🎉 Free Access Active — All courses are free for 34 more days! Ends June 1, 2026.

Course Catalog

Explore our comprehensive cybersecurity training courses

Introduction to Cybersecurity
beginner🇵🇹 PT🇰🇪 SW
Master the fundamentals of cybersecurity including threat landscapes, security principles, CIA triad, and basic defense mechanisms. Perfect for beginners starting their security journey.
40h
Multiple modules
Advanced Network Security
intermediatePro🇵🇹 PT🇰🇪 SW
Deep dive into network security, penetration testing, vulnerability assessment, and advanced defense techniques. Build expertise in securing complex network infrastructures.
50h
Multiple modules
Advanced Penetration Testing & Red Team Operations
professionalPro🇵🇹 PT🇰🇪 SW
Master advanced exploitation techniques, post-exploitation, privilege escalation, and red team tactics. Prepare for professional certifications like OSCP and OSCE.
60h
Multiple modules
Linux Fundamentals
beginner🇵🇹 PT🇰🇪 SW
Master Linux command line, file permissions, and system administration basics essential for cybersecurity
20h
Multiple modules
Windows Fundamentals
beginner🇵🇹 PT🇰🇪 SW
Learn Windows OS internals, PowerShell, Active Directory basics, and Windows security features
22h
Multiple modules
Networking Essentials
beginner🇵🇹 PT🇰🇪 SW
Understand TCP/IP, OSI model, routing, switching, and network protocols critical for security
24h
Multiple modules
Security Operations Center (SOC) Level 1
beginner🇵🇹 PT🇰🇪 SW
Learn SOC analyst fundamentals, SIEM tools, log analysis, and incident response basics
30h
Multiple modules
Active Directory Security
intermediatePro🇵🇹 PT🇰🇪 SW
Master AD enumeration, privilege escalation, Kerberos attacks, and domain hardening techniques
35h
Multiple modules
Cryptography & PKI
intermediatePro🇵🇹 PT🇰🇪 SW
Understand encryption algorithms, hashing, digital signatures, and public key infrastructure
28h
Multiple modules
Incident Response & Digital Forensics
intermediatePro🇵🇹 PT🇰🇪 SW
Learn incident handling, evidence collection, memory forensics, and malware analysis techniques
42h
Multiple modules
Threat Intelligence & Hunting
intermediatePro🇵🇹 PT🇰🇪 SW
Master threat hunting methodologies, MITRE ATT&CK framework, and threat intelligence platforms
38h
Multiple modules
Advanced Malware Analysis
professionalPro🇵🇹 PT🇰🇪 SW
Deep dive into reverse engineering, static/dynamic analysis, and advanced malware techniques
55h
Multiple modules
Mobile Security (iOS & Android)
professionalPro🇵🇹 PT🇰🇪 SW
Learn mobile app security testing, reverse engineering, and exploitation of iOS and Android platforms
48h
Multiple modules
IoT & Embedded Systems Security
professionalPro🇵🇹 PT🇰🇪 SW
Explore IoT protocols, firmware analysis, hardware hacking, and embedded system vulnerabilities
45h
Multiple modules
Security Architecture & Engineering
professionalPro🇵🇹 PT🇰🇪 SW
Design secure systems, implement defense-in-depth, and build enterprise security architectures
52h
Multiple modules
DevSecOps & CI/CD Security
professionalPro🇵🇹 PT🇰🇪 SW
Integrate security into DevOps pipelines, container security, and secure software development lifecycle
40h
Multiple modules
Bug Bounty & Vulnerability Research
professionalPro🇵🇹 PT🇰🇪 SW
Learn bug hunting methodologies, responsible disclosure, and advanced vulnerability discovery techniques
50h
Multiple modules
Social Engineering & Physical Security
intermediatePro🇵🇹 PT🇰🇪 SW
Master social engineering tactics, phishing campaigns, physical penetration testing, and OSINT
32h
Multiple modules
Pre-Security Fundamentals
beginner🇵🇹 PT🇰🇪 SW
Master the essential prerequisites before diving into cybersecurity. Learn about computer networking, operating systems, and how the web works.
25h
Multiple modules
Web Application Security
intermediatePro🇵🇹 PT🇰🇪 SW
Learn to identify and exploit common web vulnerabilities including OWASP Top 10, SQL injection, XSS, CSRF, and secure coding practices.
45h
Multiple modules
Network Security & Hardening
intermediatePro🇵🇹 PT🇰🇪 SW
Learn network security principles, firewalls, IDS/IPS, VPNs, and network hardening techniques to protect infrastructure.
40h
Multiple modules
Red Team Operations
professionalPro🇵🇹 PT🇰🇪 SW
Advanced adversary simulation, persistence techniques, lateral movement, and evasion tactics used by professional red teams.
60h
Multiple modules
Cloud Security Fundamentals
professionalPro🇵🇹 PT🇰🇪 SW
Secure cloud infrastructure across AWS, Azure, and GCP with focus on misconfigurations, IAM, and cloud-native security.
50h
Multiple modules
Banking Cybersecurity Professional Certification
professionalPro🇵🇹 PT🇰🇪 SW
Comprehensive cybersecurity training program designed specifically for banking professionals. Covers PCI-DSS compliance, SWIFT security, fraud detection, regulatory requirements, and social engineering defense. Meets Banco de Moçambique cybersecurity training requirements.
40h
Multiple modules
Botswana Regulatory Framework for Cybersecurity
beginner
