Skip to content
Cybercademy

Cybersecurity Resources

Explore and choose your next training platform, course, book, or general learning resource.

A Cloud Guru

Online training platform specializing in cloud technologies with comprehensive certification prep for AWS, Microsoft Azure, and Google Cloud.

cloud aws azure certification
Visit resource

Applied Incident Response

Understand effective ways to respond to advanced attacks against local and remote network resources. Covers the latest techniques for detecting, investigating, and recovering from threats against your network.

incident-response technical intermediate threat-hunting
Visit resource

Applied Network Security Monitoring

Learn the fundamental approach to network security monitoring through the three stages of the NSM cycle: collection, detection, and analysis. Build the analytic techniques to make you more effective at monitoring networks.

nsm network-security monitoring detection technical
Visit resource

The Art of Deception

Kevin Mitnick explains why no amount of encryption and firewalls will stop a skilled social engineer. Learn why and how social engineering works, and why the human element is the most critical factor in information security.

story social-engineering kevin-mitnick human-element
Visit resource

The Art of Invisibility

Kevin Mitnick uses true-life stories to show what happens behind the scenes online and how to protect yourself from corporate and government surveillance. Learn how to be online without leaving a trace.

story privacy surveillance kevin-mitnick opsec
Visit resource
Featured

Black Hat Python

Explore the dark side of Python's capabilities, writing network sniffers, packet injectors, virtual machine infection tools, and hidden trojans. Learn to build powerful offensive security tools using one of the most popular languages in the industry. Uses Python 2.

python offensive networking malware technical
Visit resource

Blue and Red Team Field Manual

A combined tactical reference for both offensive and defensive operations, aligned with the NIST Cybersecurity Framework. Covers Identify, Protect, Detect, Respond, and Recover with actionable commands and procedures.

blue-team red-team incident-response nist reference technical
Visit resource

Blue Team Field Manual

A tactical reference guide aligned with the NIST Cybersecurity Framework covering Identify, Protect, Detect, Respond, and Recover. Includes the commands and steps to follow when preparing for and responding to a cybersecurity incident.

blue-team incident-response nist reference technical
Visit resource
Free

Codecademy

Leading platform for learning programming fundamentals through free interactive courses. A strong starting point for building the coding skills needed in cybersecurity.

free programming beginner python
Visit resource
Featured

The Complete Cyber Security Course

Learn the foundations of cybersecurity across each domain. Covers online threats, advanced hacking techniques, trackers, exploit kits, and surveillance methods through four volumes, each focused on a specific topic.

beginner foundations networking privacy all-domains
Visit resource

The Complete Ethical Hacking Course Bundle

Covers the ethical hacking and penetration testing domain end to end. Topics include web application attacks, network pentesting, social engineering, and using Android to deploy attacks. Taught by Zaid Al Quraishi.

ethical-hacking penetration-testing web-security social-engineering intermediate
Visit resource
Featured

CompTIA Security+ (SY0-701)

The industry-standard entry-level security certification. A solid foundation for any cyber career.

certification beginner comptia
Visit resource
Free

Coursera

Massive open online course platform offering free university-level training from top programs and professors, including information security and networking.

free university beginner mooc
Visit resource
Free

Cyber Aces Online - Cybersecurity Fundamentals

Learn the three foundations of information security: operating systems, networking, and system administration. Develops the core knowledge and skills needed to start a career in cybersecurity. Completely free from SANS.

beginner free sans networking operating-systems sysadmin
Visit resource

CyberSecLabs

High-quality penetration testing lab platform for students, professionals, and enthusiasts looking to develop and enhance their offensive security skills.

hands-on penetration-testing labs
Visit resource

Cybersecurity and Cyberwar

P.W. Singer and Allan Friedman answer three key questions about cyberspace: how does it work, why does it matter, and what can we do? An accessible, deeply informative overview of cybersecurity and its geopolitical implications.

story policy geopolitics beginner cyberwar
Visit resource
Free Featured

Cybrary

Well-known cybersecurity learning platform with a large catalog of free training. Also offers a subscription tier with career-focused paths and certifications.

free beginner certification career-paths
Visit resource

Data and Goliath

Security expert Bruce Schneier examines the world of mass surveillance by corporations and governments, and offers a path that values both security and privacy. Covers what you can do and what reform looks like at scale.

