✕ Clear filters
590 lessons

🔐 Cybersecurity

Ethical hacking, penetration testing, network security, CTFs and defensive security

All ▶ YouTube 201,014📚 Coursera 18,184🎤 TED 1
CCNA 200-301 Version 1.1: Unit 6
📚 Coursera Course ↗
Self-paced
Cybersecurity
CCNA 200-301 Version 1.1: Unit 6
Coursera Intermediate Opens on Coursera ↗
Data Security
📚 Coursera Course ↗
Self-paced
Cybersecurity
Data Security
Coursera Beginner Opens on Coursera ↗
Cyber Security: Data Security and Information Privacy
📚 Coursera Course ↗
Self-paced
Cybersecurity
Cyber Security: Data Security and Information Privacy
Coursera Beginner Opens on Coursera ↗
Next-Generation Firewalls and Intrusion Prevention
📚 Coursera Course ↗
Self-paced
Cybersecurity
Next-Generation Firewalls and Intrusion Prevention
Coursera Intermediate Opens on Coursera ↗
ESG Mindsets for Business Transformation
📚 Coursera Course ↗
Self-paced
Cybersecurity
ESG Mindsets for Business Transformation
Coursera Beginner Opens on Coursera ↗
VPN Tunneling with OpenVPN: Secure Network Connections
📚 Coursera Course ↗
Self-paced
Cybersecurity
VPN Tunneling with OpenVPN: Secure Network Connections
Coursera Intermediate Opens on Coursera ↗
Cyber Espionage and Counterintelligence
📚 Coursera Course ↗
Self-paced
Cybersecurity
Cyber Espionage and Counterintelligence
Coursera Intermediate Opens on Coursera ↗
Advanced Exploitation and Scripting Techniques
📚 Coursera Course ↗
Self-paced
Cybersecurity
Advanced Exploitation and Scripting Techniques
Coursera Beginner Opens on Coursera ↗
Hacking WEP/WPA/WPA2 Wi-Fi Networks Using Kali Linux
📚 Coursera Course ↗
Self-paced
Cybersecurity
Hacking WEP/WPA/WPA2 Wi-Fi Networks Using Kali Linux
Coursera Beginner Opens on Coursera ↗
NIST 800-171
📚 Coursera Course ↗
Self-paced
Cybersecurity
NIST 800-171
Coursera Intermediate Opens on Coursera ↗
Detecting and Mitigating Cyber Threats and Attacks
📚 Coursera Course ↗
Self-paced
Cybersecurity
Detecting and Mitigating Cyber Threats and Attacks
Coursera Intermediate Opens on Coursera ↗
CCST Cybersecurity Video Training Series
📚 Coursera Course ↗
Self-paced
Cybersecurity
CCST Cybersecurity Video Training Series
Coursera Advanced Opens on Coursera ↗
Cryptography
📚 Coursera Course ↗
Self-paced
Cybersecurity
Cryptography
Coursera Beginner Opens on Coursera ↗
Cybersecurity Policy Foundations
📚 Coursera Course ↗
Self-paced
Cybersecurity
Cybersecurity Policy Foundations
Coursera Beginner Opens on Coursera ↗
Cybersecurity Solutions and Microsoft Defender
📚 Coursera Course ↗
Self-paced
Cybersecurity
Cybersecurity Solutions and Microsoft Defender
Coursera Beginner Opens on Coursera ↗
PowerPoint Data Viz – Business Charting Techniques
📚 Coursera Course ↗
Self-paced
Cybersecurity
PowerPoint Data Viz – Business Charting Techniques
Coursera Beginner Opens on Coursera ↗
Leadership
📚 Coursera Course ↗
Self-paced
Cybersecurity
Leadership
Coursera Beginner Opens on Coursera ↗
Cryptography, Network Security, and Application Security
📚 Coursera Course ↗
Self-paced
Cybersecurity
Cryptography, Network Security, and Application Security
Coursera Intermediate Opens on Coursera ↗
Advanced Networking, Virtualization, and IT Security
📚 Coursera Course ↗
Self-paced
Cybersecurity
Advanced Networking, Virtualization, and IT Security
Coursera Advanced Opens on Coursera ↗
Intermediate Ethical Hacking Hands-on Training
📚 Coursera Course ↗
Self-paced
Cybersecurity
Intermediate Ethical Hacking Hands-on Training
Coursera Beginner Opens on Coursera ↗
Mastering Endpoint Security & Threat Defense
📚 Coursera Course ↗
Self-paced
Cybersecurity
Mastering Endpoint Security & Threat Defense
Coursera Beginner Opens on Coursera ↗
Dell Technologies Networking & Security Technical Support
📚 Coursera Course ↗
Self-paced
Cybersecurity
Dell Technologies Networking & Security Technical Support
Coursera Intermediate Opens on Coursera ↗
Segurança no GKE com Cloud Next Generation Firewall
📚 Coursera Course ↗
Self-paced
Cybersecurity
Segurança no GKE com Cloud Next Generation Firewall
Coursera Intermediate Opens on Coursera ↗
Create Impactful Marketing Videos using Canva
