> $ cd ~/home/
  • About
  • Blog
  • Courses & Certs
  • Projects
  • Research

Courses & Certifications

  • ICSI | CNSS Certified Network Security Specialist
  • Ensuring Network Security with Zeek
  • Ruby on Rails - Security
  • Shell Scripting with Z Shell
  • Advanced Cryptography Engineering
  • Applied Unsupervised Deep Learning
  • Introduction to R Programming
  • Communication Skills Masterclass for Cybersecurity Career Starters
  • Jq Command Tutorials for Bash Shell Scripting
  • Cryptocurrency using Blockchain Technology
  • Python for Absolute Beginners
  • Troubleshooting Slow Network with Wireshark
  • Wireshark for Ethical Hackers
  • IoT with Raspberry Pi 4
  • Cybersecurity for Businesses - The Fundamental Edition
  • Hands-on SQL for Data Science
  • Applied Statistics with Python
  • Real-time Threat Detection with Elastic Stack
  • Getting Started with Kali Linux Penetration Testing
  • Data Analysis with Python Masterclass - Part 2
  • Blockchain IoT Deconstructed
  • Introduction to Google Cloud IoT
  • Introduction to AWS IoT
  • Introduction to Microsoft Azure IoT
  • NFT for Beginners
  • Hands-on Blockchain App Development with Hyperledger Fabric
  • Practical Blockchain: Smart Contracts and Ethereum Solidity
  • The Complete Mobile Ethical Hacking Course
  • Reverse Engineering - Part 1
  • Hands-on Azure Data Factory and Security
  • Understanding Docker
  • Business Intelligence for Dummies
  • Introduction to SAN and NAS Storage
  • Infrastructure Testing with Azure DevOps
  • Continuous Integration and Continuous Deployment with Azure
  • Data Visualization Using Tableau - Part 3
  • Implementing ISO/IEC 27001:2022
  • Linux 32-bit Reverse Engineering
  • Burp Suite: Web Application Penetration Testing
  • Open Source Intelligence
  • Asynchronous Programming in JavaScript
  • Web Security for Enterprises (Practical Training) – Part 1
  • GDPR Privacy Data Protection CASE STUDIES Explained
  • Microsoft Security, Compliance, and Identity Fundamentals Exam (SC-900) - Volume 2
  • DevOps Projects | 20 Real Time DevOps Projects
  • Secure Programming with Java
  • Exam AZ-301 Microsoft Azure Architect Design
  • Wireless Pentesting with the Raspberry Pi
  • Design, Build, & Implement Information Security Compliance
  • AZ-900: Microsoft Azure Fundamentals Certification
  • OSINT for Ethical Hackers and OSINTeers (Instagram)
  • OSINT for Ethical Hackers and OSINTeers (Facebook)
  • Advanced Open Source Intelligence and Privacy
  • A Crash Course to Build Your Own Chatbot
  • LangChain Generative AI Apps Master Class
  • Computer Vision Face Recognition Quick Starter in Python
  • Deep Learning: Masked Face Detection, Recognition
  • Advanced Deep Learning – Part 2
  • Advanced Deep Learning – Part 1
  • Cybersecurity for Supply Chain Management
  • Foundations of Hacking and Pentesting Android Apps
  • Reverse Engineering - Part 2
  • Practical Web Application Penetration Testing
  • Master ChatGPT for Ethical Hacking
  • The Complete Kotlin Developer Course
  • The Complete Android 11 Developer Course
  • The Complete iOS 13 Developer Course - and SwiftUI
  • The Complete Front-end Web Development Course
  • Securing Your Network from Attacks
  • Common Cybersecurity Attacks and Defense Strategies
  • Deep Dive into the World of Malware
  • Hands-on Password Attacks and Security
  • Linux Administration with Ansible
  • Monitoring IT Components with Zabbix
  • PowerShell Scripting Essentials
  • Dark Web Forensics
  • Beginners Cryptography Demystified
  • Hands-on IoT Pentesting
  • Machine Learning with Python
  • Amazon Redshift Demystified
  • End-to-End Mobile Security
  • Mastering Pentesting using Kali Linux
  • PowerShell Scripting Essentials: Anatomy of Logging – Developing a Logging Module
  • Kali for Penetration Testers
  • Coding with Git
  • MicroStrategy Desktop
  • Microsoft Power BI - The Complete Masterclass
  • Rethinking Cybersecurity in Digital Transformation
  • Selenium WebDriver Essentials for Python Developers
  • Testing Automation in Python with Selenium WebDriver
  • Testing Automation in Java with Selenium WebDriver
  • Getting Started with Selenium WebDriver 4 with Java
  • Selenium WebDriver Advanced - Complete Framework
  • Mastering Selenium: Web Automation
  • Master Selenium Automation Testing: Basic to Advanced Level
  • Serverless Computing on AWS with Lambda, API Gateway, S3 and DynamoDB
  • Implementing Secure Network Function Virtualization
  • Build Secure Transportable Data Center with VMWare
  • Introduction to System Design
  • Applied Python Cryptography
  • Learn Python With 20+ Real World Projects
  • Python GUI Development with Tkinter: Build Pro Desktop Apps!
