| Product | Content | Hours | Days |
| Microsoft | Windows 10 Eğitimi | 12 | 2 |
| Microsoft | MCSA: Microsoft Windows Server 2016 | 18 | 3 |
| Microsoft | MCSA: Cloud Platform | 30 | 5 |
| Microsoft | MCSA: Linux on Azure | 30 | 5 |
| Microsoft | MCSA: Windows Server 2012 | 30 | 5 |
| Product | Content | Hours | Days |
| Microsoft | Server Virtualization with Windows Server Hyper-V and System Center | 30 | 5 |
| Microsoft | Configuring and Administering Hyper-V in Windows Server 2012 | 30 | 5 |
| Vmware | VMware vRealize Automation: Install, Configure, Manage [V6.2] | 30 | 5 |
| Vmware | VMware vCenter Site Recovery Manager: Install, Configure, Manage [V5.5] | 30 | 5 |
| Product | Content | Hours | Days |
| Cisco | Interconnecting Cisco Networking Devices 1 - 2 | 60 | 10 |
| Cisco | Cisco IP Switched Networks | 18 | 3 |
| Microsoft | HP E-Series Networking Technologies | 30 | 5 |
| Product | Content | Hours | Days |
| EC-Council | EC-Council Certified Ethical Hacker (CEH) | 30 | 5 |
| Check Point | Penetration Testing Training | 18 | 3 |
| PfSense | Cyber Incident Response Team (CIRT) Training | 30 | 5 |
| Product | Content | Hours | Days |
| SANS | Malware Analysis | 30 | 5 |
| SANS | Intro to Information Security | 30 | 5 |
| SANS | Information Security Bootcamp | 30 | 5 |
| SANS | Critical Security Controls: Planning, Application and Assessment | 30 | 5 |
| SANS | Advanced Security Foundations | 30 | 5 |
| SANS | In-Depth Penetration Assessment | 30 | 5 |
| SANS | Incident Management for Hacker Technique and Technologies | 30 | 5 |
| SANS | Linux UNIX Security | 30 | 5 |
| SANS | Constant Surveillence and Security Solutions | 18 | 3 |
| SANS | Cloud Security Bascis | 18 | 3 |
| SANS | Penetration Testing for Web Applications | 18 | 3 |
| SANS | Active Defense, Offensive Precautions and Cyber Deceit | 30 | 5 |
| SANS | Penetration Testing and Ethical Hacking | 30 | 5 |
| SANS | Believable and Applied Penetration Techniques | 30 | 5 |
| SANS | SCADA Systems | 18 | 3 |
| SANS | Social Engineering for Penetration Testing | 18 | 3 |
| SANS | Ethical Hacking for Mobile Security | 18 | 3 |
| SANS | Virtualization and Private Cloud Security | 18 | 3 |
| Content | Hours | Days |
| Windows Forensics | 30 | 5 |
| Advanced Digital Forensics, Incident Response and Threat Hunting | 18 | 3 |
| In Depth Week Memory Analysis | 18 | 3 |
| Advanced Network Analysis | 18 | 3 |
| Cyber Threat Intelligence | 18 | 3 |
| Advanced Smart Phone Analysis | 18 | 3 |
| Content | Hours | Days |
| ICS/SCADA Security Basics | 18 | 3 |
| NERC Critical Infrastructure Protection Basics | 18 | 3 |
| ICS Active Defense and Incident Response | 18 | 3 |
| Content |
| Hacker Protection: Thread Update |
| Consonance Training and Employee Safety |
| Security Awareness for Electricity Organizations |
| Critical Security Controls: Health Systems Administration for HIMSS |
| Intro to Malware Analysis: Applied and Technical Training |
| Active Defense and Incident Response Techniques |