{"data":{"menu":[{"id":"b7c92f95-468a-432f-b91d-88eade3531b0","name":"Information Security","sort":1,"sub_categories":[{"id":"fa04b4cc-cf5f-4aef-838a-1310203822bb","name":"Cybersecurity","parent_category":"b7c92f95-468a-432f-b91d-88eade3531b0","sort":1,"courses":[{"id":"02ed8323-8dc3-4c82-82ed-dde07c7ac935","name":"CISSP Certification Domains 5, 6, 7, and 8 Video Training","course_type":1,"url":"https:\/\/learn.eccouncil.org\/course\/02ed8323-8dc3-4c82-82ed-dde07c7ac935","slug_url":"cissp-certification-domains-5-6-7-and-8-video-training","price":"69.99","discount_price":""},{"id":"02f18ef7-31c0-405c-9671-212c4576a7bb","name":"Curso Completo de Hacking \u00c9tico y Pentest con Metasploit - Spanish","course_type":1,"url":"https:\/\/learn.eccouncil.org\/course\/02f18ef7-31c0-405c-9671-212c4576a7bb","slug_url":"Curso-Completo-De-Hacking-etico-Y-Pentest-Con-Metasploit","price":"99.99","discount_price":""},{"id":"02f1fe19-e703-417b-82a1-c80094ca3b39","name":"Cybersecurity Strategies for Banks and NBFCs","course_type":1,"url":"https:\/\/learn.eccouncil.org\/course\/02f1fe19-e703-417b-82a1-c80094ca3b39","slug_url":"cybersecurity-strategies-for-banks-and-nbfcs","price":"99.99","discount_price":""},{"id":"03bff5a7-4bf2-4326-a16a-2da3caf9d009","name":"Cybersecurity for Blockchain from Ground Up","course_type":1,"url":"https:\/\/learn.eccouncil.org\/course\/03bff5a7-4bf2-4326-a16a-2da3caf9d009","slug_url":"cybersecurity-for-blockchain-from-ground-up","price":"69.99","discount_price":""},{"id":"03e47f40-00ea-4329-8be4-7d7db3950c60","name":"Certified Secure Software Lifecycle Professional Cert Prep","course_type":1,"url":"https:\/\/learn.eccouncil.org\/course\/03e47f40-00ea-4329-8be4-7d7db3950c60","slug_url":"certified-secure-software-lifecycle-professional-cert-prep","price":"69.99","discount_price":""},{"id":"04c7ad98-b351-40ce-9ad4-94da14ce04a9","name":"Linux Forensics","course_type":1,"url":"https:\/\/learn.eccouncil.org\/course\/04c7ad98-b351-40ce-9ad4-94da14ce04a9","slug_url":"linux-forensics","price":"59.99","discount_price":""},{"id":"0a2a4a01-230b-4e05-8872-bcd5c7564bb7","name":"Preparation Secrets for Successful Job Interview","course_type":1,"url":"https:\/\/learn.eccouncil.org\/course\/0a2a4a01-230b-4e05-8872-bcd5c7564bb7","slug_url":"preparation-secrets-for-successful-job-interview","price":"49.99","discount_price":""}],"paths":[{"id":"03b7d6cd-5bff-4d97-abc6-b72f36ca202c","name":"Mastering Digital Forensics","slug_url":"mastering-digital-forensics-learning-path"},{"id":"0802bb77-45e9-4ea4-82cf-d3a8d361a1d3","name":"Cybersecurity Unleashed for Banks","slug_url":"cybersecurity-unleashed-for-banks"},{"id":"22c602a3-f1d6-480f-83e9-d482a3bb34f6","name":"Web Security for Cybersecurity Engineers","slug_url":"web-security-for-cybersecurity-engineers"},{"id":"233121fa-c6d2-4c9e-9d27-73e961cf65f0","name":"Defending Against Cyber Bullying","slug_url":"defending-against-cyber-bullying-learning-path"},{"id":"3329a0db-675a-4981-a0d6-11d7451686e3","name":"Industrial Cybersecurity: Healthcare","slug_url":"Industrial-Cybersecurity-Healthcare"},{"id":"484e4db7-af7f-41f5-bc0a-9e92657e7a30","name":"Becoming a Secure Cyber Professional","slug_url":"becoming-a-cyber-professional"},{"id":"4af0b098-0459-4839-9ee0-a1881d08749b","name":"Mastering Threat Intelligence","slug_url":"mastering-threat-intelligence-skill-path"},{"id":"571156fe-6fa4-4948-87ae-8ce3b6c70313","name":"Becoming an Information Security Specialist","slug_url":"Becoming-an-Information-Security-Specialist"},{"id":"98fb8ba3-ebb9-414b-8b14-82656107b6ed","name":"Integrating Industrial Cybersecurity into Power Sector","slug_url":"Integrating-Industrial-Cybersecurity-into-Power-Sector-main"},{"id":"a4dd8004-c58a-4d25-b8ae-47a5c0483c33","name":"Practical Cyber Incident Response & Forensics","slug_url":"practical-cyber-incident-response-and-forensics"},{"id":"e32784f2-b940-47dc-8d61-6f5ea5791d61","name":"Cybersecurity Fundamentals for Beginners","slug_url":"cybersecurity-fundamentals-for-beginners-learning-path"},{"id":"e5ae86b5-0006-4777-8cef-d73d6ee5bac7","name":"Cybersecurity Project Manager","slug_url":"Cybersecurity-Project-Manager"},{"id":"f20fb354-4862-4aee-8c78-b8cd6b319c93","name":"Integrating