Cybersecurity Resources
Explore and choose your next training platform, course, book, or general learning resource.
A Cloud Guru
Online training platform specializing in cloud technologies with comprehensive certification prep for AWS, Microsoft Azure, and Google Cloud.
Applied Incident Response
Understand effective ways to respond to advanced attacks against local and remote network resources. Covers the latest techniques for detecting, investigating, and recovering from threats against your network.
Applied Network Security Monitoring
Learn the fundamental approach to network security monitoring through the three stages of the NSM cycle: collection, detection, and analysis. Build the analytic techniques to make you more effective at monitoring networks.
The Art of Deception
Kevin Mitnick explains why no amount of encryption and firewalls will stop a skilled social engineer. Learn why and how social engineering works, and why the human element is the most critical factor in information security.
The Art of Invisibility
Kevin Mitnick uses true-life stories to show what happens behind the scenes online and how to protect yourself from corporate and government surveillance. Learn how to be online without leaving a trace.
Black Hat Python
Explore the dark side of Python's capabilities, writing network sniffers, packet injectors, virtual machine infection tools, and hidden trojans. Learn to build powerful offensive security tools using one of the most popular languages in the industry. Uses Python 2.
Blue and Red Team Field Manual
A combined tactical reference for both offensive and defensive operations, aligned with the NIST Cybersecurity Framework. Covers Identify, Protect, Detect, Respond, and Recover with actionable commands and procedures.
Blue Team Field Manual
A tactical reference guide aligned with the NIST Cybersecurity Framework covering Identify, Protect, Detect, Respond, and Recover. Includes the commands and steps to follow when preparing for and responding to a cybersecurity incident.
Codecademy
Leading platform for learning programming fundamentals through free interactive courses. A strong starting point for building the coding skills needed in cybersecurity.
The Complete Cyber Security Course
Learn the foundations of cybersecurity across each domain. Covers online threats, advanced hacking techniques, trackers, exploit kits, and surveillance methods through four volumes, each focused on a specific topic.
The Complete Ethical Hacking Course Bundle
Covers the ethical hacking and penetration testing domain end to end. Topics include web application attacks, network pentesting, social engineering, and using Android to deploy attacks. Taught by Zaid Al Quraishi.
CompTIA Security+ (SY0-701)
The industry-standard entry-level security certification. A solid foundation for any cyber career.
Coursera
Massive open online course platform offering free university-level training from top programs and professors, including information security and networking.
Cyber Aces Online - Cybersecurity Fundamentals
Learn the three foundations of information security: operating systems, networking, and system administration. Develops the core knowledge and skills needed to start a career in cybersecurity. Completely free from SANS.
CyberSecLabs
High-quality penetration testing lab platform for students, professionals, and enthusiasts looking to develop and enhance their offensive security skills.
Cybersecurity and Cyberwar
P.W. Singer and Allan Friedman answer three key questions about cyberspace: how does it work, why does it matter, and what can we do? An accessible, deeply informative overview of cybersecurity and its geopolitical implications.
Cybrary
Well-known cybersecurity learning platform with a large catalog of free training. Also offers a subscription tier with career-focused paths and certifications.
Data and Goliath
Security expert Bruce Schneier examines the world of mass surveillance by corporations and governments, and offers a path that values both security and privacy. Covers what you can do and what reform looks like at scale.
edX
Open online course provider offering hundreds of university-level courses in information security, networking, programming, and more. Free to audit.
Foundations of Cybersecurity
Learn foundational cybersecurity concepts including types of attacks, cryptography basics, secure design, and the cybersecurity job market. Offered by Springboard as a free learning path.
Future Crimes
Marc Goodman takes readers deep into the digital underground to expose how criminals, corporations, and countries use modern technology against you. A mind-blowing look at the dark side of technological innovation and the connected world.
Ghost in the Wires
The true story of Kevin Mitnick, once the world's most wanted hacker. Mitnick details his cat-and-mouse game with federal authorities, the techniques he used to evade capture, and the exploits that made him infamous.
