Professional Documents
Culture Documents
Conheça a plataforma
Cybersecurity de pentest
training from em nuvem.
Immersive Realize testes
Labs empowers de invasão
organizations tode
maneira simples e objetiva.
increase, measure, and demonstrate human capabilities in every part of
cybersecurity.
Online soc analyst and incident response training platform for blue team
members
Le plus important challenge de securité informatique francophone disponible
!Homepage
Venez tester vos that
of site capacités
offersen toutemachines
virtual légalité ! (VDI & VMDK & VHD) for
VirtualBox and VMware. Run VMs inside VirtualBox and VMware on any host.
ps/Practice.html
Loading...
Loading...
Loading...
Loading...
Verified Link Added Date
https://github.com/ine-labs/AWSGoat 25/08/2022
https://github.com/ine-labs/AzureGoat 25/08/2022
https://owasp.org/www-project-juice-shop/ 25/08/2022
https://ginandjuice.shop/ 25/08/2022
https://blueteamlabs.online/ 25/08/2022
https://training.dfirdiva.com/ 25/08/2022
http://flaws.cloud 25/08/2022
http://flaws2.cloud 25/08/2022
https://securzy.io/
Platform
Nox Cyber
Portswigger
Mosse Cyber Security Institute
BugCrowd University
ICSI
Offensive Security
AWS Cloud Certified
SANS
ATT&CK Mitre
Coursera
Fortinet
Microsoft
CLARK Center
Hacker101
ElasticStack
Hoppers Roppers
IBM Security Learning Academy
M.E. Kabay
Open P-TECH
Udemy
Netacad
Youtube
Youtube
HBO
Netacad
Netacad
Pluralsight and Microsoft
Blackhat Webcast Serie
Federal Virtual Training Environment
Harrisburg University CyberSecurity
HackXOR
flAWS System
Stanford
Linux Journey
Ryan's Tutorials
SANS
Shadowscape
Fullstackacademy
Hacking 101
Choose Your Own Cyber Adventure Series: Entry Level Cyber Jobs Explained
NETINSTRUCT.COM
HackerSploit
CyberStart America
Roppers Academy
Roppers Academy
Roppers Academy
Professor Messer
edX
edX
Cyber 5W
OpenLearn
Cisco Networking Academy
Cybersecurity Essentials
SANS Cyber Aces Online Tutorials
Cyber Warfare and Terrorism
Enterprise Cyber Security Fundamentals
IBM Security Learning Academy
Palo Alto Networks Free Digital Learning
None
Mossé Cyber Security Institute Free Curriculum
Digital Forensics Training Videos
Digital Forensics Basics
Digital Forensics
Computer Forensics
Digital Forensics Training Videos
Digital Forensics
KAPE Guide
Computer Forensics Investigation Course
Registry Explorer/RECmd Guide
Timeline Explorer Guide
Free Course Content
Email Forensics Workshop
IoT Digital Forensics Course
Digital Forensics Training Materials
Cyber Forensics Workshop
Understanding and Analyzing Weaponized Carrier Files
Digital Forensics Courses
Free Paraben Training Videos
An Introduction to Mobile Forensics
Linux Forensics Intro
Linux LEO
Linux Forensic
XAMN Transition
ENISA CSIRT Training
Training Resources
LetsDefend
The Case ofCollege
Champlain the Stolen
DFIRSzechuan
CTF Sauce
Forensics Challenges
Malware Traffic Analysis Exercises
Flaws2 Defender Track
Global Cyber War CTF (PwnDefend)
Its comprehensive Networking Academy education program brings research and outcome based
courses
Developed to schools,
from ourcolleges,
library ofuniversities,
professional and nonprofits worldwide.
development curriculum,Courses
SANS Cyberrange from
Aces Online is an
computer basics to advanced networking and prepare students for globally-recognized
online course that teaches the core concepts needed to assess and protect information security
certifications.
systems. Andcombine
it's free!training
The course materialcommunications,
is updated regularly
IT programs in business, andto keep pace IT
technology. with changes
master's in
programs
technology
can and
build on combinethreat landscape.
students'training
existinginITbusiness,
knowledge and hone their and skillstechnology.
in softwareIT processes, business
IT programs communications, master's programs
intelligence,
can data science, project management, and advanced data mining.
IBMbuild on students'
Security works with existing
you toIThelpknowledge and hone
protect your theirwith
business skillsaninadvanced
software processes, business
and integrated
intelligence,
portfolio of data science,
enterprise project
security management,
products and and advanced
services, infused dataAImining.
with and a modern approach to
Palo Alto Networks, Inc. is an American multinational cybersecurity company with headquarters
your
in security
Santa strategy using zero trust principles—helping you thrive in the face of uncertainty.
About
MCSI us.Clara,
equips
California. Its core
geek-university.com
cyber operators and
products
offers
warriors
areofahigh-quality
a series
with
platform that
the knowledge IT includes
tutorials.
and
advanced
Most
abilities they
firewalls
of need
the topics
to
and
we are
maintain
cloud-based
13Cubed
covering are offerings
started that
as awith
dealing extend
side various those
project aspects firewalls
and wasoflater to cover
developed
computer other
system aspects of
intoadministration. security.
a full-fledged company.
We've Most will
covered
operational
recognize superiority in the cyber domain. The certifications offered by MCSI empower cyber
topics such13Cubed
operators Cisco from
inasachieving CCNA, the YouTube
Linux, VMwarechannel of thePython
vSphere, same name, which produces a wide range of
programming...
content covering Digitaland maintaining
Forensics a high
and Incident level of expertise
Response (DFIR),inasperforming
well as other cyberspace
security-related
operations.
topics. The company also provides consulting services, and occasionally develops software
The Texas A&M Engineering Extension Service (TEEX) is an internationally recognized leader in the
distributed under the brand.
delivery of emergency response, homeland security and workforce training, as well as exercises,
technical
OpenLearn assistance and economic
is a free learning platform,development.
delivered by The Openprovider.
UniversityWe as partner
part of its Royal
edX is a mission-driven, massive open online course (MOOC) with the
Charter
world's commitment
leading to
universitiessupport
and the wellbeing
organizations of
to the
offer community.
high-quality online courses to learners
Digital Forensics: A subset of forensic science that examines system data, user activity, and other
across
pieces the world.evidence
of digital To explore our 3,500+ifcourses,
to determine an attack please visit our course
is in progress and who catalog.
may be behind the
activity.
Hacking and cybersecurity are THE most important skill set of the 21st century and Hackers-Arise
is here to offer you the very best training in hacking and cybersecurity at an affordable price.
Creating future cyber security professionals. EH Academy provides online cyber security training
The
and best DFIR resource
certifications, ethicalonhacking
the planet ran by
courses and those who work everyday in DFIR.
tutorials.
eForensics
The best DFIRMagazine
resource is aondownloadable
the planet ranmagazine
by thosefocused
who work oneveryday
digital forensics.
in DFIR.We cover all
aspects of electronic forensics, from theory to practice, from methodologies and standards to
The
toolsbest
andDFIR resource
real-life on the planet ran by those who work everyday in DFIR.
solutions.
Metaspike is a digital forensics software company in Los Angeles, CA. We build intuitive computer
A circle
forensics
Ryan consists isofafor
software
Chapman aSri
closed
the curved
cloud line
that
Lankan-American is aaround
pleasure
writer aoriginally
central
to use.point. Every point on
from Minneapolis, the line is His
Minnesota. thework
same
distance
has appeared online at The New Yorker, GQ, McSweeney's, BookForum, BOMB, Guernica, andthat
from the central point. This distance to the center is called the radius. The outer line
None
encloses the circle (or theoflength of thisfrom
line) Vermont
is called the circumference.
The Believer. A recipient fellowships Studio Center and the Millay Colony for the
Arts, he lives in Kingston, New York.
Ryan Chapman is a Sri Lankan-American writer originally from Minneapolis, Minnesota. His work
has appeared online at The New Yorker, GQ, McSweeney's, BookForum, BOMB, Guernica, and
The
HighBeliever.
Technology A recipient of fellowships
Crime Investigation from Vermont
Association (HTCIA) Studio
is anCenter and thenon-profit
international Millay Colony for the
Arts, he lives in Kingston, New York.
professional organization devoted to the prevention, investigation, and prosecution of crimes
MSAB
involving is the global leader
advanced in digital forensic technology for mobile device examination and
technologies.
analysis. The company has, since its founding in 1984, set the global standard for the digital
Paraben
forensics Corporation
industry. is MSAB
an investigative technology company providingwith software for mobile
Hal Pomeranz
forensics and is anThe
computer independent vision
forensics
is toforensic
digital empower every
investigator investigation
who has consulted digital onforensic
cases ranging
solutions – for a safer
from intellectual property world. theft, to employee sabotage, to organized cybercrime and malicious
software infrastructures.
Ali Hadi Mohsin (Arabic: 1 ; علي هادي محسنJune 1967 – 12 June 2020) was an Iraqi professional
Welcome
football to Linux andLEO. You have reached asthe home offor theAl-Zawraa
Law Enforcement and Forensic
MSAB
Examiner'sis player
theIntroduction
global manager.
leader to
He played
inLinux,
digitala forensic atechnology
Comprehensive
defender for mobileguide.
Practitioner's
and Al-Talaba,
device examination winning
and
several titles with the clubs; he also played in Lebanon, for
analysis. The company has, since its founding in 1984, set the global standard for the digital Al-Safa and Al-Ahed. Ali Hadi. Personal
information.
forensics Full
industry. name.
The MSAB vision is to Security
empower every (ENISA)
investigation with digital forensic
The European Network and Information Agency is a European Union (EU) agency
solutions
dedicated – for
to a safer
preventing world.
and addressing network security and information security problems.
The European Network and Information Security Agency (ENISA) is a European Union (EU) agency
NW3C
dedicated provides a nationwide
to preventing support system
and addressing network for law enforcement
security and informationand regulatory
securityagencies
problems.
involved in the prevention, investigation, and prosecution of economic and high-tech crime. We
deliver training in computer forensics, cyber and financial crime investigations, and intelligence
The best DFIR resource on the planet ran by those who work everyday in DFIR.
analysis.
MOBILedit
By managing is the
newultimate
learners'PC suite for all of
expectations phones with features
themselves, providing including
constant an quantified
organizer, feedback
rich
phonebook functionality, smart phonebook optimizer,
on their progress, and bringing them into the community, Roppers Academy is designed to battery life indicator, signal indicator,
memory
minimizestatus,dropout SMS rate sending and management
while providing the best and first much more. hours of a cyber security
few hundred
education
Basis
Peter Technology possible.
Staarfaenger Corp. is a software
is based out of Greatercompany specializing
Columbus Area in and applying
works at artificial
Globalintelligence
Payments Inc. as
techniques
Cyber Defense to understanding
Forensics Consultant documents and unstructured data written in different languages. It
has
The headquarters
Texas A&M Engineering in Somerville, Massachusetts
Extension Service (TEEX)and offices in San Francisco,
is an internationally Washington,
recognized leaderD.C.,
in the
None
London, and Tokyo. response, homeland security and workforce training, as well as exercises,
delivery of emergency
technical assistance and economic development.
An
MITREinformation security professional
ATT&CK (Adversarial with a Masters
Tactics, Techniques and of Cyber Security
Common Knowledge) & a Bachelors
is a framework, in set of
Telecommunications
data matrices, and Engineering
assessment tool developed by MITRE Corporation to help organizations
BlueTeam Academy is a corporate cybersecurity training provider.We help companies build their
understand
teams and then theirupgrade
securitytheir readiness
team and uncoverinto
capabilities vulnerabilities
defenders, in their defenses.
incident responders and
investigators.
Kenneth Ellington is a Senior Cyber Security Consultant at EY who specializes in SIEM and SOAR
technologies
Elastic such as Splunkmaterial and Resilient
Securityis Onion
the rubber-based
is a free and open source that resumes
platformits fororiginal shape after
threat hunting, stretching
network securityor
compression,
monitoring, and anything
and logismanagement. described as elastic
It includes is flexible.
best-of-breed open source tools in such
Tutorialspoint.com
Information Security a dedicated
solutions website
provider to provide
obsessed withquality
developing online education
solutions theas
to cover
Suricata,
domains
your 6. of
Zeek,
Computer Wazuh, the
Science, Elastic Stack, among many others.