Cybersecurity into Supply Chain Management","slug_url":"Integrating-Cybersecurity-into-Supply-Chain-Management"},{"id":"fc49804d-8ed1-4b15-bdb5-65ff5309144e","name":"Master Open Source Intelligence","slug_url":"master-open-source-intelligence"}]},{"id":"ff932fce-fbdf-46ac-8b38-79c8f5ed7c69","name":"Vulnerability Assessment and Pentesting","parent_category":"b7c92f95-468a-432f-b91d-88eade3531b0","sort":2,"courses":[{"id":"026b517b-57bf-4504-9a84-1e7d476c42cd","name":"SOC Lab: Threat Hunting com Wazuh + Grafana - Portuguese","course_type":1,"url":"https:\/\/learn.eccouncil.org\/course\/026b517b-57bf-4504-9a84-1e7d476c42cd","slug_url":"soc-lab-threat-hunting-com-wazuh-grafana","price":"99.99","discount_price":""},{"id":"039b873e-2284-4e6b-a0ff-c1916c13b209","name":"Learn Ethical Hacking by Hacking Real Websites Legally","course_type":1,"url":"https:\/\/learn.eccouncil.org\/course\/039b873e-2284-4e6b-a0ff-c1916c13b209","slug_url":"learn-ethical-hacking-by-hacking-real-websites-legally","price":"69.99","discount_price":""},{"id":"03e77eca-cb51-44e3-8d66-a15663c5cf8d","name":"Log4j: The Big Picture","course_type":1,"url":"https:\/\/learn.eccouncil.org\/course\/03e77eca-cb51-44e3-8d66-a15663c5cf8d","slug_url":"log4j-the-big-picture","price":"59.99","discount_price":""},{"id":"03f87921-4023-4745-9347-a3f36d8d9f36","name":"Hands-on Penetration Testing with Netcat","course_type":1,"url":"https:\/\/learn.eccouncil.org\/course\/03f87921-4023-4745-9347-a3f36d8d9f36","slug_url":"hands-on-penetration-testing-with-netcat","price":"59.99","discount_price":""},{"id":"0490f9b4-388f-43b1-ab56-98a02f6ed706","name":"Kali for Penetration Testers","course_type":1,"url":"https:\/\/learn.eccouncil.org\/course\/0490f9b4-388f-43b1-ab56-98a02f6ed706","slug_url":"Kali-for-Penetration-Testers","price":"69.99","discount_price":""},{"id":"0491d9cb-54e0-48aa-929f-c653eba39f82","name":"\u0645\u0633\u062a\u0648\u0649 \u0623\u0633\u0627\u0633\u064a \u0645\u0639 USB Rubber Ducky \u0627\u0644\u0622\u0646 \u0628\u0623\u0642\u0644 \u0645\u0646 10 - Arabic","course_type":1,"url":"https:\/\/learn.eccouncil.org\/course\/0491d9cb-54e0-48aa-929f-c653eba39f82","slug_url":"foundation-level-with-usb-rubber-ducky-now-with-less-than-10","price":"99.99","discount_price":""},{"id":"07604457-f8c5-492d-a40b-d6a259969be7","name":"Passive Reconnaissance","course_type":1,"url":"https:\/\/learn.eccouncil.org\/course\/07604457-f8c5-492d-a40b-d6a259969be7","slug_url":"passive-reconnaissance","price":"59.99","discount_price":""}],"paths":[{"id":"066b41de-c0aa-4648-a2ea-995cac38afcb","name":"Conducting Reconnaissance for Cybersecurity","slug_url":"conducting-reconnaissance-for-cybersecurity-learning-path"},{"id":"0e53452d-5f8a-44b0-8afe-be9ae330ab82","name":"CVEs Detection and Mitigation","slug_url":"cves-detection-and-mitigation"},{"id":"2a3aac92-0969-4b09-b398-d021c006272a","name":"Programming for Ethical Hackers","slug_url":"Programming-for-Ethical-Hackers"},{"id":"2cfe9b7e-26c2-4e1d-bd0e-06d6aaf9f8cb","name":"Mastering Exploitation Analysis","slug_url":"mastering-exploitation-analysis"},{"id":"4d647990-aca2-4fd9-803c-4992188351a4","name":"Mastering Top Pentesting Tools - Beginner","slug_url":"Mastering-Top-Pentesting Tools-Beginner"},{"id":"5c73f84e-2bef-4736-ad34-97e13020f187","name":"Mastering OWASP Fundamentals","slug_url":"mastering-owasp-fundamentals"},{"id":"7ab4c17a-0ece-4d43-8243-74fb3f06eb97","name":"Bug Bounty Hunting Essentials","slug_url":"bug-bounty-hunting-essentials"},{"id":"7dad385f-bf19-4369-bc89-7fb7f37ac48d","name":"Capture the Flag","slug_url":"capture-the-flag"},{"id":"af14de41-e7fc-4bca-a392-7a4660c5e8f1","name":"Endpoint Security Professional","slug_url":"Endpoint-Security-Professional"},{"id":"b37389dc-dbb2-46fc-9049-1059bbfc5c5e","name":"Build Your Personal Cyber Playground","slug_url":"build-your-personal-cyber-playground"},{"id":"b47d2e63-fb6e-40f9-b8eb-3e289dc85a95","name":"Pentesting Agent - Beginner","slug_url":"pentesting-agent-beginner"},{"id":"baf7e3a9-9dbb-48b3-a81d-447a86a601b2","name":"Pentesting Agent - Intermediate","slug_url":"pentesting-agent-intermediate"},{"id":"caef789b-9288-4541-a66e-129c7d19bfeb","name":"Practical Dark Web for Ethical