You are on page 1of 97

Name

Alert to win - https://alf.nu/alert1


Attack-Defense - https://attackdefense.com
Bancocn - https://bancocn.com
Certified Secure - https://www.certifiedsecure.com
CMD Challenge - https://cmdchallenge.com
CryptoHack - https://cryptohack.org/
CTF Komodo Security - https://ctf.komodosec.com
Ctftime - https://ctftime.org/
Cyberdefenders - https://cyberdefenders.org/blueteam-ctf-challenges/
CyberSecLabs - https://www.cyberseclabs.co.uk/
EchoCTF - https://echoctf.red/
Explotation Education - https://exploit.education
Google CTF - https://lnkd.in/e46drbz8
Hack The Box - https://www.hackthebox.com/
Hackaflag BR - https://hackaflag.com.br/
Hacker Security - https://capturetheflag.com.br/
Hacker101 - https://ctf.hacker101.com
Hacking-Lab - https://hacking-lab.com/
Hacksplaining - https://www.hacksplaining.com/lessons
HackTheBox - https://www.hackthebox.com
Hackthis - https://www.hackthis.co.uk
HackXpert - https://hackxpert.com/
HSTRIKE - https://hstrike.com
ImmersiveLabs - https://immersivelabs.com
LetsDefend- https://letsdefend.io/
NewbieContest - https://www.newbiecontest.org/
OSBOXES - http://www.osboxes.org/
OverTheWire - http://overthewire.org
Penetration Testing Practice Labs - https://www.amanhardikar.com/mindmaps/Practice.html
PentestIT LAB - https://lab.pentestit.ru
Pentestlab - https://pentesterlab.com
PicoCTF - https://picoctf.com
PortSwigger Web Security Academy - https://portswigger.net/web-security
Practical Pentest Labs - https://practicalpentestlabs.com/
Pwn college - https://dojo.pwn.college/
PWNABLE - https://pwnable.kr/play.php
RangeForce - https://www.rangeforce.com/
Root in Jail - http://rootinjail.com
Root-Me - https://www.root-me.org
SANS Challenger - https://www.sans.org/mlp/holiday-hack-challenge/
SmashTheStack - http://www.smashthestack.org/wargames.html
TCM Security - https://academy.tcm-sec.com/
The Cryptopals Crypto Challenges - https://cryptopals.com
Try Hack Me - https://tryhackme.com
Vulnhub - https://www.vulnhub.com
Vulnmachines https://vulnmachines.com/
W3Challs - https://w3challs.com
WeChall - http://www.wechall.net
Zenk-Security - https://www.zenk-security.com/
Webgoat - https://owasp.org/www-project-webgoat/
Description

A fun, free platform to learn about cryptography through solving challenges


and cracking insecure code. Can you reach the top of the leaderboard?

Capture The Flag,isCTF


CyberDefenders teams,platform
a training CTF ratings, CTF archive, to
for #BlueTeams CTFtest
writeups
and advance
their #CyberDefense skills.
allow information security students the opportunity to safely learn and
practice penetration testing skills.
An online platform to train your offensive and defensive IT security skills.

IT professionals to advance their ethical hacking skills and be part of a


worldwide community.
qualificar dentro Join today
do segmento, and learn
contendo how tolaboratórios
inclusive, hack! virtuais
para os alunos treinarem suas skills técnicas.
Capture The Flag - CTF Hacker para aprender hacking e cibersegurança do
zero ao avançado
rewarding com a HackerSec.
environment. Hacker101 is a free educational site for hackers,
run by HackerOne.

Where hackers level up! An online cybersecurity training platform allowing


Hacksplaining:
IT professionalsSecurity Training
to advance theirfor Developers
ethical hacking skills and be part of a
worldwide community. Join today and learn how to hack!

Conheça a plataforma
Cybersecurity de pentest
training from em nuvem.
Immersive Realize testes
Labs empowers de invasão
organizations tode
maneira simples e objetiva.
increase, measure, and demonstrate human capabilities in every part of
cybersecurity.
Online soc analyst and incident response training platform for blue team
members
Le plus important challenge de securité informatique francophone disponible
!Homepage
Venez tester vos that
of site capacités
offersen toutemachines
virtual légalité ! (VDI & VMDK & VHD) for
VirtualBox and VMware. Run VMs inside VirtualBox and VMware on any host.

ps/Practice.html

picoCTF is a free computer security education program with original content


built on a Security
The Web capture-the-flag
Academyframework created
is a free online by security
training centerand privacy
for web
experts at Carnegie Mellon University.
application security, brought to you by PortSwigger. Create an account to
get started.

RangeForce is an interactive and hands-on team cyber readiness platform.


Refine your team's defensive capabilities against the latest threats with a
Root Me estapproach
continuous une plateforme permettant
to cybersecurity à chacun
skills de tester et d'améliorer
development.
ses
connaissances dans le domaine de la sécurité informatique et du hacking à
travers
Join thelafun
publication de challenges,
and help Santa find this de solutions,
year’s d'articles.
foe in the 2021 SANS Holiday
Hack Challenge.
Cybersecurity Training That Doesn't Break the Bank
TryHackMe is a free
VulnHub provides online platform
materials allowingfor learning
anyone cyber
to gain security,
practical using
hands-on
hands-on exercises and labs, all through your browser!
experience with digital security, computer applications and network
administration tasks.
Hacking Challenges: binary pwnables, web hacking, reverse engineering,
crypto & forensics. No simulation. No Guessing.
Overview
Zenk of hacking
Security est unechallenge and problem
communauté solving
de hacking et desites. - wechall
sécurité informatique
OWASP WebGoat on the main website for The OWASP Foundation. OWASP is
francophone
a basé sur le partage et l'apprentissage.
nonprofit foundation that works to improve the security of software.
Link
https://alf.nu/alert1
https://attackdefense.com
https://bancocn.com
https://www.certifiedsecure.com
https://cmdchallenge.com
https://cryptohack.org/
https://ctf.komodosec.com
https://ctftime.org/
https://cyberdefenders.org/blueteam-ctf-challenges/
https://www.cyberseclabs.co.uk/
https://echoctf.red/
https://exploit.education
https://lnkd.in/e46drbz8
https://www.hackthebox.com/
https://hackaflag.com.br/
https://capturetheflag.com.br/
https://ctf.hacker101.com
https://hacking-lab.com/
https://www.hacksplaining.com/lessons
https://www.hackthebox.com
https://www.hackthis.co.uk
https://hackxpert.com/
https://hstrike.com
https://immersivelabs.com
https://letsdefend.io/
https://www.newbiecontest.org/
http://www.osboxes.org/
http://overthewire.org
https://www.amanhardikar.com/mindmaps/Practice.html
https://lab.pentestit.ru
https://pentesterlab.com
https://picoctf.com
https://portswigger.net/web-security
https://practicalpentestlabs.com/
https://dojo.pwn.college/
https://pwnable.kr/play.php
https://www.rangeforce.com/
http://rootinjail.com
https://www.root-me.org
https://www.sans.org/mlp/holiday-hack-challenge/
http://www.smashthestack.org/wargames.html
https://academy.tcm-sec.com/
https://cryptopals.com
https://tryhackme.com
https://www.vulnhub.com
https://vulnmachines.com/
https://w3challs.com
http://www.wechall.net
https://www.zenk-security.com/
https://owasp.org/www-project-webgoat/
Name
AWSGoat
AzureGoat
OWASP Juice Shop
Gin & Juice Shop
Blue Team Labs (free labs available)
DFIR Diva
Flaws cloud
Flaws cloud 2
Securzy
Description
Loading...
Loading...
Loading...

Loading...
Loading...

Loading...
Loading...
Verified Link Added Date
https://github.com/ine-labs/AWSGoat 25/08/2022
https://github.com/ine-labs/AzureGoat 25/08/2022
https://owasp.org/www-project-juice-shop/ 25/08/2022
https://ginandjuice.shop/ 25/08/2022
https://blueteamlabs.online/ 25/08/2022
https://training.dfirdiva.com/ 25/08/2022
http://flaws.cloud 25/08/2022
http://flaws2.cloud 25/08/2022
https://securzy.io/
Platform
Nox Cyber
Portswigger
Mosse Cyber Security Institute
BugCrowd University
ICSI
Offensive Security
AWS Cloud Certified
SANS
ATT&CK Mitre
Coursera
Fortinet
Microsoft
CLARK Center
Hacker101
ElasticStack
Hoppers Roppers
IBM Security Learning Academy
M.E. Kabay
Open P-TECH
Udemy
Netacad
Youtube
Youtube
HBO
Netacad
Netacad
Pluralsight and Microsoft
Blackhat Webcast Serie
Federal Virtual Training Environment
Harrisburg University CyberSecurity
HackXOR
flAWS System
Stanford
Linux Journey
Ryan's Tutorials
SANS
Shadowscape
Fullstackacademy
Hacking 101
Choose Your Own Cyber Adventure Series: Entry Level Cyber Jobs Explained
NETINSTRUCT.COM
HackerSploit
CyberStart America
Roppers Academy
Roppers Academy
Roppers Academy
Professor Messer
edX
edX
Cyber 5W
OpenLearn
Cisco Networking Academy

Cisco Networking Academy


SANS Cyber Aces Online Tutorials
IT Masters
IT Masters
IBM Security Learning Academy
Palo Alto
Geek University
Mossé Cyber Security Institute
13Cubed
TEEX
OpenLearn
edX
DFIR.Science
Hackers Arise
AboutDFIR
EH Academy
AboutDFIR
AboutDFIR
eForensics Magazine
Metaspike
GitHub – RCJ497
CIRCL
Ryan Chapman
Ryan Chapman
HTCIA
Paraben Corporation
MSAB
Hal Pomeranz
Linux LEO
Ali Hadi
MSAB
ENISA
ENISA
AboutDFIR
NW3C
MOBILedit
Roppers Academy
Peter Staarfaenger
PNW
Basis Technology
TEEX
Sam Bowne
MITRE ATT&CK
Blue Teams Academy
Kenneth Ellington
Elastic
Security Onion
Tutorials Point
Cover6 Solutions
IT Masters
Active Countermeasures
DFIR Diva
AttackIQ
Applied Incident Response
Michael Wylie
Josh Stroschein & Jack Mott
F-Secure
Digital Forensics & Incident Response
Kathryn Hedley
Mattia Epifani
Lenny Zeltser
Netsec Explained
ReversingLabs
Lee Holmes
Symantec
Palo Alto
CryptoStopper
I.T. Security Labs
Ali Hadi
RangeForce
Chris Sanders
LetsDefend
Picus
LimaCharlie
Cybrary
BlackPerl
Varonis
MaxProd Technologies
BrightTALK
CSNP
DFIR
The DFIR Report
CSI Linux
CSI Linux
Cyberwox Academy
Hal Pomeranz
AWS
AWS
Microsoft
Microsoft
SANS DFIR
HTCIA
NIST Publication
CNCF [Cloud Native Computing Foundation]
Sharique Rizvi
Google
Microsoft 365 Security
0xf0x
Malware Unicorn
Begin.re
Google Cloud Tech
Marcus Hutchins
FedVTE
Hackers Arise
Hackaday
Maddie Stone
Max Kersten
malrev
Patrick Wardle
Sam Bowne
Sam Bowne
CCDCOE
Coleman Kane
CLARK
CLARK
HackerSploit
Josh Stroschein
OpenSecurityTraining2
Ali Hadi
Malware Evasion Techniques
Blackstorm Security
OA Labs
SANS
Colin Hardy
hasherezade
Ryan Chapman
MalwareAficionado
Security Blue Team
None
Soc Simulation
None
DFIR Madness
None
Info-Sec Box
None
Summit Route
PwnDefend
Komodo
Immersive Labs
Pico CTF
CTFlearn
stuxnet999
13Cubed
Pentester Academy
Cyber Defense Path & DFIR Challenges
The Cyber Institute
None
BushidoToken
CyberSoc
OSINT / GEOINT
AboutDFIR
Corelight
IT Masters
IT Masters
edX
Professor Messor
TEEX
edX
Coursera
edX
None
Saylor Academy
CyberInsight
Cisco Networking Academy
None
Davy Wybiral
Irvin Lemus
OpenSecurityTraining2
None
Python Institute
Hakin9
Al Sweigart
Tutorials Point
Udemy
None
Microsoft
Joe Collins
Tutorials Point
Tutorials Point
None
None
None
None
Udemy
Atlassian
Microsoft
freeCodeCamp.org
freeCodeCamp
Web Dev Simplified
Azeria Labs
Alexis Brignoni
edX
Cisco Networking Academy
Cisco Networking Academy
Udacity
Udacity
Wesley Phillips
None
Professor Messer
Alison
Alison
Alison
None
SANS
Naval Postgraduate School
None
Hack The Box
None
Cyberwox Academy
Udemy
Jon Good
The Cyber Institute
OSINT) by Hackers Arise
The OSINT Curious Project
None
None
Toddington
OSINT
jivoi
Udemy
Udemy
HTCIA
None
April Wright
The Cyber Institute
OSINT Combine
YouTube
Null Byte
Secjuice
None
Apurv Singh Gautam
Bendobrown
Irfan Shakeel
None
None
None
None
IT Masters
Offensive Security
PortSwigger
HackerSploit
None
Ali Hadi
FedVTE
FedVTE
FedVTE
High School Students
High School Students
Ages 13+
Ages 5-14
High School Students
K – 12
None
Middle School
Where to Find Them
None
Josh Moulin
None
None
FedVTE
None
None
None
Mossé Cyber Security Institute
None
None
O2O
None
CertNexus
None
None
KillSwitchX7
AboutDFIR
Andrew Rathbun
None
Saylor Academy
Saylor Academy
IT Masters
Coursera
Coursera
Coursera
Cisco Talos Intelligence Group
Proofpoint
None
None
None
None
mattnotmax
JavaScript
None
SS64
SS64
SS64
SS64
None
Varonis
Varonis
TutorialsPoint
HTCIA
None
frankwxu
None
None
Ian Neil
None
Jonathan Adkins
US Only – Limited Registration
BlueMonkey 4n6
None
Cyber 5W
Blue Cape Security
None
Members of the Digital Forensics Discord Server
Title
Nox Cyber
WebSecurity Academy
Mosse Cyber Security Institute
BugCrowd University
Certified Network Security Specialist
Metasploit Unleashed
AWS Cloud Certified
SANS Faculty Free Tools List of OSS
Using ATT&CK for Cyber Threat Intelligence Training
Coursera for Cybersecurity professionals
Fortinet Security Appliance Training
Chief Information Security Officer (CISO) Workshop Training
CLARK Center Plan C
Hacker101
ElasticStack
Hoppers Roppers
IBM Security Learning Academy
M.E. Kabay for Students & Schools
Open P-TECH
Udemy Free
Enroll Now
Stanford Free: PCAP
University Programming
Webinar Essentials
- Hacked! Security in Pythonfrom Big
Lessons
Name Breaches
Stanford University Webinar - Hash, Hack, Code: Emerging Trends
in Cyber Security
Kill Chain: The Cyber War on America's Elections (Documentary)
Intro to Cybersecurity Course
Cybersecurity Essentials
Pluralsight and Microsoft
Blackhat Webcast Serie
Federal Virtual Training Environment
Harrisburg University CyberSecurity
HackXOR WebApp CTF
flAWS System
Stanford CS 253 Web Security
Linux Journey
Ryan's Tutorials
The Ultimate List of SANS Cheat Sheets
CYBER INTELLIGENCE ANALYTICS AND OPERATIONS
Linux Command Line for Beginners
Hacking 101 Own Cyber Adventure Series: Entry Level Cyber Jobs
Choose Your
Explained
NETINSTRUCT.COM
HackerSploit
High Shcool
Introduction to Computing Fundamentals
Introduction to Security
Introduction to Capture the Flags
A+ Training
Cybersecurity Fundamentals
Cyber Security Basics: A Hands-On Approach
Digital Forensics Courses
Introduction to Cyber Security: Stay Safe Online
Introduction to Cybersecurity