Hacking - The Art of Exploitation
Rather than memorizing existing exploits, learn how hacking techniques actually work from the ground up. Covers C programming from a hacker's perspective, code debugging, hijacking network communications, shellcode, and more.
Hack The Box
Realistic penetration testing labs and challenges for intermediate to advanced learners.
Infosec Institute
Technology training company providing certification-based cybersecurity education with hands-on skills development for professionals looking to advance their careers.
Introduction to Cyber Security Specialization
Build a basic understanding of cybersecurity, identification and authentication, and career paths in the field. Includes quizzes and projects. Taught by Edward G. Amoroso on Coursera.
Introduction to Cyber Security
Learn to recognize online threats and take steps to reduce your exposure. Covers malware, viruses, trojans, network security, cryptography, identity theft, and risk management. No prior knowledge required.
Introduction to I.T. and Cybersecurity
Learn about the four primary disciplines of information technology and information security. Understand IT fundamentals to help decide which career path suits you best. Taught by Joe Perry and Ken Underhill via Cybrary.
IT Fundamentals for Cybersecurity
Learn IT fundamentals as they relate to cybersecurity. Covers the CIA Triad, access management, incident response, malware types, firewalls, anti-virus, and penetration testing basics. Offered by IBM on Coursera.
ITPro.TV
Engaging, hands-on IT training platform ideal for students pursuing IT and cybersecurity certifications. Immersive video content with practical exam prep.
Learn C the Hard Way
Learn the foundations of C through 52 hands-on exercises guided by an expert. C is one of the most important and powerful languages in the cybersecurity industry, used in everything from exploits to reverse engineering.
Linux Basics for Hackers
Use Kali Linux to learn the fundamentals of the Linux operating system and acquire the tools and techniques needed to take control of a Linux environment. Covers networking, scripting, privacy, and security in Kali.
Malware Data Science
Introduce yourself to malware detection and attribution using modern methods such as machine learning, statistics, social network analysis, and data visualization. Identify, observe, and analyze malware through a data-driven lens.
NIST Cybersecurity Framework
A policy framework of computer security guidance for how organisations can assess and improve their ability to prevent, detect, and respond to attacks.
Nmap 6 Cookbook
Simplified coverage of network scanning features in the Nmap suite. Learn Nmap through visual examples to quickly understand the concepts and practical uses of this essential security tool.
Kali by Offensive Security
Industry-leading cybersecurity training with hands-on labs, courses, and certifications. Focused on offensive security skills and professional development.
Pluralsight
Major online learning platform offering courses, learning paths, and certification prep for IT and cybersecurity professionals at all levels.
Cyber Security Interviews
A weekly podcast dedicated to sharing dialogue with influencers, thought leaders, and individuals who shape the cybersecurity industry. Great for career insights and industry perspective.
Darknet Diaries
True stories about hackers, malware, botnets, cryptocurrency, internet privacy, and cybercrime. Host Jack Rhysider investigates and documents the dark side of the internet in long-form investigative episodes.
Defensive Security Podcast
Jerry Bell and Andrew Kalat cover recent security news and break down the lessons from each event so you can keep an organization secure against the current threat landscape.
Risky Business
A weekly information security podcast featuring the latest cybersecurity news and in-depth interviews with industry professionals and researchers.
SANS Internet Stormcenter Daily Stormcast
A daily podcast summarizing the latest cybersecurity news and events. Episodes run under 10 minutes and cover current threats and developments in the computer security industry.
Security Now
Hosted by Steve Gibson and Leo Laporte, Security Now is a weekly podcast covering hot topics in security including the latest disclosures, news, and emerging technologies in the infosec community.
Smashing Security
Graham Cluley and Carole Theriault chat about cybercrime, hacking, security news, and online privacy in an accessible, often humorous format for both beginners and professionals.
