Courses

Cybersecurity Courses

Explore our comprehensive cybersecurity course library designed to accelerate your learning journey from beginner to expert. Master practical skills in penetration testing, SOC operations, offensive security and defensive security through hands-on learning.

28 of 28 courses
Vim EssentialsFree

Vim Essentials

Become proficient in Vim's modal editing paradigm.

GeneralBeginner
Networking Essentials

Networking Essentials

Build the networking foundation required for all cybersecurity work.

GeneralBeginner
Windows Essentials

Windows Essentials

Learn the basics of Windows systems and how to navigate using Command Prompt.

GeneralBeginner
Linux Essentials

Linux Essentials

Gain command-line proficiency in the Linux environment.

GeneralBeginner
Active Directory Fundamentals

Active Directory Fundamentals

Build a solid foundation in Active Directory fundamentals.

GeneralBeginner
Cybersecurity Fundamentals

Cybersecurity Fundamentals

Learn the core principles that underpin all security work.

GeneralBeginner
Cybersecurity Industry OverviewFree

Cybersecurity Industry Overview

Navigate the cybersecurity landscape and discover career paths.

GeneralBeginner
Computer Fundamentals

Computer Fundamentals

Start your IT journey by understanding how computers work.

GeneralBeginner
Web Application Fundamentals

Web Application Fundamentals

Build your foundational knowledge about web applications.

GeneralBeginner
TCP IP Protocol Suite Fundamentals

TCP IP Protocol Suite Fundamentals

Understand how data flows through networks by analyzing protocols.

GeneralIntermediate
Cryptography FundamentalsFree

Cryptography Fundamentals

Understand how encryption, hashing, and digital signatures protect data.

GeneralIntermediate
Nmap Essentials

Nmap Essentials

Conduct network reconnaissance and mapping using Nmap.

OffensiveBeginner
Password Cracking Basics

Password Cracking Basics

Learn practical cracking techniques and attack methodologies.

OffensiveBeginner
Network Service Enumeration

Network Service Enumeration

Learn how to extract detailed information from network services.

OffensiveBeginner
Pentest Reporting and Documentation

Pentest Reporting and Documentation

Communicate security findings effectively to technical and executive stakeholders.

OffensiveBeginner
Introduction to Penetration Testing

Introduction to Penetration Testing

Discover what penetration testing is and explore different assessments.

OffensiveBeginner
Legalities and Ethics in Pentesting

Legalities and Ethics in Pentesting

Stay on the right side of the law while conducting penetration tests.

OffensiveBeginner
Metasploit Framework Essentials

Metasploit Framework Essentials

Exploit vulnerabilities and conduct post-exploitation activities using Metasploit.

OffensiveIntermediate
Fundamental OSINT Techniques

Fundamental OSINT Techniques

Learn how to gather intelligence from publicly available sources.

OffensiveIntermediate
DNS Enumeration and Subdomain Discovery

DNS Enumeration and Subdomain Discovery

Uncover hidden assets and map attack surfaces through DNS recon.

OffensiveIntermediate
Ethical Hacking Methodology

Ethical Hacking Methodology

Understand the methodology used by penetration testers.

OffensiveIntermediate
Brute Forcing Network Services

Brute Forcing Network Services

Learn to test authentication security across network services.

OffensiveIntermediate
SQL Injection Attacks

SQL Injection Attacks

Learn to find and exploit SQL injection vulnerabilities.

OffensiveIntermediate
Log Analysis Essentials

Log Analysis Essentials

Investigate security incidents by analyzing logs from various sources.

DefensiveBeginner
SOC Operations Introduction

SOC Operations Introduction

Explore the world of defensive security with SOC fundamentals.

DefensiveBeginner
SIEM Introduction and Technologies

SIEM Introduction and Technologies

Understand how SIEM platforms centralize security monitoring.

DefensiveBeginner
Incident Response Introduction

Incident Response Introduction

Understand incident response frameworks, analysis, and containment processes.

DefensiveBeginner
Introduction to Governance, Risk, and Compliance

Introduction to Governance, Risk, and Compliance

Understand how organizations manage security through GRC.

StrategicBeginner
In Development

Coming Soon

We're working on these exciting new courses, coming to the Academy soon.

Active Directory Enumeration

Active Directory Enumeration

OffensiveBeginner
OWASP Top 10 Exploitation

OWASP Top 10 Exploitation

OffensiveBeginner
Advanced LDAP Exploration

Advanced LDAP Exploration

OffensiveIntermediate
Rubeus Tool Usage

Rubeus Tool Usage

OffensiveIntermediate
Wi-Fi Penetration Testing

Wi-Fi Penetration Testing

OffensiveIntermediate
Impacket Tool Usage

Impacket Tool Usage

OffensiveIntermediate
Kerberos Attack Techniques

Kerberos Attack Techniques

OffensiveIntermediate
Netexec Tool Usage

Netexec Tool Usage

OffensiveIntermediate