Cybersecurity Essentials
SANS Cyber Aces Online Tutorials
Cyber Warfare and Terrorism
Enterprise Cyber Security Fundamentals
IBM Security Learning Academy
Palo Alto Networks Free Digital Learning
None
Mossé Cyber Security Institute Free Curriculum
Digital Forensics Training Videos
Digital Forensics Basics
Digital Forensics
Computer Forensics
Digital Forensics Training Videos
Digital Forensics
KAPE Guide
Computer Forensics Investigation Course
Registry Explorer/RECmd Guide
Timeline Explorer Guide
Free Course Content
Email Forensics Workshop
IoT Digital Forensics Course
Digital Forensics Training Materials
Cyber Forensics Workshop
Understanding and Analyzing Weaponized Carrier Files
Digital Forensics Courses
Free Paraben Training Videos
An Introduction to Mobile Forensics
Linux Forensics Intro
Linux LEO
Linux Forensic
XAMN Transition
ENISA CSIRT Training
Training Resources

Mobile Threats Incident Handling


MFT Explorer/MFTECmd Guide
NW3C Live Forensic
MOBILedit Online Training
Express(For Current US Criminal Justice Practition
Training

How to Learn Forensics Roadmap


Digital Forensics Applied to Containers
Cybersecurity Digital Forensics Certificate Program – US Only
Intro to DFIR: The Divide and Conquer Process
Cyber Incident Analysis and Response
CNIT 152: Incident Response
Using MITRE ATT&CK for Cyber Threat Intelligence
Blue Teaming Free Training
Introduction to Splunk Workshop
Free Elastic Training
Security Onion Official Training
Logstash Tutorial
Cover6 Solutions Training
Information Security Incident Handling
Threat Hunting Training Course
Incident Response Training Plan Starting From Complete Beginner to
AttackIQ Academy
Free Resources for Incident Responders
Wireshark for Incident Response & Threat Hunting Workshop
Intrusion Analysis and Threat Hunting with Suricata
Attack Detection Fundamentals Workshops
SANS Digital Forensics and Incident Response
DFIR 101: Digital Forensics Essentials
Order of Volatility in Modern Smartphone Forensics
Practical Malware Analysis Essentials For Incident Responders
Advanced Wireshark Network Forensics
Open-Source YARA Rules
Defending Against PowerShell Attacks in Theory and in Practice
The Increased Use of PowerShell in Cyber Attacks
Pulling Back the Curtains on EncodedCommand PowerShell Attacks
Fileless Malware Demystified
I.T. Security Labs SIEM Tutorials
How to Install and Configure Zeek to Ship Logs to Splunk
RangeForce Community Edition
The Cuckoo’s Egg Decompiled
LetsDefend Academy
Picus Purple Academy
Education & Training
MITRE ATT&CK Defender™ Training
BlackPerl DFIR
YARA Rules Guide: Learning This Malware Research Tool
Operationalize Your SIEM Skills w/Splunk
Cyber CSI: Learn How to Forensically Examine Phishing Emails
Incident Response Process
The DFIR Report
Cobalt Strike, a Defender’s Guide
Getting Started With CSI Linux
General Linux Administration
Bash Scripting, TCP/UDP Connections, Linux Command Line
Intro to SELinux
AWS Learning Library – Digital Training
AWS Security Fundamentals
Microsoft Azure Training
Managing Security Operations in Azure
Cloud Storage Forensics: Endpoint Evidence with Chad Tilbury
Cloud Forensics Course
Cloud Computing Forensic Science Challenges
Container Forensics: What to Do When Your Cluster is a Cluster
The Trouble with Cloud Forensics
Google Cloud Training
What I Have Learned From Doing A Year of Cloud Forensics In Azure
Malware Noob2Ninja Course
Reverse Engineering Workshops
Reverse Engineering for Beginners
Cloud Forensics 101
Reverse Engineering for Beginners
Reverse Engineering 101
Reverse Engineering Malware
Introduction to Reverse Engineering with Ghidra
Android App Reverse Engineering 101
Binary Analysis Course
Advanced Binary Deobfuscation
The Art of Mac Malware Book
CNIT 126: Practical Malware Analysis
CNIT 141: Cryptography for Computer Networks
Malware Reverse Engineering Handbook
Malware Analysis Course
Malware Analysis Using VM Introspection and Memory Forensics
IoT Security and Forensics
Malware Analysis Bootcamp
Malware Analysis & Reverse Engineering Training by Josh Stroschein
Malware Analysis & Reverse Engineering Courses
Working with 010 Hex-Editor
Unprotect Project
Introduction to Advanced Threats Slides
Malware Analysis and Reverse Engineering Training
Oh You Silly Framework!: An Intro to Analyzing .NET Malware
Malware Analysis Training
Windows Malware Analysis Training – Volume 1
Oh You Silly Framework!: An Intro to Analyzing .NET Malware
Malware Analysis Fundamentals
Blue Team Labs Online
CyberDefenders Blue Team CTF Challenges
SocVel DFIR CTF

LetsDefend
The Case ofCollege
Champlain the Stolen
DFIRSzechuan
CTF Sauce

Forensics Challenges
Malware Traffic Analysis Exercises
Flaws2 Defender Track
Global Cyber War CTF (PwnDefend)

HackTale – Gamified Cyber Simulation Platform


Immersive Labs Community
picoGym
CTFlearn
MemLabs – Memory Forensics Challenges
Mini Memory CTF
CTF.Live
TryHackMe
OSINT Challenge
OSINT Dojo
OSINT CTFs
OSINT-Based Challenges
GeoGuessr
Challenges & CTFs
Zeek Cheat Sheets
Digital Forensics Course
Computer Network Fundamentals
Introduction to Networking
Network+ Training Course – N10-007
Network Assurance
Network Security
Intel® Network Academy – Network Transformation 101 & 102
Network Security – Protocols
Connected Dots Online – Interactive Computer Networking Platform
Computer Communications and Networks
Network+ Study Labs
Networking Essentials
APNIC Academy
Intro to x86 Assembly Language
Assembly Programming
Architecture 1001: x86-64 Assembly
Learn C – Free Interactive Tutorial
Python Essentials
List of Free Python Resources
Automate the Boring Stuff with Python Online Book
Learn NASM Assembly
Regex Academy: An Introduction to Text Parsing Sorcery
RegexOne – Interactive Exercises
PowerShell Documentation & Resources
Linux BASH Shell Script Basics
Learn VBScript
JSON Tutorial
SANS JSON and jq Quick Start Guide
SQLite Tutorial
SANS SQlite Pocket Reference Guide
SoloLearn Coding Courses – Multiple Programming Languages
Git Started with GitHub
Getting Git Right
GitHub Training
APIs for Beginners – How to use an API
Information Security Coding Training
Learn JSON in 10 Minutes
Introduction to ARM Assembly Basics
DFIR Python Study Group
Introduction to Linux
NDG Linux Unhatched
NDG Linux Essentials
Linux Command Line Basics
Introduction to Python Programming
Linux Workshop – Hands On Introduction to Linux
Linux Journey
CompTIA Security+ SY0-601 Training Course
NIST – Cyber Security Framework (CSF) Foundation Course
Identity and Access Management
Introduction to Computer Network Security
SANS Free Cyber Security Resources
Security Policy Templates
Labtainers
Fortinet Cybersecurity Training
HTB Academy
Simply Cyber YouTube Channel and Introduction to Cybersecurity Co
Cyberwox Academy is an online cybersecurity community and resource
Introduction to Cloud Computing
Cybersecurity Training
OSINT Mini
Open Source Intelligence
10 Minute OSINT Tips
OSINT Framework
OSINT.Link Resources Portal
Free OSINT and Online Research Resources
SANS Must Have Free Resources for Open-Source Intelligence
Awesome OSINT
OSINT Tools & Techniques – Free Demo Course
Dark Web Foundations: A Guide to the Deep/Dark Web
Dark Web Investigations
conINT Conference OSINT Talks
Open Source Intelligence 101
CaseFile Training Course
Australian OSINT Symposium Recorded Sessions
SANS OSINT Talks
OSINT Tutorials
OSINT Articles
Meta OSINT – OSINT Resources
Automating Threat Hunting on the Dark Web
OSINT at Home – Tutorials on Digital Research, Verification & Open S
The Complete Open Source Intelligence (OSINT) Training Course
Layer 8 Conference OSINT Talks
INE Starter Pass
Hackers-Arise Tutorials
Pentester Academy Tutorials
Free Short Course: Pen Testing
Kali Linux Revealed & Metasploit Unleashed
WebSecurity Academy
Pentesting Training
Hack The Box, HTB Academy, & Hacking Battlegrounds
Offensive Software Exploitation (OSE) Course & Hacking Techniques T
Introduction to Supply Chain Risk Management
Cloud Computing Security
Understanding Web and Email Server Security
Cyberstart America
CyberStart Go
picoGym & picoCTF
CS Unplugged
Computer Science Field Guide
Code.org
Coding for Kids in Python
TechGirlz (Middle School)
Forensic Images
Publicly Available PCAP Files
DFIR Forms, Policies, and Procedures
DFIR / Blue Team Training Courses on Cyberdefenders
WithYouWithMe
Federal Virtual Training Environment
Palo Alto Second Watch
Free Splunk Training for Veterans
Fortinet Veterans Program
Free Remote Internship Certification Program for Veterans
SANS VetSuccess Academy
DoD SkillBridge Program
Onward to Opportunity
DFIR Related Events
Cybersec First Responder
File Signature Database and Other File Signature (Magic Number) In
Wireshark Workshop Tutorials & Videos by Brad Dunca
Cyber Security Discord Servers
A Beginners Guide to the Digital Forensics Discord Server by Andre
DFIR Mind Maps
DFIR Resource Sites
Operating Systems
Information Security
Detecting & Defending Against Cyber Threats
Information Systems Auditing, Controls and Assurance
Data Privacy Fundamentals
Introduction to AWS Identity and Access Management
Snort Education
Hiding in Plain Sight – Obfuscation Techniques in Phishing Attacks
The ThreatHunting Project
Exercism Programming Training
DFIR Cheat Sheets
Free DFIR Distros & VMs
CyberChef Recipes
JS CheatSheet
Python Cheatsheet
An A-Z Index of Windows PowerShell Commands
A-Z Index of Windows VBScript Commands
An A-Z Index of the Linux Command Line
ASCII Table
OSINT Resource Collections
What is an Incident Response Plan and How to Create One
How to Analyze Malware with x64dbg
Python Digital Forensics Tutorial
Att&cking Back: Challenges and Opportunities Using MITRE ATT&CK f
The Cyber Social Hub
Digital Forensics Labs & Shared Cyber Forensic Intelligence Repositor
MalAPI.io – Maps Windows APIs to Common Malware Techniques
Filesec.io – Latest File Extensions Being Used by Attackers
Security+ SY0-601 Flashcards, Labs, Mock Exams
Splunk BOTS CTFs and Training
NTFS Forensics and the Master File Table
OSINT Academy
Linux Command Line Tutorial for Forensics
Reverse Engineering for Everyone by mytechnotalent
Mobile Forensics Training by Hexordia
DFIR Tutorials and Courses
Securzy Cyber Security Education Platform
The Hitchhiker’s Guide to DFIR: Experiences from Beginners to Expert
Description
Jay Jay Davey site full of curated cybersecurity training resources
Free online web security training from the creators of Burp Suite
Introduction to cybersecurity free certification with 100+ hours of training, no expiry/renewals
Free bug hunting resources and methodologies in form of webinars, education and training
Certification
Most complete andand training;
in-depth Metasploit guide available, with contributions from the authors of
the No
Get Starch
skills in AWS Press
to beMetasploit
more marketable.Book Training is quality and free. Have to create an AWS
account, Exam is $100.
developed by SANS staff
4 hour training The goal of this training is for students to understand the following
Coursera
Free access Together: Free online
to the FortiGate learningTraining
Essentials during COVID-19"
Course andLots of different
Network Security types of free
Expert coursestraining
1 and
2
workshop is a combination of experiences from Microsoft security teams and learnings from
customers
Free cybersecurity curriculum that is primarily video-based or provide online assignments that can
be easily integrated into a virtual learning environments
Free classes for web security
Free on-demand
Community built Elastic
aroundStack, a series observability,
of free courses and thatsecurity courses
provide training to beginners in the security
field
Free industry
Free technicalcourses trainingand for course
IBM Securitymaterials products
for students, teachers and others are welcome to use
for free iscourses
Python the very and lecturesobject-oriented programming language used by startups and tech
versatile,
giants, Google,
Free digital Facebook,
learning on theDropbox
tech skills and ofIBM.
tomorrowPython is also recommended for aspiring young
developers who are interested in pursuing careers in Security, Networking and Internet-of-Things.
Online
Once learning
you complete course thisplatform
course, "collection
you are ready from the
takefree courses in our learning marketplace
50 minute cyber lecture from Stanford.You WilltoLearn: the PCAP
-- The root– Certified
cause of Associate
key breaches in Python
and how
programming.
to prevent them; No prior
How toknowledge
measure of
your programming
organization’s is required.
external security posture; How the attacker
Join Professor Dan Boneh as he shares new approaches to these emerging trends and dives
lifecycle
deeper should
into how influence
you can protectthe way you
networksallocate resources
(Referenced at GRIMMCON), In advance of and
the 2020prevent harmful viruses
Presidential Election, and Killthreats.
Chain: 50 Theminute
Cyber
cyber
War lecture
on America’s from Stanford
Elections takes a deep dive into the weaknesses of today’s election technology,
Learn how to protect your personal data and privacy online and in social media, and why more
an
and issue
morethat is little
IT jobs understood
require by the awareness
cybersecurity public or even lawmakers
Foundational knowledge and essential skills for all and understanding.
cybersecurity domains, Receive a certificate
including of
info security,
completion
systems sec,to network sec, ethics an andexpert
laws, and defense and mitigation techniques used in courses,
Partnership help you become in Azure. With skill assessments and over 200+
protecting
40+ Skill IQs businesses
and 8of Role IQs, you can focusI your timespecific
on understanding
Monthly
US Govt webcast
sponsored varying
free cyber
courses. topics.
There are will post
6 available, no login in theyour
onesrequired. strengths
training
They are section and skill
below
101 Coding for
gaps and
sometimes, learn Azure
butCritical as
this is worthquickly as possible
bookmarking and checking back. They always havefor top tier speakers
the Public, 101 Infrastructure Protection for the Public, Cryptocurrency Law
on relevant, current
Enforcement the topics
forcurated Public, Cyber Supply
Collection of 18 talks. Scroll downChain to CYBER Risk SECURITY
Management section.for the
YouPublic,
will see 101 Reverse
there are 4
Engineering
categories for
Resource the Public,
Sharing, Fundamentals
Tools & of
Techniques,Cyber Risk
Red Management
Team (Offensive Security) and Blue
Hackxor is a realistic web application hacking game, designed to help players of all abilities
Teaming
develop their (Defensive
skills. AllSecurity).
the missions Lot ofare content
basedinon here,for everyone I've personally found while
real vulnerabilities
A free pentests,
doing course from bug Stanford
bounty providingand
hunting, a comprehensive
research overview of web security. The course
Through
begins witha series
an of levels you'll
introduction to learn
the about common
fundamentals of webmistakes
security andand gotchas
proceeds when to using
discuss Amazon
theline
A
Webfree, handy guide
Services (AWS). for learning
Multiple Linux."Buckets"
levels, Coverageofbegins fun with the fundamentals of command
most common methods for web attacks and their countermeasures.
navigation and basic text manipulation. It then extends to more advanced topics, such as file The course includes video
lectures,
25 hoursand
systems slides,
of training and -links
networking. In thisto
The online
course, isreading
sitetutorials
well assignments
you’llorganized
learn from andone of Fullstack’s
includes many top instructors, Corey
A collection
Greenwald, of
as free,
he introductory
guides you through on several
learning the technology
basics topicsexamples
of the command including: along
line throughLinuxwithshort,
code
command
snippets.
Learn:The
line, Exercises
ins and
Bash scripting, and
outs quizzes
of Then
creating all and are
stages provided
ofuse
styling the as well
intelligence
webpages with cycle
HTML from andcollection
CSS, to to analysis
counting and new from
converting
digestible video lectures. you’ll Fullstack’s CyberLab platform hone your
seasoned
between intel
different
technicalcollection professionals.
skills while number How
systems, to employ
and writing threat intelligence
regular expressions to conduct comprehensive
Massive
defense strategies ofworking
to free
mitigate
through a Capture
cybersecurity cheat sheets
potential compromise.
the Flagfor
How
game,reference
quick
to
a special kind
use TI to (loginofwith
respond
cybersecurity
free
tosolving
and SANS
minimize
game
account designed
6 hoursof required
ofcyber to challenge
for
free training some participants
penetration
- First, to solve
testing computer
resources) security problems by puzzles.
impact
Finally, through incidents. Howyou'll
a list of carefully
take a tour
tocurated
generate of the worldand
comprehensive
resources through aand
andactionable
watch videos
series ofpower
curated
of hackers
reports to
resources,
in action
across various
communicate platforms
gaps in (including
defenses and computers,
intelligence smartphones,
findings to decision the makers grid). You maywe’ll be
introduce
shocked toyou learn to what
some techniques
important cybersecurity
the good guystopics are usingso that you can
to fight the understand
bad guys (and somewhich of the
side is
common
winning). language,
Then you'll concepts
learn whatandit'stools
likeused in the in industry
to#simplyCyber)
work this world, as we show you the different career
YouTube Playlist (videos from my channel This playlist is a collection of various
paths open to you and the (significant) income you could
roles within the information security field, mostly entry level, so folks can understand what make as a cybersecurity professional
different opportunities
Free Cybersecurity, areLeadership
IT and out there Courses - Includes OS and networking basics. Critical to any
Cyber job
A new program designed to give high school students in the US free access to cybersecurity
learning resources written and developed by industry professionals, which can also be used to
train and qualify for a National Cyber Scholarship." Sponsored by the SANS Institue and the
National
By managing CybernewScholarship
learners' Foundation,
expectations the program is open
of and
themselves, to high
providing school quantified
constant students who are at
feedback
HackerSploit
least 13 years is theand
old leading provider
enrolled in of10th,
9th, free 11thopen-source
or 12th gradeInfosec
at a and cybersecurity
public or private training.
school
on their progress,
By managing and bringing
newequivalent)
learners' them intoofthe
expectations community,
themselves, Roppersconstant
providing Academyquantified
is designed to (or
feedback
the homeschool
minimize dropout and in
rate bringing the US
while providing thethe
best first few hundred
on their progress,
By managing new learners' them into
expectations community,
of themselves, Roppershours
providing
of a cyber
Academy
constant
security
is designed
quantified to
feedback
education
minimize possible.
dropout rate while providing the best first few hundred hours of a cyber security
on their progress, and bringing them into the community, Roppers Academy is designed to
education
minimize possible. while providing the best first few hundred hours of a cyber security
Professor dropout
Messer isratea very good teacher and offers online Youtube videos that cover a great deal
education
of topics onpossible.
CompTIA topics. He is veryonline
thorough yet(MOOC)
concise.provider.
I felt thatWe
professor
edX is a mission-driven, massive open course partnermesser
with thereally
helped
world's me understand what was needed for my test
edX is a leading universities
mission-driven, and organizations
massive to offer(MOOC)
open online course high-quality online
provider. Wecourses
partnertowith
learners
the
across
world's the world.
leading To explore
universities our
and 3,500+ courses,
organizations to please
offer visit our
high-quality course
onlinecatalog.
courses to learners
Courses are designed to help students learn the skills needed to investigate digital crimes,
across
uncover, thepreserve,
world. Toand explore ourevidence,
analyze 3,500+ courses,
and trackplease visit
threat our course
actors. We use catalog.
proven teaching
Its comprehensive
methods, interactive Networking
challenges,Academy
and education
skill-based program
learning that brings
are research
user friendlyand outcome
and engaging based
OpenLearn is a freecolleges,
courses to schools, learning universities,
platform, delivered by The Open
and nonprofits University
worldwide. as part
Courses of its
range Royal
from
Charter
computer commitment to support
basics to advanced the wellbeing
networking of the community.
and prepare students for globally-recognized
certifications.