Hackers","slug_url":"practical-dark-web-for-ethical-hackers"},{"id":"cf4f554e-fc26-44fd-b067-31c680d11f33","name":"Becoming a Digital Network Exploitation Analyst","slug_url":"becoming-a-digital-network-exploitation-analyst"},{"id":"e8896213-5e0a-42dc-abeb-88d9f926193a","name":"Cyber AI Toolkit","slug_url":"cyber-ai-toolkit"},{"id":"ea5bd6ef-525c-4632-a366-e17b4e5ab33a","name":"Pentesting Agent - Advanced","slug_url":"pentesting-agent-advanced"},{"id":"f0e474b5-40c5-4fde-9666-a4b6129fcf82","name":"Mastering Mobile Hacking","slug_url":"mastering-mobile-hacking"}]},{"id":"a0bfb52c-d760-4516-acd1-73bb3127148b","name":"Security Architecture and Operations","parent_category":"b7c92f95-468a-432f-b91d-88eade3531b0","sort":4,"courses":[{"id":"005b1b5b-700d-4c6a-9902-ed2f8252d775","name":"CCNA - Understanding Routers and Switches","course_type":1,"url":"https:\/\/learn.eccouncil.org\/course\/005b1b5b-700d-4c6a-9902-ed2f8252d775","slug_url":"ccna-understanding-routers-and-switches","price":"49.99","discount_price":""},{"id":"05a21fe6-faf2-46b0-b9f3-07504e1af27d","name":"Hands-on with Sophos Firewall","course_type":1,"url":"https:\/\/learn.eccouncil.org\/course\/05a21fe6-faf2-46b0-b9f3-07504e1af27d","slug_url":"hands-on-with-sophos-firewall","price":"99.99","discount_price":""},{"id":"065cde33-9cc9-4f53-b8bb-e731d82c3d01","name":"Hands-on FortiGate Firewall","course_type":1,"url":"https:\/\/learn.eccouncil.org\/course\/065cde33-9cc9-4f53-b8bb-e731d82c3d01","slug_url":"hands-on-fortigate-firewall","price":"99.99","discount_price":""},{"id":"0b420499-c0e9-4486-8ab5-c1b5aefadab7","name":"Ensuring Network Security with Zeek","course_type":1,"url":"https:\/\/learn.eccouncil.org\/course\/0b420499-c0e9-4486-8ab5-c1b5aefadab7","slug_url":"ensuring-network-security-with-zeek","price":"59.99","discount_price":""},{"id":"0fc40d00-ea28-442d-93f0-187c18e69e23","name":"Database System DBMS Information Modelling SQL Security 2025","course_type":1,"url":"https:\/\/learn.eccouncil.org\/course\/0fc40d00-ea28-442d-93f0-187c18e69e23","slug_url":"database-system-dbms-information-modelling-sql-security-2025","price":"99.99","discount_price":""},{"id":"108038a4-b4b3-4800-87e8-0bde53479343","name":"The Ultimate Course on Secure Shell","course_type":1,"url":"https:\/\/learn.eccouncil.org\/course\/108038a4-b4b3-4800-87e8-0bde53479343","slug_url":"the-ultimate-course-on-secure-shell","price":"99.99","discount_price":""},{"id":"10a74bd5-aaa3-46c4-9ee7-5cf3e50f28fa","name":"Tunnels in Networking","course_type":1,"url":"https:\/\/learn.eccouncil.org\/course\/10a74bd5-aaa3-46c4-9ee7-5cf3e50f28fa","slug_url":"tunnels-in-networking","price":"59.99","discount_price":""}],"paths":[{"id":"0ea40e73-085e-4d1c-b99a-7a07ab53d8fe","name":"Building Security Operation Centre from Scratch for SOC Specialists","slug_url":"building-security-operation-centre-from-scratch-for-soc-specialists"},{"id":"3b849ab8-ea76-4e81-85fb-b5e8a6b3cb6a","name":"Becoming a Network Security Engineer","slug_url":"becoming-a-network-security-engineer"},{"id":"4043c409-ccdf-497d-8f5c-0bdff82a4395","name":"Practical Linux for Security Professionals","slug_url":"Practical-Linux-for-Security-Professionals"},{"id":"4cb4ccc2-28fc-4557-8ac9-f90017696fa1","name":"Becoming a Network Management and Security Specialist","slug_url":"Network-Management-and-Security-Specialist"},{"id":"6348de9c-f03b-42df-9a2b-9d7102625198","name":"Mastering Network Security","slug_url":"mastering-network-security"},{"id":"7b5bb034-5478-4f7a-9561-9ac8c447a1ce","name":"Information Security Specialist: Novice to Pro","slug_url":"information-security-specialist-novice-to-pro-learning-path"},{"id":"8ca9a4e9-defb-4495-a7a5-bf03b198ca88","name":"Designing an IT Infrastructure","slug_url":"Designing-an-IT-Infrastructure"},{"id":"c32ccc69-f2ef-4851-a8f2-6b835cf43fc0","name":"Advance Web and Network Defense","slug_url":"advance-web-and-network-defense"},{"id":"dafb3a3f-e63f-43eb-a411-c0424e24bf7e","name":"Handling IT Infrastructure","slug_url":"Handling-IT-Infrastructure"},{"id":"e25da15b-c5ff-407e-a7ad-69986a1de91b","name":"Unleash Linux","slug_url":"unleash-linux"}]},{"id":"ef03ce05-8ba8-4a61-b938-85ec5957e2f5","name":"Industrial Security