> $ cd ~/home/
  • About
  • Blog
  • Courses & Certs
  • Projects
  • Research

Courses & Certifications

  • ICSI | CNSS Certified Network Security Specialist
  • Certified SOC Analyst (CSA)
  • Certified Cybersecurity Technician (CCT)
  • Generative AI for Cybersecurity
  • The Ultimate Guide to NIST SP 800-171 Standard for CUI Protection
  • Security Automation in AWS with Python
  • Effective Risk Management with ISO 31000
  • Designing & Deploying a Zero-Trust Architecture
  • Red Team Mastery: Advanced Offensive Security
  • Understanding Cyber Attacks and Defenses
  • Preparing for a SOC Analyst Job
  • SOC for Blue Teaming
  • OWASP API Top 10 crAPI
  • Emulate Adversarial Activity with Atomic Red Team
  • Learn Burp Suite for Advanced Web Penetration Testing
  • Building and Configuring Your Cybersecurity Attack Lab
  • Machine Learning for Application in Digital Forensics
  • Data Science for Cybersecurity
  • Deep Web and Cybersecurity
  • Getting Started with AWS Pentesting
  • Implementing Information Security in Your Enterprise
  • Linux Forensics
  • Practical DevSecOps on Google Cloud Platform
  • Hands-on Azure Penetration Testing
  • Mastering OSINT and Dark Web Intelligence
  • KPIs for Incident Response: Metrics and Measurements
  • Cybersecurity Incident Handling and Response
  • Identity and Access Management - Azure Active Directory
  • A Practical Guide to Microsoft Endpoint Manager
  • Practical Cyber Threat Intelligence
  • Planning and Implementing a Security Incident Response
  • Fundamentals of Networking Concepts, Protocols, and Security
  • IT Linux Network Administration
  • Mastering Follina (CVE-2022-30190): Exploitation, Detection, and Mitigation
  • CVE’s for Ethical Hacking Bug Bounties & Penetration Testing
  • ChatGPT for Incident Detection and Response
  • AI-driven Network Security
  • LLM Pentesting: Mastering Security Testing for AI Models
  • Crafting a Workplace Policy for Generative AI Masterclass
  • Cybersecurity for Robotics and Autonomous Systems
  • Troubleshooting Issues with Generative AI
  • Defending Homosapiens Against Attacks
  • AI for Cybersecurity & Bug Bounty Hunting
  • DIY Bluetooth Phone Controlled BB-8 Droid with Arduino
  • Learn Brackets - The Open Source Text Editor
  • Introduction to Raspberry Pi
  • Raspberry Pi Based Smart Emergency Alert System Helmet
  • Introduction to Dark Web, Anonymity, and Cryptocurrency
  • Scrum: A Concise Introduction
  • Scrum Certification + Scrum Master + Agile Scrum Training
  • Quick Start Guide to Oracle SOA 12c
  • Beginning Oracle WebLogic for Administrators
  • SQL Injection Attacks
  • Configure Juniper SRX Router Using J-Web
  • Selenium Automation Testing for Beginners
  • A Practical Introduction to Cloud Computing
  • Make In-house Hacking and Pentesting Lab
  • Applied Microsoft SQL Server Security
  • Edge Security Demystified
  • IT Helpdesk Fundamentals
  • Assessing and Protecting Industrial Control Systems
  • Introduction to IoT Hacking
  • JWT Exploitation for Pentesters
  • Linux Troubleshooting Best Practices
  • Rocky Linux Server: An Alternative to Red Hat
  • Hands-on Cryptography with C++
  • Practical Industrial Control System Penetration Testing
  • Advanced OT Cyber Security (ICS-DCS-SCADA)
  • Continuous Security Validation for Organizations
  • Advanced FortiGate Configuration
  • Getting Started with Bug Bounty Hunting
  • Cisco CCNP ENCOR (350-401) – Part 1
  • Linux Command Line for an Ethical Hacker
  • Computational Intelligence for Cybersecurity
  • ICS/OT Cybersecurity - NIST 800-82 Rev 3
  • Hands-on Penetration Testing with Termux
  • Mastering Network Intrusion Defense
  • pfSense: Network Security and Firewall Management
  • Hands-on Vulnerability Scanning with Nessus
  • Hands-on with Sophos Firewall
  • IPv6: Attack & Defense
  • Microsoft Security Development Lifecycle (SDL) for Secure Software
  • Introduction to Metasploit
  • Top 100 Interesting Bugs | Ethical Hacking & Bug Bounty - Part 1
  • Digital Forensics Masterclass Complete Computer Forensics
  • Defending Active Directory
  • Getting Started with IoT Security
  • Introduction to Web Forensics
  • Linux Security Guide
  • Cybersecurity: Cloud Security NOW! (2025)
  • Practical Bug Bounty Hunting for Hackers and Pentesters
  • DevSecOps: Implementing Security in DevOps Processes
  • Reverse Engineering: Frida For Beginners
  • Hands-on Penetration Testing with Netcat
  • Black Hat C++: C++ For Pentesters

Certifications Courses

Certifications Courses