- ICSI | CNSS Certified Network Security Specialist
- Ensuring Network Security with Zeek
- Ruby on Rails - Security
- Shell Scripting with Z Shell
- Advanced Cryptography Engineering
- Applied Unsupervised Deep Learning
- Introduction to R Programming
- Communication Skills Masterclass for Cybersecurity Career Starters
- Jq Command Tutorials for Bash Shell Scripting
- Cryptocurrency using Blockchain Technology
- Python for Absolute Beginners
- Troubleshooting Slow Network with Wireshark
- Wireshark for Ethical Hackers
- IoT with Raspberry Pi 4
- Cybersecurity for Businesses - The Fundamental Edition
- Hands-on SQL for Data Science
- Applied Statistics with Python
- Real-time Threat Detection with Elastic Stack
- Getting Started with Kali Linux Penetration Testing
- Data Analysis with Python Masterclass - Part 2
- Blockchain IoT Deconstructed
- Introduction to Google Cloud IoT
- Introduction to AWS IoT
- Introduction to Microsoft Azure IoT
- NFT for Beginners
- Hands-on Blockchain App Development with Hyperledger Fabric
- Practical Blockchain: Smart Contracts and Ethereum Solidity
- The Complete Mobile Ethical Hacking Course
- Reverse Engineering - Part 1
- Hands-on Azure Data Factory and Security
- Understanding Docker
- Business Intelligence for Dummies
- Introduction to SAN and NAS Storage
- Infrastructure Testing with Azure DevOps
- Continuous Integration and Continuous Deployment with Azure
- Data Visualization Using Tableau - Part 3
- Implementing ISO/IEC 27001:2022
- Linux 32-bit Reverse Engineering
- Burp Suite: Web Application Penetration Testing
- Open Source Intelligence
- Asynchronous Programming in JavaScript
- Web Security for Enterprises (Practical Training) – Part 1
- GDPR Privacy Data Protection CASE STUDIES Explained
- Microsoft Security, Compliance, and Identity Fundamentals Exam (SC-900) - Volume 2
- DevOps Projects | 20 Real Time DevOps Projects
- Secure Programming with Java
- Exam AZ-301 Microsoft Azure Architect Design
- Wireless Pentesting with the Raspberry Pi
- Design, Build, & Implement Information Security Compliance
- AZ-900: Microsoft Azure Fundamentals Certification
- OSINT for Ethical Hackers and OSINTeers (Instagram)
- OSINT for Ethical Hackers and OSINTeers (Facebook)
- Advanced Open Source Intelligence and Privacy
- A Crash Course to Build Your Own Chatbot
- LangChain Generative AI Apps Master Class
- Computer Vision Face Recognition Quick Starter in Python
- Deep Learning: Masked Face Detection, Recognition
- Advanced Deep Learning – Part 2
- Advanced Deep Learning – Part 1
- Cybersecurity for Supply Chain Management
- Foundations of Hacking and Pentesting Android Apps
- Reverse Engineering - Part 2
- Practical Web Application Penetration Testing
- Master ChatGPT for Ethical Hacking
- The Complete Kotlin Developer Course
- The Complete Android 11 Developer Course
- The Complete iOS 13 Developer Course - and SwiftUI
- The Complete Front-end Web Development Course
- Securing Your Network from Attacks
- Common Cybersecurity Attacks and Defense Strategies
- Deep Dive into the World of Malware
- Hands-on Password Attacks and Security
- Linux Administration with Ansible
- Monitoring IT Components with Zabbix
- PowerShell Scripting Essentials
- Dark Web Forensics
- Beginners Cryptography Demystified
- Hands-on IoT Pentesting
- Machine Learning with Python
- Amazon Redshift Demystified
- End-to-End Mobile Security
- Mastering Pentesting using Kali Linux
- PowerShell Scripting Essentials: Anatomy of Logging – Developing a Logging Module
- Kali for Penetration Testers
- Coding with Git
- MicroStrategy Desktop
- Microsoft Power BI - The Complete Masterclass
- Rethinking Cybersecurity in Digital Transformation
- Selenium WebDriver Essentials for Python Developers
- Testing Automation in Python with Selenium WebDriver
- Testing Automation in Java with Selenium WebDriver
- Getting Started with Selenium WebDriver 4 with Java
- Selenium WebDriver Advanced - Complete Framework
- Mastering Selenium: Web Automation
- Master Selenium Automation Testing: Basic to Advanced Level
- Serverless Computing on AWS with Lambda, API Gateway, S3 and DynamoDB
- Implementing Secure Network Function Virtualization
- Build Secure Transportable Data Center with VMWare
- Introduction to System Design
- Applied Python Cryptography
- Learn Python With 20+ Real World Projects
- Python GUI Development with Tkinter: Build Pro Desktop Apps!
