🎉 Free Access Active — All courses are free for 34 more days! Ends June 1, 2026.
Course Catalog
Explore our comprehensive cybersecurity training courses
Introduction to Cybersecurity
beginner🇵🇹 PT🇰🇪 SW
Master the fundamentals of cybersecurity including threat landscapes, security principles, CIA triad, and basic defense mechanisms. Perfect for beginners starting their security journey.
40h
Multiple modules
Advanced Network Security
intermediatePro🇵🇹 PT🇰🇪 SW
Deep dive into network security, penetration testing, vulnerability assessment, and advanced defense techniques. Build expertise in securing complex network infrastructures.
50h
Multiple modules
Advanced Penetration Testing & Red Team Operations
professionalPro🇵🇹 PT🇰🇪 SW
Master advanced exploitation techniques, post-exploitation, privilege escalation, and red team tactics. Prepare for professional certifications like OSCP and OSCE.
60h
Multiple modules
Linux Fundamentals
beginner🇵🇹 PT🇰🇪 SW
Master Linux command line, file permissions, and system administration basics essential for cybersecurity
20h
Multiple modules
Windows Fundamentals
beginner🇵🇹 PT🇰🇪 SW
Learn Windows OS internals, PowerShell, Active Directory basics, and Windows security features
22h
Multiple modules
Networking Essentials
beginner🇵🇹 PT🇰🇪 SW
Understand TCP/IP, OSI model, routing, switching, and network protocols critical for security
Master social engineering tactics, phishing campaigns, physical penetration testing, and OSINT
32h
Multiple modules
Pre-Security Fundamentals
beginner🇵🇹 PT🇰🇪 SW
Master the essential prerequisites before diving into cybersecurity. Learn about computer networking, operating systems, and how the web works.
25h
Multiple modules
Web Application Security
intermediatePro🇵🇹 PT🇰🇪 SW
Learn to identify and exploit common web vulnerabilities including OWASP Top 10, SQL injection, XSS, CSRF, and secure coding practices.
45h
Multiple modules
Network Security & Hardening
intermediatePro🇵🇹 PT🇰🇪 SW
Learn network security principles, firewalls, IDS/IPS, VPNs, and network hardening techniques to protect infrastructure.
40h
Multiple modules
Red Team Operations
professionalPro🇵🇹 PT🇰🇪 SW
Advanced adversary simulation, persistence techniques, lateral movement, and evasion tactics used by professional red teams.
60h
Multiple modules
Cloud Security Fundamentals
professionalPro🇵🇹 PT🇰🇪 SW
Secure cloud infrastructure across AWS, Azure, and GCP with focus on misconfigurations, IAM, and cloud-native security.
50h
Multiple modules
Banking Cybersecurity Professional Certification
professionalPro🇵🇹 PT🇰🇪 SW
Comprehensive cybersecurity training program designed specifically for banking professionals. Covers PCI-DSS compliance, SWIFT security, fraud detection, regulatory requirements, and social engineering defense. Meets Banco de Moçambique cybersecurity training requirements.
40h
Multiple modules
Botswana Regulatory Framework for Cybersecurity
beginner
A comprehensive overview of Botswana's cybersecurity regulatory landscape for financial institutions. Covers the Bank of Botswana Guidelines on Cybersecurity and Resilience (2023), the Data Protection Act (2018), the Cybercrime and Computer Related Crimes Act (2018), and the National Cybersecurity Strategy. Designed for compliance officers, legal teams, and senior management in Botswana's banking sector.
8h
Multiple modules
Cybersecurity Fundamentals for Botswana Banking Staff
beginner
Essential cybersecurity knowledge for all banking staff in Botswana. Covers the current cyber threat landscape including SIM-swap fraud, AI-enhanced phishing, advance-fee scams, and ransomware. Includes practical guidance on password security, safe email use, mobile banking security, and incident reporting aligned with Bank of Botswana requirements.
10h
Multiple modules
Data Privacy and Customer Protection in Botswana Banking
intermediatePro
Deep dive into customer data protection obligations under Botswana's Data Protection Act (2018). Covers lawful processing of financial data, data subject rights, mandatory breach notification to BOCRA, handling of sensitive personal data including biometrics, and cross-border data transfer rules. Essential for data controllers and privacy officers in Botswana's financial sector.
8h
Multiple modules
Cyber Fraud Prevention and AML Compliance in Botswana
intermediatePro
Comprehensive training on cyber fraud prevention and anti-money laundering compliance for Botswana's financial sector. Covers APP fraud, invoice fraud, investment scams, AML/CFT requirements under the Financial Intelligence Act (2022), Suspicious Transaction Reporting to the FIA, and FATF compliance. Aligned with Bank of Botswana and NBFIRA regulatory expectations.
8h
Multiple modules
Cyber Incident Response and Business Continuity for Botswana Banks
professionalPro
Advanced training on cyber incident response and business continuity planning for Botswana's banking sector. Covers Bank of Botswana incident reporting requirements, building an Incident Response Team, business impact analysis, recovery objectives, penetration testing requirements, and cyber threat intelligence sharing. For IT security managers, CISOs, and business continuity professionals.
6h
Multiple modules
AI Threat Landscape: Understanding Mythos-Class Risks
beginner
Understand how frontier AI models like Anthropic's Mythos can autonomously discover and exploit zero-day vulnerabilities. Learn the new threat landscape where AI-powered attacks operate at machine speed, and how Project Glasswing and the defender coalition are responding. This course covers the technical capabilities of AI vulnerability discovery, real-world case studies from the Mythos red team report, and the strategic implications for every organization.
Master the skills needed to work alongside AI vulnerability scanners in a post-Mythos world. Learn to triage AI-generated vulnerability findings, prioritize patches using risk-based frameworks, validate automated patches, and build CI/CD pipelines that can deploy critical fixes within hours. This course bridges the gap between AI-speed discovery and human-speed remediation.
16h
Multiple modules
Defend Against Mythos-Class Attacks
professionalPro
Advanced hands-on course simulating AI-speed exploitation scenarios. Practice defending against multi-stage exploit chains, browser sandbox escapes, kernel privilege escalation, and automated lateral movement — all at the speed that AI-powered attackers operate. This course uses realistic lab environments where students must triage, patch, and recover under extreme time pressure.
24h
Multiple modules
Incident Response at Machine Speed
intermediatePro
Traditional incident response assumes human-speed attacks. This course redefines IR for the AI era, teaching rapid containment, automated forensics, and recovery procedures designed for attacks that can compromise an entire network in minutes. Learn to build and lead an IR team that can match AI-powered adversaries.
14h
Multiple modules
Business Continuity in the AI Threat Era
intermediatePro
When AI-powered attacks can compromise an entire organization in minutes, traditional disaster recovery plans are insufficient. This course teaches modern business continuity planning that accounts for AI-speed threats, including immutable backup strategies, rapid recovery procedures, regulatory compliance, and organizational resilience frameworks.
12h
Multiple modules
Open Source Security: Contributing to the Glasswing Ecosystem
intermediatePro
Project Glasswing has made open-source security a critical career path. This course teaches you how to contribute to the security of open-source projects, work with the Linux Foundation's security initiatives, conduct security audits of open-source code, and build a career as an open-source security contributor. Aligned with the Glasswing ecosystem and the broader open-source security community.