Controls","parent_category":"b7c92f95-468a-432f-b91d-88eade3531b0","sort":9,"courses":[{"id":"0808cb2f-870a-4f5b-9daf-ac3c88aff575","name":"Introduction to Raspberry Pi","course_type":1,"url":"https:\/\/learn.eccouncil.org\/course\/0808cb2f-870a-4f5b-9daf-ac3c88aff575","slug_url":"introduction-to-raspberry-pi","price":"0","discount_price":"0"},{"id":"09d38281-a8bc-419b-975e-4eaadf4a059f","name":"Practical Introduction to Mainframe","course_type":1,"url":"https:\/\/learn.eccouncil.org\/course\/09d38281-a8bc-419b-975e-4eaadf4a059f","slug_url":"practical-introduction-to-mainframe","price":"49.99","discount_price":""},{"id":"0dd198f0-cd7e-412f-9a21-c312451b0fdb","name":"Raspberry Pi Based Smart Emergency Alert System Helmet","course_type":1,"url":"https:\/\/learn.eccouncil.org\/course\/0dd198f0-cd7e-412f-9a21-c312451b0fdb","slug_url":"raspberry-pi-based-smart-emergency-alert-system-helmet","price":"0","discount_price":"0"},{"id":"0dd55403-51ec-4bde-ba0e-49f530dde260","name":"Practical Hardware Pentesting","course_type":1,"url":"https:\/\/learn.eccouncil.org\/course\/0dd55403-51ec-4bde-ba0e-49f530dde260","slug_url":"practical-hardware-pentesting","price":"59.99","discount_price":""},{"id":"11a299c3-e433-4028-8d1f-addfe3f366f5","name":"Industrial Cybersecurity Essentials with IEC62443 Risk Assessment, Governance, and Use Cases","course_type":1,"url":"https:\/\/learn.eccouncil.org\/course\/11a299c3-e433-4028-8d1f-addfe3f366f5","slug_url":"industrial-cybersecurity-essentials-with-iec62443-risk-assessment-governance-and-use-cases","price":"49.99","discount_price":""},{"id":"11b6887f-b301-4f3b-bdac-398b21485f01","name":"Assessing and Protecting Industrial Control Systems","course_type":1,"url":"https:\/\/learn.eccouncil.org\/course\/11b6887f-b301-4f3b-bdac-398b21485f01","slug_url":"assessing-and-protectin-industrial-control-systems","price":"99.99","discount_price":""},{"id":"161ea0c3-6f50-4b9b-9609-85f5dc11c652","name":"Practical 62443 Based Risk Assessment Exercise - OT Security","course_type":1,"url":"https:\/\/learn.eccouncil.org\/course\/161ea0c3-6f50-4b9b-9609-85f5dc11c652","slug_url":"practical-62443-based-risk-assessment-exercise-ot-security","price":"99.99","discount_price":""}],"paths":[{"id":"11d68211-9a43-4c95-a65a-1003404aeb1c","name":"Integrating Security into IoT","slug_url":"integrating-security-into-IoT"},{"id":"fd64d276-666b-447b-b8fd-c6523191ceb3","name":"Leveraging IoT in Day to Day Life","slug_url":"Leveraging-IoT-in-Day-to-Day-Life"}]},{"id":"c4223df8-ccb5-4129-b727-1fac06479bdb","name":"Governance, Risk, and Compliance","parent_category":"b7c92f95-468a-432f-b91d-88eade3531b0","sort":10,"courses":[{"id":"107ea593-9cf6-4779-9623-94ddec7f2d61","name":"Practical Guidance for CMMC Compliance","course_type":1,"url":"https:\/\/learn.eccouncil.org\/course\/107ea593-9cf6-4779-9623-94ddec7f2d61","slug_url":"practical-guidance-for-cmmc-compliance","price":"79.99","discount_price":""},{"id":"25b8a2d4-f9e4-427a-847a-61cd07d56d81","name":"The Complete Business Process Management (BPM) Masterclass","course_type":1,"url":"https:\/\/learn.eccouncil.org\/course\/25b8a2d4-f9e4-427a-847a-61cd07d56d81","slug_url":"the-complete-business-process-management-bpm-masterclass","price":"59.99","discount_price":""},{"id":"2b6aea74-b1fb-49cb-859c-0fa92f983d5e","name":"Build EU GDPR Data Protection Compliance from Scratch (CIPT)","course_type":1,"url":"https:\/\/learn.eccouncil.org\/course\/2b6aea74-b1fb-49cb-859c-0fa92f983d5e","slug_url":"build-eu-gdpr-data-protection-compliance-from-scratch-cipt","price":"79.99","discount_price":""},{"id":"335e9a05-a560-4978-be3c-79e6971d472c","name":"Private Information Management System ISO 27701","course_type":1,"url":"https:\/\/learn.eccouncil.org\/course\/335e9a05-a560-4978-be3c-79e6971d472c","slug_url":"Private-Information-Management-System-ISO-27701","price":"59.99","discount_price":""},{"id":"3374835f-7675-4265-8aac-9a8077654a71","name":"California Consumer Privacy Act (CCPA)","course_type":1,"url":"https:\/\/learn.eccouncil.org\/course\/3374835f-7675-4265-8aac-9a8077654a71","slug_url":"california-consumer-privacy-act-ccpa","price":"59.99","discount_price":""},{"id":"3433a31f-b99b-4d8b-a74e-6263983d1491","name":"Build