Its comprehensive Networking Academy education program brings research and outcome based
courses
Developed to schools,
from ourcolleges,
library ofuniversities,
professional and nonprofits worldwide.
development curriculum,Courses
SANS Cyberrange from
Aces Online is an
computer basics to advanced networking and prepare students for globally-recognized
online course that teaches the core concepts needed to assess and protect information security
certifications.
systems. Andcombine
it's free!training
The course materialcommunications,
is updated regularly
IT programs in business, andto keep pace IT
technology. with changes
master's in
programs
technology
can and
build on combinethreat landscape.
students'training
existinginITbusiness,
knowledge and hone their and skillstechnology.
in softwareIT processes, business
IT programs communications, master's programs
intelligence,
can data science, project management, and advanced data mining.
IBMbuild on students'
Security works with existing
you toIThelpknowledge and hone
protect your theirwith
business skillsaninadvanced
software processes, business
and integrated
intelligence,
portfolio of data science,
enterprise project
security management,
products and and advanced
services, infused dataAImining.
with and a modern approach to
Palo Alto Networks, Inc. is an American multinational cybersecurity company with headquarters
your
in security
Santa strategy using zero trust principles—helping you thrive in the face of uncertainty.
About
MCSI us.Clara,
equips
California. Its core
geek-university.com
cyber operators and
products
offers
warriors
areofahigh-quality
a series
with
platform that
the knowledge IT includes
tutorials.
and
advanced
Most
abilities they
firewalls
of need
the topics
to
and
we are
maintain
cloud-based
13Cubed
covering are offerings
started that
as awith
dealing extend
side various those
project aspects firewalls
and wasoflater to cover
developed
computer other
system aspects of
intoadministration. security.
a full-fledged company.
We've Most will
covered
operational
recognize superiority in the cyber domain. The certifications offered by MCSI empower cyber
topics such13Cubed
operators Cisco from
inasachieving CCNA, the YouTube
Linux, VMwarechannel of thePython
vSphere, same name, which produces a wide range of
programming...
content covering Digitaland maintaining
Forensics a high
and Incident level of expertise
Response (DFIR),inasperforming
well as other cyberspace
security-related
operations.
topics. The company also provides consulting services, and occasionally develops software
The Texas A&M Engineering Extension Service (TEEX) is an internationally recognized leader in the
distributed under the brand.
delivery of emergency response, homeland security and workforce training, as well as exercises,
technical
OpenLearn assistance and economic
is a free learning platform,development.
delivered by The Openprovider.
UniversityWe as partner
part of its Royal
edX is a mission-driven, massive open online course (MOOC) with the
Charter
world's commitment
leading to
universitiessupport
and the wellbeing
organizations of
to the
offer community.
high-quality online courses to learners
Digital Forensics: A subset of forensic science that examines system data, user activity, and other
across
pieces the world.evidence
of digital To explore our 3,500+ifcourses,
to determine an attack please visit our course
is in progress and who catalog.
may be behind the
activity.
Hacking and cybersecurity are THE most important skill set of the 21st century and Hackers-Arise
is here to offer you the very best training in hacking and cybersecurity at an affordable price.
Creating future cyber security professionals. EH Academy provides online cyber security training
The
and best DFIR resource
certifications, ethicalonhacking
the planet ran by
courses and those who work everyday in DFIR.
tutorials.