Cover6 Solutions is Information
also the hostTechnology,
and primaryProgramming
sponsor of the Languages, and otherProfessionals,
D.C. cybersecurity Engineering as a
well as Management
cybersecurity Meetup subjects
group of over 7,000 members. This Cybersecurity company’s other services
IT
Theprograms
Active combine trainingteam
Countermeasures in business,
supports communications,
your sales and technology.
and technical teams IT master's
through programs
include
can build Network
on Security
students' consulting
existing IT and training,
knowledge and penetration
hone their testing,
skills in and staffing
software & collateral,
processes, recruiting.
business
training, and joint marketing events. Your technical teams have access to both support and
intelligence,
development data science,
engineering. project management, and advanced data mining
DFIR is a Wylie,
Michael non-profit MBA,with CISSPtheTogether
isgoals
the Sr. of we can strengthen
improving
Manager ofdiversity
a 24/7/365
and
in theexpand support
field andfor
DFIRmanaged
global
your customer's
providing
threat training,
hunting team.
network
certification, and book scholarships to those with limited financial resources. All monetary
Prior
AttackIQ provides real-time visibility into your security posture and helps you build a threat- built
to his current role, he was the Director of Cybersecurity at a top 100 CPA firm where he
donations
out
informed are tax-deductible.
the offensive/defensive
defense with our detailssecurity service
best-in-class practice.
Security Michael has
Optimization developed and fortaught
Applied
numerous Incident
courses Response
for the U.S. Department effective ways to respond
of Defense, DEFCON, toPlatform,
advanced Center
Colleges,attacks
and foragainst
Threat- and
clientslocalaround
Informed
remote Defense
network partnership,
resources, and
providing award-winning
proven response Academy
methods and a framework through which
the world. Michael is the winner of numerous SANS challenge coin and holds the following
to implement
credentials: them.CCNA R&S, GPEN, GMON, GCFE, TPN, CEH, CEI, VCP-DCV, CHPA, PenTest+,
CISSP,
F‑Secure
CNVP, Anti‑Virus
Microsoft Azure,provides protection against viruses, spyware, infected email attachments and
and more.
Josh
otherismalware.
an Assistant Professor
Automatic of Cyber
updates andSecurity
real-time at response
Dakota State University
guarantee the where
fastesthe teaches
protection
malware
against analysis
all new threats. and reverse
F‑Secure engineering
Anti‑Virus is easy toof install and it does notinvolve
slow down your
Digital forensics and incident response are branches cybersecurity that identifying,
computer
investigating, containing, remediating andSpecialist
potentially
Kathryn is a Director and Digital Forensic fortestifying
Khyrenz Ltd., relateda SANSto cyberattacks,
Instructor, and litigations
a co-
or other
author digital investigations.
Today, Mattia is CEO of Reality Net System Solutions, an Italian infosec and digital forensicsher
of the FOR308: Digital Forensics Essentials course at SANS, a course that takes after
expertise
consulting incompany,
Digital forensic where fundamentals.
heaworks as a digital
Lenny is the CISO at Axonius, cybersecurity techforensics
company. analyst
Earlier,and heexpert
helpedforbuild judges,
anti-malware
prosecutors,
software at an lawyers,
innovative and private
startup companies,
and oversaw at times
security serving
services as an
at a expert
Fortune court
500 witness.
technology
Lee
In itsHolmes
simplest is aterm,
developerit is on of
a set therules
Microsoft Windows PowerShell
and configurations designed team, and has
to protect thebeen an
integrity,
ReversingLabs
company.
authoritative secure.
source ofsoftware,
information provides
aboutsoftware
PowerShell supply
since chain security
its earliest protection
betas. His vast forexperience
CI/CD
confidentiality
workflows, and
containers, accessibility
and releaseof computer
packages. networks
It is the and
only data
integratedusing both
platform software
that and
detects high-
with Windows
hardware PowerShell enables him to integrate both the ‘how’ and the ‘why’ into discussions.
technologies.
risk threats, malware, backdoors, exposed secrets, and
Lee’s involvement with the PowerShell and administration community (via newsgroups, mailingsoftware tampering across the software
development
lists, and blogs) cycle.
gives him a great deal of insight into the problems faced by all levels of
administrators and PowerShell users alike.
Symantec cloud security
Palo Alto Networks, Inc. issolutions
an American and data protectioncybersecurity
multinational offerings helpcompany you safeguard data, users
with headquarters
and applications within any environment, from the public
in Santa Clara, California. Its core products are a platform that includes advanced firewalls and
cloud-based
CryptoStopper offerings
is proven that extend those firewallssoftware
to coverto other
stopaspects ofrunning
security.
Information security labsransomware
are to test new detection
solutions for cyber-security actively
purposes. ransomware
It also helps to
infections on Windows workstations and servers.
identify vulnerabilities in existing products or systems. Information security lab is to handles
vulnerability
Ali Hadi and enables Iscanning.
work asscalableaItProfessor
helps to know weaknesses in systems and materials.
RangeForce cyberand Security
readiness Researcher,
from interested
a single cloud-based inplatform.
DFIR and Access
Offensive
Security.
individual I'm also an
andisteam-based author and
exercisesspeaker.for author,
a varietytrainer,
of threats
Chris Sanders an information security and across experience
researcher originallylevels
from andMayfield,
cybersecurity functions.
KY. He is the founder of Applied Network Defense, a company focused on delivering high quality,
accessible
LetsDefendinformation
is a hands-on security
Blue Team training.training platform that enables people to gain practical
experience
Picus Security by investigating real cyber attacks inside a simulated SOC. Cloud
LimaCharlie
Cybrary is a is pioneered
cybersecurity
Breach and Attack
Security Infrastructure
and IT workforce
Simulation
as a Service
development (SIaaS).(BAS)Ourtechnology
platform
platform.
and hasorganizations
enables
Its ecosystem
helped
of people, to
companies
detect improve their cyber resilience since then
companies, content, and technologies converge to create an ever-growing catalogand
& respond to threats, automate processes, reduce the number of vendors, future-
of online
proof
courses their security
andprovides
experiential operations.tools that provide IT for andsmartcybersecurity learning
Black Pearl intelligent infrastructure commerce. Black opportunities
Pearl's flagshiptoproduct,
anyone,
anywhere,
the Blackfocuses anytime.
Pearl Knowledge Broker, lets companies extendfiles their value-added sales practices into
Varonis
MaxProd Technologieson protectingis a cyber enterprise
securitydata: company sensitive
based outand emails; confidential
of Southern customer,
Maryland supporting
the electronic
patient andprivate market
employee place.
data;Asfinancial records;threats
strategic and product plans; andonother intellectual
public
BrightTALKand provides sectors.
webinars cyber
and videossecurity for professionals continue andtotheir
wreak havoc
communities. organizations
Every day
property.
across the globe, our team of defenders are readytheir to bridge the their
gap by providing real-world,
thousands
organization ofdedicated
thought leaders
to promotingare actively sharing
cybersecurity insights,
education ideas
and awareness. andOur their most
goal is toup-to-
make
industry-standard
date knowledge expertise.
with professionals all over the globe through the technologies that BrightTALK
cybersecurity knowledge and training accessible, so everyone can protect themselves and their
has created. from cyber threats. We accomplish this by hosting free events for the community.
organizations
Digital forensics and incident response (DFIR) is a specialized field focused on identifying,
We are passionate
remediating, andand about building
investigating cybera supportive,
security diverse,Digital
incidents. and inclusive
forensics cybersecurity
includes community.
collecting,
Digital
CSI forensics
Linux is aand focused incident
Linuxforensicresponse
distribution (DFIR)
for digitalis a specialized
forensics. field focused
We developed on identifying,
anevents.
open-source
preserving,
remediating, andanalyzing
investigating cyberevidence
securityto paint
incidents. a full, detailed
Digital picture
forensics of
includes collecting,
'theme
CSI park'
Linux is aand for the
focused cyber security
Linuxforensic
distributionindustry. It
for digital has tons of
forensics. capabilities
We developed for investigations,
anevents.
open-source analysis
preserving,
and response! analyzing
CSI Linux is available evidence
in both ato paint
Virtual a full,
Machine detailed picture
Appliance and ofBootable distro to
'theme park' for the cyber security industry. It has tons of capabilities for investigations, analysis
use
and as a daily
response! driver.
CSI Linux
Cyberwox Academy is anisonline
available in both a Virtual
cybersecurity community Machine andAppliance
resource hub and that
Bootable
providesdistro to
use as
students. a daily driver.
everything they need todigital gear them towards building a strong entry-level
Hal Pomeranz is an independent forensic investigator who has consulted on cybersecurity
cases ranging
career.
from
AWS (Amazon Web Services) is a comprehensive, evolving cloud computing platform malicious
intellectual property theft, to employee sabotage, to organized cybercrime and provided by
software
Amazon infrastructures.
that includes a mixture of infrastructure as a service (IaaS), platform as a service (PaaS)by
AWS (Amazon Web Services) is a comprehensive, evolving cloud computing platform provided
and
Amazonpackaged software as a service (SaaS) offerings.
Microsoftthat is theincludes
largesta vendor
mixtureofofcomputerinfrastructure software as a in service (IaaS),Itplatform
the world. as a service
is also a leading (PaaS)
provider of
and
cloud packaged
computing software
services, as a service
video games,(SaaS) offerings.
computer and gaming hardware, search and other online
Microsoft
SANS Digital is the largestand
Forensics vendor of computer
Incident Responsesoftware community in the world.
offers It is also
digital a leading
forensics provider of
and incident
services
cloud computing services, video games, computer and gaming hardware, search and other online
response
High professionals
Technology Crime an opportunity
Investigation to learn, discuss,
Association (HTCIA)and is anshare current developments
international non-profit in the
services
field. It also provides information regarding digital forensics and incidentprosecution
response training,
professional
NIST is the National organizationInstitute devoted to the prevention,
of Standards and Technology, investigation,
a unit ofand the U.S. Commerce of crimes
certification,
involving advancedand events.
technologies.
Department. Formerly known as the National Bureau of Standards, NIST promotes and maintains
A Subject Matter
measurement Expert on
standards. It Digital hasForensics,
alsocomputing active as E-discovery
programs and IT Security andworking
assistingas a Seniorand
The CNCFInvestigator
Forensic defines cloud-native
/ Head of IT standards.
Security with use for
theSupreme encouraging
of open
Group source
Dubai, software,
having aasgood
industry
well as
exposure in
science
technologiesto develop
such and
as use
containers, these microservices and service mesh, to develop and deploy scalable
the area of Electronic Discovery, Digital Forensics & Investigation, Data collection, IT Security
applications
Audit on cloud computing platforms.
Googleand LLCCompliance
is an American and multinational
have good understanding
technology company of tools tothat investigate
focuses on electronic evidence to
search engine
implement
technology, existing laws.
online advertising,
Microsoft provides a financiallycloud backed computing,
99.9% applicationcomputeruptime software, quantum
guarantee forcomputing,
Microsoft 365. e- It
commerce, artificial intelligence, and consumer electronics
also includes a range of robust security capabilities, such as identity and access management,
threat
roles asprotection,
an escalation information
point for protection,
high priorityand securitythis
incidents, andhas riskalso
management.
included a lot of threat hunting
and in my current role a lot of focus on malware analysis.
Malware Unicorn, discusses her time in computer forensics investigations with the DoD, as well as
the
With joys of reverse engineering
Reverse malware encryption bythe
hand.
Google Cloud Engineering
consists of a for setBeginners
of physicalyou will learn
assets, such as basics of x86
computers andandhardget hands-on
disk drives, and
experience
virtual resources, such as virtual machines (VMs), that are contained in Google's data centers
around
Marcus the globe. also
Hutchins, Eachknown data centeronlinelocation is in a region
as MalwareTech, is a British
The Federal Virtual Training Environment (FedVTE) provides free computer security researcher
online cybersecurity training to
known for temporarily stopping the WannaCry ransomware
federal, state, local, tribal, and territorial government employees, federal contractors, and US attack
military veterans.
Hackers-Arise
Hackaday is the Is premier
A White-Hat website Hacker Training Site.
for hardware ideas ThisandMeans That We
discussion. Use Our
As part of ourSkills For Good
mission, we
feature the best projects from basement and garage workshops around the world.