Security Incident Response for GDPR Data Protection","course_type":1,"url":"https:\/\/learn.eccouncil.org\/course\/3433a31f-b99b-4d8b-a74e-6263983d1491","slug_url":"build-security-incident-response-for-gdpr-data-protection","price":"69.99","discount_price":""},{"id":"3590bdad-c412-4108-a2b9-51ee55b5e2e3","name":"Deploy Data Governance and Compliance","course_type":1,"url":"https:\/\/learn.eccouncil.org\/course\/3590bdad-c412-4108-a2b9-51ee55b5e2e3","slug_url":"deploy-data-governance-and-compliance","price":"59.99","discount_price":""}],"paths":[{"id":"219e6c6e-a68d-4c12-b2fc-e461aa9245d3","name":"Adopting Security and Privacy in Data","slug_url":"adopting-security-and-privacy-data"},{"id":"560d86b0-f7e7-4b30-a4df-d77fcedf19e6","name":"Design, Build, and Implement Security Incident Response","slug_url":"Design-Build-and-Implement-Security-Incident-Response"},{"id":"c6e61ab2-2914-4875-91cd-64152907d145","name":"Practical Information Security Risk Management","slug_url":"Practical-Information-Security-Risk-Management"},{"id":"df71b314-24cf-4980-8b60-d1155c3a2caf","name":"Becoming an Information Systems Analyst","slug_url":"Becoming-an-Information-Systems-Analyst"}]}]},{"id":"26df223d-a5eb-4451-a7b4-bf20a00d987b","name":"Data Science & AI","sort":5,"sub_categories":[{"id":"e53107a5-65b2-4af1-b98e-cf0db7182d4e","name":"Artificial Intelligence","parent_category":"26df223d-a5eb-4451-a7b4-bf20a00d987b","sort":3,"courses":[{"id":"05cc68c8-cfda-4975-b7e7-6e20e21659e9","name":"Deep Learning & Neural Networks Python - Keras For Dummies","course_type":1,"url":"https:\/\/learn.eccouncil.org\/course\/05cc68c8-cfda-4975-b7e7-6e20e21659e9","slug_url":"deep-learning-and-neural-networks-python-keras-for-dummies","price":"69.99","discount_price":""},{"id":"06ae6c21-fe3f-40cf-9fe5-8aea4000cea7","name":"ChatGPT for Incident Detection and Response","course_type":1,"url":"https:\/\/learn.eccouncil.org\/course\/06ae6c21-fe3f-40cf-9fe5-8aea4000cea7","slug_url":"chatgpt-for-incident-detection-and-response","price":"99.99","discount_price":""},{"id":"0953aa9f-f847-4daf-8d0c-7cea5a568f87","name":"Advanced Deep Learning \u2013 Part 1","course_type":1,"url":"https:\/\/learn.eccouncil.org\/course\/0953aa9f-f847-4daf-8d0c-7cea5a568f87","slug_url":"advanced-deep-learning-part-one","price":"49.99","discount_price":""},{"id":"1a3bc30a-e523-45f2-bdbc-d9dd7b4aa1cf","name":"Python for Generative AI Apps: Building Intelligent Systems","course_type":1,"url":"https:\/\/learn.eccouncil.org\/course\/1a3bc30a-e523-45f2-bdbc-d9dd7b4aa1cf","slug_url":"python-for-generative-ai-apps-building-intelligent-systems","price":"99.99","discount_price":""},{"id":"2150b553-4ea2-4a7d-8881-074f6f308770","name":"AI for Finance - Part 2","course_type":1,"url":"https:\/\/learn.eccouncil.org\/course\/2150b553-4ea2-4a7d-8881-074f6f308770","slug_url":"ai-for-finance-part-two","price":"49.99","discount_price":""},{"id":"21d7d55f-3f03-4c9f-b00a-1ada1805aaff","name":"Master Python & Generative AI for Advanced Analytics","course_type":1,"url":"https:\/\/learn.eccouncil.org\/course\/21d7d55f-3f03-4c9f-b00a-1ada1805aaff","slug_url":"master-python-and-generative-ai-for-advanced-analytics","price":"99.99","discount_price":""},{"id":"22374a9e-5656-459c-96ce-1ac4c7a6e3a3","name":"AI-powered Threat Modeling","course_type":1,"url":"https:\/\/learn.eccouncil.org\/course\/22374a9e-5656-459c-96ce-1ac4c7a6e3a3","slug_url":"ai-powered-threat-modeling","price":"99.99","discount_price":""}],"paths":[{"id":"72c1b2da-2ee0-422a-9045-255d5e0204ba","name":"Smart AI for Business Professionals","slug_url":"smart-ai-for-business-professionals"},{"id":"f7cf4c27-1f52-42db-ae0e-587e3ab53c1a","name":"Practical Artificial Intelligence for Professionals","slug_url":"practical-artificial-intelligence-for-professionals-learning-path"}]},{"id":"c38840bc-e0f6-4d72-9f8b-a99279f28a70","name":"Data Science","parent_category":"26df223d-a5eb-4451-a7b4-bf20a00d987b","sort":7,"courses":[{"id":"0a62d02f-a7dd-490a-824a-544603375258","name":"AI in Action: Build a Python Teaching Website from