eForensics
The best DFIRMagazine
resource is aondownloadable
the planet ranmagazine
by thosefocused
who work oneveryday
digital forensics.
in DFIR.We cover all
aspects of electronic forensics, from theory to practice, from methodologies and standards to
The
toolsbest
andDFIR resource
real-life on the planet ran by those who work everyday in DFIR.
solutions.
Metaspike is a digital forensics software company in Los Angeles, CA. We build intuitive computer
A circle
forensics
Ryan consists isofafor
software
Chapman aSri
closed
the curved
cloud line
that
Lankan-American is aaround
pleasure
writer aoriginally
central
to use.point. Every point on
from Minneapolis, the line is His
Minnesota. thework
same
distance
has appeared online at The New Yorker, GQ, McSweeney's, BookForum, BOMB, Guernica, andthat
from the central point. This distance to the center is called the radius. The outer line
None
encloses the circle (or theoflength of thisfrom
line) Vermont
is called the circumference.
The Believer. A recipient fellowships Studio Center and the Millay Colony for the
Arts, he lives in Kingston, New York.
Ryan Chapman is a Sri Lankan-American writer originally from Minneapolis, Minnesota. His work
has appeared online at The New Yorker, GQ, McSweeney's, BookForum, BOMB, Guernica, and
The
HighBeliever.
Technology A recipient of fellowships
Crime Investigation from Vermont
Association (HTCIA) Studio
is anCenter and thenon-profit
international Millay Colony for the
Arts, he lives in Kingston, New York.
professional organization devoted to the prevention, investigation, and prosecution of crimes
MSAB
involving is the global leader
advanced in digital forensic technology for mobile device examination and
technologies.
analysis. The company has, since its founding in 1984, set the global standard for the digital
Paraben
forensics Corporation
industry. is MSAB
an investigative technology company providingwith software for mobile
Hal Pomeranz
forensics and is anThe
computer independent vision
forensics
is toforensic
digital empower every
investigator investigation
who has consulted digital onforensic
cases ranging
solutions – for a safer
from intellectual property world. theft, to employee sabotage, to organized cybercrime and malicious
software infrastructures.
Ali Hadi Mohsin (Arabic: 1 ;‫ علي هادي محسن‬June 1967 – 12 June 2020) was an Iraqi professional
Welcome
football to Linux andLEO. You have reached asthe home offor theAl-Zawraa
Law Enforcement and Forensic
MSAB
Examiner'sis player
theIntroduction
global manager.
leader to
He played
inLinux,
digitala forensic atechnology
Comprehensive
defender for mobileguide.
Practitioner's
and Al-Talaba,
device examination winning
and
several titles with the clubs; he also played in Lebanon, for
analysis. The company has, since its founding in 1984, set the global standard for the digital Al-Safa and Al-Ahed. Ali Hadi. Personal
information.
forensics Full
industry. name.
The MSAB vision is to Security
empower every (ENISA)
investigation with digital forensic
The European Network and Information Agency is a European Union (EU) agency
solutions
dedicated – for
to a safer
preventing world.
and addressing network security and information security problems.
The European Network and Information Security Agency (ENISA) is a European Union (EU) agency
NW3C
dedicated provides a nationwide
to preventing support system
and addressing network for law enforcement
security and informationand regulatory
securityagencies
problems.
involved in the prevention, investigation, and prosecution of economic and high-tech crime. We
deliver training in computer forensics, cyber and financial crime investigations, and intelligence
The best DFIR resource on the planet ran by those who work everyday in DFIR.
analysis.
MOBILedit
By managing is the
newultimate
learners'PC suite for all of
expectations phones with features
themselves, providing including
constant an quantified
organizer, feedback
rich
phonebook functionality, smart phonebook optimizer,
on their progress, and bringing them into the community, Roppers Academy is designed to battery life indicator, signal indicator,
memory
minimizestatus,dropout SMS rate sending and management
while providing the best and first much more. hours of a cyber security
few hundred
education
Basis
Peter Technology possible.
Staarfaenger Corp. is a software
is based out of Greatercompany specializing
Columbus Area in and applying
works at artificial
Globalintelligence
Payments Inc. as
techniques
Cyber Defense to understanding
Forensics Consultant documents and unstructured data written in different languages. It
has
The headquarters
Texas A&M Engineering in Somerville, Massachusetts
Extension Service (TEEX)and offices in San Francisco,
is an internationally Washington,
recognized leaderD.C.,
in the
None
London, and Tokyo. response, homeland security and workforce training, as well as exercises,
delivery of emergency
technical assistance and economic development.
An
MITREinformation security professional
ATT&CK (Adversarial with a Masters
Tactics, Techniques and of Cyber Security
Common Knowledge) & a Bachelors
is a framework, in set of
Telecommunications
data matrices, and Engineering
assessment tool developed by MITRE Corporation to help organizations
BlueTeam Academy is a corporate cybersecurity training provider.We help companies build their
understand
teams and then theirupgrade
securitytheir readiness
team and uncoverinto
capabilities vulnerabilities
defenders, in their defenses.
incident responders and
investigators.
Kenneth Ellington is a Senior Cyber Security Consultant at EY who specializes in SIEM and SOAR
technologies
Elastic such as Splunkmaterial and Resilient
Securityis Onion
the rubber-based
is a free and open source that resumes
platformits fororiginal shape after
threat hunting, stretching
network securityor
compression,
monitoring, and anything
and logismanagement. described as elastic
It includes is flexible.
best-of-breed open source tools in such
Tutorialspoint.com
Information Security a dedicated
solutions website
provider to provide
obsessed withquality
developing online education
solutions theas
to cover
Suricata,
domains
your 6. of
Zeek,
Computer Wazuh, the
Science, Elastic Stack, among many others.
Cover6 Solutions is Information
also the hostTechnology,
and primaryProgramming
sponsor of the Languages, and otherProfessionals,
D.C. cybersecurity Engineering as a
well as Management
cybersecurity Meetup subjects
group of over 7,000 members. This Cybersecurity company’s other services
IT
Theprograms
Active combine trainingteam
Countermeasures in business,
supports communications,
your sales and technology.
and technical teams IT master's
through programs
include
can build Network
on Security
students' consulting
existing IT and training,
knowledge and penetration
hone their testing,
skills in and staffing
software & collateral,
processes, recruiting.
business
training, and joint marketing events. Your technical teams have access to both support and
intelligence,
development data science,
engineering. project management, and advanced data mining
DFIR is a Wylie,
Michael non-profit MBA,with CISSPtheTogether
isgoals
the Sr. of we can strengthen
improving
Manager ofdiversity
a 24/7/365
and
in theexpand support
field andfor
DFIRmanaged
global
your customer's
providing
threat training,
hunting team.
network
certification, and book scholarships to those with limited financial resources. All monetary
Prior
AttackIQ provides real-time visibility into your security posture and helps you build a threat- built
to his current role, he was the Director of Cybersecurity at a top 100 CPA firm where he
donations
out
informed are tax-deductible.
the offensive/defensive
defense with our detailssecurity service
best-in-class practice.
Security Michael has
Optimization developed and fortaught
Applied
numerous Incident
courses Response
for the U.S. Department effective ways to respond
of Defense, DEFCON, toPlatform,
advanced Center
Colleges,attacks
and foragainst
Threat- and
clientslocalaround
Informed
remote Defense
network partnership,
resources, and
providing award-winning
proven response Academy
methods and a framework through which
the world. Michael is the winner of numerous SANS challenge coin and holds the following
to implement
credentials: them.CCNA R&S, GPEN, GMON, GCFE, TPN, CEH, CEI, VCP-DCV, CHPA, PenTest+,
CISSP,
F‑Secure
CNVP, Anti‑Virus
Microsoft Azure,provides protection against viruses, spyware, infected email attachments and
and more.
Josh
otherismalware.
an Assistant Professor
Automatic of Cyber
updates andSecurity
real-time at response
Dakota State University
guarantee the where
fastesthe teaches
protection
malware
against analysis
all new threats. and reverse
F‑Secure engineering
Anti‑Virus is easy toof install and it does notinvolve
slow down your
Digital forensics and incident response are branches cybersecurity that identifying,
computer
investigating, containing, remediating andSpecialist
potentially
Kathryn is a Director and Digital Forensic fortestifying
Khyrenz Ltd., relateda SANSto cyberattacks,
Instructor, and litigations
a co-
or other
author digital investigations.
Today, Mattia is CEO of Reality Net System Solutions, an Italian infosec and digital forensicsher
of the FOR308: Digital Forensics Essentials course at SANS, a course that takes after
expertise
consulting incompany,
Digital forensic where fundamentals.
heaworks as a digital
Lenny is the CISO at Axonius, cybersecurity techforensics
company. analyst
Earlier,and heexpert
helpedforbuild judges,
anti-malware
prosecutors,
software at an lawyers,
innovative and private
startup companies,
and oversaw at times
security serving
services as an
at a expert
Fortune court
500 witness.
technology
Lee
In itsHolmes
simplest is aterm,
developerit is on of
a set therules
Microsoft Windows PowerShell
and configurations designed team, and has
to protect thebeen an
integrity,
ReversingLabs
company.
authoritative secure.
source ofsoftware,
information provides
aboutsoftware
PowerShell supply
since chain security
its earliest protection
betas. His vast forexperience
CI/CD
confidentiality
workflows, and
containers, accessibility
and releaseof computer
packages. networks
It is the and
only data
integratedusing both
platform software
that and
detects high-
with Windows
hardware PowerShell enables him to integrate both the ‘how’ and the ‘why’ into discussions.
technologies.
risk threats, malware, backdoors, exposed secrets, and
Lee’s involvement with the PowerShell and administration community (via newsgroups, mailingsoftware tampering across the software
development
lists, and blogs) cycle.
gives him a great deal of insight into the problems faced by all levels of
administrators and PowerShell users alike.
Symantec cloud security
Palo Alto Networks, Inc. issolutions
an American and data protectioncybersecurity
multinational offerings helpcompany you safeguard data, users
with headquarters
and applications within any environment, from the public
in Santa Clara, California. Its core products are a platform that includes advanced firewalls and
cloud-based
CryptoStopper offerings
is proven that extend those firewallssoftware
to coverto other
stopaspects ofrunning
security.
Information security labsransomware
are to test new detection
solutions for cyber-security actively
purposes. ransomware
It also helps to
infections on Windows workstations and servers.
identify vulnerabilities in existing products or systems. Information security lab is to handles
vulnerability
Ali Hadi and enables Iscanning.
work asscalableaItProfessor
helps to know weaknesses in systems and materials.
RangeForce cyberand Security
readiness Researcher,
from interested
a single cloud-based inplatform.
DFIR and Access
Offensive
Security.
individual I'm also an
andisteam-based author and
exercisesspeaker.for author,
a varietytrainer,
of threats
Chris Sanders an information security and across experience
researcher originallylevels
from andMayfield,
cybersecurity functions.
KY. He is the founder of Applied Network Defense, a company focused on delivering high quality,
accessible
LetsDefendinformation
is a hands-on security
Blue Team training.training platform that enables people to gain practical
experience
Picus Security by investigating real cyber attacks inside a simulated SOC. Cloud
LimaCharlie
Cybrary is a is pioneered
cybersecurity
Breach and Attack
Security Infrastructure
and IT workforce
Simulation
as a Service
development (SIaaS).(BAS)Ourtechnology
platform
platform.
and hasorganizations
enables
Its ecosystem
helped
of people, to
companies
detect improve their cyber resilience since then
companies, content, and technologies converge to create an ever-growing catalogand
& respond to threats, automate processes, reduce the number of vendors, future-
of online
proof
courses their security
andprovides
experiential operations.tools that provide IT for andsmartcybersecurity learning
Black Pearl intelligent infrastructure commerce. Black opportunities
Pearl's flagshiptoproduct,
anyone,
anywhere,
the Blackfocuses anytime.
Pearl Knowledge Broker, lets companies extendfiles their value-added sales practices into
Varonis
MaxProd Technologieson protectingis a cyber enterprise
securitydata: company sensitive
based outand emails; confidential
of Southern customer,
Maryland supporting
the electronic
patient andprivate market
employee place.
data;Asfinancial records;threats
strategic and product plans; andonother intellectual
public
BrightTALKand provides sectors.
webinars cyber
and videossecurity for professionals continue andtotheir
wreak havoc
communities. organizations
Every day
property.
across the globe, our team of defenders are readytheir to bridge the their
gap by providing real-world,
thousands
organization ofdedicated
thought leaders
to promotingare actively sharing
cybersecurity insights,
education ideas
and awareness. andOur their most
goal is toup-to-
make
industry-standard
date knowledge expertise.
with professionals all over the globe through the technologies that BrightTALK
cybersecurity knowledge and training accessible, so everyone can protect themselves and their
has created. from cyber threats. We accomplish this by hosting free events for the community.
organizations
Digital forensics and incident response (DFIR) is a specialized field focused on identifying,
We are passionate
remediating, andand about building
investigating cybera supportive,
security diverse,Digital
incidents. and inclusive
forensics cybersecurity
includes community.
collecting,
Digital
CSI forensics
Linux is aand focused incident
Linuxforensicresponse
distribution (DFIR)
for digitalis a specialized
forensics. field focused
We developed on identifying,
anevents.
open-source
preserving,
remediating, andanalyzing
investigating cyberevidence
securityto paint
incidents. a full, detailed
Digital picture
forensics of
includes collecting,
'theme
CSI park'
Linux is aand for the
focused cyber security
Linuxforensic
distributionindustry. It
for digital has tons of
forensics. capabilities
We developed for investigations,
anevents.
open-source analysis
preserving,
and response! analyzing
CSI Linux is available evidence
in both ato paint
Virtual a full,
Machine detailed picture
Appliance and ofBootable distro to
'theme park' for the cyber security industry. It has tons of capabilities for investigations, analysis
use
and as a daily
response! driver.
CSI Linux
Cyberwox Academy is anisonline
available in both a Virtual
cybersecurity community Machine andAppliance
resource hub and that
Bootable
providesdistro to
use as
students. a daily driver.
everything they need todigital gear them towards building a strong entry-level
Hal Pomeranz is an independent forensic investigator who has consulted on cybersecurity
cases ranging
career.
from
AWS (Amazon Web Services) is a comprehensive, evolving cloud computing platform malicious
intellectual property theft, to employee sabotage, to organized cybercrime and provided by
software
Amazon infrastructures.
that includes a mixture of infrastructure as a service (IaaS), platform as a service (PaaS)by
AWS (Amazon Web Services) is a comprehensive, evolving cloud computing platform provided
and
Amazonpackaged software as a service (SaaS) offerings.
Microsoftthat is theincludes
largesta vendor
mixtureofofcomputerinfrastructure software as a in service (IaaS),Itplatform
the world. as a service
is also a leading (PaaS)
provider of
and
cloud packaged
computing software
services, as a service
video games,(SaaS) offerings.
computer and gaming hardware, search and other online
Microsoft
SANS Digital is the largestand
Forensics vendor of computer
Incident Responsesoftware community in the world.
offers It is also
digital a leading
forensics provider of
and incident
services
cloud computing services, video games, computer and gaming hardware, search and other online
response
High professionals
Technology Crime an opportunity
Investigation to learn, discuss,
Association (HTCIA)and is anshare current developments
international non-profit in the
services
field. It also provides information regarding digital forensics and incidentprosecution
response training,
professional
NIST is the National organizationInstitute devoted to the prevention,