Practical Ethical Hacking - The Complete Course
Learn the foundations of ethical hacking and penetration testing, active directory exploitation, network hacking and defenses, wireless networks, and common web application attacks. Taught by Heath Adams (The Cyber Mentor).
Practical Malware Analysis
Learn the tools and techniques used by professional analysts to safely analyze, debug, and disassemble malicious software. Set up a safe virtual environment, unpack malware, analyze shellcode and C++ samples, and understand how malware stays stealthy.
Practical Packet Analysis
Learn how to use Wireshark to analyze packet captures and understand what's actually happening on your network. Goes beyond capturing packets to teach real-world troubleshooting and network forensics.
The Practice of Network Security Monitoring
Learn how to use NSM to add a robust layer of protection around your networks. Covers where to deploy NSM platforms, packet analysis tools, and how to integrate threat intelligence into NSM software.
Real-World Bug Hunting
A field guide to web hacking covering the most common bug classes including XSS, IDOR, SSRF, and more. Learn how to find and report vulnerabilities on real targets and build a methodology for responsible disclosure.
SANS Cyber Aces Online
Free courses from SANS Institute teaching core concepts for assessing and protecting information security systems. A trusted name in cybersecurity education.
SANS Institute
Top cybersecurity training and certification provider covering network defense, penetration testing, incident response, digital forensics, and more.
Security Testing with Raspberry Pi
Learn how to install Kali Linux on a Raspberry Pi and use it for ethical hacking. Build a small-scale pentesting lab, use the hacking tools in Raspbian, and apply your knowledge in hands-on scenarios.
Serious Cryptography
A practical guide to modern encryption that breaks down key concepts including authenticated encryption, secure randomness, hash functions, block ciphers, and public-key cryptography. Grounded in the fundamental mathematics behind each topic.
CSO Online
In-depth analysis and critical information for enterprise security professionals. Covers risk management, network defense, fraud, computer crime, and data loss prevention.
Cybersecurity Insiders
A comprehensive source covering end-user education, new opportunities, ideas, and the latest trends across the cybersecurity industry. Good for staying current on the broader landscape.
Daniel Miessler
Cybersecurity professional and writer exploring the intersection of security, technology, and society. Thoughtful long-form writing on offensive security, AI, and the broader implications of the digital world.
Dark Reading
Cyber threat news, vulnerability disclosures, and technology trend analysis. Covers the latest attacks, key technologies, and practices to help security professionals protect sensitive data.
Graham Cluley
Independent computer security blogger and podcaster covering security issues, news, advice, and opinion. Known for making security accessible and writing clearly about complex topics.
The Hacker News
One of the most widely read cybersecurity news publications. Features the latest infosec news and in-depth coverage of current and future trends shaping the security landscape.
KrebsOnSecurity
Brian Krebs is an investigative journalist covering the latest cybersecurity trends, cybercrime, scams, and news. One of the most respected independent security blogs, known for breaking major stories.
Naked Security by Sophos
Security threat news, opinion, analysis, and research from Sophos covering the latest internet threats and computer security issues in accessible, well-written articles.
Schneier on Security
Bruce Schneier is an American cryptographer, security professional, and privacy advocate. His weekly blog covers the latest cybersecurity news, opinion, and trends from one of the field's most respected voices.
Threatpost
Independent news and analysis covering IT and business security for professionals worldwide. In-depth reporting on the latest threats, vulnerabilities, and security events.
Troy Hunt
Australian web security expert and creator of Have I Been Pwned. Writes about the latest security news, data breaches, trends, and opinion. Well-known for clear, direct takes on real-world security issues.
ZDNet Security
24/7 news coverage and analysis of IT trends, technologies, and security. Follow hot topics, emerging threats, and keep up with the latest events affecting enterprise security.
Skillsoft
Enterprise learning platform providing IT and cybersecurity training resources to help professionals advance their skills and protect their organizations.
Spam Nation
Investigative journalist Brian Krebs unmasks the criminal masterminds behind some of the biggest spam and hacker operations targeting Americans. A fascinating deep dive into the economics and personalities of cybercrime.