story privacy surveillance policy bruce-schneier
Visit resource
Free

edX

Open online course provider offering hundreds of university-level courses in information security, networking, programming, and more. Free to audit.

free university mooc beginner
Visit resource
Free

Foundations of Cybersecurity

Learn foundational cybersecurity concepts including types of attacks, cryptography basics, secure design, and the cybersecurity job market. Offered by Springboard as a free learning path.

beginner free foundations cryptography career
Visit resource

Future Crimes

Marc Goodman takes readers deep into the digital underground to expose how criminals, corporations, and countries use modern technology against you. A mind-blowing look at the dark side of technological innovation and the connected world.

story cybercrime surveillance technology beginner
Visit resource
Featured

Ghost in the Wires

The true story of Kevin Mitnick, once the world's most wanted hacker. Mitnick details his cat-and-mouse game with federal authorities, the techniques he used to evade capture, and the exploits that made him infamous.

story kevin-mitnick hacking-history social-engineering
Visit resource
Featured

Hacking - The Art of Exploitation

Rather than memorizing existing exploits, learn how hacking techniques actually work from the ground up. Covers C programming from a hacker's perspective, code debugging, hijacking network communications, shellcode, and more.

exploitation c-programming shellcode networking technical intermediate
Visit resource
Free

Hack The Box

Realistic penetration testing labs and challenges for intermediate to advanced learners.

intermediate advanced labs ctf
Visit resource

Infosec Institute

Technology training company providing certification-based cybersecurity education with hands-on skills development for professionals looking to advance their careers.

certification professional hands-on
Visit resource
Free

Introduction to Cyber Security Specialization

Build a basic understanding of cybersecurity, identification and authentication, and career paths in the field. Includes quizzes and projects. Taught by Edward G. Amoroso on Coursera.

beginner free coursera authentication career
Visit resource
Free

Introduction to Cyber Security

Learn to recognize online threats and take steps to reduce your exposure. Covers malware, viruses, trojans, network security, cryptography, identity theft, and risk management. No prior knowledge required.

beginner free malware networking cryptography risk-management
Visit resource
Free

Introduction to I.T. and Cybersecurity

Learn about the four primary disciplines of information technology and information security. Understand IT fundamentals to help decide which career path suits you best. Taught by Joe Perry and Ken Underhill via Cybrary.

beginner free it-fundamentals career cybrary
Visit resource
Free

IT Fundamentals for Cybersecurity

Learn IT fundamentals as they relate to cybersecurity. Covers the CIA Triad, access management, incident response, malware types, firewalls, anti-virus, and penetration testing basics. Offered by IBM on Coursera.

beginner free ibm coursera cia-triad it-fundamentals
Visit resource

ITPro.TV

Engaging, hands-on IT training platform ideal for students pursuing IT and cybersecurity certifications. Immersive video content with practical exam prep.

certification hands-on video
Visit resource

Learn C the Hard Way

Learn the foundations of C through 52 hands-on exercises guided by an expert. C is one of the most important and powerful languages in the cybersecurity industry, used in everything from exploits to reverse engineering.

c-programming fundamentals technical beginner
Visit resource
Featured

Linux Basics for Hackers

Use Kali Linux to learn the fundamentals of the Linux operating system and acquire the tools and techniques needed to take control of a Linux environment. Covers networking, scripting, privacy, and security in Kali.

linux kali beginner technical networking scripting
Visit resource

Malware Data Science

Introduce yourself to malware detection and attribution using modern methods such as machine learning, statistics, social network analysis, and data visualization. Identify, observe, and analyze malware through a data-driven lens.

malware data-science machine-learning analysis technical
Visit resource
Free

NIST Cybersecurity Framework

A policy framework of computer security guidance for how organisations can assess and improve their ability to prevent, detect, and respond to attacks.

framework reference compliance
Visit resource

Nmap 6 Cookbook

Simplified coverage of network scanning features in the Nmap suite. Learn Nmap through visual examples to quickly understand the concepts and practical uses of this essential security tool.

