Courses and Resources

To shape your learning path.

4. Cloud Threat Models
4. Cloud Threat Models
Read More
3. Virtual Networks & Security Groups
3. Virtual Networks & Security Groups
Read More
2. IAM in AWS-Azure-GCP
2. IAM in AWS-Azure-GCP
Read More
1. Shared Responsibility Models
1. Shared Responsibility Models
Read More
5. IoT Architectures & Attack Techniques
5. IoT Architectures & Attack Techniques
Read More
4. Bluetooth, NFC, RFID Threats
4. Bluetooth, NFC, RFID Threats
Read More
3. Mobile Malware & Rooting/Jailbreaking Risks
3. Mobile Malware & Rooting/Jailbreaking Risks
Read More
2. Mobile OS Architecture (Android/iOS)
2. Mobile OS Architecture (Android/iOS)
Read More
1. Wi-Fi Security Standards (WPA2, WPA3)
1. Wi-Fi Security Standards (WPA2, WPA3)
Read More
6. Quantum-resistant Algorithms
6. Quantum-resistant Algorithms
Read More
5. Cryptanalysis Basics
5. Cryptanalysis Basics
Read More
4. Hardware Security Modules (HSMs)
4. Hardware Security Modules (HSMs)
Read More
3. Key Exchange Protocols
3. Key Exchange Protocols
Read More
2. Secure Cipher Suite Selection
2. Secure Cipher Suite Selection
Read More
1. Cryptography Implementation Pitfalls
1. Cryptography Implementation Pitfalls
Read More
5. Environmental Controls (Fire, Flood, HVAC, Power)
5. Environmental Controls (Fire, Flood, HVAC, Power)
Read More
4. Physical security controls (CCTV, Biometrics, Barriers)
4. Physical security controls (CCTV, Biometrics, Barriers)
Read More
3. Identity Lifecycle
3. Identity Lifecycle
Read More
2. RBAC, ABAC, PBAC
2. RBAC, ABAC, PBAC
Read More
1. Authentication & Authorization Models
1. Authentication & Authorization Models
Read More
4. Log Structures & System Events
4. Log Structures & System Events
Read More