Home » Skills » E-Learning and Tutorials

E-Learning and Tutorials

We have compiled a list of free e-learning courses for cybersecurity professionals as well as enthusiasts.

Vulnerability Scanning

This course will complement the previous course on Network Scanning, and we will go a bit deeper into finding vulnerabilities. Once you have identified relevant …
Read More

Metasploit and MSFvenom

The Metasploit framework can be used to access systems that are vulnerable to known exploits. This enables a hacker to get access to insecure systems. …
Read More

The Fundamentals of Metasploit

Welcome to this course about the Fundamentals of Metasploit! The course contains an elementary introduction to the framework and its use. Furthermore, it presents a …
Read More

Linux Command Line & Kali

The ability to understand and use Linux based operating systems is a crucial part of your skillset as a cybersecurity professional. Not only are these …
Read More

Regulation and Cyber Security 1

The purpose of this course is to give you an introduction to the regulation relevant to cybersecurity. In the increasing focus on cybersecurity, a number …
Read More

Network Scanning

Scanning of networks is a fundamental part of cybersecurity. Probing networks or internet services, searching for vulnerabilities or possible entry points for infiltrating IT assets, …
Read More

Log parsing with python

Parsing is basically the process of breaking the process down, your log message into smaller chunks of data and placing them into its own specific named fields by following …
Read More

Introduction to Pentesting

A penetration test is a process whereby the IT-systems of a company are “tested” for any known vulnerabilities. These could be related to software defects …
Read More

Reconnaissance

Reconnaissance is a concept that is known for centuries, primarily for military strategical purpose. In IT security it is an important phase, in which an attacker uses for …
Read More

Wireshark 2

This course is the sequel to Wireshark 1 where you will learn HTTP and HHTPS requests and different decryption methods. Learn more
Read More

Wireshark 1

Wireshark is a network packet analyzer. A network packet analyzer will try to capture network packets and try to display the packet data as detailed …
Read More

SQL injection

Since the beginning of the internet and rise of applications storing user data, breaches of the database storage components have been a regular part of …
Read More

Cross-site request forgery

Cross-Site Request Forgery, also known as CSRF, is a cyber attack that manipulates benign and trusted web applications, in pursuit of forcing users to complete …
Read More

Cross-site Scripting

Being a user of the Internet in almost inevitable in the modern world, which presents oneself in a vulnerable position. The possible angles of attack …
Read More

Network Monitoring and Sniffing

Monitoring and sniffing networks are fundamental parts of cybersecurity. Probing networks or internet services, searching for vulnerabilities or possible entry points for infiltrating IT assets …
Read More

Phishing Prevention

Prevention of phishing attacks is a non-trivial challenge: While there is no silver bullet, a number of countermeasures can be taken towards different parts of …
Read More

Phishing Techniques

Phishing covers a broad range of cybercriminal activities, ranging from simple malicious emails to highly coordinated attacks using complex schemes of social engineering. Most of …
Read More

Introduction to Phishing

Phishing attacks are amongst the most frequent cybersecurity incidents. The category covers a broad range of attacks, from simple malicious emails to highly coordinated attacks …
Read More