Scratch","course_type":1,"url":"https:\/\/learn.eccouncil.org\/course\/0a62d02f-a7dd-490a-824a-544603375258","slug_url":"ai-in-action-build-a-python-teaching-website-from-scratch","price":"99.99","discount_price":""},{"id":"0c069cd3-7753-4d0c-9d0d-43f42c4a07f9","name":"Blockchain Basics Masterclass","course_type":1,"url":"https:\/\/learn.eccouncil.org\/course\/0c069cd3-7753-4d0c-9d0d-43f42c4a07f9","slug_url":"blockchain-basics-masterclass","price":"99.99","discount_price":""},{"id":"0f3943ba-129d-4b4c-95fb-a7d07fc927f8","name":"Practical Blockchain: Smart Contracts and Ethereum Solidity","course_type":1,"url":"https:\/\/learn.eccouncil.org\/course\/0f3943ba-129d-4b4c-95fb-a7d07fc927f8","slug_url":"practical-blockchain-smart-contracts-and-ethereum-solidity","price":"59.99","discount_price":""},{"id":"13edbf5e-ab0d-4056-b9fe-822929042d79","name":"Applied Statistics with Python","course_type":1,"url":"https:\/\/learn.eccouncil.org\/course\/13edbf5e-ab0d-4056-b9fe-822929042d79","slug_url":"applied-statistics-with-python","price":"59.99","discount_price":""},{"id":"1bf1712c-4737-4057-b28b-97c44f1d5233","name":"Dominate 2025 with GenAI: Strategy, Impact, Execute","course_type":1,"url":"https:\/\/learn.eccouncil.org\/course\/1bf1712c-4737-4057-b28b-97c44f1d5233","slug_url":"dominate-2025-with-genai-strategy-impact-execute","price":"99.99","discount_price":""},{"id":"1d1cc222-fe85-4243-a7b6-ee41cb056e2c","name":"The SQL Programming Essentials Immersive Training","course_type":1,"url":"https:\/\/learn.eccouncil.org\/course\/1d1cc222-fe85-4243-a7b6-ee41cb056e2c","slug_url":"the-sql-programming-essentials-immersive-training","price":"59.99","discount_price":""},{"id":"337de478-2eff-494f-af45-f327c844cfbf","name":"AI Automation - Chat with Databases Without SQL","course_type":1,"url":"https:\/\/learn.eccouncil.org\/course\/337de478-2eff-494f-af45-f327c844cfbf","slug_url":"ai-automation-chat-with-databases-without-sql","price":"99.99","discount_price":""}],"paths":[{"id":"3aa7f648-5964-4b3b-8597-13c324c8b2e3","name":"Transforming Business Decisions with Data Analytics - Advanced","slug_url":"Transforming-Business-Decisions-with-Data-Analytics-Advanced-learning-path"},{"id":"69e50036-33a9-4f5b-b4b1-62a4e756e1e6","name":"Transforming Business Decisions with Data Analytics - Beginner","slug_url":"Transforming-Business-Decisions-with-Data-Analytics-Beginner"},{"id":"990c7463-8b9c-4567-8059-1be97d8884ae","name":"Optimizing Data Analytics with Business Intelligence","slug_url":"Optimizing-Data-Analytics-with-Business-Intelligence-learning-path"},{"id":"b1d22c3a-8390-4b0a-82bb-2e7ef9d497bf","name":"Becoming a Data Analyst","slug_url":"becoming-a-data-analyst-learning-path"},{"id":"c0307960-ef88-461b-aff4-27b933e6df82","name":"Becoming a Data Engineer","slug_url":"Becoming-a-DataEngineer-learning-path"},{"id":"f633e7fd-f91a-4c02-b87e-1251824a040a","name":"Becoming a Business Data Analyst","slug_url":"Becoming-a-Business-Data-Analyst-learning-path"}]}]},{"id":"cae43d99-b0bd-4147-bdd8-935710e85d27","name":"Cloud Computing","sort":98,"sub_categories":[{"id":"af898bea-9b55-4796-9861-cbcf2367f89c","name":"Cloud Security","parent_category":"cae43d99-b0bd-4147-bdd8-935710e85d27","sort":5,"courses":[{"id":"0d2b57ac-9181-42f7-a6e7-401f105af28d","name":"ownCloud NAS - Secure and Storage for Home and Business","course_type":1,"url":"https:\/\/learn.eccouncil.org\/course\/0d2b57ac-9181-42f7-a6e7-401f105af28d","slug_url":"owncloud-nas-secure-and-storage-for-home-and-business","price":"99.99","discount_price":""},{"id":"1566c827-fc88-4d06-b6d7-ecbd692a5c8d","name":"Amazon Redshift Demystified","course_type":1,"url":"https:\/\/learn.eccouncil.org\/course\/1566c827-fc88-4d06-b6d7-ecbd692a5c8d","slug_url":"amazon-redshift-demystified","price":"49.99","discount_price":""},{"id":"1f46ef7b-90ee-442e-bdc6-83f2f435313c","name":"Manage Nano Server in Hyper-V","course_type":1,"url":"https:\/\/learn.eccouncil.org\/course\/1f46ef7b-90ee-442e-bdc6-83f2f435313c","slug_url":"manage-nano-server-in-hyper-v","price":"49.99","discount_price":""},{"id":"2153605a-6b94-4f5b-94fe-61b848bd775f","name":"Jumpstart Terraform 0.12 on Azure","course_type":1,"url":"https:\/\/learn.eccouncil.org\/course\/2153605a-6b94-4f5b-94fe-61b848bd775f","slug_url":"jumpstart-terraform-on-azure","price":"49.99","discount_price":""},{"id":"22d63998-dc71-483d-a16f-527851a251ea","name":"A