Maddie
Max Stoneisisa asecurity
Kersten Securityresearcher
Researcher foron Google Project
McAfee's Advanced Zero whereResearch
Threat she focuses team.onLeveraging
0-days
Reverse
actively engineering
exploited malware involves
in-the-wild. disassembling (and sometimes decompiling) a software his
previous
program.experience
Through this asprocess,
a security specialist
binary at a financial
instructions institution,
are converted to hecode focuses primarily
mnemonics (or on
higher
banking
level malware,
constructs) as well as other threats including stealers and remote access Trojans.
Patrick Wardle is so thethat
Chiefengineers
Research can look at
Officer at what
Digitathe program
Security anddoes
founder and of
what systems it
Objective-See.
impacts
Having worked at NASA and the NSA, and well as presented at many security conferences, he is
intimately
An information familiar with aliens,
security spies, with
professional and talking
a Masters nerdy.of Cyber Security & a Bachelors in
Telecommunications Engineering
An information security professional with a Masters of Cyber Security & a Bachelors in
Telecommunications
It approvesCyber and oversees Engineering
theAnalyst,
implementation of theSecurity
budget, & development plan and Programme
Malware, Intelligence and all around Computer Science nerd.Currently
of Work,
Ph.D. activities for each calendar year, of the cyber defence hub
CLARK,Candidate at University
the Cybersecurity Labsofand Cincinnati,
ResourceComputer Science Engineering
Knowledge-base, is a platforminfor Cyber Operations.
building and
Sr. Cyber
sharing Intelligence research analyst by day.
CLARK, the Cybersecurity Labs and Resource Knowledge-base, is a platform for building andlibrary
free cybersecurity curricula. It includes a model for building curriculum, the digital
system,
sharing freeand cybersecurity
distinct curriculum collections.
curricula. It includes a model for building curriculum, the digital library
system, and distinct curriculum collections.
HackerSploit is aimed at protecting companies and businesses from the ever-growing threat of
hackers,
Josh is andata breaches,
Assistant malware,
Professor and ransomware.
of Cyber Security at Dakota State University where he teaches
malware analysis and reverse engineering
None
Ali Hadi and I work as awayProfessor anddetection,
Security Researcher,
Defense
Blackstorm evasion
Security is theis to bypass
a quality-driven company.cover whatinterested
We provide malware isindoing,
quality security
DFIR andandOffensive
based determine
on client its
Security.
activity toI'm
a also an family
specific author orand speaker.
authors. There are different techniques used by threat actorsWe likelive
specifications
OA Labs. We anda our
are pledge
medical of partnership,
clinic that focusesThe commitment,
on tactics
preventative andand continuous
restorative improvement.
therapies for men
injection,
by data encryption, and obfuscating. often induce payloads and scripts
andour brand We
women. promise of CREATING
specialize in hormone CONFIDENCE
optimization andand willweight
alwaysloss.
portray Thepassion
goal at OAandLabs
enthusiasm
is to
for what we do and what we offer.
promote longevity, promote overall health, and improve quality of life through a multi faceted
approach.
Colin Hardy has a wealth of real-world, hands-on cyber security experience specialising in
SANS
malware Institute
analysis, is the mostforensics,
digital trusted source of cyber
cyber threat security training,
intelligence, incident certifications
management andandresearch.
By managingsecurity
information new learners' strategy. expectations of themselves, providing constant quantified feedback
on their progress, and bringing them into the community, Roppers Academy is designed to
Software
minimize Engineer,rate Malware
while Analyst,
providingand Consultant in Poland
Welcome dropoutto MalwareAficionado!Here, the
we'llbest
coverfirstMalware
few hundred
Analysis, hours of a cyber
Reverse security
Engineering,
education
Incident possible.
Response, and (most) things Information Security! for maintaining internal network
Blue teams are defensive security professionals responsible
defenses against all cyber attacks and threats. Red teams simulate attacks against blue teams to
test the effectiveness of the network's security.
A Full-System Simulation Environment for Massively Parallel Heterogeneous System-on-Chip.
None
Abstract: Driven by flexibility, performance and cost constraints of demanding modern
None
applications, heterogeneous System-on-Chip (SoC) is the dominant design paradigm in the
embedded
Think
DFIR aboutsystem
Madness allisthe computing
content
a site yourdomain.
by Information company needs
Security and produces
professional, Jamesto go about
Smith its business. From the
Champlain
budget College's
spreadsheets Computer
to employee & Digital Forensics
contracts, program
product offers
brainstorming the bestdedicated
sessions possible
to buyer
to sharing
digital
personas,
thrill of
forensics the hunt
training for amateurs and professionals alike.
your business runsaton the undergraduate
information. Now,level.
consider what would happen if some of that content fell
into the wrong hands. Competitors could get an edge on you, hackers could access private
customer data, and your company's financials could be put at risk.
PwnDefend
None was created as a mechanism to help people with the cyber security challenges we
face today.
HackTale is a new,It's inception
innovativewas focused
approach onfor
theteaching
creationand of capture
training thecyber flagexperts
(CTF) games that helped
via gamification.
None
teach good
HackTale is asecurity
platform practises
designed through
for thethe medium
creation of of offensive security.
cyber-games. Each game simulates a different
attack scenarioplatform
An enterprise and focuses on different
that measures andaspects of cyber-defense.
evidences the cyber security capabilities of your
workforce, Immersive Labs is the leader in
Participants learn to overcome sets of challenges from six domains cyber workforce optimization. Organizations
of cybersecurity use the
including
Immersive Labs Simulation Engine to evidence resilience across their
general skills, cryptography, web exploitation, forensics, etc. The challenges are all set up with the whole workforce
intent of being hacked, making it an excellent, legal way to get hands-on experience.
None
An educational, introductory set of CTF-styled challenges which is aimed to encourage students,
security researchers and also CTF players to get started with the field of Memory Forensics
Quick videos providing a high-level overview of a topic
Ideal course for penetration testers, security enthusiasts and network administrators
Analysis of mobile
An independent and forensics, big data and cloudorganization
neutral nongovernmental forensics, socialwhose networking
mission isforensics
to ensure the rights
of people to security, dignity and equity in cyberspace
None
A service we provide to customer to ensure the safety of his environment. The benefits that the
None
customer receives consist in simply connecting their or outsourced infrastructure to CyberSOC
security
OSINT is monitoring
a methodology for collecting, analyzing, and making decisions about data accessible in
publicly available sources to be used in an intelligence context
The best DFIR
Corelight is theresource on the planet
most powerful network ranvisibility
by those andwho work everyday
monitoring solution in for
DFIR.
information security
professionals
Combine training in business, communications, and technology
Combine management and leadership training with lessons in technology, analytics, and big data
A mission-driven, massive
Professor openA+,online course (MOOC) provider videos, notes, study groups,
The Texas Messer's CompTIA
A&M Engineering Network+,
Extension Serviceand Security+
(TEEX) is antraining
internationally recognized leader in the
and IT certification
delivery of emergency study materials
response, homeland security and workforce training, as well as exercises,
technical
Interactive assistance
online classesand economic
subjectsdevelopment
in offering including law, history, science, engineering,coursesbusiness,
An online learning platform self-paced guided projects and on-demand onsocial
a
sciences, computer science, public health, and artificial intelligence
variety of subjects. The platform partners with universities and companies, including Amazon (AI)
Web Services,
An online Google
learning and IBM,and
destination to provide courses offering high-quality courses from the world's
MOOC provider,
best universities and institutions to learners
A nonprofit initiative working since 2008 to offer free and open online courses to all who want to
None
learn. We offer nearly 100 full-length courses at the college and professional levels, each built by
Its comprehensive
subject matter Networking Academy education program brings research and outcome based
experts.
A leading
courses tocybersecurity
schools, colleges,consulting and advisory
universities, firm withworldwide.
and nonprofits the expertise and resources
Courses range from necessary
to assist clients build secure cyber defences
computer basics to advanced networking and prepare students for globally-recognized
certifications
Irvin
None Lemus, CISSP has been in the industry for over 15 years. Irvin has been involved with
Overview
cybersecurity of the hardware and
competitions as aCircuitPython
trainer, coach, programming
mentor and environment
creator. He is along withasome
currently Cyberbasic
Range
programming
Engineer for By Light, the Bay Cyber League Competitions Coordinator and SkillsUSA Contest
Chair.
The Pythonthe
It teaches Institute is an independent
basic concepts and describes non-profit project that
the hardware set up by the Open
assembly code Education and
Development
Hakin9 Group (OpenEDG) to promote the Python programming
is a monthly magazine dedicated to hacking and cybersecurity. In every edition, language, train a we
newtry to
None
generation
focus on different approaches to show various techniques - defensive and offensive. This the
of Python programmers, and support professional careers in programming in
Python
knowledge language, andyouin related technologies
Al Sweigart will is a help
software understand
developer and howteaches
most popular attacksto
programming are performed
kids and adults. andHehow
hastowritten
protect
your data
several from
Python booksthem.
Tutorialspoint.com
Udemy is a platform afor
isthat beginners,
dedicated
allows
including
website
instructors
Hackingquality
totoprovide
build
Secretonline
online
Ciphers
courses
with Python,
education
on their in theInvent
preferred domainsYour
topics. of
Own Computer
Computer Games
Science, with
Information Python, and
Technology, Making Games
Programming with Python
Languages, & Pygame.
andsource
other code
Engineering as
Using Udemy's course development tools, instructors can upload videos, for
well as Management subjects
developers, PowerPoint presentations, PDFs, audio, ZIP files and any other content that learners
Microsoft
might findishelpful
the largest vendor of computer software in the world. It is also a leading provider of
cloud computing services, video games, computer and gaming hardware, search and other online
None
services. Microsoft's corporate headquarters is located in Redmond, Wash., and it has offices in
more than 60 countries
Tutorialspoint.com is a dedicated website to provide quality online education in the domains of
None
Computer Science, Information Technology,
Tutorialspoint.com is a dedicated website to Programming
provide quality Languages, and other
online education Engineering
in the domains as of
well as Management subjects
Computer Science, Information Technology, Programming Languages, and other Engineering as
well as Management subjects
None
None
None
Platform that allows instructors to build online courses on their preferred topics. Using Udemy's
None
course development tools, instructors can upload videos, source code for developers, PowerPoint
Microsoft
presentations,is thePDFs,
largest vendor
audio, of
ZIPthat computer
files software
and any products
other contentin thethat
world. It is also
learners a leading
might provider of
find helpful.
Australian
cloud computingsoftware company
services, video develops
games, computer andfor software
gaming developers,
hardware, searchproject managers
and other online
and other
services. software
Microsoft's development
corporate teams
headquarters is located in Redmond, Wash., and it has offices in
freeCodeCamp is a community of millions of people around the world who are learning to code
more than 60 countries.
together. You can learn to code with free online courses, programming projects, and interview
preparation for developer jobs. We're a 501(c)(3) public charity
freeCodeCamp (also referred to as Free Code Camp) is a non-profit organization that consists of
an interactive learning web platform, an online community forum, chat rooms, online publications
and local organizations
The complete that intendLearn
guide to JavaScript. to makehowlearning
to buildweb development
JavaScript projectsaccessible to anyone.
without getting stuck.
View Course.
Azeria Labs provides training courses on ARM exploit development, reverse engineering,
vulnerability research.
edX
Its is a mission-driven,
comprehensive massiveAcademy
Networking open online courseprogram
education (MOOC) brings
provider. We partner
research with thebased
and outcome
Special
world's Agent
leading ofuniversities
a Federal Law
and Enforcement
organizations agency
to offer high-quality online courses to learners
courses
Its to schools,Networking
comprehensive colleges, universities,
Academy and nonprofits
education worldwide.
program brings Courses and
research range from
outcome based
across
computer the world. To explore our 3,500+ courses, please visit our course catalog
courses tobasics
schools, to colleges,
advanceduniversities,
networkingand andnonprofits
prepare students
worldwide.for globally-recognized
Courses range from
certifications
computer
Udacity is abasics
global, to online,
advanced networking
lifelong learningand prepare
platform students for
connecting globally-recognized
education to jobs. Udacity works
certifications
with industry leaders to create project-based online learning programs. These unique
Udacity is a global, online, lifelong learning platform connecting education to jobs. Udacity works
collaborations ensure that students learn the technology skills
with industry leaders to create project-based online learning programs. These unique that employers value most.
collaborations ensure that students learn the technology skills that employers value most.