A comprehensive overview of Botswana's cybersecurity regulatory landscape for financial institutions. Covers the Bank of Botswana Guidelines on Cybersecurity and Resilience (2023), the Data Protection Act (2018), the Cybercrime and Computer Related Crimes Act (2018), and the National Cybersecurity Strategy. Designed for compliance officers, legal teams, and senior management in Botswana's banking sector.
8h
Multiple modules
Cybersecurity Fundamentals for Botswana Banking Staff
beginner
Essential cybersecurity knowledge for all banking staff in Botswana. Covers the current cyber threat landscape including SIM-swap fraud, AI-enhanced phishing, advance-fee scams, and ransomware. Includes practical guidance on password security, safe email use, mobile banking security, and incident reporting aligned with Bank of Botswana requirements.
10h
Multiple modules
Data Privacy and Customer Protection in Botswana Banking
intermediatePro
Deep dive into customer data protection obligations under Botswana's Data Protection Act (2018). Covers lawful processing of financial data, data subject rights, mandatory breach notification to BOCRA, handling of sensitive personal data including biometrics, and cross-border data transfer rules. Essential for data controllers and privacy officers in Botswana's financial sector.
8h
Multiple modules
Cyber Fraud Prevention and AML Compliance in Botswana
intermediatePro
Comprehensive training on cyber fraud prevention and anti-money laundering compliance for Botswana's financial sector. Covers APP fraud, invoice fraud, investment scams, AML/CFT requirements under the Financial Intelligence Act (2022), Suspicious Transaction Reporting to the FIA, and FATF compliance. Aligned with Bank of Botswana and NBFIRA regulatory expectations.
8h
Multiple modules
Cyber Incident Response and Business Continuity for Botswana Banks
professionalPro
Advanced training on cyber incident response and business continuity planning for Botswana's banking sector. Covers Bank of Botswana incident reporting requirements, building an Incident Response Team, business impact analysis, recovery objectives, penetration testing requirements, and cyber threat intelligence sharing. For IT security managers, CISOs, and business continuity professionals.
6h
Multiple modules
AI Threat Landscape: Understanding Mythos-Class Risks
beginner
Understand how frontier AI models like Anthropic's Mythos can autonomously discover and exploit zero-day vulnerabilities. Learn the new threat landscape where AI-powered attacks operate at machine speed, and how Project Glasswing and the defender coalition are responding. This course covers the technical capabilities of AI vulnerability discovery, real-world case studies from the Mythos red team report, and the strategic implications for every organization.
8h
Multiple modules
AI-Powered Vulnerability Triage & Automated Patching
intermediatePro
Master the skills needed to work alongside AI vulnerability scanners in a post-Mythos world. Learn to triage AI-generated vulnerability findings, prioritize patches using risk-based frameworks, validate automated patches, and build CI/CD pipelines that can deploy critical fixes within hours. This course bridges the gap between AI-speed discovery and human-speed remediation.
16h
Multiple modules
Defend Against Mythos-Class Attacks
professionalPro
Advanced hands-on course simulating AI-speed exploitation scenarios. Practice defending against multi-stage exploit chains, browser sandbox escapes, kernel privilege escalation, and automated lateral movement — all at the speed that AI-powered attackers operate. This course uses realistic lab environments where students must triage, patch, and recover under extreme time pressure.
24h
Multiple modules
Incident Response at Machine Speed
intermediatePro
Traditional incident response assumes human-speed attacks. This course redefines IR for the AI era, teaching rapid containment, automated forensics, and recovery procedures designed for attacks that can compromise an entire network in minutes. Learn to build and lead an IR team that can match AI-powered adversaries.
14h
Multiple modules
Business Continuity in the AI Threat Era
intermediatePro
When AI-powered attacks can compromise an entire organization in minutes, traditional disaster recovery plans are insufficient. This course teaches modern business continuity planning that accounts for AI-speed threats, including immutable backup strategies, rapid recovery procedures, regulatory compliance, and organizational resilience frameworks.
12h
Multiple modules
Open Source Security: Contributing to the Glasswing Ecosystem
intermediatePro
Project Glasswing has made open-source security a critical career path. This course teaches you how to contribute to the security of open-source projects, work with the Linux Foundation's security initiatives, conduct security audits of open-source code, and build a career as an open-source security contributor. Aligned with the Glasswing ecosystem and the broader open-source security community.
14h
Multiple modules