Courses

Cybersecurity Courses

Explore our comprehensive cybersecurity course library designed to accelerate your learning journey from beginner to expert. Master practical skills in penetration testing, SOC operations, offensive security and defensive security through hands-on learning.

28 of 28 courses
Vim Essentials element

Vim Essentials

Become proficient in Vim's modal editing paradigm.

General|Beginner|
13h
Networking Essentials element

Networking Essentials

Build the networking foundation required for all cybersecurity work.

General|Beginner|
28h
Windows Essentials element

Windows Essentials

Learn the basics of Windows systems and how to navigate using Command Prompt.

General|Beginner|
14h
Linux Essentials element

Linux Essentials

Gain command-line proficiency in the Linux environment.

General|Beginner|
16h
Active Directory Fundamentals element

Active Directory Fundamentals

Build a solid foundation in Active Directory fundamentals.

General|Beginner|
22h
Cybersecurity Fundamentals element

Cybersecurity Fundamentals

Learn the core principles that underpin all security work.

General|Beginner|
12h
Cybersecurity Industry Overview element

Cybersecurity Industry Overview

Navigate the cybersecurity landscape and discover career paths.

General|Beginner|
10h
Computer Fundamentals element

Computer Fundamentals

Start your IT journey by understanding how computers work.

General|Beginner|
8h
Web Application Fundamentals element

Web Application Fundamentals

Build your foundational knowledge about web applications.

General|Beginner|
15h
TCP IP Protocol Suite Fundamentals element

TCP IP Protocol Suite Fundamentals

Understand how data flows through networks by analyzing protocols.

General|Intermediate|
14h
Cryptography Fundamentals element

Cryptography Fundamentals

Understand how encryption, hashing, and digital signatures protect data.

General|Intermediate|
14h
Nmap Essentials element

Nmap Essentials

Conduct network reconnaissance and mapping using Nmap.

Offensive|Beginner|
13h
Password Cracking Basics element

Password Cracking Basics

Learn practical cracking techniques and attack methodologies.

Offensive|Beginner|
14h
Network Service Enumeration element

Network Service Enumeration

Learn how to extract detailed information from network services.

Offensive|Beginner|
7h
Pentest Reporting and Documentation element

Pentest Reporting and Documentation

Communicate security findings effectively to technical and executive stakeholders.

Offensive|Beginner|
8h
Introduction to Penetration Testing element

Introduction to Penetration Testing

Discover what penetration testing is and explore different assessments.

Offensive|Beginner|
8h
Legalities and Ethics in Pentesting element

Legalities and Ethics in Pentesting

Stay on the right side of the law while conducting penetration tests.

Offensive|Beginner|
8h
Metasploit Framework Essentials element

Metasploit Framework Essentials

Exploit vulnerabilities and conduct post-exploitation activities using Metasploit.

Offensive|Intermediate|
18h
Fundamental OSINT Techniques element

Fundamental OSINT Techniques

Learn how to gather intelligence from publicly available sources.

Offensive|Intermediate|
12h
DNS Enumeration and Subdomain Discovery element

DNS Enumeration and Subdomain Discovery

Uncover hidden assets and map attack surfaces through DNS recon.

Offensive|Intermediate|
8h
Ethical Hacking Methodology element

Ethical Hacking Methodology

Understand the methodology used by penetration testers.

Offensive|Intermediate|
16h
Brute Forcing Network Services element

Brute Forcing Network Services

Learn to test authentication security across network services.

Offensive|Intermediate|
17h
SQL Injection Attacks element

SQL Injection Attacks

Learn to find and exploit SQL injection vulnerabilities.

Offensive|Intermediate|
24h
Log Analysis Essentials element

Log Analysis Essentials

Investigate security incidents by analyzing logs from various sources.

Defensive|Beginner|
12h
SOC Operations Introduction element

SOC Operations Introduction

Explore the world of defensive security with SOC fundamentals.

Defensive|Beginner|
10h
SIEM Introduction and Technologies element

SIEM Introduction and Technologies

Understand how SIEM platforms centralize security monitoring.

Defensive|Beginner|
13h
Incident Response Introduction element

Incident Response Introduction

Understand incident response frameworks, analysis, and containment processes.

Defensive|Beginner|
9h
Introduction to Governance, Risk, and Compliance element

Introduction to Governance, Risk, and Compliance

Understand how organizations manage security through GRC.

Strategic|Beginner|
11h
In Development

Coming Soon

We're working on these exciting new courses, coming to the Academy soon.

Active Directory Enumeration

Active Directory Enumeration

Offensive|Beginner
OWASP Top 10 Exploitation

OWASP Top 10 Exploitation

Offensive|Beginner
Advanced LDAP Exploration

Advanced LDAP Exploration

Offensive|Intermediate
Rubeus Tool Usage

Rubeus Tool Usage

Offensive|Intermediate
Wi-Fi Penetration Testing

Wi-Fi Penetration Testing

Offensive|Intermediate
Impacket Tool Usage

Impacket Tool Usage

Offensive|Intermediate
Kerberos Attack Techniques

Kerberos Attack Techniques

Offensive|Intermediate
Netexec Tool Usage

Netexec Tool Usage

Offensive|Intermediate