| Learning Path |
Learn Enterprise & Learn Unlimited |
Learn One |
Learn Fundamentals |
| OWASP Top 10 - 2021 Essentials |
✅ |
✅ |
✅ |
| Threat Hunting Foundations |
✅ |
 |
 |
| Cloud Essentials |
✅ |
✅ |
✅ |
| Offensive Cloud Foundations |
✅ |
 |
 |
| Internet of Things (IoT) Essentials |
✅ |
 |
 |
| Red Teaming |
✅ |
 |
 |
| DevSecOps Essentials |
✅ |
 |
 |
| GitOps Essentials |
✅ |
✅ |
✅ |
| Web System Administration Foundations |
✅ |
 |
 |
| Windows System Administration Foundations |
✅ |
 |
 |
| UNIX System Administration Foundations |
✅ |
 |
 |
| MITRE D3FEND - Model |
✅ |
 |
 |
| MITRE D3FEND - Harden |
✅ |
 |
 |
| MITRE D3FEND - Detect |
✅ |
 |
 |
| MITRE ATT&CK - Reconnaissance (TA0043) |
✅ |
 |
 |
| MITRE ATT&CK - Resource Development (TA0042) |
✅ |
 |
 |
| MITRE ATT&CK - Initial Access (TA0001) |
✅ |
 |
 |
| MITRE ATT&CK - Persistence (TA0003) |
✅ |
 |
 |
| MITRE ATT&CK - Privilege Escalation (TA0004) |
✅ |
 |
 |
| MITRE ATT&CK - Defense Evasion (TA0005) |
✅ |
 |
 |
| MITRE ATT&CK - Credential Access (TA0006) |
✅ |
 |
 |
| MITRE ATT&CK - Discovery (TA0007) |
✅ |
 |
 |
| MITRE ATT&CK - Lateral Movement (TA0008) |
✅ |
 |
 |
| MITRE ATT&CK - Collection (TA0009) |
✅ |
 |
 |
| MITRE ATT&CK - Command and Control (TA0011) |
✅ |
 |
 |
| Secure Software Development Essentials |
✅ |
 |
✅ |
| Integrating Security into Software Development |
✅ |
✅ |
✅ |
| Intermediate Secure Development I |
✅ |
✅ |
✅ |
| Intermediate Secure Development II |
✅ |
 |
✅ |
| Incident Responder Foundations |
✅ |
 |
 |
| Network Penetration Testing Essentials |
✅ |
✅ |
✅ |
| Security Operations Essentials |
✅ |
✅ |
✅ |
| Web Application Assessment Essentials |
✅ |
✅ |
✅ |
| Exploit Development Essentials |
✅ |
✅ |
✅ |
| Introduction to Cloud Security |
✅ |
✅ |
✅ |
| Introduction to Secure Software Development |
✅ |
✅ |
✅ |
| Get Good at C |
✅ |
✅ |
✅ |
| Get Good at Python |
✅ |
✅ |
✅ |
| Get into Active Directory |
✅ |
✅ |
✅ |
| Get into Networking |
✅ |
✅ |
✅ |
| Get Into Development |
✅ |
✅ |
✅ |
| Get into Linux |
✅ |
✅ |
✅ |
| Get into Windows |
✅ |
✅ |
✅ |
| Get into Low Level Binary Security |
✅ |
✅ |
✅ |
| Kali Linux Essentials |
✅ |
✅ |
✅ |
| SOC Ops - Essential |
✅ |
✅ |
✅ |
| SOC Ops - Intermediate |
✅ |
 |
 |
| SOC Ops - Advanced |
✅ |
 |
 |
| IT Generalist - Essential |
✅ |
✅ |
✅ |
| IT Generalist - Intermediate |
✅ |
 |
 |
| IT Generalist - Advanced |
✅ |
 |
 |
| Connectivity Options and Troubleshooting Guide |
✅ |
✅ |
✅ |
| Vulnerability Management Foundations |
✅ |
 |
 |
| Kubernetes Foundations |
✅ |
 |
✅ |
| Cloud Automation and Misconfiguration Foundations |
✅ |
 |
 |
| Digital Forensics Foundations |
✅ |
 |
 |
| LLM Red Teaming |
✅ |
 |
 |
| The Cybersecurity Survival Guide |
✅ |
✅ |
✅ |
| Governance, Risk, and Compliance (GRC) for Cybersecurity |
✅ |
✅ |
✅ |
| Hands-On Cloud Security |
✅ |
✅ |
 |
| MacOS Exploit Development and Penetration Testing: ARM |
✅ |
 |
 |
| MacOS Exploit Development and Penetration Testing: Intel |
✅ |
 |
 |