StationX
Learning platform dedicated to cybersecurity with 90+ courses covering network security, ethical hacking, Linux, scripting, programming, and certification prep.
The Code Book
Simon Singh traces the history of encryption from ancient ciphers to modern cryptography, revealing the dramatic effects secrecy has had on wars, nations, and individual lives throughout human history.
The Cuckoo's Egg
Clifford Stoll's true account of how he tracked a spy through the early internet while working at Lawrence Berkeley Lab. A gripping story of deception, broken codes, and a dangerous game of cat-and-mouse with a hacker codenamed Hunter.
TryHackMe
Browser-based hacking labs and learning paths — great for beginners.
Udemy
One of the world's largest course marketplaces with hundreds of IT and cybersecurity courses. Affordable training for students at all skill levels.
The Ultimate Linux Mastery Bundle
Learn the fundamentals of Linux for cybersecurity. Covers effective navigation, privacy, anonymity, and operating system concepts. A solid foundation for anyone serious about security. Taught by Jason Cannon.
Violent Python
Apply theoretical offensive computing concepts using a practical approach. Create your own attack tools in Python, automate large-scale network attacks, extract metadata, investigate forensic artifacts, build wireless tools, and mine social media. Uses Python 2.
VulnHub
Provides materials and vulnerable machines for gaining practical cybersecurity experience. Walk through intentional vulnerabilities to develop real penetration testing skills.
The Web Application Hacker's Handbook
The definitive guide to finding and exploiting web application vulnerabilities.
Billy Ellis
Software developer and mobile security researcher. Creates videos on iOS security, mobile exploitation, software engineering, and reverse engineering topics.
Colin Kelly
Full-time cybersecurity professional creating content on education, career paths, certifications, and practical security topics. Good for learners figuring out their path in the industry.
Cristi Vlad
A cybersecurity analyst and OSCP holder focused on penetration testing and ethical hacking. Helps learners get started in offensive security through tutorials and walkthroughs.
Day Cyberwox
Full-time cybersecurity professional and WGU cybersecurity degree student. Shares career tips, his journey, and advice for students looking to land their first full-time cybersecurity position.
DC Cybersec
A cybersecurity professional focused on the defensive side of security. Helps you get into the industry by teaching tools and techniques for getting started and sharpening skills in cybersecurity.
HackerSploit
Free and open-source information security training covering offensive and defensive techniques. Makes security education accessible with practical tutorials on tools, techniques, and platforms.
IppSec
In-depth walkthroughs of HackTheBox, VulnHub, and other pentesting challenges. IppSec is the gold standard for learning how to approach machines methodically and think like a penetration tester.
IT Career Questions
Created by Zach Hill, this channel brings on IT professionals and newcomers to answer your questions about IT careers, certifications, and breaking into the field.
John Hammond
Tutorials on programming languages and cybersecurity for enthusiasts, professionals, and students. Known for CTF walkthroughs, malware analysis, and making complex topics approachable.
LiveOverflow
Documents, educates, and explores the journey through cybersecurity with a focus on solving CTF challenges. Known for deep technical dives into binary exploitation, web security, and hacking research.
Loi Liang Yang
Cybersecurity consultant and CISSP/CEH/Security+ holder. Focuses on the offensive side through walkthroughs, tutorials, and presentations to help learners break into cybersecurity.
Rebecca Richard
Documents her journey studying cybersecurity at university, completing her degree, and growing a freelance business. Creates tutorials and vlogs showing what it looks like to break into the field as a student.
STÖK
Educational content for the bug bounty community. STÖK focuses on inspiring hackers to level up their skills through tutorials, recon methodology, and a hacker mindset perspective.
The Cyber Mentor
Heath Adams teaches ethical hacking and penetration testing with a focus on sharpening technical skills and building a pentester's mindset. Covers active directory, web app hacking, and career advice.
No resources found. Try a different search or category.