Eskills Academy logo

Main menu

Includes navigation links and user settings

Eskills Academy logo
  • Browse products
  • Sign up
  • Log in

© 2025 Eskills Academy
  • Terms of Use
  • Privacy Policy

Browse products

Browse products

Product filters:
search

Categories

Product image for Achieving 100% Compliance in Data Security Policies

Achieving 100% Compliance in Data Security Policies

Sharpen your skills in devising effective data security policies and implementation.

Course•By Eskills Academy

Learn more
Product image for Activating Defence-in-Depth Security Model

Activating Defence-in-Depth Security Model

Learn Defense in Depth Strategy online or Data Security Management to make a leading career in the cyber security industry.

Course•By Eskills Academy

Learn more
Product image for Addressing Popular IT Security Myths

Addressing Popular IT Security Myths

Get your hands on to the in-depth knowledge of Cybersecurity myths and case studies that reveal the insights of cyber war.

Course•By Eskills Academy

Learn more
Product image for An Introduction to Machine Learning & NLP in Python

An Introduction to Machine Learning & NLP in Python

An Introduction to Machine Learning & NLP in Python

Course•By Eskills Academy

Learn more
Product image for Analytics, Machine Learning & NLP in Python

Analytics, Machine Learning & NLP in Python

Analytics, Machine Learning & NLP in Python

Course•By Eskills Academy

Learn more
Product image for Cisco CCNA

Cisco CCNA

Learn all the necessary CCNA concepts with hand-on exercises to ace your CCNA exams

Course•By Eskills Academy

Learn more
Product image for Complete Data Science Training with Python for Data Analysis

Complete Data Science Training with Python for Data Analysis

Complete Data Science Training with Python for Data Analysis

Course•By Eskills Academy

Learn more
Product image for Core Fundamentals of CEH - Certified Ethical Hacking

Core Fundamentals of CEH - Certified Ethical Hacking

Master an ethical hacking methodology for complete system security assessment

Course•By Eskills Academy

Learn more
Product image for Cyber Security Practices 2022-23: Threat Modelling & Classifications

Cyber Security Practices 2022-23: Threat Modelling & Classifications

Learn the structured approach to identifying, quantifying, and addressing cyber threats.

Course•By Eskills Academy

Learn more
Product image for Ethical Hacking Practices 2022-23: Complete Guide to Cyber Risk Management

Ethical Hacking Practices 2022-23: Complete Guide to Cyber Risk Management

Master the risk management framework with comprehensive assessment methods.

Course•By Eskills Academy

Learn more
Product image for Ethical Hacking Practices 2022-23: Expert Disaster Recovery Planning

Ethical Hacking Practices 2022-23: Expert Disaster Recovery Planning

Learn insights to latest cyber risks and enhance skills on responding to disasters.

Course•By Eskills Academy

Learn more
Product image for Ethical Hacking Practices 2022-23: IT Surveillance and Computer Forensics

Ethical Hacking Practices 2022-23: IT Surveillance and Computer Forensics

Practical ethical hacking techniques of IT Surveillance and Computer Forensics

Course•By Eskills Academy

Learn more
Product image for Fundamentals of Cryptography

Fundamentals of Cryptography

Acquire basic skills to identify and analyze encryption methods and algorithms.

Course•By Eskills Academy

Learn more
Product image for Fundamentals of Data Security

Fundamentals of Data Security

Learn concepts around cyber security tools and master data security specialization.

Course•By Eskills Academy

Learn more
Product image for IT Security Trends in 2022-23

IT Security Trends in 2022-23

Learn the history and the future trends of cyber security and cyber crimes.

Course•By Eskills Academy

Learn more
Product image for Introduction to Cyber Threats in 2022-23

Introduction to Cyber Threats in 2022-23

Designed to help learners develop a deeper understanding of modern information and system protection technology and methods.

Course•By Eskills Academy

Learn more
Product image for Introduction to DDOS - Denial of Service

Introduction to DDOS - Denial of Service

Learn growing threats and consequences of a DDoS attack and its countermeasures.

Course•By Eskills Academy

Learn more
Product image for Learn Tableau Desktop 9 from Scratch for Data Science

Learn Tableau Desktop 9 from Scratch for Data Science

Learn Tableau Desktop 9 from Scratch for Data Science

Course•By Eskills Academy

Learn more
Product image for Machine Learning and TensorFlow on the Google Cloud

Machine Learning and TensorFlow on the Google Cloud

Machine Learning and TensorFlow on the Google Cloud

Course•By Eskills Academy

Learn more
Product image for OSI Layers Security Threats  Detection for Beginners

OSI Layers Security Threats Detection for Beginners

Successfully identify and resolve risks related to OSI model layers.

Course•By Eskills Academy

Learn more
Product image for Python for Offensive Penetration Testing

Python for Offensive Penetration Testing

Step-by-step instructions and working examples to make you a skilled penetration tester.

Course•By Eskills Academy

Learn more
Product image for Quant Trading Using Machine Learning

Quant Trading Using Machine Learning

Quant Trading Using Machine Learning

Course•By Eskills Academy

Learn more
Product image for Tensorflow Masterclass For Machine Learning and Artificial Intelligence in Python

Tensorflow Masterclass For Machine Learning and Artificial Intelligence in Python

Tensorflow Masterclass For Machine Learning and Artificial Intelligence in Python

Course•By Eskills Academy

Learn more
Product image for Tensorflow and Keras Masterclass For Machine Learning and AI in Python

Tensorflow and Keras Masterclass For Machine Learning and AI in Python

Tensorflow and Keras Masterclass For Machine Learning and AI in Python

Course•By Eskills Academy

Learn more
Product image for WiFi Hacking: Wireless Penetration Testing

WiFi Hacking: Wireless Penetration Testing

Understanding wireless risks and vulnerabilities involved.

Course•By Eskills Academy

Learn more
Product image for Wireless and Mobile Hacking

Wireless and Mobile Hacking

Learn basic principles behind mobile device security and mobile network architecture.

Course•By Eskills Academy

Learn more
26 products found