None
None
CompTIA A+, ofNetwork+, andlargest
Security+
Alison is one the world's freetraining
learningvideos,
platformsnotes,
for study groups,
education andand IT training.
skills certification
It is a
study materials
for-profit social enterprise dedicated to making it possible for anyone, to study anything,
Alison is one of the world's largest free learning platforms for education and skills training. It is a
anywhere,
for-profit at any
social time, for dedicated
enterprise free online,toatmakingany subject level.for anyone, to study anything,
it possible
The world's largest free learning platforms for education and skills training. It is a for-profit social
anywhere, at any time,
enterprise dedicated tofor free online,
making at any
it possible for subject
anyone,level.
to study anything, anywhere, at any time,
for free online, at any subject level.
None
The most trusted resource for information security training, cyber security certifications, and
research
The Naval Postgraduate School (NPS) provided post-baccalaureate education to military officers
and other members of the United States defense and national security community.
Hack The Box is an online platform allowing you to test your penetration testing skills and
None
exchange ideas and methodologies with other members of similar interests. It contains several
challenges that are constantly updated.
Udemy
None is a platform that allows instructors to build online courses on their preferred topics.
Using Udemy's course development tools, instructors can upload videos, source code for
Building
developers, a Cybersecurity Home Lab
PowerPoint presentations, PDFs, audio, ZIP files and any other content that learners
might find helpful.
An experienced Cyber Security leader that is dedicated to providing training, tips & tricks, and
career
Dedicatedadvice throughout
to the advancement the community.
of cyber education, workforce and policy development for women
and
osintminorities
combine in underserved
provides leading communities.
edge training in online investigations, online safety, open source
The OSINT Curious Project is a source of quality, actionable, Open Source Intelligence news,
intelligence to help you find, understand and take action
original blogs, instructional videos, and a bi-weekly webcast/podcast. Most of all, we want to
inspire people to look outside of their OSINT-comfort zones and pursue their OSINT passions.
None
None
Toddington International is pleased to curate the Web’s largest database of free OSINT resources
and tools, research
Open-source “cheat(OSINT)
intelligence sheets,”is and other online
the collection andinvestigative
analysis of dataaids.gathered from open
sources (overt and publicly available sources) to produce actionable intelligence.
A platform that allows instructors to build online courses on their preferred topics. Using Udemy's
A curated
course list of amazingly
development awesome open source intelligence tools andforresources
A platform that allowstools, instructors
instructors can online
to build upload videos, on
courses source
theircode
preferred developers,
topics. Using PowerPoint
Udemy's
presentations, PDFs, audio, ZIP files and any other content that learners
course development tools, instructors can upload videos, source code for developers, PowerPoint might find helpful.
presentations,
The HTCIA wasPDFs, formed audio, ZIP fileseducation
to provide and any other content thatto
and collaboration learners might
our global find helpful.
members for the
prevention and investigation of high tech crimes
None
April C. Wright is a hacker, writer, teacher, and community leader with over 25 years of breaking,
making, fixing, and
A foundational defending
course global critical
in open-source communications
intelligence (OSINT) gathering, teaches students how to
A YouTube
find, gather, description
and analyze refers
data to
fromthe content
the creator's text to describe their content. It uses SEO
Internet
OSINT Combine
techniques is an Australian
to optimize and categorizeveteranvideos
owned toand
helpoperated
users findbusiness
the rightwho specialise
content. Therein are
open-
two
source intelligence (OSINT) training & software.
types of YouTube descriptions: the overall description of the channel and the descriptions for
each
Focusvideo you upload.
on creating videos for aspiring ethical hackers, computer scientists, and the infosec
community.
Secjuice is the only non-profit, independent and volunteer led publication in the information
security space. We are a private members writing club focused on cybersecurity, information
security, network security, hacking, cyberwar, and open source intelligence gathering.
Work as a Threat Researcher at Cyble. I am focused on darknet and darkweb research, creating
None
automated tools to collect data and perform threat investigations by utilizing HUMINT, SOCMINT,
and OSINT. I have graduated from Georgia Tech with a Master's in Cybersecurity.
The founder of ehacking.net and creates future cyber security professionals by offering quality
former Advisoty
cyber security Board Member
education of @OSINTcurio.us
at EH Academy. You can connect with him on Twitter (@irfaanshakeel)
and LinkedIn.
None
None
None
IT programs
Offensive combine
security is atraining in and
proactive business, communications,
adversarial approach toand technology.
protecting IT master's
computer programs
systems,
None
can
networks and individuals from attacks. Conventional security -- sometimes referred to asbusiness
build on students' existing IT knowledge and hone their skills in software processes,
intelligence, data science,
"defensive security" project
-- focuses management,
on reactive and advanced
measures, data mining
such as patching software and finding and
fixing system vulnerabilities.
PortSwigger offers tools for web application security, testing, & scanning. Choose from a range of
security tools
HackerSploit is the leading provider of free Infosec and cybersecurity training
None
The Federal Virtual Training Environment (FedVTE) provides free online cybersecurity training to
eLearnSecurity
federal, state, researcher
local, and territorial
tribal, and Malware Analysis Professional course instructor
The Federal Virtual Training Environmentgovernment employees,
(FedVTE) provides federal
free online contractors,training
cybersecurity and US to
military
federal, veterans.
state, local,Training
tribal, and territorial government employees, federal contractors,training
and US to
The Federal Virtual Environment (FedVTE) provides free online cybersecurity
military veterans.
federal, state, local, tribal, and territorial government employees, federal contractors, and US
military veterans. developed to help you discover your talent, advance your skills and win
A fun programme
scholarships
A fun programmein cyber security to help you discover your talent, advance your skills and win
developed
scholarships in cyber
A noncompetitive security
practice space where you can explore and solve challenges from previously
released picoCTF competitions
collection of free teaching material that teaches Computer Science through engaging games and
The K-12 Computer Science Access Report is a collaborative partnership between the Computer
puzzles
Science Teachers Association and Code.org (with the help of many state education agencies and
An online interactive
education resource
organizations) for high
to identify on school students learning
a school-by-school basis about
wherecomputer science
foundational computer
science is taught
None
Nonprofit Program of Creating IT Futures Inspiring Middle School Girls to Explore Technology to
Empower Their Future Careers.
None
None
Josh Moulin has been in the cybersecurity field since 2004 and worked in a variety of roles.
Currently, he is a Senior VP for a global cybersecurity non-profit.
None
The Federal Virtual Training Environment (FedVTE) provides free online cybersecurity training to
None
federal, state, local, tribal, and territorial government employees, federal contractors, and US
military veterans.
None
MCSI
None equips cyber operators and warriors with the knowledge and abilities they need to maintain
operational superiority in the cyber domain. The certifications offered by MCSI empower cyber
None
operators in achieving and maintaining a high level of expertise in performing cyberspace
operations.
None
Onward to Opportunity (O2O) is a free career training program that provides professional
None
certification and employee support services to transitioning service members, veterans and
military spouses.
None
CertNexus is a vendor-neutral certification body, providing emerging technology certifications and
micro-credentials for business, data, developer, IT, and security professionals.
None
None
Red Teamer & Compendium
The Definitive Network Security Consultant.
Project. | The best DFIR resource on the planet ran by those who
work everyday in DFIR
A repository of DFIR-related Mind Maps geared towards the visual learners! ... A repo to
centralize some of the regular expressions
Saylor Academy is a nonprofit initiative working since 2008 to offer free and open online courses
None
to all who want to
Saylor Academy is alearn. We offer
nonprofit nearlyworking
initiative 100 full-length
since 2008courses at the
to offer freecollege andonline
and open professional
courses
levels,
to all each
who wantbuilttoby subject
learn. We matter
offer experts.
nearly 100 full-length courses at the college and professional
IT programs combine training in business, communications, and technology. IT master's programs
levels,
can each
build onan built by subject
students' matter
existing experts. and hone their skills in software processes, business
IT knowledge
Coursera is online learning platform offering self-paced guided projects and on-demand
intelligence,
courses data science, projectThemanagement, and advanced data mining
Coursera is an online learning platform offeringpartners
on a variety of subjects. platform withguided
self-paced universities
projectsandand
companies,
on-demand including
Amazon
courses Web Services, Google and IBM, to provide courses.
Courseraon is aanvariety
onlineoflearning
subjects. The platform
platform offeringpartners withguided
self-paced universities
projectsandand
companies,
on-demand including
Amazon Web Services, Google and IBM, to provide courses.
courses on a variety of subjects. The platform partners with universities and companies, including
Amazon
Cisco Web
Talos Services,
is aone of theGoogle
largest and
andIBM,
most totrusted
provideproviders
courses.of cutting-edge security research
Proofpoint is cybersecurity platform aimed to protect workers and data from advanced
globally. We provide
cybersecurity criminals thethat
data Ciscoemail,
target Security products
social mediaandandservices use to take
mobile devices. action. email
Proofpoint's
protection is a cloud-based solution that allows companies to easily filter their inbox and outbox.
None
None
None
None
Command-line tool to search
lightweight, interpreted, for malwarelanguage
object-oriented samples with
in various repositories
first-class functions, and is best known as
the scripting language for Web pages, but it's used in many non-browser environments as well
None
An
SS64A-Z Index ofHow-to
VBScript The Windows
Search. CMD
An A-Z Command Line - SS64VBScript
Index of Windows · Basic CMD lines ofAwindows
commands. Abs(number)
Absolute (positive) value of number.
An A-Z Index of the Linux command line: bash + utilities. ; seq, Print numeric sequences ;
set, Manipulate shell variables and functions
Numeric computer code used to represent characters from the alphabet.
Varonis focuses on protecting enterprise data: sensitive files and emails; confidential customer,
None
patient and employee data; financial records; strategic and
Varonis focuses
Tutorialspoint.com on protecting
is a dedicatedenterprise
websitedata: sensitive
to provide filesproduct
quality
plans;confidential
and emails;
online education
and other intellectual
customer,
in the domains of
property.
patient and employee data; financial records; strategic and product plans; and other intellectual
Computer Science, Information Technology, Programming Languages, and other Engineering as
property.
well
High as Management
Technology Crime subjects. This website
Investigation was launched
Association (HTCIA) isbyananinternational
AMU alumni, Mr. Mohtashim,
non-profit
with a single organization
professional tutorial on HTML in year
devoted 2006.
to the prevention, investigation, and prosecution of crimes
involving advanced technologies.
None
frankwxu/digital-forensics-lab. Free hands-on digital forensics labs for students and faculty. Rich
Text FormatHTMLShellJavaPythonBatchfile.
None
Ian Neil is one of the world's top trainers of Security+. He has many years of teaching experience,
None
and a proven ability to break information down into manageable chunks so that complex ideas
are clear and easy to understand.
None
None
Open Source Intelligence (OSINT) training, education, and tradecraft best practices. OSINT is a
unique and specialized form of information
Digital Forensics and Incidence Response using Open Source tools
Courses are designed to help students learn the skills needed to investigate digital crimes,
None
uncover, preserve, and analyze evidence, and track threat actors. We use proven teaching
methods, interactive challenges, and skill-based learning that are user friendly and engaging.
