Courses & Certifications
- ICSI | CNSS Certified Network Security Specialist
- Certified SOC Analyst (CSA)
- Certified Cybersecurity Technician (CCT)
- Generative AI for Cybersecurity
- The Ultimate Guide to NIST SP 800-171 Standard for CUI Protection
- Security Automation in AWS with Python
- Effective Risk Management with ISO 31000
- Designing & Deploying a Zero-Trust Architecture
- Red Team Mastery: Advanced Offensive Security
- Understanding Cyber Attacks and Defenses
- Preparing for a SOC Analyst Job
- SOC for Blue Teaming
- OWASP API Top 10 crAPI
- Emulate Adversarial Activity with Atomic Red Team
- Learn Burp Suite for Advanced Web Penetration Testing
- Building and Configuring Your Cybersecurity Attack Lab
- Machine Learning for Application in Digital Forensics
- Data Science for Cybersecurity
- Deep Web and Cybersecurity
- Getting Started with AWS Pentesting
- Implementing Information Security in Your Enterprise
- Linux Forensics
- Practical DevSecOps on Google Cloud Platform
- Hands-on Azure Penetration Testing
- Mastering OSINT and Dark Web Intelligence
- KPIs for Incident Response: Metrics and Measurements
- Cybersecurity Incident Handling and Response
- Identity and Access Management - Azure Active Directory
- A Practical Guide to Microsoft Endpoint Manager
- Practical Cyber Threat Intelligence
- Planning and Implementing a Security Incident Response
- Fundamentals of Networking Concepts, Protocols, and Security
- IT Linux Network Administration
- Mastering Follina (CVE-2022-30190): Exploitation, Detection, and Mitigation
- CVE’s for Ethical Hacking Bug Bounties & Penetration Testing
- ChatGPT for Incident Detection and Response
- AI-driven Network Security
- LLM Pentesting: Mastering Security Testing for AI Models
- Crafting a Workplace Policy for Generative AI Masterclass
- Cybersecurity for Robotics and Autonomous Systems
- Troubleshooting Issues with Generative AI
- Defending Homosapiens Against Attacks
- AI for Cybersecurity & Bug Bounty Hunting
- DIY Bluetooth Phone Controlled BB-8 Droid with Arduino
- Learn Brackets - The Open Source Text Editor
- Introduction to Raspberry Pi
- Raspberry Pi Based Smart Emergency Alert System Helmet
- Introduction to Dark Web, Anonymity, and Cryptocurrency
- Scrum: A Concise Introduction
- Scrum Certification + Scrum Master + Agile Scrum Training
- Quick Start Guide to Oracle SOA 12c
- Beginning Oracle WebLogic for Administrators
- SQL Injection Attacks
- Configure Juniper SRX Router Using J-Web
- Selenium Automation Testing for Beginners
- A Practical Introduction to Cloud Computing
- Make In-house Hacking and Pentesting Lab
- Applied Microsoft SQL Server Security
- Edge Security Demystified
- IT Helpdesk Fundamentals
- Assessing and Protecting Industrial Control Systems
- Introduction to IoT Hacking
- JWT Exploitation for Pentesters
- Linux Troubleshooting Best Practices
- Rocky Linux Server: An Alternative to Red Hat
- Hands-on Cryptography with C++
- Practical Industrial Control System Penetration Testing
- Advanced OT Cyber Security (ICS-DCS-SCADA)
- Continuous Security Validation for Organizations
- Advanced FortiGate Configuration
- Getting Started with Bug Bounty Hunting
- Cisco CCNP ENCOR (350-401) – Part 1
- Linux Command Line for an Ethical Hacker
- Computational Intelligence for Cybersecurity
- ICS/OT Cybersecurity - NIST 800-82 Rev 3
- Hands-on Penetration Testing with Termux
- Mastering Network Intrusion Defense
- pfSense: Network Security and Firewall Management
- Hands-on Vulnerability Scanning with Nessus
- Hands-on with Sophos Firewall
- IPv6: Attack & Defense
- Microsoft Security Development Lifecycle (SDL) for Secure Software
- Introduction to Metasploit
- Top 100 Interesting Bugs | Ethical Hacking & Bug Bounty - Part 1
- Digital Forensics Masterclass Complete Computer Forensics
- Defending Active Directory
- Getting Started with IoT Security
- Introduction to Web Forensics
- Linux Security Guide
- Cybersecurity: Cloud Security NOW! (2025)
- Practical Bug Bounty Hunting for Hackers and Pentesters
- DevSecOps: Implementing Security in DevOps Processes
- Reverse Engineering: Frida For Beginners
- Hands-on Penetration Testing with Netcat
- Black Hat C++: C++ For Pentesters