- Python for OOP: The A-to-Z OOP Python Programming Course
- Python for Ethical Hacking
- The Complete Python 3 Course: Beginner to Advanced
- Black Hat Python for Pentesters (2025)
- Ethical Hacking - Capture the Flag Walkthroughs – v3
- Ethical Hacking - Capture the Flag Walkthroughs – v1
- Recon for Pentesting & Bug Bounties
- Practical Linux for Pentesting & Bug Bounties
- Mastering Nuclei with Automation for Pentesting & Bug Bounty
- Ethical Hacking/Penetration Testing & Bug Bounty Hunting v2
- Data Visualization Using Tableau - Part 2
- Data Visualization with Plotly
- Jupyter Notebook for Everyone
- Mastering Network Security
- WordPress Hacking & Hardening in Simple Steps
- The OWASP Top 10 Demystified
- Penetration Testing with OWASP ZAP
- An Introduction to OWASP Top 10 Vulnerabilities
- The Ultimate Guide to NIST SP 800-53 - Fundamentals and Control Families
- Effectively Outsourcing Cybersecurity Operations
- Private Information Management System ISO 27701
- How to become a CISO (Chief Information Security Officer)
- Mitigating M&A Cybersecurity Risks
- Intentionally-vulnerable Apps in Action for Ethical Hacking Practice
- Metasploit Like a Pro
- Network Automation with Python
- Build a Cyber Security Career and Earn More than 150K/Year
- Information Security for Dummies
- IT Security with Red Hat Made Easy
- Hands-on Binary Analysis in Linux - Part 2
- Hands-on Binary Analysis in Linux - Part 1
- Linux Hardening Deconstructed
- Implementing and Administering Cisco Solutions: CCNA 200-301
- Implementing Docker Containers with Windows Server 2019
- Data Analysis with R Masterclass
- Data Wrangling with Pandas - Part 2
- Data Wrangling with Pandas - Part 1
- Data Analysis with Python Masterclass - Part 1
- Databases with Python: MySQL, SQLite & MongoDB with Python
- The SQL Programming Essentials Immersive Training
- The Complete Full-Stack JavaScript Course
- Cybersecurity for Healthcare - Part 1
- Power of Next Generation Firewalls
- Session Hijacking and Prevention Techniques
- Windows Penetration Testing Essentials
- Ethical Hacking with Nmap
- Object Oriented Programming in JavaScript – Build a Quiz App
- Object Oriented Programming in JavaScript
- HTML, CSS, and JavaScript for Beginners - Web Design Course
- Learn JavaScript and HTML5 Canvas – Build A Paint/Drawing App
- Learn JavaScript for Beginners
- Master Exploitation Analysis Assessment
- Project Management for Cybersecurity Professionals
- Getting Started with Vulnerability Analysis and Management
- ISO/IEC 27001: Information Security Management
- Deep Dive into Network Assessments
- Complete Bash Shell Scripting
- Black Hat Python: Python For Pentesters
- Insider Secret from an Ethical Hacker on Internet Security
- Cyberbullying and You: Beating-the-Bully Guidelines
- Cybercrime And You: Staying Safe in a Hyper-Connected World
- OWASP Top 10 for Docker Containers and Kubernetes Security
- Application Security - The Complete Guide
- Web Security for Enterprises (Practical Training) – Part 2
- Ultimate Privacy by Design Master Course (GDPR, CCPA, Etc.)
