Cyber Security 101
Introductory course for anyone entering cybersecurity.
Beginners | Experts | Executives
Where cyber security meets entrepreneurship. Browse beginner, professional, business,
cyber awareness, CompTIA, pen testing, and career-path courses built for students,
professionals, families, executives, law enforcement, and entrepreneurs.
Introductory course for anyone entering cybersecurity.
Find the right cybersecurity career pathway and required skills.
Basic computer literacy for new technology users.
Learn how to build and monetize a cybersecurity business.
Network penetration testing lifecycle, reporting, and remediation.
Ethical hacking methods, tools, and controlled lab practice.
SOC analyst skills, alert triage, tools, and workflows.
Collect and analyze public web intelligence ethically.
Security+ fundamentals, controls, threats, and exam preparation.
Networking foundations for cybersecurity learners.
Hardware, operating systems, troubleshooting, and support basics.
Threat detection, analysis, and security operations preparation.
Authorized penetration testing concepts and exam preparation.
Advanced security architecture and enterprise risk topics.
Foundational ethical hacking concepts and legal boundaries.
Reconnaissance, scanning, testing, and reporting basics.
OWASP-style web risks, testing, and secure remediation.
Secure networks, firewalls, segmentation, and access control.
Linux command line skills for analysts and testers.
Windows hardening, logs, permissions, and security tools.
Cloud risks, shared responsibility, IAM, and monitoring.
AWS identity, network security, logging, and cloud controls.
Microsoft cloud security, Entra ID, and governance basics.
Google Cloud IAM, network controls, and monitoring basics.
Practical security behavior for everyday employees.
Recognize phishing, social engineering, and business email scams.
Age-appropriate online safety and cyber awareness.
Online privacy, cyberbullying, scams, and digital reputation.
Tools and strategies to protect children online.
Avoid scams, identity theft, and online fraud targeting seniors.
Protect personal information and recover from identity theft.
Recognize romance scams and online manipulation tactics.
Prevent, document, and respond to cyberbullying incidents.
Understand sextortion risks, prevention, and response steps.
Recognize blackmail schemes and preserve evidence safely.
Understand extortion threats and incident response basics.
Protect privacy across devices, apps, and accounts.
Build strong authentication habits and reduce account takeover risk.
Secure smartphones, apps, permissions, and backups.
Secure routers, Wi-Fi, smart devices, and family networks.
Affordable cyber controls for small businesses and startups.
Protect business data, clients, payments, and brand reputation.
Business formation, services, pricing, clients, and sales.
How to scope, deliver, and report security consulting work.
Position cybersecurity services and win qualified clients.
Build authority through talks, media, webinars, and events.
Turn expertise into books, guides, and training products.
Earn interviews, build credibility, and communicate clearly.
Legal issues involving cybercrime, privacy, and digital evidence.
Protect client data and understand legal technology risks.
Preserve, document, and understand digital evidence workflows.
Foundations for investigating online crime and fraud.
Open-source intelligence collection, validation, and documentation.
Deeper OSINT workflows for people, domains, and organizations.
Investigate social platforms while preserving evidence.
Understand dark web risks, terminology, and safe research boundaries.
Collect, analyze, and communicate cyber threat intelligence.
Introductory malware behavior, triage, and safe analysis concepts.
Prepare for ransomware prevention, response, and recovery.
Plan, detect, contain, eradicate, and recover from incidents.
Evidence handling, forensic images, timelines, and reporting basics.
Core analyst skills for monitoring, investigation, and reporting.
Search logs, build alerts, and investigate events in SIEM tools.
Analyze logs from endpoints, servers, cloud, and network systems.
Protect laptops, desktops, and servers against common attacks.
Scan, prioritize, remediate, and report vulnerabilities.
Reduce risk through practical update and patch workflows.
Identify, assess, and reduce organizational cybersecurity risk.
Policies, roles, oversight, and measurable security governance.
Apply NIST CSF concepts to organize cybersecurity programs.
Use NICE/NICCS concepts to map roles, skills, and training.
Understand privacy principles and practical data protection steps.
Healthcare security and privacy awareness foundations.
Payment card data security requirements and responsibilities.
Strategic cyber risk for CEOs, presidents, and leaders.
Cyber oversight, reporting, and decision-making for boards.
Cybercrime trends and response considerations for law enforcement.
Cyber concepts for intelligence and investigative professionals.
Understand surveillance threats, privacy, and protective measures.
Foundational awareness of counter-surveillance and personal security.
Write safer code and prevent common software vulnerabilities.
Use Python for automation, parsing, and security workflows.
Understand common JavaScript and browser security risks.
Recognize and prevent SQL injection vulnerabilities.
Secure APIs through authentication, authorization, and testing.
Integrate security into development and deployment pipelines.
Secure images, registries, runtime, and container configurations.
Secure clusters, workloads, identities, and network policies.
Identity-centered security and least-privilege access concepts.
Protect users and organizations from email-based attacks.
Prevent, detect, and respond to BEC and wire fraud schemes.
Investigate online fraud patterns and preserve key records.
Understand policies, controls, claims, and risk transfer.
Create usable policies, standards, and procedures.
Build a cyber resume and communicate relevant experience.
Prepare for analyst, support, networking, and security interviews.
Step-by-step pathway toward SOC analyst roles.
Networking and support skills for junior admin roles.
Skills and milestones for security specialist positions.
Audit, controls, compliance, and evidence collection basics.
Known academy course pages use direct live course URLs. Generated course titles use matching /courses/ slug-style URLs.
All prior TBA placeholders were changed to FREE.
Copyright 2005 – 2025 National Cyber Security