Cybersecurity
Threats, cryptography, network security, and governance.
A beginner-friendly guide to cybersecurity covering networking, threats, cryptography, identity management, network and application security, security operations, cloud security, and governance. Build a solid foundation in protecting systems and data.
A beginner-friendly guide to ethical hacking covering reconnaissance, scanning, vulnerability analysis, exploitation, web application attacks, network attacks, password cracking, post-exploitation, and building a practice lab. Learn to think like a hacker to defend systems effectively.
A comprehensive introduction to web application security covering the OWASP Top 10, injection attacks, cross-site scripting, authentication, CSRF, security misconfiguration, sensitive data exposure, security testing tools, and the secure development lifecycle. Build the knowledge to identify and prevent the most critical web application vulnerabilities.
A comprehensive introduction to digital forensics covering forensic methodology, evidence acquisition, file systems, disk and memory forensics, network analysis, email and browser forensics, mobile forensics, and forensic reporting. Build the knowledge to understand and apply modern digital investigation techniques.
A hands-on course covering penetration testing and red teaming methodologies — from reconnaissance and vulnerability assessment, through exploitation and privilege escalation, to reporting, remediation, and building a career in offensive security. All techniques are taught in the context of authorized security testing.
A comprehensive guide to network security covering firewalls, intrusion detection, VPNs, segmentation, Zero Trust, wireless and DNS security, SIEM, threat modelling, and incident response. Build the skills to protect modern network infrastructure from evolving threats.
A comprehensive introduction to cryptography covering classical ciphers, symmetric and asymmetric encryption, hash functions, digital signatures, PKI, TLS, cryptographic attacks, and post-quantum cryptography. Build the knowledge to understand and apply modern encryption techniques.