Khalil Afridi Profile picture
May 18 β€’ 12 tweets β€’ 5 min read Twitter logo Read on Twitter
I'm excited to share these 10 FREE cybersecurity
courses from ISC(2) with you!

I've learned a lot from them and I think you will too.

Follow the thread to get started πŸ‘‡πŸ‘‡

#cybersecurity #security #informationsecurity #freecourses #learnmore #Cloud Image
1⃣ Incident Detection & Response

coursera.org/learn/sscp-4th…
2⃣ Securing Software, Data and End Points

coursera.org/learn/sscp-4th…
3⃣ Networks and Communications Security

coursera.org/learn/network-…
4⃣ Network Security

coursera.org/learn/-network…
5⃣ Cloud and Wireless Security

coursera.org/learn/sscp-4th…
6⃣ Maturing Risk Management

coursera.org/learn/sscp-4th…
7⃣ Access Control Concepts
coursera.org/learn/access-c…
8⃣ Security Awareness Training

coursera.org/learn/security…
9⃣ Security Operations

coursera.org/learn/security…
πŸ”Ÿ Network Security
coursera.org/learn/-network…
That's a wrap!
If you enjoyed this thread:
1. Follow me @khalilApriday for more of these
2. RT & share this thread with your audience.

β€’ β€’ β€’

Missing some Tweet in this thread? You can try to force a refresh
γ€€

Keep Current with Khalil Afridi

Khalil Afridi Profile picture

Stay in touch and get notified when new unrolls are available from this author!

Read all threads

This Thread may be Removed Anytime!

PDF

Twitter may remove this content at anytime! Save it as PDF for later use!

Try unrolling a thread yourself!

how to unroll video
  1. Follow @ThreadReaderApp to mention us!

  2. From a Twitter thread mention us with a keyword "unroll"
@threadreaderapp unroll

Practice here first or read more on our help page!

More from @khalilApriday

May 5
𝐅𝐑𝐄𝐄 π‘π„π’πŽπ”π‘π‚π„π’ - ππ‹π€π‚πŠ π‡πˆπ‹π‹π’ πˆππ…πŽπ‘πŒπ€π“πˆπŽπ
π’π„π‚π”π‘πˆπ“π˜

Black Hills Information Security is recommended for high-quality cybersecurity content created by experts in the field.

Here are some fantastic free resources to check out

πŸ‘‡πŸ‘‡
1⃣ π—•π—¨π—œπ—Ÿπ—— 𝗬𝗒𝗨π—₯ π—›π—’π— π—˜ π—Ÿπ—”π—•

🌟 How to Build a Home Lab for Infosec - Ralph May

2βƒ£π—‘π—˜π—§π—ͺ𝗒π—₯π—ž π—¦π—˜π—–π—¨π—₯π—œπ—§π—¬

🌟 Networking for Pentesters: Beginners

youtube.com/playlist?list=…
Read 7 tweets
May 3
Cybersecurity Courses with Free Certification from
Security Blue Team @SecBlueTeam

Don't miss this opportunity & get these certification for πŸ’―FREE

- Dark Web Operation
- Vulnerability Management
- Threat Hunting
- Digital Forensics
- Network Analysis

Check out πŸ‘‡πŸ‘‡
1⃣ Introduction to Dark Web Operation

securityblue.team/courses/introd…
2⃣ Vulnerability Management

securityblue.team/courses/an-int…
Read 8 tweets
Feb 22
Grow your cybersecurity skills with this incredible collection of FREE learning resources.

⚑️ Get ready to level up!

Follow & share the 🧡

#infosec #cybersecurity #pentesting #bugbounty
#hacking #blueteam #redteam #technology #DataSecurity #CyberSec #Linux#soc #dfir
1️⃣ Hands-on cyber security training through real-world scenarios.

tryhackme.com
2️⃣ LiveOverflow YouTube channel

youtube.com/@LiveOverflow
Read 11 tweets
Feb 19
Looking to kickstart your career in cybersecurity?

You can do it all with FREE resources and a clear step-by-step path

Here is How 🧡

#infosec #cybersecurity #pentesting #oscp @tryhackme #hacking #cissp #redteam #technology #DataSecurity #CyberSec #Linux
1️⃣ Level - Introduction to OpenVPN

πŸ…°οΈ OpenVPN: How to Connect

-OpenVPN - Windows
-OpenVPN - Linux
-OpenVPN - MacOS

The room is free complete it.πŸ‘‡

tryhackme.com/room/openvpn
2️⃣ Introductory Research Walkthrough

Here you will learn

- How to research
- How to search for vulnerabilities

The room is free complete it.πŸ‘‡

tryhackme.com/room/introtore…
Read 11 tweets
Feb 17
Want to know about the different types of
Cybersecurity controls to protect your systems, networks & organisation's

1- Confidentiality
2- Integrity
3- Availability

a 🧡 on the different types of cybersecurity controls:
1⃣ Technical Controls

-Technical controls are the measures put in place to
protect computer systems and networks from cyber threats.

-These controls include firewalls, intrusion detection
systems, antivirus software, access controls, and encryption.
2⃣ Administrative Controls

- Admin controls are policies and procedures that are put in place to manage and govern the org's security program.

- These controls include security awareness training, security policies and procedures, risk mangt, and incident response planning.
Read 9 tweets
Feb 1
Get ahead in your career:

How Coursera.org free #cybersecurity courses can boost your resume and job prospects

Follow the thread for a creative and engaging look free cybersecurity courses For Beginners & Professional πŸ’» #Cybersecurity

#Infosys #infosecurity
2⃣ Ethical #hacking Essential

coursera.org/learn/ethical-…
Read 11 tweets

Did Thread Reader help you today?

Support us! We are indie developers!


This site is made by just two indie developers on a laptop doing marketing, support and development! Read more about the story.

Become a Premium Member ($3/month or $30/year) and get exclusive features!

Become Premium

Don't want to be a Premium member but still want to support us?

Make a small donation by buying us coffee ($5) or help with server cost ($10)

Donate via Paypal

Or Donate anonymously using crypto!

Ethereum

0xfe58350B80634f60Fa6Dc149a72b4DFbc17D341E copy

Bitcoin

3ATGMxNzCUFzxpMCHL5sWSt4DVtS8UqXpi copy

Thank you for your support!

Follow Us on Twitter!

:(