Threats, cryptography, network security, and governance.
A comprehensive introduction to cryptography covering classical ciphers, symmetric and asymmetric encryption, hash functions, digital signatures, PKI, TLS, cryptographic attacks, and post-quantum cryptography. Build the knowledge to understand and apply modern encryption techniques.
A beginner-friendly guide to cybersecurity covering networking, threats, cryptography, identity management, network and application security, security operations, cloud security, and governance. Build a solid foundation in protecting systems and data.
A comprehensive introduction to digital forensics covering forensic methodology, evidence acquisition, file systems, disk and memory forensics, network analysis, email and browser forensics, mobile forensics, and forensic reporting. Build the knowledge to understand and apply modern digital investigation techniques.
A beginner-friendly guide to ethical hacking covering reconnaissance, scanning, vulnerability analysis, exploitation, web application attacks, network attacks, password cracking, post-exploitation, and building a practice lab. Learn to think like a hacker to defend systems effectively.
A comprehensive guide to network security covering firewalls, intrusion detection, VPNs, segmentation, Zero Trust, wireless and DNS security, SIEM, threat modelling, and incident response. Build the skills to protect modern network infrastructure from evolving threats.
A comprehensive introduction to web application security covering the OWASP Top 10, injection attacks, cross-site scripting, authentication, CSRF, security misconfiguration, sensitive data exposure, security testing tools, and the secure development lifecycle. Build the knowledge to identify and prevent the most critical web application vulnerabilities.
A hands-on course covering penetration testing and red teaming methodologies — from reconnaissance and vulnerability assessment, through exploitation and privilege escalation, to reporting, remediation, and building a career in offensive security. All techniques are taught in the context of authorized security testing.