Cyber security professionals boost their career to the next level and become experts in digital
forensics & incident
None
A repo that contains links to projects by members of the Digital Forensics Discord Server! This is
meant to help promote projects made by our very own members
Link Skill Level Hands-on Proof of completion
https://noxcyber.co.uk/ all
https://portswigger.net/web-security all
https://www.mosse-institute.com/certifications/mics-introduction-to-cyber-security.html
all
https://www.bugcrowd.com/hackers/bugcrowd-university/
all
https://www.icsi.co.uk/courses/icsi-cnss-certified-network-security-specialist-covid-19
all
https://www.offensive-security.com/metasploit-unleashed/
all
https://www.youtube.com/watch?v=3hLmDS179YE
all
https://www.sans.org/media/free/free-faculty-tools.pdf?msc=sans-free-lp
all
https://attack.mitre.org/resources/training/cti/
all
https://blog.coursera.org/coursera-together-free-online-learning-during-covid-19/
all
https://www.fortinet.com/training/cybersecurity-professionals.html
all
https://docs.microsoft.com/en-us/security/ciso-workshop/the-ciso-workshop
all
https://clark.center/home all
https://www.hacker101.com/ all
https://training.elastic.co/learn-from-home
all
https://www.hoppersroppers.org/training.html
beginners
https://www.securitylearningacademy.com/
all
http://www.mekabay.com/courses/index.htm
all
https://www.ptech.org/open-p-tech/ all
https://www.udemy.com/courses/free/ all
https://www.netacad.com/courses/programming/pcap-programming-essentials-python
all
https://www.youtube.com/watch?v=V9agUAz0DwI
all
https://www.youtube.com/watch?v=544rhbcDtc8
all
https://www.hbo.com/documentaries/kill-chain-the-cyber-war-on-americas-elections
all
https://www.netacad.com/portal/web/self-enroll/c/course-1003729
all
https://www.netacad.com/portal/web/self-enroll/c/course-1003733
all
https://www.pluralsight.com/partners/microsoft/azure
all
https://www.blackhat.com/html/webcast/webcast-home.html
all
https://fedvte.usalearning.gov/public_fedvte.php
all
https://professionaled.harrisburgu.edu/online-content/
all
https://hackxor.net/ all
http://flaws.cloud/ all
https://web.stanford.edu/class/cs253 all
https://linuxjourney.com all
https://ryanstutorials.net all
https://www.sans.org/blog/the-ultimate-list-of-sans-cheat-sheets/
all
https://www.shadowscape.io/cyber-intelligence-analytics-operat
all
https://prep.fullstackacademy.com/all
https://cyber.fullstackacademy.com/prepare/hacking-101
all
https://www.youtube.com/playlist?list=PL4Q-ttyNIRAqog96mt8C8lKWzTjW6f38F
all
https://netinstruct.com/courses all
https://hackersploit.org/ all
https://www.cyberstartamerica.org all
https://www.hoppersroppers.org/courseSecurity.html
Beginner yes badge
https://www.hoppersroppers.org/courseSecurity.html
Beginners Yes Badge
https://www.hoppersroppers.org/courseCTF.html
Introduction to Co Yes badge
https://www.youtube.com/watch?v=OS9MJjNK6gA&list=PLG49S3nxzAnlGHY8ObL8DiyP3AIu9vd3K
Beginners No No
https://www.edx.org/course/cybersecurity-fundamentals
Beginners NA Costs Extra
https://www.edx.org/course/cyber-security-basics-a-hands-on-approach
Prerequisites are b Yes Costs Extra
https://academy.cyber5w.com/collections?category=courses
Beginners Some courses have Yes
https://www.open.edu/openlearn/science-maths-technology/introduction-cyber-security-stay-safe-online/content-section-o
Beginners No Yes
https://www.netacad.com/courses/cybersecurity/introduction-cybersecurity
Beginners Yes Yes
https://www.netacad.com/courses/cybersecurity/cybersecurity-essentials
Introduction to CybYes Certificate of Compl
https://www.sans.org/cyberaces/ Beginners Yes None
https://itmasters.edu.au/free-short-course-cyber-warfare-and-terrorism/
This is an intermed None Certificate of Compl
https://itmasters.edu.au/free-short-course-enterprise-cyber-security-fundamentals/
This is an intermed None Certificate of Compl
https://www.securitylearningacademy.com/
Hopper’s Roppers I Yes Progress Report and
https://www.paloaltonetworks.com/services/education
Yes, there is fundamNone None
https://geek-university.com/courses/ Beginners None Certificate of Compl
https://platform.mosse-institute.com/ None Yes Yes
https://www.youtube.com/user/davisrichardg
None None None
https://teex.org/class/AWR139/ Beginners None None
https://www.open.edu/openlearn/science-maths-technology/digital-forensics/content-section-0?active-tab=description-tab
Beginners None Statement of Partic
https://www.edx.org/course/computer-forensics
Must complete the eNone Costs Extra
https://www.youtube.com/c/DFIRScience/featured
Beginners None None
https://www.hackers-arise.com/forensicsNone None Yes – There are free
https://aboutdfir.com/toolsandartifacts/windows/kape/
Beginners None None
https://academy.ehacking.net/p/computer-hacking-forensics-investigation
None None Costs Extra ($10)
https://aboutdfir.com/toolsandartifacts/windows/registry-explorer-recmd/
Beginners None None
https://aboutdfir.com/toolsandartifacts/windows/timeline-explorer/
Beginners None None
https://eforensicsmag.com/category/free-course-content/
None None None
https://events.metaspike.com/talks/email-forensics-workshop/
None None None
https://github.com/RJC497/IoT-Digital-Forensics-Course
None Yes None
https://www.circl.lu/services/forensic-training-materials/
None None None
https://www.youtube.com/playlist?list=PLt_Hvzh8oeR5S27UaoKDx2qqYZcpokGL5
Beginners Yes None
https://github.com/rj-chap/CFWorkshop None Yes None
https://htcia.org/free-courses/ None None None
https://paraben.com/dfir-free-training/None None None
https://www.youtube.com/watch?v=5e5KdbY-xzE
Beginners None None
https://archive.org/details/HalLinuxForensics/mode/2up
None Yes None
https://www.linuxleo.com/ Beginners Yes – This is a deta None
https://linuxdfir.ashemery.com/ None yes None
https://www.msab.com/training/free-courses/
None None None
https://www.enisa.europa.eu/topics/trainings-for-cybersecurity-specialists/online-training-material
None Yes – There are hanNone
https://www.enisa.europa.eu/topics/trainings-for-cybersecurity-specialists/online-training-material/technical-operational#m
None Yes None
https://aboutdfir.com/toolsandartifacts/windows/mft-explorer-mftecmd/
None None None
https://www.nw3c.org/live-online-training/live-online-cybercrime-course-list
None Yes Yes
https://content.mobiledit.com/training/ Beginners Yes None
https://www.hoppersroppers.org/roadmap/training/forensics.html
None Yes None
https://www.youtube.com/watch?v=bz2RiPsUC5Q
None None None
https://www.pnw.edu/cybersecurity/cwct/training-paths/cybersecurity-digital-forensics-cs_df-certificate-program/
Beginners Yes Yes
https://dfir-training.basistech.com/courses/intro-to-divide-and-conquer
Beginners None Yes
https://teex.org/class/AWR169/ Beginners None Yes
https://samsclass.info/152/152_F21.shtmlNone None None
https://attack.mitre.org/resources/training/
Beginners Yes None
https://www.blueteamsacademy.com/Beginners Yes None
https://www.youtube.com/playlist?list=PLau8hF6Nab7uHnbSt6LtZpnZlhC0l_9Bv
Beginners Yes, the dataset in None
https://www.elastic.co/training/free Beginners Yes None
https://www.youtube.com/watch?v=5fxVaVO8-L8&list=PLljFlTO9rB155aYBjHw2InKkSMLuhWpxH
None None Only available with
https://www.tutorialspoint.com/logstash/index.htm
None None None
https://www.youtube.com/c/Cover6Solutions/videos
None None None
https://itmasters.edu.au/free-short-course-information-security-incident-handling/
None None Yes
https://www.activecountermeasures.com/cyber-threat-hunting-training-course/
Beginners Yes None
https://training.dfirdiva.com/free-ir-training-plan
Beginners Yes Some courses have p
https://academy.attackiq.com/ Beginners Yes Badge
https://www.appliedincidentresponse.com/resources/
Beginners None None
https://www.youtube.com/watch?v=8jqNjo-LqYw
None Yes None
https://www.youtube.com/watch?v=0WgyiOxCFzE
None None None
https://www.f-secure.com/en/consulting/events/attack-detection-fundamentals-workshops
None Yes None
https://www.youtube.com/channel/UCwSo89W3KgPrid41vskBDYA
None None None
https://www.youtube.com/watch?v=eftOgRsHK4A
Beginners None None
https://www.youtube.com/watch?v=gXN4rRs77Ts
None None None
https://www.youtube.com/watch?v=20xYpxe8mBg
Beginners None None
https://www.youtube.com/playlist?list=PL8BogY0hWwvwWI_wE566IWLB0SttkxBxR
None Yes – There is a lin None
https://www.reversinglabs.com/products/open-source-yara-rules
None None None
https://www.youtube.com/watch?v=M5bkHUQy-JA
None None None
https://www.slideshare.net/ThreatIntel/powershell-the-increased-use-of-powershell-in-cyber-attacks
None None None
https://unit42.paloaltonetworks.com/unit42-pulling-back-the-curtains-on-encodedcommand-powershell-attacks/
None None None
https://www.youtube.com/watch?v=atL1WmmMJJw
None None None
https://www.youtube.com/c/ITSecurityLabs/videos
Beginners Yes – Can follow al None
https://www.youtube.com/watch?v=Hdh4mOozsg8
None None None
https://go.rangeforce.com/free-cyber-security-training-community-edition
Beginners Yes Badge
https://chrissanders.org/training/cuckoosegg/
Beginners None None
https://app.letsdefend.io/academy/ Beginners Yes – Some lessons None
ha
https://www.picussecurity.com/ Beginners None Yes
https://edu.limacharlie.io/ None None None
https://www.cybrary.it/info/mitre-attack-defender/
Yes – Courses star None Yes
https://www.youtube.com/channel/UCqVIVdF5lwb3uMhiS0XM4XQ
Beginners None None
https://www.varonis.com/blog/yara-rules/
Beginners None None
https://www.youtube.com/playlist?list=PLARteNMbJUb3UMIaT9pLn4jEttOZ7Q3_Y
Beginners None None
https://www.brighttalk.com/webcast/14421/387042
None None None
https://www.youtube.com/watch?v=61Qjx8Uti5s
Beginners None None
https://thedfirreport.com/ None None None
https://thedfirreport.com/2021/08/29/cobalt-strike-a-defenders-guide/
None None None
https://training.csilinux.com/ Beginners None None
https://training.csilinux.com/ Beginners None None
https://www.youtube.com/playlist?list=PLBNtagSCmDWyUcCsdq7m5ljKYDYTNG9R1
Beginners None None
https://archive.org/details/HalSELinux Beginners Yes None
https://www.aws.training/LearningLibrary
Yes – The training caNone None
https://aws.amazon.com/training/digital/aws-security-fundamentals/
Beginners None None
https://docs.microsoft.com/en-us/learn/browse/?products=azure
Yes – Courses are None Badges
https://docs.microsoft.com/en-us/learn/paths/manage-security-operations/
None None Badges
https://www.youtube.com/watch?v=vgmKUGuMi7c
None None None
https://htcia.org/free-courses/ None None None
https://csrc.nist.gov/publications/detail/nistir/8006/final
None None None
https://www.youtube.com/watch?v=MyXROAqO7YI
Beginners None None
https://www.slideshare.net/ShariqueRizvi/the-trouble-with-cloud-forensics
None None None
https://cloud.google.com/training Yes – Beginners canYes Badges
https://m365internals.com/2021/07/13/what-ive-learned-from-doing-a-year-of-cloud-forensics-in-azure-ad/
None None None
https://www.youtube.com/playlist?list=PLiFO-R_BI-kAqDPqtnOq2n70mtAZ6xg5N
None Yes None
https://malwareunicorn.org/#/workshops Yes – Reverse EnginYes None
https://www.begin.re/ Beginners Yes None
https://www.youtube.com/watch?v=OkjTqlETgMA
Beginners None None
https://www.youtube.com/playlist?list=PLPsJIruML_ZivGWUd6bPkwDe-KFOIYg7p
Beginners None None
https://fedvte.usalearning.gov/publiccourses/reverse/index.htm
Beginners Yes None
https://www.hackers-arise.com/reverse-engineering-malware
None Yes None
https://hackaday.io/course/172292-introduction-to-reverse-engineering-with-ghidra
None Yes – The live coursNone
https://ragingrock.com/AndroidAppRE/Beginners Yes None
https://maxkersten.nl/binary-analysis-course/
None Yes None
https://github.com/malrev/ABD None Yes None
https://taomm.org/ None None None
https://samsclass.info/126/126_F21.shtml