of Standards and Technology, investigation,
a unit ofand the U.S. Commerce of crimes
certification,
involving advancedand events.
technologies.
Department. Formerly known as the National Bureau of Standards, NIST promotes and maintains
A Subject Matter
measurement Expert on
standards. It Digital hasForensics,
alsocomputing active as E-discovery
programs and IT Security andworking
assistingas a Seniorand
The CNCFInvestigator
Forensic defines cloud-native
/ Head of IT standards.
Security with use for
theSupreme encouraging
of open
Group source
Dubai, software,
having aasgood
industry
well as
exposure in
science
technologiesto develop
such and
as use
containers, these microservices and service mesh, to develop and deploy scalable
the area of Electronic Discovery, Digital Forensics & Investigation, Data collection, IT Security
applications
Audit on cloud computing platforms.
Googleand LLCCompliance
is an American and multinational
have good understanding
technology company of tools tothat investigate
focuses on electronic evidence to
search engine
implement
technology, existing laws.
online advertising,
Microsoft provides a financiallycloud backed computing,
99.9% applicationcomputeruptime software, quantum
guarantee forcomputing,
Microsoft 365. e- It
commerce, artificial intelligence, and consumer electronics
also includes a range of robust security capabilities, such as identity and access management,
threat
roles asprotection,
an escalation information
point for protection,
high priorityand securitythis
incidents, andhas riskalso
management.
included a lot of threat hunting
and in my current role a lot of focus on malware analysis.
Malware Unicorn, discusses her time in computer forensics investigations with the DoD, as well as
the
With joys of reverse engineering
Reverse malware encryption bythe
hand.
Google Cloud Engineering
consists of a for setBeginners
of physicalyou will learn
assets, such as basics of x86
computers andandhardget hands-on
disk drives, and
experience
virtual resources, such as virtual machines (VMs), that are contained in Google's data centers
around
Marcus the globe. also
Hutchins, Eachknown data centeronlinelocation is in a region
as MalwareTech, is a British
The Federal Virtual Training Environment (FedVTE) provides free computer security researcher
online cybersecurity training to
known for temporarily stopping the WannaCry ransomware
federal, state, local, tribal, and territorial government employees, federal contractors, and US attack
military veterans.
Hackers-Arise
Hackaday is the Is premier
A White-Hat website Hacker Training Site.
for hardware ideas ThisandMeans That We
discussion. Use Our
As part of ourSkills For Good
mission, we
feature the best projects from basement and garage workshops around the world.
Maddie
Max Stoneisisa asecurity
Kersten Securityresearcher
Researcher foron Google Project
McAfee's Advanced Zero whereResearch
Threat she focuses team.onLeveraging
0-days
Reverse
actively engineering
exploited malware involves
in-the-wild. disassembling (and sometimes decompiling) a software his
previous
program.experience
Through this asprocess,
a security specialist
binary at a financial
instructions institution,
are converted to hecode focuses primarily
mnemonics (or on
higher
banking
level malware,
constructs) as well as other threats including stealers and remote access Trojans.
Patrick Wardle is so thethat
Chiefengineers
Research can look at
Officer at what
Digitathe program
Security anddoes
founder and of
what systems it
Objective-See.
impacts
Having worked at NASA and the NSA, and well as presented at many security conferences, he is
intimately
An information familiar with aliens,
security spies, with
professional and talking
a Masters nerdy.of Cyber Security & a Bachelors in
Telecommunications Engineering
An information security professional with a Masters of Cyber Security & a Bachelors in
Telecommunications
It approvesCyber and oversees Engineering
theAnalyst,
implementation of theSecurity
budget, & development plan and Programme
Malware, Intelligence and all around Computer Science nerd.Currently
of Work,
Ph.D. activities for each calendar year, of the cyber defence hub
CLARK,Candidate at University
the Cybersecurity Labsofand Cincinnati,
ResourceComputer Science Engineering
Knowledge-base, is a platforminfor Cyber Operations.
building and
Sr. Cyber
sharing Intelligence research analyst by day.
CLARK, the Cybersecurity Labs and Resource Knowledge-base, is a platform for building andlibrary
free cybersecurity curricula. It includes a model for building curriculum, the digital
system,
sharing freeand cybersecurity
distinct curriculum collections.
curricula. It includes a model for building curriculum, the digital library
system, and distinct curriculum collections.
HackerSploit is aimed at protecting companies and businesses from the ever-growing threat of
hackers,
Josh is andata breaches,
Assistant malware,
Professor and ransomware.
of Cyber Security at Dakota State University where he teaches
malware analysis and reverse engineering
None
Ali Hadi and I work as awayProfessor anddetection,
Security Researcher,
Defense
Blackstorm evasion
Security is theis to bypass
a quality-driven company.cover whatinterested
We provide malware isindoing,
quality security
DFIR andandOffensive
based determine
on client its
Security.
activity toI'm
a also an family
specific author orand speaker.
authors. There are different techniques used by threat actorsWe likelive
specifications
OA Labs. We anda our
are pledge
medical of partnership,
clinic that focusesThe commitment,
on tactics
preventative andand continuous
restorative improvement.
therapies for men
injection,
by data encryption, and obfuscating. often induce payloads and scripts
andour brand We
women. promise of CREATING
specialize in hormone CONFIDENCE
optimization andand willweight
alwaysloss.
portray Thepassion
goal at OAandLabs
enthusiasm
is to
for what we do and what we offer.
promote longevity, promote overall health, and improve quality of life through a multi faceted
approach.
Colin Hardy has a wealth of real-world, hands-on cyber security experience specialising in
SANS
malware Institute
analysis, is the mostforensics,
digital trusted source of cyber
cyber threat security training,
intelligence, incident certifications
management andandresearch.
By managingsecurity
information new learners' strategy. expectations of themselves, providing constant quantified feedback
on their progress, and bringing them into the community, Roppers Academy is designed to
Software
minimize Engineer,rate Malware
while Analyst,
providingand Consultant in Poland
Welcome dropoutto MalwareAficionado!Here, the
we'llbest
coverfirstMalware
few hundred
Analysis, hours of a cyber
Reverse security
Engineering,
education
Incident possible.
Response, and (most) things Information Security! for maintaining internal network
Blue teams are defensive security professionals responsible
defenses against all cyber attacks and threats. Red teams simulate attacks against blue teams to
test the effectiveness of the network's security.
A Full-System Simulation Environment for Massively Parallel Heterogeneous System-on-Chip.
None
Abstract: Driven by flexibility, performance and cost constraints of demanding modern
None
applications, heterogeneous System-on-Chip (SoC) is the dominant design paradigm in the
embedded
Think
DFIR aboutsystem
Madness allisthe computing
content
a site yourdomain.
by Information company needs
Security and produces
professional, Jamesto go about
Smith its business. From the
Champlain
budget College's
spreadsheets Computer
to employee & Digital Forensics
contracts, program
product offers
brainstorming the bestdedicated
sessions possible
to buyer
to sharing
digital
personas,
thrill of
forensics the hunt
training for amateurs and professionals alike.
your business runsaton the undergraduate
information. Now,level.
consider what would happen if some of that content fell
into the wrong hands. Competitors could get an edge on you, hackers could access private
customer data, and your company's financials could be put at risk.
PwnDefend
None was created as a mechanism to help people with the cyber security challenges we
face today.
HackTale is a new,It's inception
innovativewas focused
approach onfor
theteaching
creationand of capture
training thecyber flagexperts
(CTF) games that helped
via gamification.
None
teach good
HackTale is asecurity
platform practises
designed through
for thethe medium
creation of of offensive security.
cyber-games. Each game simulates a different
attack scenarioplatform
An enterprise and focuses on different
that measures andaspects of cyber-defense.
evidences the cyber security capabilities of your
workforce, Immersive Labs is the leader in
Participants learn to overcome sets of challenges from six domains cyber workforce optimization. Organizations
of cybersecurity use the
including
Immersive Labs Simulation Engine to evidence resilience across their
general skills, cryptography, web exploitation, forensics, etc. The challenges are all set up with the whole workforce
intent of being hacked, making it an excellent, legal way to get hands-on experience.
None
An educational, introductory set of CTF-styled challenges which is aimed to encourage students,
security researchers and also CTF players to get started with the field of Memory Forensics
Quick videos providing a high-level overview of a topic
Ideal course for penetration testers, security enthusiasts and network administrators
Analysis of mobile
An independent and forensics, big data and cloudorganization
neutral nongovernmental forensics, socialwhose networking
mission isforensics
to ensure the rights
of people to security, dignity and equity in cyberspace
None
A service we provide to customer to ensure the safety of his environment. The benefits that the
None
customer receives consist in simply connecting their or outsourced infrastructure to CyberSOC
security
OSINT is monitoring
a methodology for collecting, analyzing, and making decisions about data accessible in
publicly available sources to be used in an intelligence context
The best DFIR
Corelight is theresource on the planet
most powerful network ranvisibility
by those andwho work everyday
monitoring solution in for
DFIR.
information security
professionals
Combine training in business, communications, and technology
Combine management and leadership training with lessons in technology, analytics, and big data
A mission-driven, massive
Professor openA+,online course (MOOC) provider videos, notes, study groups,
The Texas Messer's CompTIA
A&M Engineering Network+,
Extension Serviceand Security+
(TEEX) is antraining
internationally recognized leader in the
and IT certification
delivery of emergency study materials
response, homeland security and workforce training, as well as exercises,
technical
Interactive assistance
online classesand economic
subjectsdevelopment
in offering including law, history, science, engineering,coursesbusiness,
An online learning platform self-paced guided projects and on-demand onsocial
a
sciences, computer science, public health, and artificial intelligence
variety of subjects. The platform partners with universities and companies, including Amazon (AI)
Web Services,
An online Google
learning and IBM,and
destination to provide courses offering high-quality courses from the world's
MOOC provider,
best universities and institutions to learners
A nonprofit initiative working since 2008 to offer free and open online courses to all who want to
None
learn. We offer nearly 100 full-length courses at the college and professional levels, each built by
Its comprehensive
subject matter Networking Academy education program brings research and outcome based
experts.
A leading
courses tocybersecurity
schools, colleges,consulting and advisory
universities, firm withworldwide.
and nonprofits the expertise and resources
Courses range from necessary
to assist clients build secure cyber defences
computer basics to advanced networking and prepare students for globally-recognized
certifications
Irvin
None Lemus, CISSP has been in the industry for over 15 years. Irvin has been involved with
Overview
cybersecurity of the hardware and
competitions as aCircuitPython
trainer, coach, programming
mentor and environment
creator. He is along withasome
currently Cyberbasic
Range
programming
Engineer for By Light, the Bay Cyber League Competitions Coordinator and SkillsUSA Contest
Chair.
The Pythonthe
It teaches Institute is an independent
basic concepts and describes non-profit project that
the hardware set up by the Open
assembly code Education and
Development
Hakin9 Group (OpenEDG) to promote the Python programming
is a monthly magazine dedicated to hacking and cybersecurity. In every edition, language, train a we
newtry to
None
generation
focus on different approaches to show various techniques - defensive and offensive. This the
of Python programmers, and support professional careers in programming in
Python
knowledge language, andyouin related technologies
Al Sweigart will is a help
software understand
developer and howteaches
most popular attacksto
programming are performed
kids and adults. andHehow
hastowritten
protect
your data
several from
Python booksthem.
Tutorialspoint.com
Udemy is a platform afor
isthat beginners,
dedicated
allows
including
website
instructors
Hackingquality
totoprovide
build
Secretonline
online
Ciphers
courses
with Python,
education
on their in theInvent
preferred domainsYour
topics. of
Own Computer
Computer Games
Science, with
Information Python, and
Technology, Making Games
Programming with Python
Languages, & Pygame.
andsource
other code
Engineering as
Using Udemy's course development tools, instructors can upload videos, for
well as Management subjects
developers, PowerPoint presentations, PDFs, audio, ZIP files and any other content that learners
Microsoft
might findishelpful
the largest vendor of computer software in the world. It is also a leading provider of
cloud computing services, video games, computer and gaming hardware, search and other online
None
services. Microsoft's corporate headquarters is located in Redmond, Wash., and it has offices in
more than 60 countries
Tutorialspoint.com is a dedicated website to provide quality online education in the domains of
None
Computer Science, Information Technology,
Tutorialspoint.com is a dedicated website to Programming
provide quality Languages, and other
online education Engineering
in the domains as of
well as Management subjects
Computer Science, Information Technology, Programming Languages, and other Engineering as
well as Management subjects
None
None
None
Platform that allows instructors to build online courses on their preferred topics. Using Udemy's
None
course development tools, instructors can upload videos, source code for developers, PowerPoint
Microsoft
presentations,is thePDFs,
largest vendor
audio, of
ZIPthat computer
files software
and any products
other contentin thethat
world. It is also
learners a leading
might provider of
find helpful.
Australian
cloud computingsoftware company
services, video develops
games, computer andfor software
gaming developers,
hardware, searchproject managers
and other online
and other
services. software
Microsoft's development
corporate teams
headquarters is located in Redmond, Wash., and it has offices in
freeCodeCamp is a community of millions of people around the world who are learning to code
more than 60 countries.
together. You can learn to code with free online courses, programming projects, and interview
preparation for developer jobs. We're a 501(c)(3) public charity
freeCodeCamp (also referred to as Free Code Camp) is a non-profit organization that consists of
an interactive learning web platform, an online community forum, chat rooms, online publications
and local organizations
The complete that intendLearn
guide to JavaScript. to makehowlearning
to buildweb development
JavaScript projectsaccessible to anyone.
without getting stuck.
View Course.
Azeria Labs provides training courses on ARM exploit development, reverse engineering,
vulnerability research.
edX
Its is a mission-driven,
comprehensive massiveAcademy
Networking open online courseprogram
education (MOOC) brings
provider. We partner
research with thebased
and outcome
Special
world's Agent
leading ofuniversities
a Federal Law
and Enforcement
organizations agency
to offer high-quality online courses to learners
courses
Its to schools,Networking
comprehensive colleges, universities,
Academy and nonprofits
education worldwide.
program brings Courses and
research range from
outcome based
across
computer the world. To explore our 3,500+ courses, please visit our course catalog
courses tobasics
schools, to colleges,
advanceduniversities,
networkingand andnonprofits
prepare students
worldwide.for globally-recognized
Courses range from
certifications
computer
Udacity is abasics
global, to online,
advanced networking
lifelong learningand prepare
platform students for
connecting globally-recognized
education to jobs. Udacity works
certifications
with industry leaders to create project-based online learning programs. These unique
