-
Network Fundamentals
-
How the Web Works?
-
Computers Fundamentals
-
Operating Systems Basics
-
Software Basics
-
Attacks and Defenses
-
Windows Fundamentals
-
Command Line
-
Networking
-
Cryptography
-
Exploitation Basics
-
Web Hacking
-
Offensive Security Tooling
-
Defensive Security
-
Security Solutions
-
Defensive Security Tooling
-
Build your Cybersecurity Career
-
OWASP Top 10 (2025)
-
Blue Team Introduction
-
SOC Team Internals
-
Core SOC Solutions
-
Cyber Defence Frameworks
-
Phishing Analysis
-
Network Traffic Analysis
-
Network Security Monitoring
-
Web Security Monitoring
-
Windows Security Monitoring
-
Linux Security Monitoring
-
Malware Concepts for SOC
-
Threat Analysis Tools
-
SIEM Triage for SOC
- Log Analysis
- Advanced Splunk
- Advanced ELK
- Detection Engineering
- Threat Hunting
- Threat Emulation
- Incident Response
- Malware Analysis
- File System Analysis
- Linux Endpoint Investigation
- Windows Endpoint Investigation
- macOS Forensics
- Mobile Analysis
- Memory Analysis
- Disk Image Analysis
- Introduction to Security Engineering
- Threats and Risks
- Network and System Security
- Software Security
- Managing Incidents
- OWASP Top 10 (2025)