None Yes None
https://samsclass.info/141/141_F21.shtml
None None None
https://ccdcoe.org/library/publications/malware-reverse-engineering-handbook/
None None None
https://www.youtube.com/playlist?list=PLFvh_k-n27CnAyfsMDowQmogkG5MbZkXz
None None None
https://clark.center/details/goldenrichard/11053447-1b48-4d20-8a87-df52dfa95338
None Yes None
https://clark.center/details/thayajneh/7b274e20-4b98-4e4a-bc43-8ef646b3639c
None None None
https://www.youtube.com/playlist?list=PLBf0hzazHTGMSlOI2HZGc08ePwut6A2Io
Beginners None None
https://www.youtube.com/c/M9development/featured
None None None
https://p.ost2.fyi/ None None None
https://www.youtube.com/playlist?list=PLCS2zI95IiNwheFCTaUEytA1GT0mNOOdn
None None None
https://search.unprotect.it/map/ None None None
http://www.blackstormsecurity.com/docs/BHACK2020.pdf
None None None
https://www.openanalysis.net/ None None None
https://www.sans.org/webcasts/silly-framework-intro-analyzing-dotnet-malware-sansatmic-sydney-117015
None None Yes – Certificate of
https://www.youtube.com/c/ColinHardy None None None
https://github.com/hasherezade/malware_training_vol1
None Yes None
https://www.sans.org/webcasts/silly-framework-intro-analyzing-dotnet-malware-sansatmic-sydney-117015
None None Yes
None Beginner None None
https://blueteamlabs.online/ None None None
https://cyberdefenders.org/blueteam-ctf-challenges/?type=ctf
None None None
https://socvel.com/ None None None
https://letsdefend.io/ None None None
https://dfirmadness.com/the-stolen-szechuan-sauce/
None None None
https://champdfa-ccsc-sp20.ctfd.io/ None None None
https://info-sec-box.ctfd.io/ None None None
https://www.malware-traffic-analysis.net/training-exercises.html
None None None
http://flaws2.cloud/defender.htm None None None
https://globalwar.pwndefend.com/ None None None
https://www.hacktale.com/ None None None
https://community.immersivelabs.online/None None None
https://picoctf.org/index#picogym Yes (Ages 13+ can siNone None
https://ctflearn.com/ Beginners None None
https://github.com/stuxnet999/MemLabs Challenges range fr None None
https://www.youtube.com/watch?v=JuEv8UleO0U
None None None
https://www.ctf.live/ Has Beginner, Inter None None
https://tryhackme.com/ Has Easy, Medium an None None
https://courses.thecyberinst.org/courses/osint-challenge
None None None
https://www.osintdojo.com/ None None None
https://blog.bushidotoken.net/p/ctf.html
None None None
None None None None
https://www.geoguessr.com/ None None None
https://aboutdfir.com/education/challenges-ctfs/
None None None
https://f.hubspotusercontent00.net/hubfs/8645105/Corelight_May2021/Pdf/002_CORELIGHT_080420_ZEEK_LOGS_US_ONL
None None None
https://itmasters.edu.au/free-short-course-digital-forensics-updated/
Beginners None Certificate if you g
https://itmasters.edu.au/free-short-course-computer-network-fundamentals/
Beginners None Certificate of Compl
https://www.edx.org/course/introduction-to-networking
None None Costs Extra
https://www.youtube.com/playlist?list=PLG49S3nxzAnmpdmX7RoTOyuNJQAb-r-gd
None None None
https://teex.org/class/AWR138/ None None None
https://www.edx.org/course/network-security-2
None None Costs Extra
https://www.coursera.org/learn/network-transformation-101
None None Costs Extra
https://www.edx.org/course/network-security-protocols
None None Costs Extra
https://www.connecteddots.online/ Beginners Yes None
https://learn.saylor.org/course/view.php?id=84
Beginners None Yes - Certificate of
https://www.youtube.com/playlist?list=PLw78nfbi6DWiji62oG8ySfPFSLXZ4j_-3
Beginners None None
https://www.netacad.com/virtual/wr/networking-essentials
None None None
https://academy.apnic.net/en/online-courses/
Beginners None Yes - Certificate of
https://www.youtube.com/watch?v=wLXIWKUWpSs&list=PLmxT2pVYo5LB5EzTPZGfFN0c2GDiSXgQe
Beginners None None
https://canvas.instructure.com/enroll/LBPFDE
None Yes None
https://p.ost2.fyi/courses/course-v1:OpenSecurityTraining2+Arch1001_x86-64_Asm+2021_v1/about
None Yes None
https://www.learn-c.org/ Beginners Yes None
https://pythoninstitute.org/free-python-courses/
Beginners Yes None
https://hakin9.org/list-of-free-python-resources/
None None None
https://automatetheboringstuff.com/ Beginners Yes None
https://www.tutorialspoint.com/assembly_programming/index.htm
Beginners Yes None
https://www.udemy.com/course/regex-academy-an-introduction-to-text-parsing-sorcery/
Beginners None None
https://regexone.com/ None Yes None
https://docs.microsoft.com/en-us/powershell/
Beginners None None
https://www.youtube.com/playlist?list=PLTXMX1FE5Hj7QDc8R1GyaNucSI3aH-Sp5
None None None
https://www.tutorialspoint.com/vbscript/index.htm
Beginners None None
https://www.tutorialspoint.com/json/index.htm
None None None
https://www.sans.org/posters/json-and-jq-quick-start-guide/
None None None
https://www.sqlitetutorial.net/ None Yes None
https://www.sans.org/posters/sqlite-pocket-reference-guide/
None None None
https://www.sololearn.com/home Beginners Yes Yes – Certifiate of
https://www.udemy.com/course/git-started-with-github/
None None None
https://www.atlassian.com/git Beginners None None
https://docs.microsoft.com/en-us/learn/browse/?products=github
Beginners Yes Yes – Digital Badge
https://www.youtube.com/watch?v=GZvSYJDk-us
Beginners Yes None
https://www.freecodecamp.org/learn/information-security/
None Yes Yes
https://www.youtube.com/watch?v=iiADhChRriM
Beginners None None
https://azeria-labs.com/writing-arm-assembly-part-1/
None None None
https://www.youtube.com/playlist?list=PLz61osc7c3OqQ_xBZJbzZdIkVd8HnxLmC
Beginners None None
https://www.edx.org/course/introduction-to-linux
Beginners None Costs Extra
https://www.netacad.com/courses/os-it/ndg-linux-unhatched
Beginners Yes Yes – Certificate of
https://www.netacad.com/courses/os-it/ndg-linux-essentials
Beginners Yes Yes – Certificate of
https://www.udacity.com/course/linux-command-line-basics--ud595
Beginners None None
https://www.udacity.com/course/introduction-to-python--ud1110
Beginners Yes None
https://www.youtube.com/watch?v=YDyqO256blQ
Beginners Yes None
https://linuxjourney.com/ Beginners Yes None
https://www.youtube.com/playlist?list=PLG49S3nxzAnkL2ulFS3132mOVKuzzBxA8
None None None
https://alison.com/course/nist-cyber-security-framework-csf-foundation
Beginners None None
https://alison.com/course/identity-and-access-management
Beginners None None
https://alison.com/course/introduction-to-computer-network-security-revised
None None None
https://www.sans.org/security-resources/
None None None
https://www.sans.org/information-security-policy/
None None None
https://nps.edu/web/c3o/labtainers None Yes None
https://www.fortinet.com/training/cybersecurity-professionals
None None Yes
https://academy.hackthebox.com/catalogue
None Yes None
https://www.youtube.com/c/GeraldAuger/featured
Beginners None None
https://www.cyberwoxacademy.com/post/building-a-cybersecurity-homelab
Beginners None None
https://www.udemy.com/course/introduction-to-cloud-computing/
Beginners None None
https://www.youtube.com/c/JonGoodCyber/featured
Beginners None None
https://courses.thecyberinst.org/courses/osintmini
Beginners None None
https://www.hackers-arise.com/osint None None None
https://www.youtube.com/playlist?list=PL423I_gHbWUUOs09899rex4t2l5py9YIk
None None None
https://osintframework.com/ None None None
https://osint.link/ None None None
https://www.toddington.com/resources/free-osint-resources-open-source-intelligence-search-tools-research-tools-online-in
None None None
https://www.sans.org/blog/-must-have-free-resources-for-open-source-intelligence-osint-/
None None None
https://github.com/jivoi/awesome-osintNone None None
https://www.udemy.com/course/osint-free-demo/
Beginners None None
https://www.udemy.com/course/deep-web/Beginners Yes None
https://htcia.org/free-courses/ None None None
https://www.youtube.com/c/conINT_io/featured
None None None
https://www.youtube.com/watch?v=uxZyzJGfrUY
Beginners None None
https://courses.thecyberinst.org/courses/casefile
None None None
https://academy.osintcombine.com/p/australian-osint-symposium-2020
None None None
https://www.youtube.com/c/sansinstitute/search?query=osint
None None None
https://www.youtube.com/c/NullByteWHT/search?query=osint
None None None
https://www.secjuice.com/tag/osint/ None None None
https://metaosint.github.io/ None None None
https://www.youtube.com/watch?v=tHwy6bYgrlU
None None None
https://www.youtube.com/playlist?list=PLrFPX1Vfqk3ehZKSFeb9pVIHqxqrNW8Sy
None None None
https://www.youtube.com/watch?v=opLD4zFB5z0
Beginners None None
https://www.youtube.com/channel/UCynWOUeHAOflEQtJnrZpkNA/videos
None None None
https://checkout.ine.com/starter-pass Beginners Yes Yes
https://www.hackers-arise.com/ None None None
https://www.youtube.com/channel/UChjC1q6Ami7W0E71TzPZELA
None None None
https://www.itmasters.edu.au/free-short-course-pen-testing/
None Yes Yes – Certificate of
https://kali.training/ None None None
https://portswigger.net/web-security None Yes None
https://www.youtube.com/c/HackerSploit/featured
Yes – There is a Pe None None
https://www.hackthebox.eu/individuals None Yes None
https://exploitation.ashemery.com/ None Yes None
https://fedvte.usalearning.gov/publiccourses/cscrm/index.htm
None None None
https://fedvte.usalearning.gov/publiccourses/cloud2/cloudframe.php
None None None
https://fedvte.usalearning.gov/publiccourses/IMR_105/index01.htm
None None None
https://www.cyberstartamerica.org/ None None None
https://go.cyberstart.com/ None None None
https://picoctf.org/ None None None
https://csunplugged.org/en/ None None None
https://www.csfieldguide.org.nz/ None None None
https://studio.code.org/courses None None None
https://www.youtube.com/playlist?list=PLnb0FwCbM-50UuNjpeIrdEnlSbbMK891Q
None None None
https://www.techgirlz.org/ None None None
https://aboutdfir.com/resources/tool-testing/
None None None
https://www.netresec.com/?page=PcapFiles
None None None
https://joshmoulin.com/digital-forensics-incident-response-forms-policies-and-procedures/
None None None
https://bluedemy.cyberdefenders.org/Beginners Some of the coursesNone
https://www.withyouwithme.com/ None None None
https://fedvte.usalearning.gov/ None None None
https://live.paloaltonetworks.com/t5/second-watch/ct-p/Second_Watch
None None None
https://workplus.splunk.com/veteransNone None None
https://www.fortinet.com/tw/training/veterans-program
None None None
https://www.mosse-institute.com/veterans-in-cyber.html
None None None
https://www.sans.org/about/academies/vetsuccess/
None None None
https://skillbridge.osd.mil/ None None None
https://ivmf.syracuse.edu/programs/career-training/
None None None
https://events.dfirdiva.com/dfir-related-events
None None None
https://store.certnexus.com/index.php/certification/cybersecurity/category-cybersec-first-responder/audience-student/deliv
None None None
https://www.filesignatures.net/index.php?page=all
None None None
https://unit42.paloaltonetworks.com/wireshark-workshop-videos/
None None None
https://medium.com/@KillSwitchX7/cyber-security-discord-servers-7d9c0b7cd7cb
None None None
https://aboutdfir.com/a-beginners-guide-to-the-digital-forensics-discord-server/
None None None
https://github.com/AndrewRathbun/DFIRMindMaps
None None None
https://www.dfir.training/ None None None
https://learn.saylor.org/course/view.php?id=94
None None After Scoring 70% o
https://learn.saylor.org/course/view.php?id=453
None None Yes – After Scoring
https://itmasters.edu.au/free-short-course-detecting-and-defending-against-cyber-threats/
None None Yes with a passing
https://www.coursera.org/learn/information-systems-audit
None None None
https://www.coursera.org/learn/northeastern-data-privacy
Yes None None
https://www.coursera.org/learn/introduction-to-aws-identity-and-access-management