- How to Succeed in a Data Protection Officer Role (GDPR DPO)
- Build Security Incident Response for GDPR Data Protection
- Build EU GDPR Data Protection Compliance from Scratch (CIPT)
- Master Azure DevOps - Boards, App/Infra Deployment, Pipeline
- DevOps Beginner to Advanced: Integrating DevOps with Cloud (Part 2)
- DevOps Beginner to Advanced: Integrating DevOps with Cloud (Part 1)
- Mastering ChatGPT for Threat Intelligence
- Learn Spring & Spring Boot – 10x Productive Java Development
- Introduction to OOP Programming in Java EE
- Bootstrap 4 Quick Website Bootstrap Components Course
- Secure Software Architecture and Design Patterns in Java EE – Part 2
- AZ-103/104 Microsoft Azure Administrator Full Course
- Microsoft Cybersecurity Pro Track: Threat Detection
- Microsoft Cybersecurity Pro Track: Security in Office 365
- Microsoft Windows Server 2019 - Hands-on Training
- Microsoft Cyber Security Fundamentals
- Internet of Things IoT, Robotics and Hacking with NodeMCU
- Applied Secure Smart City
- Practical Internet of Things Hacking
- Privacy and Ethics in the Internet of Things
- Learn Hacking Using Raspberry Pi from Scratch
- Web Hacker’s Toolbox: Tools Used by Successful Hackers
- Security Information and Event Management
- In the Trenches: Security Operations Center
- Linux for Absolute Beginners
- Deep Dive into Oracle WebLogic 12c Administrations
- Basic Administration of Oracle WebLogic 12c
- Bug Bounty with CVE Hunting Along with Ethical Hacking
- Ethical Hacking/Penetration Testing & Bug Bounty Hunting v1
- Log4j: The Big Picture
- Modern JavaScript for Beginners + JavaScript Project
- Secure Programming with C++
- Secure Programming with C
- Applied Threat Hunting
- Incident Response for Enterprises
- The Beginner’s Cyber Security Awareness Training Course
- Introduction to Cybersecurity
- Pentesting GraphQL APIs
- Securing GraphQL APIs from Attacks
- Open-source Identity and Access Management
- Information Security Risk Management
- OWASP Top 10 Security Fundamentals
- Data Mining for Fraud Detection
- ChatGPT for Vulnerability Detection
- Zero Trust
- Security Automation with Ansible
- Building CI/CD Pipeline Using AWS CodePipeline
- Introduction to Azure Cloud Security Tools and Services
- Microsoft AZ-500: Azure Security Engineer
- DevOps Beginner to Advanced: Introduction to DevOps
- Google Cloud Platform Essentials
- AWS Certified Cloud Practitioner - Essentials Course
- Introduction to Cloud Computing
- Mastering Web and Infrastructure Reconnaissance
- Digital Forensics for Pentesters - Hands-on Learning
- Computer Forensics Best Practices
- Digital Forensic Essentials (D|FE)
- Network Defense Essentials (N|DE)
- Ethical Hacking Essentials (E|HE)
- Parrot OS Deconstructed
- Hands-on Android Penetration Testing
- Cyber Ninja Beyond 9 to 5
- Applied MySQL Security
- 6G Foundations and Strategic Futures
- Applied Attack Surface Analysis and Reduction for Vulnerability Assessment
- Purple Team: Prevention and Detection
- ICS/OT Cyber Attack Tactics, Techniques, & Procedures MITRE
- End-to-end Supply Chain Security
- Network Security with Arista (Untangle) NG Firewall – 2025
- API Security with OAuth 2.0
- Hands-on Virtualization with Proxmox VE
- Reverse Engineering: Cutter for Beginners
- Windows Exploitation: 45 Ethical Hacks & Exploits
- Wi-Fi Ethical Hacking: Hak5 WiFi Pineapple & HackRF One
- Hack People Instead of Systems: Social Engineering & OSINT
- Ethical Hacking & Cybersecurity Fundamentals
- Generative AI for Cybersecurity
- The Ultimate Guide to NIST SP 800-171 Standard for CUI Protection
- Security Automation in AWS with Python
- Effective Risk Management with ISO 31000
- Designing & Deploying a Zero-Trust Architecture
- Red Team Mastery: Advanced Offensive Security
- Understanding Cyber Attacks and Defenses
