Cyber Security 101
Introductory course for anyone entering cybersecurity.
View CourseBeginners | Experts | Executives
Where cyber security meets entrepreneurship. Browse beginner, professional, business, cyber awareness, CompTIA, pen testing, and career-path courses built for students, professionals, families, executives, law enforcement, and entrepreneurs.
Introductory course for anyone entering cybersecurity.
View CourseFind the right cybersecurity career pathway and required skills.
View CourseBasic computer literacy for new technology users.
View CourseLearn how to build and monetize a cybersecurity business.
View CourseNetwork penetration testing lifecycle, reporting, and remediation.
View CourseEthical hacking methods, tools, and controlled lab practice.
View CourseSOC analyst skills, alert triage, tools, and workflows.
View CourseCollect and analyze public web intelligence ethically.
View CourseSecurity+ fundamentals, controls, threats, and exam preparation.
View CourseNetworking foundations for cybersecurity learners.
View CourseHardware, operating systems, troubleshooting, and support basics.
View CourseThreat detection, analysis, and security operations preparation.
View CourseAuthorized penetration testing concepts and exam preparation.
View CourseAdvanced security architecture and enterprise risk topics.
View CourseFoundational ethical hacking concepts and legal boundaries.
View CourseReconnaissance, scanning, testing, and reporting basics.
View CourseOWASP-style web risks, testing, and secure remediation.
View CourseSecure networks, firewalls, segmentation, and access control.
View CourseLinux command line skills for analysts and testers.
View CourseWindows hardening, logs, permissions, and security tools.
View CourseCloud risks, shared responsibility, IAM, and monitoring.
View CourseAWS identity, network security, logging, and cloud controls.
View CourseMicrosoft cloud security, Entra ID, and governance basics.
View CourseGoogle Cloud IAM, network controls, and monitoring basics.
View CoursePractical security behavior for everyday employees.
View CourseRecognize phishing, social engineering, and business email scams.
View CourseAge-appropriate online safety and cyber awareness.
View CourseOnline privacy, cyberbullying, scams, and digital reputation.
View CourseTools and strategies to protect children online.
View CourseAvoid scams, identity theft, and online fraud targeting seniors.
View CourseProtect personal information and recover from identity theft.
View CourseRecognize romance scams and online manipulation tactics.
View CoursePrevent, document, and respond to cyberbullying incidents.
View CourseUnderstand sextortion risks, prevention, and response steps.
View CourseRecognize blackmail schemes and preserve evidence safely.
View CourseUnderstand extortion threats and incident response basics.
View CourseProtect privacy across devices, apps, and accounts.
View CourseBuild strong authentication habits and reduce account takeover risk.
View CourseSecure smartphones, apps, permissions, and backups.
View CourseSecure routers, Wi-Fi, smart devices, and family networks.
View CourseAffordable cyber controls for small businesses and startups.
View CourseProtect business data, clients, payments, and brand reputation.
View CourseBusiness formation, services, pricing, clients, and sales.
View CourseHow to scope, deliver, and report security consulting work.
View CoursePosition cybersecurity services and win qualified clients.
View CourseBuild authority through talks, media, webinars, and events.
View CourseTurn expertise into books, guides, and training products.
View CourseEarn interviews, build credibility, and communicate clearly.
View CourseLegal issues involving cybercrime, privacy, and digital evidence.
View CourseProtect client data and understand legal technology risks.
View CoursePreserve, document, and understand digital evidence workflows.
View CourseFoundations for investigating online crime and fraud.
View CourseOpen-source intelligence collection, validation, and documentation.
View CourseDeeper OSINT workflows for people, domains, and organizations.
View CourseInvestigate social platforms while preserving evidence.
View CourseUnderstand dark web risks, terminology, and safe research boundaries.
View CourseCollect, analyze, and communicate cyber threat intelligence.
View CourseIntroductory malware behavior, triage, and safe analysis concepts.
View CoursePrepare for ransomware prevention, response, and recovery.
View CoursePlan, detect, contain, eradicate, and recover from incidents.
View CourseEvidence handling, forensic images, timelines, and reporting basics.
View CourseCore analyst skills for monitoring, investigation, and reporting.
View CourseSearch logs, build alerts, and investigate events in SIEM tools.
View CourseAnalyze logs from endpoints, servers, cloud, and network systems.
View CourseProtect laptops, desktops, and servers against common attacks.
View CourseScan, prioritize, remediate, and report vulnerabilities.
View CourseReduce risk through practical update and patch workflows.
View CourseIdentify, assess, and reduce organizational cybersecurity risk.
View CoursePolicies, roles, oversight, and measurable security governance.
View CourseApply NIST CSF concepts to organize cybersecurity programs.
View CourseUse NICE/NICCS concepts to map roles, skills, and training.
View CourseUnderstand privacy principles and practical data protection steps.
View CourseHealthcare security and privacy awareness foundations.
View CoursePayment card data security requirements and responsibilities.
View CourseStrategic cyber risk for CEOs, presidents, and leaders.
View CourseCyber oversight, reporting, and decision-making for boards.
View CourseCybercrime trends and response considerations for law enforcement.
View CourseCyber concepts for intelligence and investigative professionals.
View CourseUnderstand surveillance threats, privacy, and protective measures.
View CourseFoundational awareness of counter-surveillance and personal security.
View CourseWrite safer code and prevent common software vulnerabilities.
View CourseUse Python for automation, parsing, and security workflows.
View CourseUnderstand common JavaScript and browser security risks.
View CourseRecognize and prevent SQL injection vulnerabilities.
View CourseSecure APIs through authentication, authorization, and testing.
View CourseIntegrate security into development and deployment pipelines.
View CourseSecure images, registries, runtime, and container configurations.
View CourseSecure clusters, workloads, identities, and network policies.
View CourseIdentity-centered security and least-privilege access concepts.
View CourseProtect users and organizations from email-based attacks.
View CoursePrevent, detect, and respond to BEC and wire fraud schemes.
View CourseInvestigate online fraud patterns and preserve key records.
View CourseUnderstand policies, controls, claims, and risk transfer.
View CourseCreate usable policies, standards, and procedures.
View CourseBuild a cyber resume and communicate relevant experience.
View CoursePrepare for analyst, support, networking, and security interviews.
View CourseStep-by-step pathway toward SOC analyst roles.
View CourseNetworking and support skills for junior admin roles.
View CourseSkills and milestones for security specialist positions.
View CourseAudit, controls, compliance, and evidence collection basics.
View CourseKnown academy course pages use direct live course URLs. Generated course titles use matching /courses/ slug-style URLs. All prior TBA placeholders were changed to FREE.