None None None
https://www.youtube.com/watch?v=W1pb9DFCXLw&list=PLpPXZRVU-dX33VNUeqWrMmBNf5FeKVmi-
None None None
https://www.proofpoint.com/sites/default/files/proofpoint-obfuscation-techniques-phishing-attacks-threat-insight-en-v1.pd
None None None
https://www.threathunting.net/ None None None
https://exercism.org/ None None None
https://www.sans.org/posters/?focus-area=digital-forensics
None None None
https://csilinux.com/ None None None
https://github.com/mattnotmax/cyberchef-recipes
None None None
https://htmlcheatsheet.com/js/ None None None
https://www.pythoncheatsheet.org/ None None None
https://ss64.com/ps/ None None None
https://ss64.com/vb/ None None None
https://ss64.com/bash/ None None None
https://ss64.com/ascii.html None None None
None None None None
https://www.varonis.com/blog/incident-response-plan/
None None None
https://www.varonis.com/blog/how-to-use-x64dbg-malware-analysis/
None None None
https://www.tutorialspoint.com/python_digital_forensics/index.htm
None None None
https://htcia.org/free-courses/ None None None
https://cybersocialhub.com/ None None None
https://github.com/frankwxu/digital-forensics-lab
None None None
https://malapi.io/ None None None
https://filesec.io/ None None None
https://securityplus.training/ None None None
https://bots.splunk.com/ None None None
https://www.youtube.com/watch?v=xW5UwDztkX4
None None None
https://osintacademy.com/ None None None
https://www.youtube.com/playlist?list=PLSbhiuoC0XgX70ZtgJ7d-1rLui0jZRabg
Beginner None None
https://0xinfection.github.io/reversing/Beginner None None
https://academy.cyber5w.com/collections/mobile-forensics
Yes, there are fund Yes Yes – Certificate of
https://bluecapesecurity.com/ None None None
https://securzy.io/ None None None
https://leanpub.com/TheHitchhikersGuidetoDFIRExperiencesFromBeginnersandExperts
None None None
Community Topics
Building a Home Lab, Linux, Bash, Hardware, Programming, Python,
Virtualization, Ubuntu, Hex, Linux Filesystem, Linux Permissions, Linux User
https://www.hoppersroppers.org/community.html
Management,
Risk, Linux Processes,
Security Principles, Threats,Bash Scripting
Attacks, Cyber KillChain, Malware Types,
File Forensics, File Formats, File Carving, Metadata, Steganography, Network
https://www.hoppersroppers.org/community.html
Password Security, Network Safety, OpSec
Forensics, Wireshark, tShark, Networking RFCs, Crpyto Math, Ciphers, XOR,
Windows Forensics, Linux Forensics, Evidence Acquisition, Working with Virtual
https://www.hoppersroppers.org/community.html
RSA
A+
HardCertification,
Disks, LinuxComputer
Forensics Hardware, Mobile
Distros, Writing Devices,Reports,
Forensics Networking, BIOS,
FTK Imager,
None Windows,
Data Linux,
Representation,
Security macOS,
Concepts andWorking Attacks,
Problems, Malware,
With Scripting
Files, TsurugiNetworking,
Cryptography, Linux, File Systems
Systemsand Data
None Carving, Investigating
Administration, Windows
Malware, Recycle
Forensics, Bin, Program
Detection, Executions, TimeZone
Prevention
Cybersecurity
Conversions, LNK landscape, reverseThumb
and Jumplists, engineering,
Caches,network
Registryattacks, malware,
Artifacts, Shellbags,
None vulnerability management, pentesting
USB Forensics, Volume Shadow Copies, Schedules Tasks, Event Logs, Timeline
None Analysis, EncryptedPhishing,
Threat Landscape, Files Malware, Authentication, Networking,
None Cryptography, Laws, Risk
Cybersecurity Overview, CIA Triad, Breaches, Attacks, Threats, Cyberwarfare,
None Firewalls, Detection, Cyber Kill Chain
Master Nmap quickly with this cheat sheet of common and not so common
options. A handy
LFI Explained andreference for experts
the techniques and those
to leverage getting
a shell from started with Nmap.
a local file
inclusion vulnerability.
Penetration testing toolsHow to get
cheat a shell
sheet, from
a high LFI overview / quick
level
reference cheat sheet for penetration testing.
back on Linux/Windows with PHP, Python, Powershell, nc (Netcat), JSP, Java,
Bash, PS etc.
nbtscan install, examples and nbtscan commands cheatsheet
Linux Command Cheat Sheet and examples for penetration testing.
dministrators
A list of useful payloads and bypass for Web Application Security and
Pentest/CTF
A cheat sheet- GitHub - swisskyrepo/PayloadsAllTheThings:
for attacking SQLite viathe
SQLi. Contribute to A oflist of useful
A quick reference
payloads and for for
bypass understanding
Web Application nature andand
Security severity
Pentest/CTF
unicornsasfuel/sqlite_sqli_cheat_sheet
vulnerabilities in TLS configurations anddevelopment by creating
implementations. - GitHub an- account
on GitHub.
IBM/tls-vuln-cheatsheet: A quick reference for understanding the nature
Offensive Operations training at SANS institute - Learn more about our and
severity
courses of vulnerabilities
& Operations
certifications in TLS
offered configurations and implementations.
Offensive training atboth
SANSlive and online
institute or more
- Learn sign up for one
about ourof
our offensive operations webcasts
courses & certifications offered both live and online or sign up for one of
our offensive operations webcasts
Offensive Operations training at SANS institute - Learn more about our
courses
Offensive & Operations
certifications offered
training atboth
SANSlive and online
institute or more
- Learn sign up for one
about ourof
our offensive
courses operationsoffered
webcasts
Offensive Operations training at SANS institute - Learn more about ourof
& certifications both live and online or sign up for one
our offensive
courses operationsoffered
& certifications webcastsboth live and online or sign up for one of
our offensive operations webcasts
SANS Penetration Testing blog pertaining to SANS Cheat Sheet: Python 3
Use CLIs to interact with the three most popular cloud platforms: Amazon
Web Services (AWS), Microsoft Azure, and the Google Cloud Platform (GCP).
Link
https://www.virustotal.com/gui/
https://any.run/
https://github.com/Ignitetechnologies/Privilege-Escalation
https://github.com/rshipp/awesome-malware-analysis
https://zeltser.com/analyzing-malicious-documents/
https://www.cybrary.it/wp-content/uploads/2017/11/cheat-sheet-reverse-v6.png
http://pentestmonkey.net/category/cheat-sheet/sql-injection
https://hackertarget.com/nmap-cheatsheet-a-quick-reference-guide/
https://highon.coffee/blog/lfi-cheat-sheet/
https://highon.coffee/blog/penetration-testing-tools-cheat-sheet/
https://highon.coffee/blog/reverse-shell-cheat-sheet/
https://highon.coffee/blog/nbtscan-cheat-sheet/
https://highon.coffee/blog/linux-commands-cheat-sheet/
https://i.redd.it/9bu827i9tr751.jpg
https://i.redd.it/fviaw8s43q851.jpg
https://ahrefs.com/blog/google-advanced-search-operators/
https://imgur.com/gallery/U5jqgik
https://github.com/S1ckB0y1337/Active-Directory-Exploitation-Cheat-Sheet
https://github.com/JavierOlmedo/shodan-filters
https://labs.f-secure.com/blog/getting-real-with-xss/
https://assets.contentstack.io/v3/assets/blt36c2e63521272fdc/bltea7de5267932e94b/5eb08aafcf88d36e47cf0644/C
https://www.sans.org/security-resources/tcpip.pdf?msc=Cheat+Sheet+Blog
https://www.sans.org/security-resources/ipv6_tcpip_pocketguide.pdf?msc=Cheat+Sheet+Blog
https://assets.contentstack.io/v3/assets/blt36c2e63521272fdc/bltf146e4f361db3938/5e34a7bc946d717e2eab6139/
https://zeltser.com/writing-tips-for-it-professionals/
https://zeltser.com/new-product-management-tips/
https://zeltser.com/getting-the-right-it-job-tips/
https://zeltser.com/security-assessment-report-cheat-sheet/
https://zeltser.com/security-incident-log-review-checklist/
https://zeltser.com/security-architecture-cheat-sheet/
https://zeltser.com/human-communications-cheat-sheet/
https://zeltser.com/security-incident-survey-cheat-sheet/
https://zeltser.com/ddos-incident-cheat-sheet/
https://zeltser.com/cheat-sheets/
https://digital-forensics.sans.org/media/sift_cheat_sheet.pdf?msc=Cheat+Sheet+Blog
https://digital-forensics.sans.org/media/reverse-engineering-malicious-code-tips.pdf?msc=Cheat+Sheet+Blog
https://digital-forensics.sans.org/media/remnux-malware-analysis-tips.pdf?msc=Cheat+Sheet+Blog
https://digital-forensics.sans.org/media/analyzing-malicious-document-files.pdf?msc=Cheat+Sheet+Blog
https://digital-forensics.sans.org/media/malware-analysis-cheat-sheet.pdf?msc=Cheat+Sheet+Blog
https://digital-forensics.sans.org/media/SQlite-PocketReference-final.pdf?msc=Cheat+Sheet+Blog
https://digital-forensics.sans.org/media/EricZimmermanCommandLineToolsCheatSheet-v1.0.pdf?msc=Cheat+Sheet+B
https://digital-forensics.sans.org/media/rekall-memory-forensics-cheatsheet.pdf?msc=Cheat+Sheet+Blog
https://digital-forensics.sans.org/media/linux-shell-survival-guide.pdf?msc=Cheat+Sheet+Blog
https://digital-forensics.sans.org/media/windows_to_unix_cheatsheet.pdf?msc=Cheat+Sheet+Blog
https://digital-forensics.sans.org/media/volatility-memory-forensics-cheat-sheet.pdf?msc=Cheat+Sheet+Blog
https://digital-forensics.sans.org/media/hex_file_and_regex_cheat_sheet.pdf?msc=Cheat+Sheet+Blog
https://assets.contentstack.io/v3/assets/blt36c2e63521272fdc/blt61c336e02577e733/5eb0940e248a28605479ccf0
https://digital-forensics.sans.org/community/cheat-sheets?msc=Cheat+Sheet+Blog.
https://github.com/swisskyrepo/PayloadsAllTheThings
https://github.com/unicornsasfuel/sqlite_sqli_cheat_sheet
https://github.com/IBM/tls-vuln-cheatsheet
https://pen-testing.sans.org/retrieve/windows-cheat-sheet.pdf?msc=Cheat+Sheet+Blog
https://pen-testing.sans.org/retrieve/linux-cheat-sheet.pdf?msc=Cheat+Sheet+Blog
https://assets.contentstack.io/v3/assets/blt36c2e63521272fdc/bltd6fa777a3215f34a/5eb08aae08d37e6d82ef77fe/w
https://pen-testing.sans.org/retrieve/windows-command-line-sheet.pdf?msc=Cheat+Sheet+Blog
https://pen-testing.sans.org/retrieve/netcat-cheat-sheet.pdf?msc=Cheat+Sheet+Blog
https://pen-testing.sans.org/retrieve/misc-tools-sheet.pdf?msc=Cheat+Sheet+Blog
https://www.sans.org/blog/sans-cheat-sheet-python-3/?msc=Cheat+Sheet+Blog
https://assets.contentstack.io/v3/assets/blt36c2e63521272fdc/blt4e45e00c2973546d/5eb08aae4461f75d77a48fd4/
https://assets.contentstack.io/v3/assets/blt36c2e63521272fdc/blta6a2ae64ec0ed535/5eb08aaeead3926127b4df44/
https://assets.contentstack.io/v3/assets/blt36c2e63521272fdc/blt0f228a4b9a1165e4/5ef3d602395b554cb3523e7b/
https://www.sans.org/security-resources/GoogleCheatSheet.pdf?msc=Cheat+Sheet+Blog
https://wiki.sans.blue/Tools/pdfs/ScapyCheatSheet_v0.2.pdf
https://assets.contentstack.io/v3/assets/blt36c2e63521272fdc/blte37ba962036d487b/5eb08aae26a7212f2db1c1da
https://www.sans.org/security-resources/posters/cloud/multicloud-cheat-sheet-215?msc=blog-ultimate-list-cheat-sh
https://wiki.sans.blue/Tools/pdfs/LinuxCLI101.pdf
https://wiki.sans.blue/Tools/pdfs/LinuxCLI.pdf
https://wiki.sans.blue/Tools/pdfs/PowerShell.pdf
https://wiki.sans.blue/Tools/pdfs/Get-WinEvent.pdf
from https://ericzimmerman.github.io/#!index.md
Name -
AmcacheParser
AppCompatCacheParser
bstrings
EvtxECmd
EZViewer
Hasher
JLECmd
JumpList Explorer
LECmd
MFTECmd
MFTExplorer
PECmd
RBCmd
RecentFileCacheParser
RECmd
Registry Explorer
RLA
SDB Explorer
SBECmd
ShellBags Explorer
SQLECmd
SrumECmd
SumECmd
Timeline Explorer
VSCMount
WxTCmd
GitHub Sponsors
PayPal
Patreon
Description
Amcache.hve parser with lots of extra features. Handles locked files
AppCompatCache aka ShimCache parser. Handles locked files
Find them strings yo. Built in regex patterns. Handles locked files
Event log (evtx) parser with standardized CSV, XML, and json output! Custom maps, locked file support,
and more! zero dependency viewer for .doc, .docx, .xls, .xlsx, .txt, .log, .rtf, .otd, .htm, .html, .mht, .csv,
Standalone,
and
Hash.pdf. Anythings
all the non-supported files are shown in a hex editor (with data interpreter!)
