning
  • AI learning
  • Webinars
© 2026 Litmos US, L.P. and affiliates. All rights reserved.
  • Privacy Statement
  • Terms & Conditions
  • AI Principles
  • Website Terms
  • Modern Slavery Statement
  • Accessibility Statement
x-logo x-logo Linkedin-logo Facebook Instagram
Register for early access to Litmos Features

Release Notes feedback

"*" indicates required fields

Please provide your email and indicate which domain(s) you'd like the new features enabled.