  • Python for OOP: The A-to-Z OOP Python Programming Course
  • Python for Ethical Hacking
  • The Complete Python 3 Course: Beginner to Advanced
  • Black Hat Python for Pentesters (2025)
  • Ethical Hacking - Capture the Flag Walkthroughs – v3
  • Ethical Hacking - Capture the Flag Walkthroughs – v1
  • Recon for Pentesting & Bug Bounties
  • Practical Linux for Pentesting & Bug Bounties
  • Mastering Nuclei with Automation for Pentesting & Bug Bounty
  • Ethical Hacking/Penetration Testing & Bug Bounty Hunting v2
  • Data Visualization Using Tableau - Part 2
  • Data Visualization with Plotly
  • Jupyter Notebook for Everyone
  • Mastering Network Security
  • WordPress Hacking & Hardening in Simple Steps
  • The OWASP Top 10 Demystified
  • Penetration Testing with OWASP ZAP
  • An Introduction to OWASP Top 10 Vulnerabilities
  • The Ultimate Guide to NIST SP 800-53 - Fundamentals and Control Families
  • Effectively Outsourcing Cybersecurity Operations
  • Private Information Management System ISO 27701
  • How to become a CISO (Chief Information Security Officer)
  • Mitigating M&A Cybersecurity Risks
  • Intentionally-vulnerable Apps in Action for Ethical Hacking Practice
  • Metasploit Like a Pro
  • Network Automation with Python
  • Build a Cyber Security Career and Earn More than 150K/Year
  • Information Security for Dummies
  • IT Security with Red Hat Made Easy
  • Hands-on Binary Analysis in Linux - Part 2
  • Hands-on Binary Analysis in Linux - Part 1
  • Linux Hardening Deconstructed
  • Implementing and Administering Cisco Solutions: CCNA 200-301
  • Implementing Docker Containers with Windows Server 2019
  • Data Analysis with R Masterclass
  • Data Wrangling with Pandas - Part 2
  • Data Wrangling with Pandas - Part 1
  • Data Analysis with Python Masterclass - Part 1
  • Databases with Python: MySQL, SQLite & MongoDB with Python
  • The SQL Programming Essentials Immersive Training
  • The Complete Full-Stack JavaScript Course
  • Cybersecurity for Healthcare - Part 1
  • Power of Next Generation Firewalls
  • Session Hijacking and Prevention Techniques
  • Windows Penetration Testing Essentials
  • Ethical Hacking with Nmap
  • Object Oriented Programming in JavaScript – Build a Quiz App
  • Object Oriented Programming in JavaScript
  • HTML, CSS, and JavaScript for Beginners - Web Design Course
  • Learn JavaScript and HTML5 Canvas – Build A Paint/Drawing App
  • Learn JavaScript for Beginners
  • Master Exploitation Analysis Assessment
  • Project Management for Cybersecurity Professionals
  • Getting Started with Vulnerability Analysis and Management
  • ISO/IEC 27001: Information Security Management
  • Deep Dive into Network Assessments
  • Complete Bash Shell Scripting
  • Black Hat Python: Python For Pentesters
  • Insider Secret from an Ethical Hacker on Internet Security
  • Cyberbullying and You: Beating-the-Bully Guidelines
  • Cybercrime And You: Staying Safe in a Hyper-Connected World
  • OWASP Top 10 for Docker Containers and Kubernetes Security
  • Application Security - The Complete Guide
  • Web Security for Enterprises (Practical Training) – Part 2
  • Ultimate Privacy by Design Master Course (GDPR, CCPA, Etc.)