- Preparing for a SOC Analyst Job
- SOC for Blue Teaming
- OWASP API Top 10 crAPI
- Emulate Adversarial Activity with Atomic Red Team
- Learn Burp Suite for Advanced Web Penetration Testing
- Building and Configuring Your Cybersecurity Attack Lab
- Machine Learning for Application in Digital Forensics
- Data Science for Cybersecurity
- Deep Web and Cybersecurity
- Getting Started with AWS Pentesting
- Implementing Information Security in Your Enterprise
- Linux Forensics
- Practical DevSecOps on Google Cloud Platform
- Hands-on Azure Penetration Testing
- Mastering OSINT and Dark Web Intelligence
- KPIs for Incident Response: Metrics and Measurements
- Cybersecurity Incident Handling and Response
- Identity and Access Management - Azure Active Directory
- A Practical Guide to Microsoft Endpoint Manager
- Practical Cyber Threat Intelligence
- Planning and Implementing a Security Incident Response
- Fundamentals of Networking Concepts, Protocols, and Security
- IT Linux Network Administration
- Mastering Follina (CVE-2022-30190): Exploitation, Detection, and Mitigation
- CVE’s for Ethical Hacking Bug Bounties & Penetration Testing
- ChatGPT for Incident Detection and Response
- AI-driven Network Security
- LLM Pentesting: Mastering Security Testing for AI Models
- Crafting a Workplace Policy for Generative AI Masterclass
- Cybersecurity for Robotics and Autonomous Systems
- Troubleshooting Issues with Generative AI
- Defending Homosapiens Against Attacks
- AI for Cybersecurity & Bug Bounty Hunting
- DIY Bluetooth Phone Controlled BB-8 Droid with Arduino
- Learn Brackets - The Open Source Text Editor
- Introduction to Raspberry Pi
- Raspberry Pi Based Smart Emergency Alert System Helmet
- Introduction to Dark Web, Anonymity, and Cryptocurrency
- Scrum: A Concise Introduction
- Scrum Certification + Scrum Master + Agile Scrum Training
- Quick Start Guide to Oracle SOA 12c
- Beginning Oracle WebLogic for Administrators
- SQL Injection Attacks
- Configure Juniper SRX Router Using J-Web
- Selenium Automation Testing for Beginners
- A Practical Introduction to Cloud Computing
- Make In-house Hacking and Pentesting Lab
- Applied Microsoft SQL Server Security
- Edge Security Demystified
- IT Helpdesk Fundamentals
- Assessing and Protecting Industrial Control Systems
- Introduction to IoT Hacking
- JWT Exploitation for Pentesters
- Linux Troubleshooting Best Practices
- Rocky Linux Server: An Alternative to Red Hat
- Hands-on Cryptography with C++
- Practical Industrial Control System Penetration Testing
- Advanced OT Cyber Security (ICS-DCS-SCADA)
- Continuous Security Validation for Organizations
- Advanced FortiGate Configuration
- Getting Started with Bug Bounty Hunting
- Certified SOC Analyst (CSA)
- Certified Cybersecurity Technician (CCT)
- Cisco CCNP ENCOR (350-401) – Part 1
- Linux Command Line for an Ethical Hacker
- Computational Intelligence for Cybersecurity
- ICS/OT Cybersecurity - NIST 800-82 Rev 3
- Hands-on Penetration Testing with Termux
- Mastering Network Intrusion Defense
- pfSense: Network Security and Firewall Management
- Hands-on Vulnerability Scanning with Nessus
- Hands-on with Sophos Firewall
- IPv6: Attack & Defense
- Microsoft Security Development Lifecycle (SDL) for Secure Software
- Introduction to Metasploit
- Top 100 Interesting Bugs | Ethical Hacking & Bug Bounty - Part 1
- Digital Forensics Masterclass Complete Computer Forensics
- Defending Active Directory
- Getting Started with IoT Security
- Introduction to Web Forensics
- Linux Security Guide
- Cybersecurity: Cloud Security NOW! (2025)
- Practical Bug Bounty Hunting for Hackers and Pentesters
- DevSecOps: Implementing Security in DevOps Processes
- Reverse Engineering: Frida For Beginners
- Hands-on Penetration Testing with Netcat
- Black Hat C++: C++ For Pentesters