Practical Introduction to Cloud Computing","course_type":1,"url":"https:\/\/learn.eccouncil.org\/course\/22d63998-dc71-483d-a16f-527851a251ea","slug_url":"a-practical-introduction-to-cloud-computing","price":"0","discount_price":"0"},{"id":"23ebb5b9-2d18-4467-a09b-cdd63bf70063","name":"Odoo: The Complete Master Class: Beginner to Professional","course_type":1,"url":"https:\/\/learn.eccouncil.org\/course\/23ebb5b9-2d18-4467-a09b-cdd63bf70063","slug_url":"odoo-the-complete-master-class-beginner-to-professional","price":"59.99","discount_price":""},{"id":"24c70143-71c1-407c-b462-15b22f972038","name":"Hands-on Cloud Analysis with Microsoft SharePoint","course_type":1,"url":"https:\/\/learn.eccouncil.org\/course\/24c70143-71c1-407c-b462-15b22f972038","slug_url":"hands-on-cloud-analysis-with-microsoft-sharepoint","price":"49.99","discount_price":""}],"paths":[{"id":"1203d15c-ce80-4aea-819f-625d5e712684","name":"Unleash Microsoft Security CERT Preps","slug_url":"unleash-microsoft-security-cert-preps"},{"id":"13267929-9f01-4b98-9457-7b5852243645","name":"Protecting Data in Microsoft Azure","slug_url":"protecting-data-in-microsoft-azure-learning-path"},{"id":"aaf617ef-a31a-4003-9ca5-b9a52eb24f6b","name":"Practical Cloud SecOps","slug_url":"practical-cloud-secops"},{"id":"fc525dec-854c-4993-8aa6-041984a43fda","name":"Becoming a Secure Blockchain Developer","slug_url":"Becoming-a-Secure-Blockchain-Developer"}]}]},{"id":"5724fce2-6c7b-4ee4-9ceb-aac30701ae2d","name":"Secure Programming","sort":99,"sub_categories":[{"id":"bb9bec74-477e-426c-a771-7e8ba1907b78","name":"DevSecOps","parent_category":"5724fce2-6c7b-4ee4-9ceb-aac30701ae2d","sort":6,"courses":[{"id":"0172baa5-9a40-4cad-bb23-986176431a3d","name":"React.JS for Ecommerce: Building a Store with React.JS","course_type":1,"url":"https:\/\/learn.eccouncil.org\/course\/0172baa5-9a40-4cad-bb23-986176431a3d","slug_url":"reactjs-for-ecommerce-building-a-store-with-reactjs","price":"49.99","discount_price":""},{"id":"0326d793-b74d-4c14-b131-98df2700b11d","name":"Helm 3 - Package Manager for Kubernetes","course_type":1,"url":"https:\/\/learn.eccouncil.org\/course\/0326d793-b74d-4c14-b131-98df2700b11d","slug_url":"helm-3-package-manager-for-kubernetes","price":"49.99","discount_price":""},{"id":"04bcb9a8-a3c3-45f3-9860-913cbdb2c40b","name":"Automate Security into CI\/CD Pipelines with Jenkins - Introduction to DevSecOps","course_type":1,"url":"https:\/\/learn.eccouncil.org\/course\/04bcb9a8-a3c3-45f3-9860-913cbdb2c40b","slug_url":"automate-security-into-ci-cd-pipelines-with-jenkins-introduction-to-devsecops","price":"49.99","discount_price":""},{"id":"058b4c86-45d8-4648-8cc0-00a5783b181e","name":"Automate Security into CI\/CD Pipelines with Jenkins - Deep Dive on DevSecOps","course_type":1,"url":"https:\/\/learn.eccouncil.org\/course\/058b4c86-45d8-4648-8cc0-00a5783b181e","slug_url":"automate-security-into-ci-cd-pipelines-with-jenkins-deep-dive-on-devsecops","price":"69.99","discount_price":""},{"id":"10e7b113-4a45-49dd-9847-5b7ba496df4a","name":"Mastering Istio for Kubernetes Security","course_type":1,"url":"https:\/\/learn.eccouncil.org\/course\/10e7b113-4a45-49dd-9847-5b7ba496df4a","slug_url":"mastering-istio-for-kubernetes-security","price":"79.99","discount_price":""},{"id":"1e45a33e-18ff-499f-b293-32b1b94187d9","name":"DevOps Bootcamp: Fast Learning Track","course_type":1,"url":"https:\/\/learn.eccouncil.org\/course\/1e45a33e-18ff-499f-b293-32b1b94187d9","slug_url":"devops-bootcamp-fast-learning-track","price":"49.99","discount_price":""},{"id":"23a12a88-376b-4fbe-aba0-149da07e81a9","name":"Threat Modelling in Agile and DevSecOps","course_type":1,"url":"https:\/\/learn.eccouncil.org\/course\/23a12a88-376b-4fbe-aba0-149da07e81a9","slug_url":"threat-modelling-in-agile-and-devsecops","price":"49.99","discount_price":""}],"paths":[{"id":"07199e77-9e24-408a-b7eb-af43ee91f2b7","name":"Mastering DevSecOps in Cloud","slug_url":"Mastering-DevSecOps-in-Cloud"},{"id":"1e5003bd-8adb-4494-a4eb-054abfd9605b","name":"Becoming a DevOps Professional","slug_url":"becoming-a-devops-professional"},{"id":"802f2698-701c-43df-9d2e-2a3cc9affe03","name":"Implementing DevOps