nmap network-scanning technical beginner tools
Visit resource

Kali by Offensive Security

Industry-leading cybersecurity training with hands-on labs, courses, and certifications. Focused on offensive security skills and professional development.

offensive-security certification hands-on advanced
Visit resource

Pluralsight

Major online learning platform offering courses, learning paths, and certification prep for IT and cybersecurity professionals at all levels.

courses certification learning-paths
Visit resource
Free

Cyber Security Interviews

A weekly podcast dedicated to sharing dialogue with influencers, thought leaders, and individuals who shape the cybersecurity industry. Great for career insights and industry perspective.

weekly interviews career beginner
Visit resource
Free Featured

Darknet Diaries

True stories about hackers, malware, botnets, cryptocurrency, internet privacy, and cybercrime. Host Jack Rhysider investigates and documents the dark side of the internet in long-form investigative episodes.

storytelling cybercrime hacking malware beginner
Visit resource
Free

Defensive Security Podcast

Jerry Bell and Andrew Kalat cover recent security news and break down the lessons from each event so you can keep an organization secure against the current threat landscape.

weekly defensive blue-team news intermediate
Visit resource
Free

Risky Business

A weekly information security podcast featuring the latest cybersecurity news and in-depth interviews with industry professionals and researchers.

weekly news interviews intermediate
Visit resource
Free

SANS Internet Stormcenter Daily Stormcast

A daily podcast summarizing the latest cybersecurity news and events. Episodes run under 10 minutes and cover current threats and developments in the computer security industry.

daily news sans beginner short
Visit resource
Free Featured

Security Now

Hosted by Steve Gibson and Leo Laporte, Security Now is a weekly podcast covering hot topics in security including the latest disclosures, news, and emerging technologies in the infosec community.

weekly news beginner intermediate
Visit resource
Free

Smashing Security

Graham Cluley and Carole Theriault chat about cybercrime, hacking, security news, and online privacy in an accessible, often humorous format for both beginners and professionals.

weekly news privacy cybercrime beginner
Visit resource
Featured

Practical Ethical Hacking - The Complete Course

Learn the foundations of ethical hacking and penetration testing, active directory exploitation, network hacking and defenses, wireless networks, and common web application attacks. Taught by Heath Adams (The Cyber Mentor).

ethical-hacking penetration-testing active-directory networking beginner intermediate
Visit resource
Featured

Practical Malware Analysis

Learn the tools and techniques used by professional analysts to safely analyze, debug, and disassemble malicious software. Set up a safe virtual environment, unpack malware, analyze shellcode and C++ samples, and understand how malware stays stealthy.

malware reverse-engineering analysis technical intermediate
Visit resource

Practical Packet Analysis

Learn how to use Wireshark to analyze packet captures and understand what's actually happening on your network. Goes beyond capturing packets to teach real-world troubleshooting and network forensics.

wireshark packet-analysis networking technical beginner
Visit resource

The Practice of Network Security Monitoring

Learn how to use NSM to add a robust layer of protection around your networks. Covers where to deploy NSM platforms, packet analysis tools, and how to integrate threat intelligence into NSM software.

nsm network-security monitoring incident-response technical
Visit resource

Real-World Bug Hunting

A field guide to web hacking covering the most common bug classes including XSS, IDOR, SSRF, and more. Learn how to find and report vulnerabilities on real targets and build a methodology for responsible disclosure.

bug-bounty web-security xss idor technical intermediate
Visit resource
Free

SANS Cyber Aces Online

Free courses from SANS Institute teaching core concepts for assessing and protecting information security systems. A trusted name in cybersecurity education.

free beginner sans fundamentals
Visit resource

SANS Institute

Top cybersecurity training and certification provider covering network defense, penetration testing, incident response, digital forensics, and more.

certification advanced professional corporate
Visit resource

Security Testing with Raspberry Pi

Learn how to install Kali Linux on a Raspberry Pi and use it for ethical hacking. Build a small-scale pentesting lab, use the hacking tools in Raspbian, and apply your knowledge in hands-on scenarios.

raspberry-pi kali ethical-hacking home-lab technical beginner
Visit resource

Serious Cryptography

A practical guide to modern encryption that breaks down key concepts including authenticated encryption, secure randomness, hash functions, block ciphers, and public-key cryptography. Grounded in the fundamental mathematics behind each topic.