  • How to Succeed in a Data Protection Officer Role (GDPR DPO)
  • Build Security Incident Response for GDPR Data Protection
  • Build EU GDPR Data Protection Compliance from Scratch (CIPT)
  • Master Azure DevOps - Boards, App/Infra Deployment, Pipeline
  • DevOps Beginner to Advanced: Integrating DevOps with Cloud (Part 2)
  • DevOps Beginner to Advanced: Integrating DevOps with Cloud (Part 1)
  • Mastering ChatGPT for Threat Intelligence
  • Learn Spring & Spring Boot – 10x Productive Java Development
  • Introduction to OOP Programming in Java EE
  • Bootstrap 4 Quick Website Bootstrap Components Course
  • Secure Software Architecture and Design Patterns in Java EE – Part 2
  • AZ-103/104 Microsoft Azure Administrator Full Course
  • Microsoft Cybersecurity Pro Track: Threat Detection
  • Microsoft Cybersecurity Pro Track: Security in Office 365
  • Microsoft Windows Server 2019 - Hands-on Training
  • Microsoft Cyber Security Fundamentals
  • Internet of Things IoT, Robotics and Hacking with NodeMCU
  • Applied Secure Smart City
  • Practical Internet of Things Hacking
  • Privacy and Ethics in the Internet of Things
  • Learn Hacking Using Raspberry Pi from Scratch
  • Web Hacker’s Toolbox: Tools Used by Successful Hackers
  • Security Information and Event Management
  • In the Trenches: Security Operations Center
  • Linux for Absolute Beginners
  • Deep Dive into Oracle WebLogic 12c Administrations
  • Basic Administration of Oracle WebLogic 12c
  • Bug Bounty with CVE Hunting Along with Ethical Hacking
  • Ethical Hacking/Penetration Testing & Bug Bounty Hunting v1
  • Log4j: The Big Picture
  • Modern JavaScript for Beginners + JavaScript Project
  • Secure Programming with C++
  • Secure Programming with C
  • Applied Threat Hunting
  • Incident Response for Enterprises
  • The Beginner’s Cyber Security Awareness Training Course
  • Introduction to Cybersecurity
  • Pentesting GraphQL APIs
  • Securing GraphQL APIs from Attacks
  • Open-source Identity and Access Management
  • Information Security Risk Management
  • OWASP Top 10 Security Fundamentals
  • Data Mining for Fraud Detection
  • ChatGPT for Vulnerability Detection
  • Zero Trust
  • Security Automation with Ansible
  • Building CI/CD Pipeline Using AWS CodePipeline
  • Introduction to Azure Cloud Security Tools and Services
  • Microsoft AZ-500: Azure Security Engineer
  • DevOps Beginner to Advanced: Introduction to DevOps
  • Google Cloud Platform Essentials
  • AWS Certified Cloud Practitioner - Essentials Course
  • Introduction to Cloud Computing
  • Mastering Web and Infrastructure Reconnaissance
  • Digital Forensics for Pentesters - Hands-on Learning
  • Computer Forensics Best Practices
  • Digital Forensic Essentials (D|FE)
  • Network Defense Essentials (N|DE)
  • Ethical Hacking Essentials (E|HE)
  • Parrot OS Deconstructed
  • Hands-on Android Penetration Testing
  • Cyber Ninja Beyond 9 to 5
  • Applied MySQL Security
  • 6G Foundations and Strategic Futures
  • Applied Attack Surface Analysis and Reduction for Vulnerability Assessment
  • Purple Team: Prevention and Detection
  • ICS/OT Cyber Attack Tactics, Techniques, & Procedures MITRE
  • End-to-end Supply Chain Security
  • Network Security with Arista (Untangle) NG Firewall – 2025
  • API Security with OAuth 2.0
  • Hands-on Virtualization with Proxmox VE
  • Reverse Engineering: Cutter for Beginners
  • Windows Exploitation: 45 Ethical Hacks & Exploits
  • Wi-Fi Ethical Hacking: Hak5 WiFi Pineapple & HackRF One
  • Hack People Instead of Systems: Social Engineering & OSINT
  • Ethical Hacking & Cybersecurity Fundamentals
  • Generative AI for Cybersecurity
  • The Ultimate Guide to NIST SP 800-171 Standard for CUI Protection
  • Security Automation in AWS with Python
  • Effective Risk Management with ISO 31000
  • Designing & Deploying a Zero-Trust Architecture
  • Red Team Mastery: Advanced Offensive Security
  • Understanding Cyber Attacks and Defenses
  • Preparing for a SOC Analyst Job
