Our Courses

We offer hundreds of courses in Cybersecurity, IT, Soft Skills, and Management and we’re adding more all the time. Please use the search bar or filter by topic and/or skill level to find your content and get started!

  • Topics

  • Skill Level

information security

Advanced Open Source Intelligence and Privacy

6 Lessons | 17 Topics

This course is a natural and logical extent of the previous Open source intelligence course where we placed a good foundation to move to more advanced topics concerning OSINT and the Privacy perspective of your digital life. This course assumes you are familiar with basic search operators and generic OSINT processes (requirements planning, keyword indexing, […]

Black Hat Python: Python For Pentesters

8 Lessons | 29 Topics | 7 Quizzes

Bored of using automated testing tools, it is the right time to switch to Python.  Packed with many reverse engineering and exploitation libraries, Python is a great language to learn if you want to flirt with information security tasks. This course will teach you how to read and write new packets, sniff the network, and […]

Build Your Own NetApp Storage Lab, for Free

2 Lessons | 13 Topics

This course walks you through how to build a fully ready and complete NetApp simulator lab from scratch, using NetApp’s latest operating system ONTAP 9. The lab features two NetApp simulator clusters with Windows and Linux clients in separate IP subnets to make it as close to a real world environment as possible… and best […]

Burp Suite: Web Application Penetration Testing

6 Lessons | 19 Topics

Expand your knowledge of Burp Suite beyond just capturing the request and responses. Burp Suite is one of the freely available and most widely accepted penetration testing tools to discover vulnerabilities and attacks. Burp suite as an integrated platform has some advanced set of tools and interfaces to perform security testing. Its various tools work […]

Common Cybersecurity Attacks and Defense Strategies

2 Lessons | 10 Topics

Bad actors are constantly hunting for your personal and proprietary information to use against you for their profit. Attacks are becoming more and more sophisticated, so you must learn to recognize their methods and start defending your cyberspace today. This course teaches you to recognize the most common and most devastating attacks. Relevant, timely information […]

Cyberbullying and You: Beating-the-Bully Guidelines

5 Lessons | 15 Topics

Cyberbullying – which refers to incidents where digital technologies are used to harass, threaten, and humiliate others – is one of the most common types of online harassment. Cyberbullying is on the rise worldwide. According to a UNICEF report in 2019, one in three young people (aged 13-24 years) in 30 countries said they have been a victim of cyberbullying. Cyberbullying […]

Cybercrime And You: Staying Safe in a Hyper-Connected World

7 Lessons | 23 Topics

In our hyper-connected world, where instant communication between people, data and machines occurs over global, open networks, cybercrime has become an inescapable part of our daily lives.   More and more people are increasingly reliant on online spaces to live, study, work, and entertainment and leisure. However, without the requisite cybersecurity infrastructure and knowledge as we […]

Cybersecurity for Businesses – The Fundamental Edition

4 Lessons | 10 Topics | 2 Quizzes

Are you a small business owner that is worried about being hacked?  Are you confused on where to start and how to begin?  Have you been looking for a course that teaches you the information/cybersecurity basics to best protect your business in a fun relaxed manner?  If so, you are going to find that this […]

Deep Dive into the World of Malware

10 Lessons | 16 Topics | 8 Quizzes

We have been seeing increasing news stories about breaches, hacks, and various cyberattacks but what does it mean in the real world? How does it impact me? This course aims to look at modern malware families and techniques, as well as how they are being used in the “real world”. By the end of this […]

End-to-End Mobile Security

7 Lessons | 24 Topics | 5 Quizzes

The more that we become connected the more we need to be conscious of mobile security. Contacts, emails, passwords, location data, confidential documents, photos, etc. are all contained on our phones and thus are a prime target for malicious hackers and leaked data. It is critical to understand how to secure our mobile devices and […]