Course Catalog
27 courses across four professional tracks. Browse, filter, and enroll.
Digital Forensics
FCMP Series — Evidence-led. Court-ready. Built by examiners.
Introduction to Digital Forensics
Foundational concepts and principles of digital forensic examination.
Evidence Handling & Chain of Custody
Proper procedures for preserving, documenting, and maintaining digital evidence integrity.
Computer Forensics Fundamentals
Core techniques for acquiring, analyzing, and reporting on computer-based evidence.
Mobile Device Forensics
Extraction and analysis techniques for smartphones, tablets, and mobile devices.
Email & Messaging Analysis
Forensic examination of email systems, messaging platforms, and communication metadata.
Network Forensics
Capturing, analyzing, and interpreting network traffic for forensic investigation.
Cloud & Remote Evidence Acquisition
Methods for collecting and preserving evidence from cloud services and remote systems.
Advanced Forensic Analysis Techniques
Advanced methodologies for complex forensic examinations and multi-source analysis.
Expert Witness Testimony & Reporting
Preparing forensic reports and delivering expert testimony in legal proceedings.
Cybersecurity
CYS Series — Offensive and defensive. Practical. No fluff.
Cybersecurity Essentials
Foundational cybersecurity concepts, threats, and defensive strategies.
Security Awareness for Organizations
Building a security-aware culture across your organization.
Ethical Hacking & Penetration Testing
Hands-on offensive security techniques and penetration testing methodologies.
SOC Operations & Threat Monitoring
Security Operations Center workflows, threat detection, and monitoring practices.
Incident Response Fundamentals
Structured approach to detecting, containing, and recovering from security incidents.
Advanced Penetration Testing
Advanced exploitation techniques, post-exploitation, and red team operations.
Malware Analysis & Reverse Engineering
Analyzing malicious software through static and dynamic reverse engineering techniques.
Cloud Security Architecture
Designing and implementing secure cloud infrastructure and architectures.
Cybersecurity Leadership & Governance
Strategic cybersecurity management, governance frameworks, and executive communication.
Cybercrime Investigations
CCI Series — From street-level fraud to nation-state operations.
Digital Evidence Admissibility
Legal frameworks governing the admissibility of digital evidence in proceedings.
OSINT for Investigators
Open-source intelligence gathering techniques for cybercrime investigations.
Dark Web Intelligence & Monitoring
Techniques for monitoring and gathering intelligence from dark web platforms.
Cybercrime Investigation Methodology
Structured investigative methodology for complex cybercrime cases.
Financial Cybercrime & Fraud Investigation
Investigating financial fraud, money laundering, and economic cybercrime.
Cross-Border Cybercrime Cooperation
International frameworks and cooperation mechanisms for cross-border cybercrime cases.
AI Literacy
AI Series — Fluency. Governance. Practical application.
AI Foundations for Security Professionals
Core AI and machine learning concepts for cybersecurity practitioners.
AI in Threat Detection & Security Operations
Applying AI and ML to threat detection, anomaly identification, and SOC automation.
Adversarial AI & Emerging Threats
Understanding adversarial AI techniques, deepfakes, and AI-powered attack vectors.
Investment by Level
All courses are self-paced. Instructor-led cohorts and corporate group training available on request.
Self-paced courses for beginners and non-technical professionals.
Hands-on courses for practitioners building specialist skills.
Expert-level courses for senior professionals and team leads.
Instructor-led cohorts: $1,200–$2,000/seat | Corporate group training: $4,500–$12,000/engagement
Request Corporate Pricing