Udacity is a global, online, lifelong learning platform connecting education to jobs. Udacity works
collaborations ensure that students learn the technology skills
with industry leaders to create project-based online learning programs. These unique that employers value most.
collaborations ensure that students learn the technology skills that employers value most.
None
None
CompTIA A+, ofNetwork+, andlargest
Security+
Alison is one the world's freetraining
learningvideos,
platformsnotes,
for study groups,
education andand IT training.
skills certification
It is a
study materials
for-profit social enterprise dedicated to making it possible for anyone, to study anything,
Alison is one of the world's largest free learning platforms for education and skills training. It is a
anywhere,
for-profit at any
social time, for dedicated
enterprise free online,toatmakingany subject level.for anyone, to study anything,
it possible
The world's largest free learning platforms for education and skills training. It is a for-profit social
anywhere, at any time,
enterprise dedicated tofor free online,
making at any
it possible for subject
anyone,level.
to study anything, anywhere, at any time,
for free online, at any subject level.
None
The most trusted resource for information security training, cyber security certifications, and
research
The Naval Postgraduate School (NPS) provided post-baccalaureate education to military officers
and other members of the United States defense and national security community.
Hack The Box is an online platform allowing you to test your penetration testing skills and
None
exchange ideas and methodologies with other members of similar interests. It contains several
challenges that are constantly updated.
Udemy
None is a platform that allows instructors to build online courses on their preferred topics.
Using Udemy's course development tools, instructors can upload videos, source code for
Building
developers, a Cybersecurity Home Lab
PowerPoint presentations, PDFs, audio, ZIP files and any other content that learners
might find helpful.
An experienced Cyber Security leader that is dedicated to providing training, tips & tricks, and
career
Dedicatedadvice throughout
to the advancement the community.
of cyber education, workforce and policy development for women
and
osintminorities
combine in underserved
provides leading communities.
edge training in online investigations, online safety, open source
The OSINT Curious Project is a source of quality, actionable, Open Source Intelligence news,
intelligence to help you find, understand and take action
original blogs, instructional videos, and a bi-weekly webcast/podcast. Most of all, we want to
inspire people to look outside of their OSINT-comfort zones and pursue their OSINT passions.
None
None
Toddington International is pleased to curate the Web’s largest database of free OSINT resources
and tools, research
Open-source “cheat(OSINT)
intelligence sheets,”is and other online
the collection andinvestigative
analysis of dataaids.gathered from open
sources (overt and publicly available sources) to produce actionable intelligence.
A platform that allows instructors to build online courses on their preferred topics. Using Udemy's
A curated
course list of amazingly
development awesome open source intelligence tools andforresources
A platform that allowstools, instructors
instructors can online
to build upload videos, on
courses source
theircode
preferred developers,
topics. Using PowerPoint
Udemy's
presentations, PDFs, audio, ZIP files and any other content that learners
course development tools, instructors can upload videos, source code for developers, PowerPoint might find helpful.
presentations,
The HTCIA wasPDFs, formed audio, ZIP fileseducation
to provide and any other content thatto
and collaboration learners might
our global find helpful.
members for the
prevention and investigation of high tech crimes
None
April C. Wright is a hacker, writer, teacher, and community leader with over 25 years of breaking,
making, fixing, and
A foundational defending
course global critical
in open-source communications
intelligence (OSINT) gathering, teaches students how to
A YouTube
find, gather, description
and analyze refers
data to
fromthe content
the creator's text to describe their content. It uses SEO
Internet
OSINT Combine
techniques is an Australian
to optimize and categorizeveteranvideos
owned toand
helpoperated
users findbusiness
the rightwho specialise
content. Therein are
open-
two
source intelligence (OSINT) training & software.
types of YouTube descriptions: the overall description of the channel and the descriptions for
each
Focusvideo you upload.
on creating videos for aspiring ethical hackers, computer scientists, and the infosec
community.
Secjuice is the only non-profit, independent and volunteer led publication in the information
security space. We are a private members writing club focused on cybersecurity, information
security, network security, hacking, cyberwar, and open source intelligence gathering.
Work as a Threat Researcher at Cyble. I am focused on darknet and darkweb research, creating
None
automated tools to collect data and perform threat investigations by utilizing HUMINT, SOCMINT,
and OSINT. I have graduated from Georgia Tech with a Master's in Cybersecurity.
The founder of ehacking.net and creates future cyber security professionals by offering quality
former Advisoty
cyber security Board Member
education of @OSINTcurio.us
at EH Academy. You can connect with him on Twitter (@irfaanshakeel)
and LinkedIn.
None
None
None
IT programs
Offensive combine
security is atraining in and
proactive business, communications,
adversarial approach toand technology.
protecting IT master's
computer programs
systems,
None
can
networks and individuals from attacks. Conventional security -- sometimes referred to asbusiness
build on students' existing IT knowledge and hone their skills in software processes,
intelligence, data science,
"defensive security" project
-- focuses management,
on reactive and advanced
measures, data mining
such as patching software and finding and
fixing system vulnerabilities.
PortSwigger offers tools for web application security, testing, & scanning. Choose from a range of
security tools
HackerSploit is the leading provider of free Infosec and cybersecurity training
None
The Federal Virtual Training Environment (FedVTE) provides free online cybersecurity training to
eLearnSecurity
federal, state, researcher
local, and territorial
tribal, and Malware Analysis Professional course instructor
The Federal Virtual Training Environmentgovernment employees,
(FedVTE) provides federal
free online contractors,training
cybersecurity and US to
military
federal, veterans.
state, local,Training
tribal, and territorial government employees, federal contractors,training
and US to
The Federal Virtual Environment (FedVTE) provides free online cybersecurity
military veterans.
federal, state, local, tribal, and territorial government employees, federal contractors, and US
military veterans. developed to help you discover your talent, advance your skills and win
A fun programme
scholarships
A fun programmein cyber security to help you discover your talent, advance your skills and win
developed
scholarships in cyber
A noncompetitive security
practice space where you can explore and solve challenges from previously
released picoCTF competitions
collection of free teaching material that teaches Computer Science through engaging games and
The K-12 Computer Science Access Report is a collaborative partnership between the Computer
puzzles
Science Teachers Association and Code.org (with the help of many state education agencies and
An online interactive
education resource
organizations) for high
to identify on school students learning
a school-by-school basis about
wherecomputer science
foundational computer
science is taught
None
Nonprofit Program of Creating IT Futures Inspiring Middle School Girls to Explore Technology to
Empower Their Future Careers.
None
None
Josh Moulin has been in the cybersecurity field since 2004 and worked in a variety of roles.
Currently, he is a Senior VP for a global cybersecurity non-profit.
None
The Federal Virtual Training Environment (FedVTE) provides free online cybersecurity training to
None
federal, state, local, tribal, and territorial government employees, federal contractors, and US
military veterans.
None
MCSI
None equips cyber operators and warriors with the knowledge and abilities they need to maintain
operational superiority in the cyber domain. The certifications offered by MCSI empower cyber
None
operators in achieving and maintaining a high level of expertise in performing cyberspace
operations.
None
Onward to Opportunity (O2O) is a free career training program that provides professional
None
certification and employee support services to transitioning service members, veterans and
military spouses.
None
CertNexus is a vendor-neutral certification body, providing emerging technology certifications and
micro-credentials for business, data, developer, IT, and security professionals.
None
None
Red Teamer & Compendium
The Definitive Network Security Consultant.
Project. | The best DFIR resource on the planet ran by those who
work everyday in DFIR
A repository of DFIR-related Mind Maps geared towards the visual learners! ... A repo to
centralize some of the regular expressions
Saylor Academy is a nonprofit initiative working since 2008 to offer free and open online courses
None
to all who want to
Saylor Academy is alearn. We offer
nonprofit nearlyworking
initiative 100 full-length
since 2008courses at the
to offer freecollege andonline
and open professional
courses
levels,
to all each
who wantbuilttoby subject
learn. We matter
offer experts.
nearly 100 full-length courses at the college and professional
IT programs combine training in business, communications, and technology. IT master's programs
levels,
can each
build onan built by subject
students' matter
existing experts. and hone their skills in software processes, business
IT knowledge
Coursera is online learning platform offering self-paced guided projects and on-demand
intelligence,
courses data science, projectThemanagement, and advanced data mining
Coursera is an online learning platform offeringpartners
on a variety of subjects. platform withguided
self-paced universities
projectsandand
companies,
on-demand including
Amazon
courses Web Services, Google and IBM, to provide courses.
Courseraon is aanvariety
onlineoflearning
subjects. The platform
platform offeringpartners withguided
self-paced universities
projectsandand
companies,
on-demand including
Amazon Web Services, Google and IBM, to provide courses.
courses on a variety of subjects. The platform partners with universities and companies, including
Amazon
Cisco Web
Talos Services,
is aone of theGoogle
largest and
andIBM,
most totrusted
provideproviders
courses.of cutting-edge security research
Proofpoint is cybersecurity platform aimed to protect workers and data from advanced
globally. We provide
cybersecurity criminals thethat
data Ciscoemail,
target Security products
social mediaandandservices use to take
mobile devices. action. email
Proofpoint's
protection is a cloud-based solution that allows companies to easily filter their inbox and outbox.
None
None
None
None
Command-line tool to search
lightweight, interpreted, for malwarelanguage
object-oriented samples with
in various repositories
first-class functions, and is best known as
the scripting language for Web pages, but it's used in many non-browser environments as well
None
An
SS64A-Z Index ofHow-to
VBScript The Windows
Search. CMD
An A-Z Command Line - SS64VBScript
Index of Windows · Basic CMD lines ofAwindows
commands. Abs(number)
Absolute (positive) value of number.
An A-Z Index of the Linux command line: bash + utilities. ; seq, Print numeric sequences ;
set, Manipulate shell variables and functions
Numeric computer code used to represent characters from the alphabet.
Varonis focuses on protecting enterprise data: sensitive files and emails; confidential customer,
None
patient and employee data; financial records; strategic and
Varonis focuses
Tutorialspoint.com on protecting
is a dedicatedenterprise
websitedata: sensitive
to provide filesproduct
quality
plans;confidential
and emails;
online education
and other intellectual
customer,
in the domains of
property.
patient and employee data; financial records; strategic and product plans; and other intellectual
Computer Science, Information Technology, Programming Languages, and other Engineering as
property.
well
High as Management
Technology Crime subjects. This website
Investigation was launched
Association (HTCIA) isbyananinternational
AMU alumni, Mr. Mohtashim,
non-profit
with a single organization
professional tutorial on HTML in year
devoted 2006.
to the prevention, investigation, and prosecution of crimes
involving advanced technologies.
None
frankwxu/digital-forensics-lab. Free hands-on digital forensics labs for students and faculty. Rich
Text FormatHTMLShellJavaPythonBatchfile.
None
Ian Neil is one of the world's top trainers of Security+. He has many years of teaching experience,
None
and a proven ability to break information down into manageable chunks so that complex ideas
are clear and easy to understand.
None
None
Open Source Intelligence (OSINT) training, education, and tradecraft best practices. OSINT is a
unique and specialized form of information
Digital Forensics and Incidence Response using Open Source tools
Courses are designed to help students learn the skills needed to investigate digital crimes,
None
uncover, preserve, and analyze evidence, and track threat actors. We use proven teaching
methods, interactive challenges, and skill-based learning that are user friendly and engaging.
Cyber security professionals boost their career to the next level and become experts in digital
forensics & incident
None
A repo that contains links to projects by members of the Digital Forensics Discord Server! This is
meant to help promote projects made by our very own members
Link Skill Level Hands-on Proof of completion
https://noxcyber.co.uk/ all
https://portswigger.net/web-security all
https://www.mosse-institute.com/certifications/mics-introduction-to-cyber-security.html
all
https://www.bugcrowd.com/hackers/bugcrowd-university/
all
https://www.icsi.co.uk/courses/icsi-cnss-certified-network-security-specialist-covid-19
all
https://www.offensive-security.com/metasploit-unleashed/
all
https://www.youtube.com/watch?v=3hLmDS179YE
all
https://www.sans.org/media/free/free-faculty-tools.pdf?msc=sans-free-lp
all
https://attack.mitre.org/resources/training/cti/
all
https://blog.coursera.org/coursera-together-free-online-learning-during-covid-19/
all
https://www.fortinet.com/training/cybersecurity-professionals.html
all
https://docs.microsoft.com/en-us/security/ciso-workshop/the-ciso-workshop
all
https://clark.center/home all
https://www.hacker101.com/ all
https://training.elastic.co/learn-from-home
all
https://www.hoppersroppers.org/training.html
beginners
https://www.securitylearningacademy.com/
all
http://www.mekabay.com/courses/index.htm
all
https://www.ptech.org/open-p-tech/ all
https://www.udemy.com/courses/free/ all
https://www.netacad.com/courses/programming/pcap-programming-essentials-python
all
https://www.youtube.com/watch?v=V9agUAz0DwI
all
https://www.youtube.com/watch?v=544rhbcDtc8
all
https://www.hbo.com/documentaries/kill-chain-the-cyber-war-on-americas-elections
all
https://www.netacad.com/portal/web/self-enroll/c/course-1003729
all
https://www.netacad.com/portal/web/self-enroll/c/course-1003733
all
https://www.pluralsight.com/partners/microsoft/azure
all
https://www.blackhat.com/html/webcast/webcast-home.html
all
https://fedvte.usalearning.gov/public_fedvte.php
all
https://professionaled.harrisburgu.edu/online-content/
all
https://hackxor.net/ all
http://flaws.cloud/ all
https://web.stanford.edu/class/cs253 all
https://linuxjourney.com all
https://ryanstutorials.net all
https://www.sans.org/blog/the-ultimate-list-of-sans-cheat-sheets/
all
https://www.shadowscape.io/cyber-intelligence-analytics-operat
all
https://prep.fullstackacademy.com/all
https://cyber.fullstackacademy.com/prepare/hacking-101
all
https://www.youtube.com/playlist?list=PL4Q-ttyNIRAqog96mt8C8lKWzTjW6f38F
all
https://netinstruct.com/courses all
https://hackersploit.org/ all
https://www.cyberstartamerica.org all
https://www.hoppersroppers.org/courseSecurity.html
Beginner yes badge
https://www.hoppersroppers.org/courseSecurity.html
Beginners Yes Badge
https://www.hoppersroppers.org/courseCTF.html
Introduction to Co Yes badge
https://www.youtube.com/watch?v=OS9MJjNK6gA&list=PLG49S3nxzAnlGHY8ObL8DiyP3AIu9vd3K
Beginners No No
https://www.edx.org/course/cybersecurity-fundamentals
Beginners NA Costs Extra
https://www.edx.org/course/cyber-security-basics-a-hands-on-approach
Prerequisites are b Yes Costs Extra
https://academy.cyber5w.com/collections?category=courses
Beginners Some courses have Yes
https://www.open.edu/openlearn/science-maths-technology/introduction-cyber-security-stay-safe-online/content-section-o
Beginners No Yes
https://www.netacad.com/courses/cybersecurity/introduction-cybersecurity
Beginners Yes Yes