in Microsoft Azure","slug_url":"Implementing-DevOps-in-Microsoft-Azure"}]},{"id":"9ecd4108-b077-4880-b604-0bab4715dbbf","name":"Software Development","parent_category":"5724fce2-6c7b-4ee4-9ceb-aac30701ae2d","sort":8,"courses":[{"id":"00479b0b-fe8a-41b8-8f19-097d7ad21bcd","name":"Bootstrap 4 Quick Website Bootstrap Components Course","course_type":1,"url":"https:\/\/learn.eccouncil.org\/course\/00479b0b-fe8a-41b8-8f19-097d7ad21bcd","slug_url":"bootstrap-4-quick-website-boostrap-components-course","price":"49.99","discount_price":""},{"id":"007ef08f-5c3c-4848-be97-021cf7a695aa","name":"The Complete Full-Stack JavaScript Course","course_type":1,"url":"https:\/\/learn.eccouncil.org\/course\/007ef08f-5c3c-4848-be97-021cf7a695aa","slug_url":"the-complete-full-stack-javascript-course","price":"79.99","discount_price":""},{"id":"03a24d37-7356-48b8-87ac-0b7c5ce532ab","name":"Mastering Ansible Playbooks: Debugging and Security","course_type":1,"url":"https:\/\/learn.eccouncil.org\/course\/03a24d37-7356-48b8-87ac-0b7c5ce532ab","slug_url":"mastering-ansible-playbooks-debugging-and-security","price":"99.99","discount_price":""},{"id":"04d6da60-154a-4f20-8ad0-6deb33f8b5fa","name":"Testing Automation in Java with Selenium WebDriver","course_type":1,"url":"https:\/\/learn.eccouncil.org\/course\/04d6da60-154a-4f20-8ad0-6deb33f8b5fa","slug_url":"testing-automation-in-java-with-selenium-webdriver","price":"49.99","discount_price":""},{"id":"04dc13e9-d56f-46d1-9c2f-651ff89ef666","name":"Master Math by Coding in Python","course_type":1,"url":"https:\/\/learn.eccouncil.org\/course\/04dc13e9-d56f-46d1-9c2f-651ff89ef666","slug_url":"master-math-by-coding-in-python","price":"79.99","discount_price":""},{"id":"04f9bd32-b393-4293-9aaf-c01541e36608","name":"Agile Product Management: A Concise Introduction","course_type":1,"url":"https:\/\/learn.eccouncil.org\/course\/04f9bd32-b393-4293-9aaf-c01541e36608","slug_url":"agile-product-management-a-concise-introduction","price":"0","discount_price":"0"},{"id":"0577cbcb-7796-47df-b7da-b2f662bdbe9a","name":"The Complete Front-end Web Development Course","course_type":1,"url":"https:\/\/learn.eccouncil.org\/course\/0577cbcb-7796-47df-b7da-b2f662bdbe9a","slug_url":"the-complete-front-end-web-development-course","price":"69.99","discount_price":""}],"paths":[{"id":"08deb204-c6bf-410a-a975-a0311b2e7965","name":"Gateway to Programming Fundamentals","slug_url":"Gateway-to-Programming-Fundamentals"},{"id":"16585947-fb8c-4617-bb01-a6d4fbbc99b6","name":"Building Secure Java Applications","slug_url":"Building-Secure-Java-Applications-learning-path"},{"id":"2d38998a-047d-4802-9557-975a2c9717d2","name":"Unleash JavaScript","slug_url":"unleash-javascript"},{"id":"32b0491f-f3f9-4138-9484-cc7f1338f2db","name":"Mastering Ethical Hacking Tools","slug_url":"Mastering-Ethical-Hacking-Tools-skill-path"},{"id":"5dff3176-ae98-4304-a2d5-8e482677869e","name":"Programming Fundamentals and Security","slug_url":"programming-fundamentals-and-security"},{"id":"898a871c-d4cc-4b1b-bada-5f7fa7fd06b2","name":"Python Programming","slug_url":"python-programming"},{"id":"90b79f5b-b209-4aca-ab81-a1dde6f00162","name":"Mastering Selenium for Testing","slug_url":"Mastering-Selenium-for-Testing"},{"id":"9e3c5a43-efbf-4369-b2ca-f25b95fbf3b8","name":"Become a Full Stack Developer","slug_url":"Become-a-Full-Stack-Developer"},{"id":"b3fb0354-ab79-4675-95e0-dca218210aef","name":"Becoming a GIS Analyst","slug_url":"Becoming-a-GIS-Analyst"},{"id":"e4c8b5b4-a0a6-45f1-a147-362df2ad4aad","name":"Full Stack Development Specialist","slug_url":"Full-Stack-Development-Specialist"}]}]},{"id":"0e5f2c8a-1c60-4a65-949e-c01fc00eb1e0","name":"Network Security","sort":100,"sub_categories":[]}],"tags":[{"id":"0953573e-1bd0-4ebf-831f-03bb75265e9c","name":"Cloud Data Security"},{"id":"5432425c-8e02-4ef9-b8cc-4f1fcf5f4f0f","name":"Penetration Testing"},{"id":"599562fc-3c66-4747-be44-39a07518ad9f","name":"Cryptography"},{"id":"72aadb94-df66-4b60-95b9-3fc4ed50a5ae","name":"DevSecOps"},{"id":"9f751c06-6b77-490b-8e35-f080af3a0471","name":"Ubuntu"},{"id":"b165fbe7-69cc-4f92-a39d-6f630ec7f1ea","name":"Kubernetes"},{"id":"b62839ae-6eea-4037-bc7a-fe9965866f70","name":"Spring Boot"}]}}