Jump List parser
GUI based Jump List viewer
Parse lnk files
$MFT, $Boot, $J, $SDS, $I30, and $LogFile (coming soon) parser. Handles locked files
Graphical $MFT viewer
Prefetch parser
Recycle Bin artifact (INFO2/$I) parser
RecentFileCache parser
Powerful command line Registry tool searching, multi-hive support, plugins, and more
Registry viewer with searching, multi-hive support, plugins, and more. Handles locked files
Replay transaction logs and update Registry hives so they are no longer dirty. Useful when tools do not
know how to handle
Shim database GUI transaction logs
ShellBags Explorer, command line edition, for exporting shellbag data
GUI for browsing shellbags data. Handles locked files
Find and process SQLite files according to your needs with maps!
Process SRUDB.dat and (optionally) SOFTWARE hive for network, process, and energy info!
Process Microsoft User Access Logs found under 'C:\Windows\System32\LogFiles\SUM'
View CSV and Excel files, filter, group, sort, etc. with ease
Mount all VSCs on a drive letter to a given mount point
Windows 10 Timeline database parser
August 2022 24
Link
1.5.1.0 | 1.5.1.0
1.5.0.0 | 1.5.0.0
1.5.2.0 | 1.5.2.0
1.5.0.0 | 1.5.0.0
1.0.0.0 | 2.0.0.0
2.0.0.0 | -
1.5.0.0 | 1.5.0.0
1.4.0.0 | 2.0.0.0
1.5.0.0 | 1.5.0.0
1.2.1.0 | 1.2.1.0
0.5.1.0 | 2.0.0.0
1.5.0.0 | 1.5.0.0
1.5.0.0 | 1.5.0.0
1.5.0.0 | 1.5.0.0
1.6.0.0 | 2.0.0.0
1.6.0.0 | 2.0.0.0
2.0.0.0 | 2.0.0.0
1.0.0.0 | 2.0.0.0
2.0.0.0 | 2.0.0.0
1.4.0.0 | 2.0.0.0
1.0.0.0 | 1.0.0.0
0.5.1.0 | 0.5.1.0
0.5.2.0 | 0.5.2.0
1.3.0.0 | 2.0.0.0
1.5.0.0 | 1.5.0.0
1.0.0.0 | 1.0.0.0
Name
Academy Hackaflag
Try Hack Me
Attack-Defense
alert to win
CTF Komodo Security
CMD Challenge
Exploitation Education
Google CTF
HackTheBox
Hacksplaining
Hacker101
Hacker Security
Hacking-Lab
ImmersiveLabs
NewbieContest
OverTheWire
Practical Pentest Labs
Pentestlab
Penetration Testing Practice Labs
PentestIT LAB
PicoCTF
PWNABLE
Root-Me
SANS Challenger
SmashTheStack
Try Hack Me
The Cryptopals Crypto Challenges
Vulnhub
W3Challs
WHO4REYOU
WeChall
Zenk-Security
Link
https://cmdchallenge.com
https://tryhackme.com/
https://attackdefense.com/
https://alf.nu/alert1
https://ctf.komodosec.com/
https://cmdchallenge.com
https://exploit.education/
https://capturetheflag.withgoogle.com/
https://www.hackthebox.eu
https://www.hacksplaining.com/exercises
https://ctf.hacker101.com
https://capturetheflag.com.br/
https://www.hacking-lab.com/index.html
https://immersivelabs.com/
https://www.newbiecontest.org/
http://overthewire.org
https://practicalpentestlabs.com
https://pentesterlab.com/
http://www.amanhardikar.com/mindmaps/Practice.html
https://lab.pentestit.ru
https://picoctf.com
https://pwnable.kr/play.php
https://www.root-me.org/
https://www.holidayhackchallenge.com/
http://smashthestack.org/wargames.html
https://tryhackme.com/
https://cryptopals.com/
https://www.vulnhub.com
https://w3challs.com/
http://www.wechall.net/
Description
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Name
Building Secure & Reliable Systems
Security Engineering
The Cyber Skill Gap
The Beginner’s Guide to Information Security
Texas A&M Security Courses
Description
Best Practices for Designing, Implementing and Maintaining Systems
A guide
The Cyberto Skill
building
Gap:dependable distributed
How To Become systems
A Highly Paid And Sought After Information Security
Specialist! (Use COUPON CODE: W4VSPTW8G7
Offers insight and resources to help readers embarkto make
on aitcareer
free) in one of the 21st century’s
most important—and
courses potentially
are offered through threelucrative—field
discipline-specific tracks: general, non-technical computer
users; technical IT professionals; and business managers and professionals.
Authors
Heather Adkins, Betsy Beyer, Paul Blankinship, Ana Oprea, Piotr Lewandowski, Adam
Stubblefield
Ross Anderson
Vagner Nunes
Limor Elbaz
Link
https://landing.google.com/sre/books/
https://www.cl.cam.ac.uk/~rja14/book.html
https://payhip.com/b/PdkW
https://www.amazon.com/Beginners-Guide-Information-Security-Kickstart-ebook/dp/B01JTDDSAM
https://teex.org/program/dhs-cybersecurity/
Name
Risky Business
Pauls Security Weekly
Security Now
Daily Information Security Podcast ("StormCast”)
ShadowTalk
Don't Panic - The Unit 42 Podcast
Recorded Future
The Cybrary Podcast
Cyber Life
Career Notes
Down the Security Rabbithole
The Privacy, Security, & OSINT Show
Defensive Security Podcast
Darknet Diaries
Brakeing Down Security
Open Source Security Podcast
Cyber Motherboard
Hak5
Threatpost Podcast Series
CISO-Security Vendor Relationship Podcast
Getting Into Infosec Podcast
Unsupervised Learning
Hosted by award-winning journalist Patrick Gray, Risky Business Description
has become a must-listen digest for information security
professionals
and security news, which is an open discussion forum for the hosts to express their opinions about the latest security
headlines,
Steve Gibson,breaches,
the man newwho exploits
coinedandthevulnerabilities,
term spyware and “not” politics,
created the“cyber” policies andprogram,
first anti-spyware more creator of Spinrite and
ShieldsUP, discusses the hot topics in security today with Leo Laporte
Stormcasts are daily 5-10 minute information security threat updates. The podcast is produced each work day, and typically
released lateTeam
Intelligence in theisday to be ready
conducting, forwith
along yourguest
morning commute
speakers discussing the latest threat actors, campaigns, security events
and industry news
Don't Panic! is the official podcast from Unit 42 at Palo Alto Networks. We find the big issues that are frustrating cyber
security practitioners
operations floor as well andashelp simplify
giving you the them so they
skinny don't needand
on established to panic
emerging adversaries. We also talk current events,
technical tradecraft, and offer up insights on the big picture issues
how to retain of talent. Entrepreneurs at all stages of their startup companies in our industryjoin us to share their stories and experience,
including how to get funding, hiring the best talent, driving sales,
owners looking to learn how to secure their data. We will talk about many things, and choosing where to base
like how your
to get business
jobs, cover breakdowns of
hot topics, and have special guest interviews with the men and women "in the trenches" of the industry
Cybersecurity professionals share their personal career journeys and offer tips and advice in this brief, weekly podcast from
The CyberWire
analysis, everything about Cybersecurity which includes Cybercrime, Cyber Law, Cyber Risk, Enterprise Risk & Security and
many more. If you want
Source Intelligence (OSINT)to hear issues
opinion andthat areThis
news. relevant to your
podcast organization,
will help listeners subscribe
learn some and tune-in
ideas on howto this podcast
to stay secure from
cyber-attacks and help them become “digitally invisible”
secured. As of today, they have more than 200 episodes and some of the topics discussed include Forensics, Penetration
Testing, Incident Response, Malware Analysis, Vulnerabilities and many more
Darknet Diaries
organizations. ThePodcast
hosts willis hosted and produced
teach concepts by Jack Rhysider
that Information Securitythat discuss topics
Professionals needrelated
to knowtoandinformation security.
discuss topics that It a
will refresh the memories of seasoned veterans
Open Source Security Podcast is a podcast that discusses security with an open-source slant. The show started in 2016 and
is hosted
Joseph by They
Cox. Josh Bressers and Kurt
tackle topics aboutSiefried.
famousAs of thisand
hackers writing, they now
researchers posted
about thearound
biggest190+
newspodcasts
in cybersecurity. The Cyber-
stuff gets complicated really fast, but Motherboard spends its time fixed in the
infrastructure. Their channel currently has 590,000 subscribers and is one of the most viewed shows infosec world so we don’t
whenhaveyoutowant to
Co-hosted by
learn something the creator
about of the
security CISO/Security
networks Vendor Relationship Series, David Spark, and Mike Johnson, in 30 minutes,
including security news, videos, feature reports and more, with their global editorial activities
this weekly program challenges the co-hosts, guests, and listeners to critique, share true stories. This podcast, The are driven by industry-leading
journalist TomVendor
CISO/Security Spring, Relationship,
editor-in-chieftargets to enlighten and educate listeners on improving security buyer and seller
relationships
Stories of how Infosec and Cybersecurity pros got jobs in the field so you can be inspired, motivated, and educated on your
journey
Weekly podcasts and biweekly newsletters as a curated summary intersection of security, technology, and humans, or a
standalone idea to provoke thought, by Daniel Miessler
Link
https://risky.biz/
https://securityweekly.com/category-shows/paul-security-weekly/
https://twit.tv/shows/security-now
https://isc.sans.edu/podcast.html
https://resources.digitalshadows.com/threat-intelligence-podcast-shadowtalk
https://unit42.libsyn.com/
https://www.recordedfuture.com/free-products
https://www.cybrary.it/info/cybrary-podcast/
https://redcircle.com/shows/cyber-life
https://www.thecyberwire.com/podcasts/career-notes
http://podcast.wh1t3rabbit.net/
https://podcasts.apple.com/us/podcast/the-privacy-security-osint-show/id1165843330
https://defensivesecurity.org/
https://darknetdiaries.com/episode/
https://www.brakeingsecurity.com/
https://www.opensourcesecuritypodcast.com/
https://podcasts.apple.com/us/podcast/cyber/id1441708044
https://shop.hak5.org/pages/videos
https://threatpost.com/category/podcasts/
https://cisoseries.com
https://gettingintoinfosec.com/
https://danielmiessler.com/podcast/
Name
SimplyCyber
IPPSec
Derek Rook
Adrian Crenshaw
LionSec
Zer0Mem0ry
webpwnized
Troy Hunt
0x41414141
Seytonic
Security Weekly
SecureNinjaTV
Samy Kamkar’s Applied hacking
rwbnetsec
Penetration Testing in Linux
Pentester Academy TV
Open SecurityTraining
NetSecNow
Metasploitation
LiveOverflow
John Hammond
iExplo1t
HACKING TUTORIALS
HackerSploit
GynvaelEN
Geeks Fort
Don Does 30
SSTec Tutorials
DemmSec
DEFCON Conference
DedSec
danooct1
BalCCon
Corey Nachreiner
Tradecraft Security Weekly
HackADay
TheCyberMentor
Grant Collins
Description
risk, compliance, privacy, education, certification, conferences; all with the intent of professional
development
lots of medium length instructional videos covering tools from Kali 2.0, no recent posts.