📚 Coursera Course ↗
Self-paced
Cybersecurity
Create Impactful Marketing Videos using Canva
Coursera Intermediate Opens on Coursera ↗
Strategic Cyber Effects Management
📚 Coursera Course ↗
Self-paced
Cybersecurity
Strategic Cyber Effects Management
Coursera Advanced Opens on Coursera ↗
Introduction to Cybersecurity Careers
📚 Coursera Course ↗
Self-paced
Cybersecurity
Introduction to Cybersecurity Careers
Coursera Beginner Opens on Coursera ↗
Cybersecurity: Protecting your Information on the Go
📚 Coursera Course ↗
Self-paced
Cybersecurity
Cybersecurity: Protecting your Information on the Go
Coursera Beginner Opens on Coursera ↗
IT Risk Assessment Practices
📚 Coursera Course ↗
Self-paced
Cybersecurity
IT Risk Assessment Practices
Coursera Beginner Opens on Coursera ↗
Data Visualization & Advanced App Logic
📚 Coursera Course ↗
Self-paced
Cybersecurity
Data Visualization & Advanced App Logic
Coursera Intermediate Opens on Coursera ↗
Ethical Hacking with Kali Linux: Analyze & Apply
📚 Coursera Course ↗
Self-paced
Cybersecurity
Ethical Hacking with Kali Linux: Analyze & Apply
Coursera Intermediate Opens on Coursera ↗
Practical Cybersecurity Fundamentals: Unit 3
📚 Coursera Course ↗
Self-paced
Cybersecurity
Practical Cybersecurity Fundamentals: Unit 3
Coursera Intermediate Opens on Coursera ↗
Secure Against Network Intrusions
📚 Coursera Course ↗
Self-paced
Cybersecurity
Secure Against Network Intrusions
Coursera Intermediate Opens on Coursera ↗
Cybersecurity Assessment: CompTIA Security+ & CYSA+
📚 Coursera Course ↗
Self-paced
Cybersecurity
Cybersecurity Assessment: CompTIA Security+ & CYSA+
Coursera Advanced Opens on Coursera ↗
Introduction to reCAPTCHA
📚 Coursera Course ↗
Self-paced
Cybersecurity
Introduction to reCAPTCHA
Coursera Beginner Opens on Coursera ↗
IT Fundamentals for Business Profiles: Cybersecurity
📚 Coursera Course ↗
Self-paced
Cybersecurity
IT Fundamentals for Business Profiles: Cybersecurity
Coursera Beginner Opens on Coursera ↗
Cybersecurity: Overlooked Threats to Your Strategy
📚 Coursera Course ↗
Self-paced
Cybersecurity
Cybersecurity: Overlooked Threats to Your Strategy
Coursera Beginner Opens on Coursera ↗
TCP/IP and Internet
📚 Coursera Course ↗
Self-paced
Cybersecurity
TCP/IP and Internet
Coursera Intermediate Opens on Coursera ↗
Network Security Principles
📚 Coursera Course ↗
Self-paced
Cybersecurity
Network Security Principles
Coursera Beginner Opens on Coursera ↗
Ethical Hacking Capstone Project: Breach, Response, AI
📚 Coursera Course ↗
Self-paced
Cybersecurity
Ethical Hacking Capstone Project: Breach, Response, AI
Coursera Intermediate Opens on Coursera ↗
AI Agents for Cybersecurity
📚 Coursera Course ↗
Self-paced
Cybersecurity
AI Agents for Cybersecurity
Coursera Intermediate Opens on Coursera ↗
Pentesting APIs
📚 Coursera Course ↗
Self-paced
Cybersecurity
Pentesting APIs
Coursera Intermediate Opens on Coursera ↗
Cybersecurity Architecture
📚 Coursera Course ↗
Self-paced
Cybersecurity
Cybersecurity Architecture
Coursera Beginner Opens on Coursera ↗
Azure Cybersecurity Solutions And Microsoft Defender
📚 Coursera Course ↗
Self-paced
Cybersecurity
Azure Cybersecurity Solutions And Microsoft Defender
Coursera Beginner Opens on Coursera ↗
Network Traffic Analysis with Wireshark
📚 Coursera Course ↗
Self-paced
Cybersecurity
Network Traffic Analysis with Wireshark
Coursera Intermediate Opens on Coursera ↗
Modelling Threats - Strategies in Threat Modelling
📚 Coursera Course ↗
Self-paced
Cybersecurity
Modelling Threats - Strategies in Threat Modelling
Coursera Intermediate Opens on Coursera ↗
Understanding Cyber Risk Reporting with FAIR™
📚 Coursera Course ↗
Self-paced
Cybersecurity
Understanding Cyber Risk Reporting with FAIR™
Coursera Advanced Opens on Coursera ↗
Securing Systems and Networks
📚 Coursera Course ↗
Self-paced
Cybersecurity
Securing Systems and Networks
Coursera Advanced Opens on Coursera ↗
Introduction to the Threat Intelligence Lifecycle
📚 Coursera Course ↗
Self-paced
Cybersecurity
Introduction to the Threat Intelligence Lifecycle
Coursera Beginner Opens on Coursera ↗