Courses and Resources

To shape your learning path.

2. Mobile OS Architecture (Android/iOS)
2. Mobile OS Architecture (Android/iOS)
Read More
1. Wi-Fi Security Standards (WPA2, WPA3)
1. Wi-Fi Security Standards (WPA2, WPA3)
Read More
6. Quantum-resistant Algorithms
6. Quantum-resistant Algorithms
Read More
5. Cryptanalysis Basics
5. Cryptanalysis Basics
Read More
4. Hardware Security Modules (HSMs)
4. Hardware Security Modules (HSMs)
Read More
3. Key Exchange Protocols
3. Key Exchange Protocols
Read More
2. Secure Cipher Suite Selection
2. Secure Cipher Suite Selection
Read More
1. Cryptography Implementation Pitfalls
1. Cryptography Implementation Pitfalls
Read More
5. Environmental Controls (Fire, Flood, HVAC, Power)
5. Environmental Controls (Fire, Flood, HVAC, Power)
Read More
4. Physical security controls (CCTV, Biometrics, Barriers)
4. Physical security controls (CCTV, Biometrics, Barriers)
Read More
3. Identity Lifecycle
3. Identity Lifecycle
Read More
2. RBAC, ABAC, PBAC
2. RBAC, ABAC, PBAC
Read More
1. Authentication & Authorization Models
1. Authentication & Authorization Models
Read More
4. Log Structures & System Events
4. Log Structures & System Events
Read More
3. Basic Hardening and Configuration Management
3. Basic Hardening and Configuration Management
Read More
2. File systems & Process Management
2. File systems & Process Management
Read More
1. Command-line Proficiency
1. Command-line Proficiency
Read More
6. VPNs, Tunneling & Encryption in Transit
6. VPNs, Tunneling & Encryption in Transit
Read More
5. Network Threat Landscape
5. Network Threat Landscape
Read More
4. Secure Communication Protocols (TLS, SSH, IPsec)
4. Secure Communication Protocols (TLS, SSH, IPsec)
Read More
3. Firewalls, IDS/IPS Concepts
3. Firewalls, IDS/IPS Concepts
Read More