Courses and Resources

To shape your learning path.

2. Routing, Switching & Segmentation
2. Routing, Switching & Segmentation
Read More
1. OSI & TCP/IP Models
1. OSI & TCP/IP Models
Read More
6. PKI Fundamentals
6. PKI Fundamentals
Read More
5. Digital Signatures & Certificates
5. Digital Signatures & Certificates
Read More
4. Entropy, Randomness & Cryptographic Strength
4. Entropy, Randomness & Cryptographic Strength
Read More
3. Key Management Fundamentals
3. Key Management Fundamentals
Read More
2. Hashing Algorithms
2. Hashing Algorithms
Read More
1. Symmetric vs Asymmetric Cryptography
1. Symmetric vs Asymmetric Cryptography
Read More
6. Overview of Cybersecurity Domains (NIST/NICE framework)
6. Overview of Cybersecurity Domains (NIST/NICE framework)
Read More
5. Introduction to SOC Environments
5. Introduction to SOC Environments
Read More
4. Security Governance Basics
4. Security Governance Basics
Read More
3. Types of Threat Actors
3. Types of Threat Actors
Read More
2. Threats, Vulnerabilities & Attack Surfaces
2. Threats, Vulnerabilities & Attack Surfaces
Read More
1. Security Concepts: Confidentiality, Integrity, Availability (CIA)
1. Security Concepts: Confidentiality, Integrity, Availability (CIA)
Read More