cryptography technical intermediate mathematics
Visit resource
Free

CSO Online

In-depth analysis and critical information for enterprise security professionals. Covers risk management, network defense, fraud, computer crime, and data loss prevention.

enterprise risk-management professional analysis
Visit resource
Free

Cybersecurity Insiders

A comprehensive source covering end-user education, new opportunities, ideas, and the latest trends across the cybersecurity industry. Good for staying current on the broader landscape.

news education trends beginner
Visit resource
Free

Daniel Miessler

Cybersecurity professional and writer exploring the intersection of security, technology, and society. Thoughtful long-form writing on offensive security, AI, and the broader implications of the digital world.

blog opinion offensive ai professional
Visit resource
Free Featured

Dark Reading

Cyber threat news, vulnerability disclosures, and technology trend analysis. Covers the latest attacks, key technologies, and practices to help security professionals protect sensitive data.

news vulnerabilities threats professional
Visit resource
Free

Graham Cluley

Independent computer security blogger and podcaster covering security issues, news, advice, and opinion. Known for making security accessible and writing clearly about complex topics.

blog news opinion beginner
Visit resource
Free Featured

The Hacker News

One of the most widely read cybersecurity news publications. Features the latest infosec news and in-depth coverage of current and future trends shaping the security landscape.

news beginner daily vulnerabilities
Visit resource
Free Featured

KrebsOnSecurity

Brian Krebs is an investigative journalist covering the latest cybersecurity trends, cybercrime, scams, and news. One of the most respected independent security blogs, known for breaking major stories.

blog cybercrime investigative brian-krebs news
Visit resource
Free

Naked Security by Sophos

Security threat news, opinion, analysis, and research from Sophos covering the latest internet threats and computer security issues in accessible, well-written articles.

news analysis beginner sophos
Visit resource
Free

Schneier on Security

Bruce Schneier is an American cryptographer, security professional, and privacy advocate. His weekly blog covers the latest cybersecurity news, opinion, and trends from one of the field's most respected voices.

blog cryptography privacy bruce-schneier opinion
Visit resource
Free

Threatpost

Independent news and analysis covering IT and business security for professionals worldwide. In-depth reporting on the latest threats, vulnerabilities, and security events.

news analysis vulnerabilities professional
Visit resource
Free

Troy Hunt

Australian web security expert and creator of Have I Been Pwned. Writes about the latest security news, data breaches, trends, and opinion. Well-known for clear, direct takes on real-world security issues.

blog web-security data-breaches troy-hunt opinion
Visit resource
Free

ZDNet Security

24/7 news coverage and analysis of IT trends, technologies, and security. Follow hot topics, emerging threats, and keep up with the latest events affecting enterprise security.

news enterprise it professional
Visit resource

Skillsoft

Enterprise learning platform providing IT and cybersecurity training resources to help professionals advance their skills and protect their organizations.

corporate certification professional
Visit resource

Spam Nation

Investigative journalist Brian Krebs unmasks the criminal masterminds behind some of the biggest spam and hacker operations targeting Americans. A fascinating deep dive into the economics and personalities of cybercrime.

story cybercrime investigative spam brian-krebs
Visit resource
Featured

StationX

Learning platform dedicated to cybersecurity with 90+ courses covering network security, ethical hacking, Linux, scripting, programming, and certification prep.

courses beginner certification ethical-hacking
Visit resource

The Code Book

Simon Singh traces the history of encryption from ancient ciphers to modern cryptography, revealing the dramatic effects secrecy has had on wars, nations, and individual lives throughout human history.

story cryptography history beginner
Visit resource
Featured

The Cuckoo's Egg

Clifford Stoll's true account of how he tracked a spy through the early internet while working at Lawrence Berkeley Lab. A gripping story of deception, broken codes, and a dangerous game of cat-and-mouse with a hacker codenamed Hunter.

story espionage hacking-history beginner
Visit resource
Free Featured

TryHackMe

Browser-based hacking labs and learning paths — great for beginners.

beginner labs browser-based
Visit resource

Udemy

One of the world's largest course marketplaces with hundreds of IT and cybersecurity courses. Affordable training for students at all skill levels.

