Courses and Resources

To shape your learning path.

3. Basic Hardening and Configuration Management
3. Basic Hardening and Configuration Management
Read More
2. File systems & Process Management
2. File systems & Process Management
Read More
1. Command-line Proficiency
1. Command-line Proficiency
Read More
6. VPNs, Tunneling & Encryption in Transit
6. VPNs, Tunneling & Encryption in Transit
Read More
5. Network Threat Landscape
5. Network Threat Landscape
Read More
4. Secure Communication Protocols (TLS, SSH, IPsec)
4. Secure Communication Protocols (TLS, SSH, IPsec)
Read More
3. Firewalls, IDS/IPS Concepts
3. Firewalls, IDS/IPS Concepts
Read More
2. Routing, Switching & Segmentation
2. Routing, Switching & Segmentation
Read More
1. OSI & TCP/IP Models
1. OSI & TCP/IP Models
Read More
6. PKI Fundamentals
6. PKI Fundamentals
Read More
5. Digital Signatures & Certificates
5. Digital Signatures & Certificates
Read More
4. Entropy, Randomness & Cryptographic Strength
4. Entropy, Randomness & Cryptographic Strength
Read More
3. Key Management Fundamentals
3. Key Management Fundamentals
Read More
2. Hashing Algorithms
2. Hashing Algorithms
Read More
1. Symmetric vs Asymmetric Cryptography
1. Symmetric vs Asymmetric Cryptography
Read More
6. Overview of Cybersecurity Domains (NIST/NICE framework)
6. Overview of Cybersecurity Domains (NIST/NICE framework)
Read More
5. Introduction to SOC Environments
5. Introduction to SOC Environments
Read More
4. Security Governance Basics
4. Security Governance Basics
Read More
3. Types of Threat Actors
3. Types of Threat Actors
Read More
2. Threats, Vulnerabilities & Attack Surfaces
2. Threats, Vulnerabilities & Attack Surfaces
Read More
1. Security Concepts: Confidentiality, Integrity, Availability (CIA)
1. Security Concepts: Confidentiality, Integrity, Availability (CIA)
Read More