Cybersecurity Courses

Master cybersecurity skills with our comprehensive courses

Penetration Testing
Featured
Penetration Testing

Introduction to ethical hacking and penetration testing. Learn reconnaissance techniques, pentesting tools, and key methodologies.

4 hours
advanced
pentestingethical hackingreconnaissance
Cryptography
Featured
Cryptography

Dive into the science of securing information through encoding. Learn encryption methods, hashing algorithms, and cryptographic attacks.

3 hours
intermediate
cryptographyencryptionhashing
Types of Attacks
Featured
Types of Attacks

Discover various cyberattacks and attackers. Learn about social engineering, phishing, malware, and both technical and non-technical attack methods.

3 hours
beginner
attackssocial engineeringphishing
Introduction to Cybersecurity
Featured
Introduction to Cybersecurity

Learn the fundamentals of cybersecurity, its purposes, and core principles. Explore career opportunities and understand the CIA Triad.

2 hours
beginner
fundamentalsCIA Triadcareer
Emerging Tech & Future of Cybersecurity
Emerging Tech & Future of Cybersecurity

Explore emerging technologies and future trends in cybersecurity including AI/ML, quantum computing, IoT security, and blockchain.

2 hours
advanced
AIquantumIoT
Cybersecurity in the Cloud
Cybersecurity in the Cloud

Explore cloud security challenges, shared responsibility model, identity management, common threats, and cloud security best practices.

3.5 hours
intermediate
cloud securityAWSAzure
Networking Fundamentals
Networking Fundamentals

Master essential networking concepts crucial for cybersecurity. Learn protocols, addressing, network models, topologies, and security methods.

4 hours
beginner
networkingTCP/IPOSI model
Risk Assessment and Management
Risk Assessment and Management

Learn to evaluate and improve your cybersecurity posture. Identify risks, implement controls, and continuously improve security.

2.5 hours
intermediate
risk managementassessmentsecurity controls
Advanced Attacks
Advanced Attacks

Explore sophisticated attack methodologies including Advanced Persistent Threats, spoofing techniques, and interception attacks.

2.5 hours
advanced
APTspoofingMITM
Linux Fundamentals
Linux Fundamentals

Master Linux, the go-to OS for cybersecurity professionals. Learn setup, basic commands, and file system navigation.

3 hours
beginner
Linuxcommand lineterminal
Defensive Measures
Defensive Measures

Master defensive strategies from non-technical concepts to automation tools. Learn authentication, authorization, and Python security scripting.

3 hours
intermediate
defenseauthenticationSIEM
Cybersecurity for Individuals and Companies
Cybersecurity for Individuals and Companies

Explore how cybersecurity needs differ between individuals and organizations. Learn about unique security challenges and protective measures.

2 hours
beginner
GDPRHIPAAcompliance