  • SOC for Blue Teaming
  • OWASP API Top 10 crAPI
  • Emulate Adversarial Activity with Atomic Red Team
  • Learn Burp Suite for Advanced Web Penetration Testing
  • Building and Configuring Your Cybersecurity Attack Lab
  • Machine Learning for Application in Digital Forensics
  • Data Science for Cybersecurity
  • Deep Web and Cybersecurity
  • Getting Started with AWS Pentesting
  • Implementing Information Security in Your Enterprise
  • Linux Forensics
  • Practical DevSecOps on Google Cloud Platform
  • Hands-on Azure Penetration Testing
  • Mastering OSINT and Dark Web Intelligence
  • KPIs for Incident Response: Metrics and Measurements
  • Cybersecurity Incident Handling and Response
  • Identity and Access Management - Azure Active Directory
  • A Practical Guide to Microsoft Endpoint Manager
  • Practical Cyber Threat Intelligence
  • Planning and Implementing a Security Incident Response
  • Fundamentals of Networking Concepts, Protocols, and Security
  • IT Linux Network Administration
  • Mastering Follina (CVE-2022-30190): Exploitation, Detection, and Mitigation
  • CVE’s for Ethical Hacking Bug Bounties & Penetration Testing
  • ChatGPT for Incident Detection and Response
  • AI-driven Network Security
  • LLM Pentesting: Mastering Security Testing for AI Models
  • Crafting a Workplace Policy for Generative AI Masterclass
  • Cybersecurity for Robotics and Autonomous Systems
  • Troubleshooting Issues with Generative AI
  • Defending Homosapiens Against Attacks
  • AI for Cybersecurity & Bug Bounty Hunting
  • DIY Bluetooth Phone Controlled BB-8 Droid with Arduino
  • Learn Brackets - The Open Source Text Editor
  • Introduction to Raspberry Pi
  • Raspberry Pi Based Smart Emergency Alert System Helmet
  • Introduction to Dark Web, Anonymity, and Cryptocurrency
  • Scrum: A Concise Introduction
  • Scrum Certification + Scrum Master + Agile Scrum Training
  • Quick Start Guide to Oracle SOA 12c
  • Beginning Oracle WebLogic for Administrators
  • SQL Injection Attacks
  • Configure Juniper SRX Router Using J-Web
  • Selenium Automation Testing for Beginners
  • A Practical Introduction to Cloud Computing
  • Make In-house Hacking and Pentesting Lab
  • Applied Microsoft SQL Server Security
  • Edge Security Demystified
  • IT Helpdesk Fundamentals
  • Assessing and Protecting Industrial Control Systems
  • Introduction to IoT Hacking
  • JWT Exploitation for Pentesters
  • Linux Troubleshooting Best Practices
  • Rocky Linux Server: An Alternative to Red Hat
  • Hands-on Cryptography with C++
  • Practical Industrial Control System Penetration Testing
  • Advanced OT Cyber Security (ICS-DCS-SCADA)
  • Continuous Security Validation for Organizations
  • Advanced FortiGate Configuration
  • Getting Started with Bug Bounty Hunting
  • Certified SOC Analyst (CSA)
  • Certified Cybersecurity Technician (CCT)
  • Cisco CCNP ENCOR (350-401) – Part 1
  • Linux Command Line for an Ethical Hacker
  • Computational Intelligence for Cybersecurity
  • ICS/OT Cybersecurity - NIST 800-82 Rev 3
  • Hands-on Penetration Testing with Termux
  • Mastering Network Intrusion Defense
  • pfSense: Network Security and Firewall Management
  • Hands-on Vulnerability Scanning with Nessus
  • Hands-on with Sophos Firewall
  • IPv6: Attack & Defense
  • Microsoft Security Development Lifecycle (SDL) for Secure Software
  • Introduction to Metasploit
  • Top 100 Interesting Bugs | Ethical Hacking & Bug Bounty - Part 1
  • Digital Forensics Masterclass Complete Computer Forensics
  • Defending Active Directory
  • Getting Started with IoT Security
  • Introduction to Web Forensics
  • Linux Security Guide
  • Cybersecurity: Cloud Security NOW! (2025)
  • Practical Bug Bounty Hunting for Hackers and Pentesters
  • DevSecOps: Implementing Security in DevOps Processes
  • Reverse Engineering: Frida For Beginners
  • Hands-on Penetration Testing with Netcat
  • Black Hat C++: C++ For Pentesters

Certifications Courses

Certifications Courses