https://www.netacad.com/courses/cybersecurity/cybersecurity-essentials
Introduction to CybYes Certificate of Compl
https://www.sans.org/cyberaces/ Beginners Yes None
https://itmasters.edu.au/free-short-course-cyber-warfare-and-terrorism/
This is an intermed None Certificate of Compl
https://itmasters.edu.au/free-short-course-enterprise-cyber-security-fundamentals/
This is an intermed None Certificate of Compl
https://www.securitylearningacademy.com/
Hopper’s Roppers I Yes Progress Report and
https://www.paloaltonetworks.com/services/education
Yes, there is fundamNone None
https://geek-university.com/courses/ Beginners None Certificate of Compl
https://platform.mosse-institute.com/ None Yes Yes
https://www.youtube.com/user/davisrichardg
None None None
https://teex.org/class/AWR139/ Beginners None None
https://www.open.edu/openlearn/science-maths-technology/digital-forensics/content-section-0?active-tab=description-tab
Beginners None Statement of Partic
https://www.edx.org/course/computer-forensics
Must complete the eNone Costs Extra
https://www.youtube.com/c/DFIRScience/featured
Beginners None None
https://www.hackers-arise.com/forensicsNone None Yes – There are free
https://aboutdfir.com/toolsandartifacts/windows/kape/
Beginners None None
https://academy.ehacking.net/p/computer-hacking-forensics-investigation
None None Costs Extra ($10)
https://aboutdfir.com/toolsandartifacts/windows/registry-explorer-recmd/
Beginners None None
https://aboutdfir.com/toolsandartifacts/windows/timeline-explorer/
Beginners None None
https://eforensicsmag.com/category/free-course-content/
None None None
https://events.metaspike.com/talks/email-forensics-workshop/
None None None
https://github.com/RJC497/IoT-Digital-Forensics-Course
None Yes None
https://www.circl.lu/services/forensic-training-materials/
None None None
https://www.youtube.com/playlist?list=PLt_Hvzh8oeR5S27UaoKDx2qqYZcpokGL5
Beginners Yes None
https://github.com/rj-chap/CFWorkshop None Yes None
https://htcia.org/free-courses/ None None None
https://paraben.com/dfir-free-training/None None None
https://www.youtube.com/watch?v=5e5KdbY-xzE
Beginners None None
https://archive.org/details/HalLinuxForensics/mode/2up
None Yes None
https://www.linuxleo.com/ Beginners Yes – This is a deta None
https://linuxdfir.ashemery.com/ None yes None
https://www.msab.com/training/free-courses/
None None None
https://www.enisa.europa.eu/topics/trainings-for-cybersecurity-specialists/online-training-material
None Yes – There are hanNone
https://www.enisa.europa.eu/topics/trainings-for-cybersecurity-specialists/online-training-material/technical-operational#m
None Yes None
https://aboutdfir.com/toolsandartifacts/windows/mft-explorer-mftecmd/
None None None
https://www.nw3c.org/live-online-training/live-online-cybercrime-course-list
None Yes Yes
https://content.mobiledit.com/training/ Beginners Yes None
https://www.hoppersroppers.org/roadmap/training/forensics.html
None Yes None
https://www.youtube.com/watch?v=bz2RiPsUC5Q
None None None
https://www.pnw.edu/cybersecurity/cwct/training-paths/cybersecurity-digital-forensics-cs_df-certificate-program/
Beginners Yes Yes
https://dfir-training.basistech.com/courses/intro-to-divide-and-conquer
Beginners None Yes
https://teex.org/class/AWR169/ Beginners None Yes
https://samsclass.info/152/152_F21.shtmlNone None None
https://attack.mitre.org/resources/training/
Beginners Yes None
https://www.blueteamsacademy.com/Beginners Yes None
https://www.youtube.com/playlist?list=PLau8hF6Nab7uHnbSt6LtZpnZlhC0l_9Bv
Beginners Yes, the dataset in None
https://www.elastic.co/training/free Beginners Yes None
https://www.youtube.com/watch?v=5fxVaVO8-L8&list=PLljFlTO9rB155aYBjHw2InKkSMLuhWpxH
None None Only available with
https://www.tutorialspoint.com/logstash/index.htm
None None None
https://www.youtube.com/c/Cover6Solutions/videos
None None None
https://itmasters.edu.au/free-short-course-information-security-incident-handling/
None None Yes
https://www.activecountermeasures.com/cyber-threat-hunting-training-course/
Beginners Yes None
https://training.dfirdiva.com/free-ir-training-plan
Beginners Yes Some courses have p
https://academy.attackiq.com/ Beginners Yes Badge
https://www.appliedincidentresponse.com/resources/
Beginners None None
https://www.youtube.com/watch?v=8jqNjo-LqYw
None Yes None
https://www.youtube.com/watch?v=0WgyiOxCFzE
None None None
https://www.f-secure.com/en/consulting/events/attack-detection-fundamentals-workshops
None Yes None
https://www.youtube.com/channel/UCwSo89W3KgPrid41vskBDYA
None None None
https://www.youtube.com/watch?v=eftOgRsHK4A
Beginners None None
https://www.youtube.com/watch?v=gXN4rRs77Ts
None None None
https://www.youtube.com/watch?v=20xYpxe8mBg
Beginners None None
https://www.youtube.com/playlist?list=PL8BogY0hWwvwWI_wE566IWLB0SttkxBxR
None Yes – There is a lin None
https://www.reversinglabs.com/products/open-source-yara-rules
None None None
https://www.youtube.com/watch?v=M5bkHUQy-JA
None None None
https://www.slideshare.net/ThreatIntel/powershell-the-increased-use-of-powershell-in-cyber-attacks
None None None
https://unit42.paloaltonetworks.com/unit42-pulling-back-the-curtains-on-encodedcommand-powershell-attacks/
None None None
https://www.youtube.com/watch?v=atL1WmmMJJw
None None None
https://www.youtube.com/c/ITSecurityLabs/videos
Beginners Yes – Can follow al None
https://www.youtube.com/watch?v=Hdh4mOozsg8
None None None
https://go.rangeforce.com/free-cyber-security-training-community-edition
Beginners Yes Badge
https://chrissanders.org/training/cuckoosegg/
Beginners None None
https://app.letsdefend.io/academy/ Beginners Yes – Some lessons None
ha
https://www.picussecurity.com/ Beginners None Yes
https://edu.limacharlie.io/ None None None
https://www.cybrary.it/info/mitre-attack-defender/
Yes – Courses star None Yes
https://www.youtube.com/channel/UCqVIVdF5lwb3uMhiS0XM4XQ
Beginners None None
https://www.varonis.com/blog/yara-rules/
Beginners None None
https://www.youtube.com/playlist?list=PLARteNMbJUb3UMIaT9pLn4jEttOZ7Q3_Y
Beginners None None
https://www.brighttalk.com/webcast/14421/387042
None None None
https://www.youtube.com/watch?v=61Qjx8Uti5s
Beginners None None
https://thedfirreport.com/ None None None
https://thedfirreport.com/2021/08/29/cobalt-strike-a-defenders-guide/
None None None
https://training.csilinux.com/ Beginners None None
https://training.csilinux.com/ Beginners None None
https://www.youtube.com/playlist?list=PLBNtagSCmDWyUcCsdq7m5ljKYDYTNG9R1
Beginners None None
https://archive.org/details/HalSELinux Beginners Yes None
https://www.aws.training/LearningLibrary
Yes – The training caNone None
https://aws.amazon.com/training/digital/aws-security-fundamentals/
Beginners None None
https://docs.microsoft.com/en-us/learn/browse/?products=azure
Yes – Courses are None Badges
https://docs.microsoft.com/en-us/learn/paths/manage-security-operations/
None None Badges
https://www.youtube.com/watch?v=vgmKUGuMi7c
None None None
https://htcia.org/free-courses/ None None None
https://csrc.nist.gov/publications/detail/nistir/8006/final
None None None
https://www.youtube.com/watch?v=MyXROAqO7YI
Beginners None None
https://www.slideshare.net/ShariqueRizvi/the-trouble-with-cloud-forensics
None None None
https://cloud.google.com/training Yes – Beginners canYes Badges
https://m365internals.com/2021/07/13/what-ive-learned-from-doing-a-year-of-cloud-forensics-in-azure-ad/
None None None
https://www.youtube.com/playlist?list=PLiFO-R_BI-kAqDPqtnOq2n70mtAZ6xg5N
None Yes None
https://malwareunicorn.org/#/workshops Yes – Reverse EnginYes None
https://www.begin.re/ Beginners Yes None
https://www.youtube.com/watch?v=OkjTqlETgMA
Beginners None None
https://www.youtube.com/playlist?list=PLPsJIruML_ZivGWUd6bPkwDe-KFOIYg7p
Beginners None None
https://fedvte.usalearning.gov/publiccourses/reverse/index.htm
Beginners Yes None
https://www.hackers-arise.com/reverse-engineering-malware
None Yes None
https://hackaday.io/course/172292-introduction-to-reverse-engineering-with-ghidra
None Yes – The live coursNone
https://ragingrock.com/AndroidAppRE/Beginners Yes None
https://maxkersten.nl/binary-analysis-course/
None Yes None
https://github.com/malrev/ABD None Yes None
https://taomm.org/ None None None
https://samsclass.info/126/126_F21.shtml
None Yes None
https://samsclass.info/141/141_F21.shtml
None None None
https://ccdcoe.org/library/publications/malware-reverse-engineering-handbook/
None None None
https://www.youtube.com/playlist?list=PLFvh_k-n27CnAyfsMDowQmogkG5MbZkXz
None None None
https://clark.center/details/goldenrichard/11053447-1b48-4d20-8a87-df52dfa95338
None Yes None
https://clark.center/details/thayajneh/7b274e20-4b98-4e4a-bc43-8ef646b3639c
None None None
https://www.youtube.com/playlist?list=PLBf0hzazHTGMSlOI2HZGc08ePwut6A2Io
Beginners None None
https://www.youtube.com/c/M9development/featured
None None None
https://p.ost2.fyi/ None None None
https://www.youtube.com/playlist?list=PLCS2zI95IiNwheFCTaUEytA1GT0mNOOdn
None None None
https://search.unprotect.it/map/ None None None
http://www.blackstormsecurity.com/docs/BHACK2020.pdf
None None None
https://www.openanalysis.net/ None None None
https://www.sans.org/webcasts/silly-framework-intro-analyzing-dotnet-malware-sansatmic-sydney-117015
None None Yes – Certificate of
https://www.youtube.com/c/ColinHardy None None None
https://github.com/hasherezade/malware_training_vol1
None Yes None
https://www.sans.org/webcasts/silly-framework-intro-analyzing-dotnet-malware-sansatmic-sydney-117015
None None Yes
None Beginner None None
https://blueteamlabs.online/ None None None
https://cyberdefenders.org/blueteam-ctf-challenges/?type=ctf
None None None
https://socvel.com/ None None None
https://letsdefend.io/ None None None
https://dfirmadness.com/the-stolen-szechuan-sauce/
None None None
https://champdfa-ccsc-sp20.ctfd.io/ None None None
https://info-sec-box.ctfd.io/ None None None
https://www.malware-traffic-analysis.net/training-exercises.html
None None None
http://flaws2.cloud/defender.htm None None None
https://globalwar.pwndefend.com/ None None None
https://www.hacktale.com/ None None None
https://community.immersivelabs.online/None None None
https://picoctf.org/index#picogym Yes (Ages 13+ can siNone None
https://ctflearn.com/ Beginners None None
https://github.com/stuxnet999/MemLabs Challenges range fr None None
https://www.youtube.com/watch?v=JuEv8UleO0U
None None None
https://www.ctf.live/ Has Beginner, Inter None None
https://tryhackme.com/ Has Easy, Medium an None None
https://courses.thecyberinst.org/courses/osint-challenge
None None None
https://www.osintdojo.com/ None None None
https://blog.bushidotoken.net/p/ctf.html
None None None
None None None None
https://www.geoguessr.com/ None None None
https://aboutdfir.com/education/challenges-ctfs/
None None None
https://f.hubspotusercontent00.net/hubfs/8645105/Corelight_May2021/Pdf/002_CORELIGHT_080420_ZEEK_LOGS_US_ONL
None None None
https://itmasters.edu.au/free-short-course-digital-forensics-updated/
Beginners None Certificate if you g
https://itmasters.edu.au/free-short-course-computer-network-fundamentals/
Beginners None Certificate of Compl
https://www.edx.org/course/introduction-to-networking
None None Costs Extra
https://www.youtube.com/playlist?list=PLG49S3nxzAnmpdmX7RoTOyuNJQAb-r-gd
None None None
https://teex.org/class/AWR138/ None None None
https://www.edx.org/course/network-security-2
None None Costs Extra
https://www.coursera.org/learn/network-transformation-101
None None Costs Extra
https://www.edx.org/course/network-security-protocols
None None Costs Extra
https://www.connecteddots.online/ Beginners Yes None
https://learn.saylor.org/course/view.php?id=84
Beginners None Yes - Certificate of
https://www.youtube.com/playlist?list=PLw78nfbi6DWiji62oG8ySfPFSLXZ4j_-3
Beginners None None
https://www.netacad.com/virtual/wr/networking-essentials
None None None
https://academy.apnic.net/en/online-courses/
Beginners None Yes - Certificate of
https://www.youtube.com/watch?v=wLXIWKUWpSs&list=PLmxT2pVYo5LB5EzTPZGfFN0c2GDiSXgQe
Beginners None None
https://canvas.instructure.com/enroll/LBPFDE
None Yes None
https://p.ost2.fyi/courses/course-v1:OpenSecurityTraining2+Arch1001_x86-64_Asm+2021_v1/about
None Yes None
https://www.learn-c.org/ Beginners Yes None
https://pythoninstitute.org/free-python-courses/
Beginners Yes None
https://hakin9.org/list-of-free-python-resources/
None None None
https://automatetheboringstuff.com/ Beginners Yes None
https://www.tutorialspoint.com/assembly_programming/index.htm
Beginners Yes None
https://www.udemy.com/course/regex-academy-an-introduction-to-text-parsing-sorcery/
Beginners None None
https://regexone.com/ None Yes None
https://docs.microsoft.com/en-us/powershell/
Beginners None None
https://www.youtube.com/playlist?list=PLTXMX1FE5Hj7QDc8R1GyaNucSI3aH-Sp5
None None None
https://www.tutorialspoint.com/vbscript/index.htm
Beginners None None
https://www.tutorialspoint.com/json/index.htm
None None None
https://www.sans.org/posters/json-and-jq-quick-start-guide/
None None None
https://www.sqlitetutorial.net/ None Yes None
https://www.sans.org/posters/sqlite-pocket-reference-guide/
None None None
https://www.sololearn.com/home Beginners Yes Yes – Certifiate of
https://www.udemy.com/course/git-started-with-github/
None None None
https://www.atlassian.com/git Beginners None None
https://docs.microsoft.com/en-us/learn/browse/?products=github
Beginners Yes Yes – Digital Badge
https://www.youtube.com/watch?v=GZvSYJDk-us
Beginners Yes None
https://www.freecodecamp.org/learn/information-security/
None Yes Yes
https://www.youtube.com/watch?v=iiADhChRriM
Beginners None None
https://azeria-labs.com/writing-arm-assembly-part-1/
None None None
https://www.youtube.com/playlist?list=PLz61osc7c3OqQ_xBZJbzZdIkVd8HnxLmC
Beginners None None
https://www.edx.org/course/introduction-to-linux
Beginners None Costs Extra
https://www.netacad.com/courses/os-it/ndg-linux-unhatched
Beginners Yes Yes – Certificate of
https://www.netacad.com/courses/os-it/ndg-linux-essentials
Beginners Yes Yes – Certificate of
https://www.udacity.com/course/linux-command-line-basics--ud595
Beginners None None
https://www.udacity.com/course/introduction-to-python--ud1110
Beginners Yes None
https://www.youtube.com/watch?v=YDyqO256blQ
Beginners Yes None
https://linuxjourney.com/ Beginners Yes None
https://www.youtube.com/playlist?list=PLG49S3nxzAnkL2ulFS3132mOVKuzzBxA8
None None None
https://alison.com/course/nist-cyber-security-framework-csf-foundation
Beginners None None
https://alison.com/course/identity-and-access-management
Beginners None None
https://alison.com/course/introduction-to-computer-network-security-revised
None None None
https://www.sans.org/security-resources/
None None None
https://www.sans.org/information-security-policy/
None None None
https://nps.edu/web/c3o/labtainers None Yes None
https://www.fortinet.com/training/cybersecurity-professionals
None None Yes
https://academy.hackthebox.com/catalogue
None Yes None
https://www.youtube.com/c/GeraldAuger/featured
Beginners None None
https://www.cyberwoxacademy.com/post/building-a-cybersecurity-homelab
Beginners None None
https://www.udemy.com/course/introduction-to-cloud-computing/
Beginners None None
https://www.youtube.com/c/JonGoodCyber/featured
Beginners None None
https://courses.thecyberinst.org/courses/osintmini
Beginners None None
https://www.hackers-arise.com/osint None None None
https://www.youtube.com/playlist?list=PL423I_gHbWUUOs09899rex4t2l5py9YIk
None None None
https://osintframework.com/ None None None
https://osint.link/ None None None
https://www.toddington.com/resources/free-osint-resources-open-source-intelligence-search-tools-research-tools-online-in
None None None
https://www.sans.org/blog/-must-have-free-resources-for-open-source-intelligence-osint-/
None None None
https://github.com/jivoi/awesome-osintNone None None
https://www.udemy.com/course/osint-free-demo/
Beginners None None
https://www.udemy.com/course/deep-web/Beginners Yes None
https://htcia.org/free-courses/ None None None
https://www.youtube.com/c/conINT_io/featured
None None None
https://www.youtube.com/watch?v=uxZyzJGfrUY
Beginners None None
https://courses.thecyberinst.org/courses/casefile
None None None
https://academy.osintcombine.com/p/australian-osint-symposium-2020
None None None
https://www.youtube.com/c/sansinstitute/search?query=osint
None None None
https://www.youtube.com/c/NullByteWHT/search?query=osint
None None None
https://www.secjuice.com/tag/osint/ None None None
https://metaosint.github.io/ None None None
https://www.youtube.com/watch?v=tHwy6bYgrlU
None None None
https://www.youtube.com/playlist?list=PLrFPX1Vfqk3ehZKSFeb9pVIHqxqrNW8Sy
None None None
https://www.youtube.com/watch?v=opLD4zFB5z0
Beginners None None
https://www.youtube.com/channel/UCynWOUeHAOflEQtJnrZpkNA/videos
None None None
https://checkout.ine.com/starter-pass Beginners Yes Yes
https://www.hackers-arise.com/ None None None
https://www.youtube.com/channel/UChjC1q6Ami7W0E71TzPZELA
None None None
https://www.itmasters.edu.au/free-short-course-pen-testing/
None Yes Yes – Certificate of
https://kali.training/ None None None
https://portswigger.net/web-security None Yes None
https://www.youtube.com/c/HackerSploit/featured
Yes – There is a Pe None None
https://www.hackthebox.eu/individuals None Yes None
https://exploitation.ashemery.com/ None Yes None
https://fedvte.usalearning.gov/publiccourses/cscrm/index.htm
None None None
https://fedvte.usalearning.gov/publiccourses/cloud2/cloudframe.php
None None None
https://fedvte.usalearning.gov/publiccourses/IMR_105/index01.htm
None None None
https://www.cyberstartamerica.org/ None None None
https://go.cyberstart.com/ None None None
https://picoctf.org/ None None None
https://csunplugged.org/en/ None None None
https://www.csfieldguide.org.nz/ None None None
https://studio.code.org/courses None None None
https://www.youtube.com/playlist?list=PLnb0FwCbM-50UuNjpeIrdEnlSbbMK891Q
None None None
https://www.techgirlz.org/ None None None
https://aboutdfir.com/resources/tool-testing/
None None None
https://www.netresec.com/?page=PcapFiles
None None None
https://joshmoulin.com/digital-forensics-incident-response-forms-policies-and-procedures/
None None None
https://bluedemy.cyberdefenders.org/Beginners Some of the coursesNone
https://www.withyouwithme.com/ None None None
https://fedvte.usalearning.gov/ None None None
https://live.paloaltonetworks.com/t5/second-watch/ct-p/Second_Watch
None None None
https://workplus.splunk.com/veteransNone None None
https://www.fortinet.com/tw/training/veterans-program
None None None
https://www.mosse-institute.com/veterans-in-cyber.html
None None None
https://www.sans.org/about/academies/vetsuccess/
None None None
https://skillbridge.osd.mil/ None None None
https://ivmf.syracuse.edu/programs/career-training/
None None None
https://events.dfirdiva.com/dfir-related-events
None None None
https://store.certnexus.com/index.php/certification/cybersecurity/category-cybersec-first-responder/audience-student/deliv
None None None
https://www.filesignatures.net/index.php?page=all
None None None
https://unit42.paloaltonetworks.com/wireshark-workshop-videos/
None None None
https://medium.com/@KillSwitchX7/cyber-security-discord-servers-7d9c0b7cd7cb
None None None
https://aboutdfir.com/a-beginners-guide-to-the-digital-forensics-discord-server/
None None None
https://github.com/AndrewRathbun/DFIRMindMaps
None None None
https://www.dfir.training/ None None None
https://learn.saylor.org/course/view.php?id=94
None None After Scoring 70% o
https://learn.saylor.org/course/view.php?id=453
None None Yes – After Scoring
https://itmasters.edu.au/free-short-course-detecting-and-defending-against-cyber-threats/
None None Yes with a passing
https://www.coursera.org/learn/information-systems-audit
None None None
https://www.coursera.org/learn/northeastern-data-privacy
Yes None None
https://www.coursera.org/learn/introduction-to-aws-identity-and-access-management
None None None
https://www.youtube.com/watch?v=W1pb9DFCXLw&list=PLpPXZRVU-dX33VNUeqWrMmBNf5FeKVmi-
None None None
https://www.proofpoint.com/sites/default/files/proofpoint-obfuscation-techniques-phishing-attacks-threat-insight-en-v1.pd
None None None
https://www.threathunting.net/ None None None
https://exercism.org/ None None None
https://www.sans.org/posters/?focus-area=digital-forensics
None None None
https://csilinux.com/ None None None
https://github.com/mattnotmax/cyberchef-recipes
None None None
https://htmlcheatsheet.com/js/ None None None
https://www.pythoncheatsheet.org/ None None None
https://ss64.com/ps/ None None None
https://ss64.com/vb/ None None None
https://ss64.com/bash/ None None None
https://ss64.com/ascii.html None None None
None None None None
https://www.varonis.com/blog/incident-response-plan/
None None None
https://www.varonis.com/blog/how-to-use-x64dbg-malware-analysis/
None None None
https://www.tutorialspoint.com/python_digital_forensics/index.htm
None None None
https://htcia.org/free-courses/ None None None
https://cybersocialhub.com/ None None None
https://github.com/frankwxu/digital-forensics-lab
None None None
https://malapi.io/ None None None
https://filesec.io/ None None None
https://securityplus.training/ None None None
https://bots.splunk.com/ None None None
https://www.youtube.com/watch?v=xW5UwDztkX4
None None None
https://osintacademy.com/ None None None
https://www.youtube.com/playlist?list=PLSbhiuoC0XgX70ZtgJ7d-1rLui0jZRabg
Beginner None None
https://0xinfection.github.io/reversing/Beginner None None
https://academy.cyber5w.com/collections/mobile-forensics
Yes, there are fund Yes Yes – Certificate of
https://bluecapesecurity.com/ None None None
https://securzy.io/ None None None
https://leanpub.com/TheHitchhikersGuidetoDFIRExperiencesFromBeginnersandExperts
None None None
Community Topics
Building a Home Lab, Linux, Bash, Hardware, Programming, Python,
Virtualization, Ubuntu, Hex, Linux Filesystem, Linux Permissions, Linux User
https://www.hoppersroppers.org/community.html
Management,
Risk, Linux Processes,
Security Principles, Threats,Bash Scripting
Attacks, Cyber KillChain, Malware Types,
File Forensics, File Formats, File Carving, Metadata, Steganography, Network
https://www.hoppersroppers.org/community.html
Password Security, Network Safety, OpSec
Forensics, Wireshark, tShark, Networking RFCs, Crpyto Math, Ciphers, XOR,
Windows Forensics, Linux Forensics, Evidence Acquisition, Working with Virtual
https://www.hoppersroppers.org/community.html
RSA
A+
HardCertification,
Disks, LinuxComputer
Forensics Hardware, Mobile
Distros, Writing Devices,Reports,
Forensics Networking, BIOS,
FTK Imager,
None Windows,
Data Linux,
Representation,
Security macOS,
Concepts andWorking Attacks,
Problems, Malware,
With Scripting
Files, TsurugiNetworking,
Cryptography, Linux, File Systems
Systemsand Data
None Carving, Investigating
Administration, Windows
Malware, Recycle
Forensics, Bin, Program
Detection, Executions, TimeZone
Prevention
Cybersecurity
Conversions, LNK landscape, reverseThumb
and Jumplists, engineering,
Caches,network
Registryattacks, malware,
Artifacts, Shellbags,
None vulnerability management, pentesting
USB Forensics, Volume Shadow Copies, Schedules Tasks, Event Logs, Timeline
None Analysis, EncryptedPhishing,
Threat Landscape, Files Malware, Authentication, Networking,
None Cryptography, Laws, Risk
Cybersecurity Overview, CIA Triad, Breaches, Attacks, Threats, Cyberwarfare,
None Firewalls, Detection, Cyber Kill Chain

