Khalil Afridi Profile picture
Oct 17 โ€ข 10 tweets โ€ข 4 min read
Start your Career in Cyber-Security / Information-Security by spending $0

These are FREE University courses that are available online for you to take!
๐Ÿงต

#infosec #infosecurity #Harvard #NetworkSecurity #CyberMonday2022 #CyberSecurityAwareness
๐ˆ๐๐Œ - ๐‚๐ฒ๐›๐ž๐ซ๐ฌ๐ž๐œ๐ฎ๐ซ๐ข๐ญ๐ฒ ๐๐š๐ฌ๐ข๐œ๐ฌ
This course gives you the background needed to understand the basics of Cybersecurity.
๐Ÿ–‡๏ธ
edx.org/course/cyberseโ€ฆ
๐‚๐ฒ๐›๐ž๐ซ๐ฌ๐ž๐œ๐ฎ๐ซ๐ข๐ญ๐ฒ ๐…๐ฎ๐ง๐๐š๐ฆ๐ž๐ง๐ญ๐š๐ฅ๐ฌ

Learn cybersecurity fundamentals, including how to detect threats, protect systems and networks, and anticipate potential cyber attacks.
๐Ÿ–‡๏ธ
edx.org/course/cyberseโ€ฆ
๐๐ž๐ญ๐ฐ๐จ๐ซ๐ค ๐ฌ๐ž๐œ๐ฎ๐ซ๐ข๐ญ๐ฒ

This free course, Network security, helps to explain the intricacies area of network security by studying the main issues involved in achieving a reasonable degree of resilience against attacks.
๐Ÿ–‡๏ธ
open.edu/openlearn/scieโ€ฆ
๐๐ž๐ญ๐ฐ๐จ๐ซ๐ค ๐’๐ž๐œ๐ฎ๐ซ๐ข๐ญ๐ฒ - ๐€๐๐ฏ๐š๐ง๐œ๐ž๐ ๐“๐จ๐ฉ๐ข๐œ๐ฌ

Learn advanced topics in network security, including Security Monitoring, Perimeter Security, IPv6, and IPv6 Security.
๐Ÿ–‡๏ธ
edx.org/course/networkโ€ฆ
๐๐ž๐ฐ ๐˜๐จ๐ซ๐ค ๐”๐ง๐ข๐ฏ๐ž๐ซ๐ฌ๐ข๐ญ๐ฒ - ๐๐ž๐ง๐ž๐ญ๐ซ๐š๐ญ๐ข๐จ๐ง ๐“๐ž๐ฌ๐ญ๐ข๐ง๐  - ๐„๐ฑ๐ฉ๐ฅ๐จ๐ข๐ญ๐š๐ญ๐ข๐จ๐ง

Learn exploit phase of penetration testing, including the foundations of explorations, app deb, RE, exploit dev & web app exp.
๐Ÿ–‡๏ธ
edx.org/course/penetraโ€ฆ
๐‚๐ฒ๐›๐ž๐ซ๐ฌ๐ž๐œ๐ฎ๐ซ๐ข๐ญ๐ฒ ๐‘๐ข๐ฌ๐ค ๐Œ๐š๐ง๐š๐ ๐ž๐ฆ๐ž๐ง๐ญ

Learn key principles of risk analysis, risk assessment, and risk mitigation for information security using both qualitative and quantitative methodologies.
๐Ÿ–‡๏ธ
edx.org/course/cyberseโ€ฆ
๐‡๐š๐ซ๐ฏ๐š๐ซ๐ ๐”๐ง๐ข๐ฏ๐ž๐ซ๐ฌ๐ข๐ญ๐ฒ ๐‚๐’๐Ÿ“๐ŸŽ'๐ฌ ๐ˆ๐ง๐ญ๐ซ๐จ๐๐ฎ๐œ๐ญ๐ข๐จ๐ง ๐ญ๐จ ๐‚๐จ๐ฆ๐ฉ๐ฎ๐ญ๐ž๐ซ ๐’๐œ๐ข๐ž๐ง๐œ๐ž

An introduction to the intellectual enterprises of computer science and the art of programming.
๐Ÿ–‡๏ธ
edx.org/course/introduโ€ฆ
๐‡๐š๐ซ๐ฏ๐š๐ซ๐๐— ๐‚๐’๐Ÿ“๐ŸŽ'๐ฌ ๐ˆ๐ง๐ญ๐ซ๐จ๐๐ฎ๐œ๐ญ๐ข๐จ๐ง ๐ญ๐จ ๐๐ซ๐จ๐ ๐ซ๐š๐ฆ๐ฆ๐ข๐ง๐  ๐ฐ๐ข๐ญ๐ก ๐๐ฒ๐ญ๐ก๐จ๐ง

An introduction to programming using Python, a popular language for general-purpose programming, data science, web programming, and more.
๐Ÿ–‡๏ธ
edx.org/course/cs50s-iโ€ฆ
That's a wrap!