courses beginner affordable
Visit resource

The Ultimate Linux Mastery Bundle

Learn the fundamentals of Linux for cybersecurity. Covers effective navigation, privacy, anonymity, and operating system concepts. A solid foundation for anyone serious about security. Taught by Jason Cannon.

linux beginner fundamentals privacy os
Visit resource

Violent Python

Apply theoretical offensive computing concepts using a practical approach. Create your own attack tools in Python, automate large-scale network attacks, extract metadata, investigate forensic artifacts, build wireless tools, and mine social media. Uses Python 2.

python offensive forensics wireless networking technical
Visit resource
Free

VulnHub

Provides materials and vulnerable machines for gaining practical cybersecurity experience. Walk through intentional vulnerabilities to develop real penetration testing skills.

free hands-on penetration-testing labs
Visit resource

The Web Application Hacker's Handbook

The definitive guide to finding and exploiting web application vulnerabilities.

web intermediate pentesting
Visit resource
Free

Billy Ellis

Software developer and mobile security researcher. Creates videos on iOS security, mobile exploitation, software engineering, and reverse engineering topics.

mobile ios exploitation intermediate advanced
Visit resource
Free

Colin Kelly

Full-time cybersecurity professional creating content on education, career paths, certifications, and practical security topics. Good for learners figuring out their path in the industry.

career certifications education beginner
Visit resource
Free

Cristi Vlad

A cybersecurity analyst and OSCP holder focused on penetration testing and ethical hacking. Helps learners get started in offensive security through tutorials and walkthroughs.

offensive penetration-testing oscp intermediate
Visit resource
Free

Day Cyberwox

Full-time cybersecurity professional and WGU cybersecurity degree student. Shares career tips, his journey, and advice for students looking to land their first full-time cybersecurity position.

student career beginner degree wgu
Visit resource
Free

DC Cybersec

A cybersecurity professional focused on the defensive side of security. Helps you get into the industry by teaching tools and techniques for getting started and sharpening skills in cybersecurity.

blue-team defensive beginner career
Visit resource
Free

HackerSploit

Free and open-source information security training covering offensive and defensive techniques. Makes security education accessible with practical tutorials on tools, techniques, and platforms.

offensive defensive beginner tools free
Visit resource
Free Featured

IppSec

In-depth walkthroughs of HackTheBox, VulnHub, and other pentesting challenges. IppSec is the gold standard for learning how to approach machines methodically and think like a penetration tester.

hackthebox vulnhub ctf offensive intermediate advanced
Visit resource
Free

IT Career Questions

Created by Zach Hill, this channel brings on IT professionals and newcomers to answer your questions about IT careers, certifications, and breaking into the field.

career it-fundamentals beginner interviews
Visit resource
Free Featured

John Hammond

Tutorials on programming languages and cybersecurity for enthusiasts, professionals, and students. Known for CTF walkthroughs, malware analysis, and making complex topics approachable.

ctf programming malware beginner intermediate
Visit resource
Free

LiveOverflow

Documents, educates, and explores the journey through cybersecurity with a focus on solving CTF challenges. Known for deep technical dives into binary exploitation, web security, and hacking research.

ctf offensive binary-exploitation advanced web-security
Visit resource
Free

Loi Liang Yang

Cybersecurity consultant and CISSP/CEH/Security+ holder. Focuses on the offensive side through walkthroughs, tutorials, and presentations to help learners break into cybersecurity.

offensive certifications career beginner intermediate
Visit resource
Free

Rebecca Richard

Documents her journey studying cybersecurity at university, completing her degree, and growing a freelance business. Creates tutorials and vlogs showing what it looks like to break into the field as a student.

student career beginner degree freelance
Visit resource
Free

STÖK

Educational content for the bug bounty community. STÖK focuses on inspiring hackers to level up their skills through tutorials, recon methodology, and a hacker mindset perspective.

bug-bounty offensive web-security intermediate
Visit resource
Free Featured

The Cyber Mentor

Heath Adams teaches ethical hacking and penetration testing with a focus on sharpening technical skills and building a pentester's mindset. Covers active directory, web app hacking, and career advice.

offensive ethical-hacking penetration-testing active-directory intermediate
Visit resource