Structured courses across security, networking, data, AI, and software architecture.

The courses route teaches each subject through staged reading, accurate diagrams, embedded tools, and clear technical writing, so the material can be studied in sequence rather than pieced together from scattered notes.

10 courses
153 hours of content
38 learning stages
Browse courses
Person studying at a laptop, photo by John Schnobrich on Unsplash

Recommended learning pathway

Courses are ordered from foundational context to advanced specialisation. Follow the sequence for the strongest understanding, or jump directly into any topic.

All courses

Each course includes structured stages, embedded tools, diagrams, knowledge checks, and stage tests. Free to access, no account required.

1Technology Evolution, photo by Lorenzo Herrera on Unsplash

Technology Evolution

Trace how computing, networking, standards, security, and AI evolved so later course concepts arrive with context instead of floating jargon.

3 hours3 stagesBeginners welcome
Stage 1. Timeline contextStage 2. Causal linksStage 3. Guided paths
Open course
Six eras

Trace computing from mainframes through personal computing, the web, mobile, cloud, and AI.

Understanding cause-and-effect across these eras gives later courses grounding instead of floating jargon.

2Network Models, photo by Jordan Harrison on Unsplash

Network Models

Understand what network models are for, how requests move from name to response, and how to explain failures with evidence instead of folklore.

9 hours3 stagesBeginners welcome
OSI and TCP/IP foundationsApplied TCP/IP behaviourNetwork models for security and operations
Open course
Request path

Trace one web request through resolution, negotiation, delivery, and inspection.

This course is strongest when you need to explain why a request fails where it does, not when you want another abstract model diagram.

3Cybersecurity, photo by Sai Kiran Anagani on Unsplash

Cybersecurity

Learn how to judge exposure, controls, detection, and response using realistic scenarios, clear language, and defensible evidence.

28 hours3 stagesBeginners welcome
Cybersecurity FoundationsApplied CybersecurityCybersecurity Practice and Strategy
Open course
Risk to response

Watch a live threat approach, get detected, and get contained before it spreads.

The value of the course is operational judgement: where exposure begins, where controls interrupt it, and how response turns telemetry into action.

4Digitalisation, photo by Marvin Meyer on Unsplash

Digitalisation

Learn how digital change improves services by reducing friction, clarifying ownership, and making operations measurable.

11 hours3 stagesBeginners welcome
Digitalisation FoundationsApplied DigitalisationDigital Strategy and Enterprise Scale
Open course
Service journey

See fragmented work reorganise into a cleaner operating flow with measurable outcomes.

Digitalisation matters when people, process, and data stop fighting each other and start moving through one accountable service design.

5Enterprise Architecture, photo by Alex Kotliarskyi on Unsplash

Enterprise Architecture

Learn TOGAF 10 as a practical enterprise-architecture method with business, information, technology, migration, governance, and framework comparison depth.

35 hours8 stagesBeginners welcome
Stage 1. Orientation and TOGAF 10 in PracticeStage 2. Preliminary Phase and Architecture VisionStage 3. Business ArchitectureStage 4. Information Systems ArchitectureStage 5. Technology Architecture and Cross-Cutting DesignStage 6. Opportunities, Solutions, Migration, and DeliveryStage 7. Running EA as a CapabilityStage 8. Comparison, Tailoring, Limitations, and Capstone
Open course
Course story

Open the course to see the full sequence, examples, and practice surfaces.

The guided overview on the left explains the route. The animation on the right is there to compress the mental model before you open it.

6Data, photo by Carlos Muza on Unsplash

Data

Learn how data becomes trustworthy enough to support decisions, with clear treatment of source context, structure, quality, privacy, and reuse.

12 hours3 stagesBeginners welcome
Data FoundationsApplied DataData Practice and Strategy
Open course
Trusted data flow

Separate fragile raw input from the validated signal that can actually support a decision.

The course focuses on trust, lineage, and modelling discipline, because charts without reliable structure do not deserve executive confidence.

7AI, photo by Steve Johnson on Unsplash

AI

Learn what AI systems are actually doing, where the real risks sit, and how to evaluate use, data, models, and deployment more honestly.

14 hours3 stagesSome experience
AI FoundationsApplied AIModern AI Systems
Open course
Model lifecycle

Keep training, evaluation, attack pressure, and monitored deployment in one honest system.

This makes the course useful for people who need to explain AI responsibly, not just repeat model buzzwords or isolated benchmark scores.

8AI Agents, photo by Andrea De Santis on Unsplash

AI Agents

Learn how agent systems plan, use tools, keep context, and fail, with stronger treatment of boundaries, oversight, and traceability.

20 hours6 stagesBeginners welcome
Stage 1. FoundationsStage 2. Core conceptsStage 3. Practical buildingStage 4. Security and ethicsStage 5. Advanced masteryStage 6. Capstone and certification
Open course
Agent loop

Show the planner dispatching into tools and memory before any output earns trust.

The professional lesson is sequencing: goals, retrieval, tool use, approval, and evidence have to stay traceable if the system is going to be defensible.

9Software Architecture, photo by Ilya Pavlov on Unsplash

Software Architecture

Learn how architecture makes responsibilities, boundaries, trade-offs, and runtime evidence explicit across real systems.

12 hours3 stagesSome experience
Architecture FoundationsApplied ArchitectureDigital and Cloud Scale Architecture
Open course
System boundaries

Follow the request as it crosses boundary, services, state, and telemetry.

Architecture becomes real when runtime behaviour is visible, because boundaries and trade-offs are only useful if a team can see how the system actually moves.

10Energy System Data, photo by John Schnobrich on Unsplash

Energy System Data

Learn a structured route through the subject with guided modules, diagrams, checks, and stage tests.

9 hours3 stagesBeginners welcome
Energy data foundationsData lifecycle, rules, and governanceContext, transformation, and deep dives
Open course
Course story

Open the course to see the full sequence, examples, and practice surfaces.

The guided overview on the left explains the route. The animation on the right is there to compress the mental model before you open it.