If you enjoyed this thread:

1. Follow me @khalilApriday for more of these
2. RT and share this thread with your audience

โ€ข โ€ข โ€ข

Missing some Tweet in this thread? You can try to force a refresh
ใ€€

Keep Current with Khalil Afridi

Khalil Afridi Profile picture

Stay in touch and get notified when new unrolls are available from this author!

Read all threads

This Thread may be Removed Anytime!

PDF

Twitter may remove this content at anytime! Save it as PDF for later use!

Try unrolling a thread yourself!

how to unroll video
  1. Follow @ThreadReaderApp to mention us!

  2. From a Twitter thread mention us with a keyword "unroll"
@threadreaderapp unroll

Practice here first or read more on our help page!

More from @khalilApriday

Sep 19
Whether you're applying for a new job or considering a cloud computing career, brush up on your Microsoft Azure skills.

I have put together a collection of our TOP Microsoft Azure training resources for free:๐Ÿงต

#Microsoft #Azure #Cloud #aws #GCP #learning #cloudtech
1โƒฃ Microsoft Azure Fundamentals AZ-900 Exam Prep Specialization

๐Ÿ”—
learn.microsoft.com/en-us/trainingโ€ฆ
2โƒฃ Top 3 free resources developers need for learning Azure

๐Ÿ”—
azure.microsoft.com/en-gb/blog/topโ€ฆ
Read 11 tweets
Sep 15
Python for Cybersecurity Specialization

Master Python for a variety of cybersecurity tasks with these FREE Top-class resources.

Enrollment Starts: Sep 15

#CyberSecurity #Python #programming #infosec #developer

๐Ÿ‘‡๐Ÿ‘‡
1โƒฃ Introduction to Python for Cybersecurity

- This course is the first part of Python for Cybersecurity Specialization.
- Learners will get an introduction and overview of the course format and learning objectives.

coursera.org/learn/pythonfoโ€ฆ
2โƒฃ Execution, persistence, privilege escalation, and evasion

coursera.org/learn/executioโ€ฆ
Read 7 tweets
Sep 14
โ€œI've been in IT for 15 years and still Google the most basic stuff daily.

It's ok not to know everything, no one does. What is important is your Googling skills.

Knowing what to Google is one of the most important skills you can have .โ€

Here is How to do it. ๐Ÿ‘‡
Refine Your Searches With Operators

1- Use quotations (" ") : "what is bitcoin"
2- Use AND Operator: Web3 AND blockchain
3- The OR Operator: Python OR R learning
4- Exclude terms with a minus (-) symbol: python learning -w3school
5- two periods (..) between numbers to search for a range: laptop price $500..$1000
6- Restrict Your search to a single site: app.hypefury.com
7- Search File Types: filetype:pdf how to start javascript
Read 9 tweets
Sep 13
Wireshark is the worldโ€™s foremost and widely-used network protocol analyzer.

Become a Wireshark expert in NO time by following these videos.

๐Ÿ‘‡๐Ÿ‘‡
Wireshark Tutorial for BEGINNERS

๐Ÿ–‡๏ธ
How I Learned to Stop Worrying and Love the PCAP

๐Ÿ–‡๏ธ
Read 7 tweets
Sep 10
A list of top 10 popular malware reports that every Malware Analyst should check out

Take a look at these excellent Malware analysis reports

#malware #ThreatHunting #threatintelligence #fireye #virus #Talos @TalosSecurity #linux #hacking #networks #rootkits

๐Ÿ‘‡๐Ÿ‘‡
1โƒฃ CheckPoint - SpeakUp: A New Undetected Backdoor Linux Trojan

๐Ÿ”—
research.checkpoint.com/2019/speakup-aโ€ฆ
2โƒฃ First Sednit UEFI Rootkit unveiled

๐Ÿ”—
mirror.netcologne.de/CCC/congress/2โ€ฆ
Read 11 tweets
Sep 4
Learn to Hack

Over 27 Hours of Free Hacking Material

@TCMSecurity #websecurity #Pentesting
#Linux #OSINT #Python #bufferoverflow
#opsec #Hacking

Thread ๐Ÿ‘‡๐Ÿงต
Practical Ethical Hacking

This course is a 12-hour introduction to the practical side of ethical hacking.The course is hands-on and will cover many foundational topics.
๐Ÿ–‡
OSINT Fundamentals

This is a 4.5 hour course on open source intelligence (OSINT) tactics and techniques. It is designed to help students improve their investigative skills, research methodology, and personal OPSEC.
๐Ÿ–‡
Read 6 tweets

Did Thread Reader help you today?

Support us! We are indie developers!


This site is made by just two indie developers on a laptop doing marketing, support and development! Read more about the story.

Become a Premium Member ($3/month or $30/year) and get exclusive features!

Become Premium

Don't want to be a Premium member but still want to support us?

Make a small donation by buying us coffee ($5) or help with server cost ($10)

Donate via Paypal

Or Donate anonymously using crypto!

Ethereum

0xfe58350B80634f60Fa6Dc149a72b4DFbc17D341E copy

Bitcoin

3ATGMxNzCUFzxpMCHL5sWSt4DVtS8UqXpi copy

Thank you for your support!

Follow Us on Twitter!

:(