AES Security

Networking Fundamentals

How devices communicate over networks using protocols and IPs.

Operating Systems Security

Protecting Windows/Linux systems through accounts, patches, and logs.

Threats & Attack Vectors

The common ways attackers break in and cause damage.

Cryptography Basics

Using encryption and hashing to keep data private and secure.

Network Security Tools & Practices

Tools like firewalls, IDS, and SIEMs that defend networks.

Vulnerability Management

Finding and fixing system weaknesses before attackers do.

Identity & Access Management (IAM)

Controlling who can access what, and how they prove it.

Incident Response & Digital Forensics

Steps and analysis for handling and investigating cyberattacks.

Governance, Risk, & Compliance (GRC)

Frameworks and rules that guide security and reduce risk.