CIA Triad (in depth), Countermeasures, Cybersecurity Domains, ISO, Threats,


Vulnerabilities, Attacks, Malware, Cryptography, Access Controls, Stenography,
None Obfuscation, Incident Response, Hardening, Disaster Recovery, Cyber Laws
None Windows, Linux, Networking, Bash Scripting, PowerShell, Python
None Cyber Weapons, Cyber Attacks,
Cyber Cyber
Threats, Attacks, Secure Design, PhysicalTerrorism,
Security,Military
Disaster Cyber Preparedness
Recovery, Business
Shimcache,
IBM Products Plaso, WSL 2,
(QRadar, Resilient Triage, Log2Timeline,
SOAR, Guardium, Windows
Verify Saas, Terminal,
etc),
None Continuity,
EventFinder2,
Cryptography,Network
Redline,Security,
Encryption,macOS System
Forensics,
Cloud, MobileSecurity,
iLEAPP,Defense
Security, iOS in Depth
Forensics,
Zero Trust, WMI,
Access
Lab Setup, Governance,
MFTECmd, SRUM, Risk, Compliance,
Timestamps, NTFS, LNK Threat Hunting
File, Jump Lists,using
Plaso,YARA,
Shellbags,
None Management,
Microsoft
Cybersecurity, and
Windows
Cloudmore.
Fundamentals,
Security, Security
Security Tools,
Operations Technical
Center Concepts,
(SOC), Network
Recycle Bin Forensics, RDP Cache, Event Logs, CyberChef, Image Creation,
None Discovering
Security, Attack
Cortex
KAPE, Volume XDR,
ShadowCampaigns,
Firewalls,
Copies, Enterprise
Prisma
EvtxECmd, Security Concepts,
Arsenal Image Vulnerabilities,
Mounter,
CCNA, Linux,
Programming, VMware
Malware ESXi, NMAP,
Development, SQL,Digital
Raspberry Pi, Apache
Investigations, HTTPKansa,
YARA Server,SIFT,
None Memory Player,
VMware Analysis, Redline,
Splunk, Volatility,Python
VirtualBox, Persistence, Prefetch, Baselines, Windows
Fundamentals,
Digital
Processes, EmailWindows
Forensics, SleuthKit,
Header Hardening,
Analysis, RDPNetwork
hfind, Tsurugi Defense,
Linux,
Hashes, SDELETE,
Shimcache,ELK,
FTKOSINT,
Imager,
WMI, Internet
YARA, File
None Searching
Mounting, Forensic Acquisition in Linux, DD, Volatility,
Malicious Word Document, Malicious PDF Document, Maldoc, ProcDOT, LiME, Research,
None Scientific Method, Android
Payload Distribution FormatAcquisition, Cybercrime, Windows, Linux,
Investigation Methods, Documentation and Reporting, Scientific Method, Data
None Evidentiary Reporting,Photorec,
Storage, Acquisition, Computer Technologies,
tsk_recover, TheDigital
SleuthEvidence Collection
Kit, Autopsy, hfind,
None Malware,
Digital Memory
Forensics Acquisition
Process, and
History, Analysis,
Types of Volatility,
Digital Mobile
Forensics Device
Anti-Forensics,
Acquisition, Unix/Linux,
Network Linux
Analysis, Forensics,
Amazon AWS Windows Memory
EC2 Forensic MemoryForensics,
Acquisition,
None Creating
Windows aFile
Forensically
System, Sound Image,
Forensics Tools, Live Memory
Artifacts, Acquisition
Acquisition, and Analysis,
Analysis
AD1, GitHub, Bento Portable Toolkit, Python Programming, Go Programming,
Recovering Deleted Files, Registry Analysis, Pre-Fetch Files, Browser Forensics,
None Maltego, Cryptocurrency
Sysinternals, Extracting EXIF Investigations
information, Android Mobile Forensics, Network
None Forensics
None How to Use
Evidence, KAPE, Examining
Hashing, KAPEImage
Acquiring Disk Output,withKAPE
FTK,Related
Windows Videos and Disk
& Linux Blog Posts
None Examination & Analysis,
Registry Explorer Creating Line,
GUI, Command a DiskHow
Image withrla.exe,
to use Linux Examining RECmd
None Output,
Why Registry
UseMobile
Timeline Related CTFs, Videos
Explorer,Thunderbird and Blog
Updating EZArtifacts, Posts
Tools, Timeline Explorer Related Blog
Android Forensics, Deepfakes, Android Malware
None Posts/Videos
Anaylsis, Reverse Engineering, Shodan in the CLI, Drive Geometry,
None Photographic
Message Headers,Evidence,
DKIM,PowerShell
ARC, MIME, in Server
ForensicsMetadata, Forensic Preservation
None Strategies, Email Analysis
None IoT Forensics, Digital
Post-mortem Fitbit, Echo, Smartwatch
Forensics, File System Forensics and Data Recovery,
None Windows Memory and File Forensics
Network Forensics, OSI Model, Encoding Schemes, File Signatures, Tools,
None Wireshark, Hex, ASCII, PCAP Analysis, Hashing, Covert Channels
Analyzing Malicious Office and PDF Files, JavaScript (JS), Visual Basic for
None Applications (VBA), Debugging, Maldocs
E3 Platform, Windows 10 Artifacts, Chip Dump Extraction, Google Takeout
None None
Evidence, Importing Cellebrite Data, Processing WhatsApp Data, Data Triage,
None Email Deduplication, Office365 Acquisition, FitBit Data, Android Root Engine
None bile Forensics
Memory Forensics,Linux
Tools, Volatility, Rootkits,
Linux Commands, Boot Sequence, LinuxIOCs, DiskBasics,
Network Acquisition, File a
Configuring
None System, Disk Mounting, Artifacts, Disk Triage, Timeline Analysis,
Forensic Workstation, Evidence Acquisition, Write Blocking, Tools, Mounting Logs, Syslog
None Images,
Building Sleuth
artifactKit, Network
handling andInvestigation Tool
analysis environment, processing and storing
None artifacts,
Linux artifact
Forensics analysis, incident response, webserver analysis,
XRY Reader to XAMN
countermeasures, Viewer
artefact Transition,
analysis XRY Reader
framework, IOCs,to XAMN Express
electronic evidence,
None Transition.
digital forensics, mobile threats, mobile forensics, network forensics,
None honeypots,
Risks in mobile vulnerability
platforms,handling.
mobile artifact analysis, Android forensics, mobile
None macOS
forensics Forensics, iOS and Android Mobile Forensics, Cyber Investigations,
Cellular Records Analysis, Digital Footprints, Dark Web & OSINT, Seizure,
None MFT Explorer, MFTECmd
Windows
MOBILEditAcquisition, Windows
Forensic Express Forensics,
Installation, Advertising
Settings, Identifiers,
Updates, Virtual
Connecting a
None Currency, Automated Forensic Tools, SQLite
Phone, Importing Data, Connecting to iCloud, Creating Reports, Analyzing
None Images, Hacking Phones
https://www.hoppersroppers.org/community.html
File Forensics, Host and Memory Forensics, Network Forensics
None YouTube
A+, – Peter
Security+, Staarfaenger
Cisco CCNATriage
Cyber & Ops,
Digital FirstSystem
Linux Response Website
Administration,
Endpoint Visibility, Cyber Basics, Malware, Prioritization, OS Computer
Yes Forensics,
Configuration Changes, User Activity, Categorizing Artifacts, Analyzing ACE
Computer Hacking Forensic Investigator (CHFI), AccessData Artifact
None Categories
Incident
IncidentManagement,
Incident Response,Scope,
Response, Preparation,
Security Live Data Detection,
Operations, Analysis,
ELK Stack,
Collection, Containment,
SIEM,Duplication,
Forensic Azure Sentinel,
Analysis
None Eradication,
Wazuh,
Methodology, Recovery
ThreatInvestigating
Intelligence, Windows
The Hive Project,
Systems,OSQuery, Kolide,
Investigating MacMITRE
OS XATT&CK,
None OSINT,
Systems, Shodan, SpiderFoot,
Investigating WireShark,
Applications, YARA,
Report Digital Forensics, Radare2, IDA
Writing.
Pro, Ghidra, Memory Analysis, Red Teaming Attack Simulation With Atomic
None Mapping
Red Team,toHow MITRE ATT&CK,
to Build StoringLearning
a Machine and Analyzing ATT&CK-mapped
Intrusion Detection System,data Azure
None Sentinel, Azure Security Center
Logging, Metrics, Observability, APM, SIEM, Kibana, Anomaly Detection, Elastic
None Splunk
Cloud
Linux, Enterprise,
Kibana forLab,Splunk Users, Elastic Security
Virtualization, Home Hardware, Python, Regex,Fundamentals,
JSON, C, Assembly,
None Elastic Endgame
Powershell, Fundamentals
Installation, Networking,
Analyst Tools,Network+
Alert Triage & CaseRisk,
Training, Creation, AdPrinciples,
Security Hoc Hunting,
Cyber
None Detection
Killchain, Engineering
Malware, How Attacks Work, Malware Defense, Passwords,
Logstash, ELK Stack, Installation, Architecture, Collecting Logs, Grok, Plugins, Network
None Safety,
APIs, OpSec, Security+ Training, SIEM, Splunk, QRadar, DNS, HTTP, TLS,
ThreatSecurity
DHCP, Hunting,
Email
and Monitoring
Security
Protocols, Onion,
FTP, Incident
Network Logs, Handling, PDF Malware
Email Analysis, Analysis,
Wireshark, PCAP
None Home
Analysis,Lab Setup,
Windows SOC Analyst
Artifacts, Fundamentals
Evident Acquisition, NTFS, Windows
Incident Handling, Hacking Techniques and Countermeasures, Writing Incident Forensics,
None Corporate
Reports, FornesicsControls,
Protective Tools (EnCase,SecurityAxiom, Paraben, Autopsy), Eric Zimmerman
Architecture
Logging, Threat
Tools, Memory Intel, C2,Volatility,
Analysis, Zeek, Firewalls,
Memory Event ID TypePDF
Forensics, 3, Passer, Beacons,
Analysis, AI
Office File
None Hunter,
Analysis, Threat Hunting
MalwareThreatAnalysis, IOCs, YARA, Threat Hunting, OSINT, Working
MITRE ATT&CK, Intelligence, Detection, FIN6, Breach & Attack
None Tickets,
Simulation,VirusTotal
SOC, MSSP, Threat Report ATT&CK Mapper (TRAM), Threat
None Modeling, OCTAVE, EASY
Lateral Movement, EventFramework
Log, Memory forAnalysis
Threat Intelligence
with Volatility, Python,
None Default Windows Processes, WMIC, PowerShell, Lateral Movement, and BYOD
Threat Hunting, Open Source Tools, Incident Response, Event Log Analysis,
None Wireshark,
Ransomware, Incident
KANSA, Response,
Moloch, ThreatThreat Hunting
Intelligence, Windows Command-Line
None Obfuscation,
Suricata, Validating
Kibana, Moloch, Evidence
Scirius, for
PCAP Courtroom Testimony,
Analysis,Discovery
SELKS, Threat Reporting
Huntingfor
Initial
DigitalAccess, Code
Forensics, Execution
Analysis of the and Persistence,
Facebook and Lateral
Portal Mini, Forensic Analysis of
None Movement, C2 and Exfiltration
Xiaomi IoT Ecosystem, EZ Tools, KAPE, Stringlifier, Google Workspace Incident
None Response, IR Playbooks, Scoring and Judging Artifacts in Autopsy
None What digital forensics is, what digital evidence is and where to find it
None Mobile Forensics, Android, iOS, communication protocols
None Free Malware
Wireshark, HexAnalysis Tools, PeStudio,File
Editor, Network-Based Threat Intelligence,
Carving, NetworkThreat Hunting
Forensics, PCAP
None Analysis
None None
How attackers use PowerShell. How to defend against PowerShell attacks.
None Obfuscation, Obfuscated PowerShell.
How attackers use PowerShell. How to defend against PowerShell attacks.
None Obfuscation, Obfuscated
This is a detailed blog postPowerShell.
about EncodedCommand PowerShell Attacks with
None examples.
What Obfuscation, Obfuscated PowerShell.
There Fileless
Splunk, Windows
are Malware
several is, How
–tutorials
Process itabout
Works,
Injection
here IR,howExamples
Linux ofaaSIEM
to Execution
set up Dropper,
Context, Examples of
Regulardata.
and analyze
None Fileless Malware,
Expressions
Topics include:(Regex),Fileless
Security Cloud Ransomware
Security
Onion, ELK, –Graylog,
Shared Snort,
Responsibility,
pfSense, Docker,
Grafana, Zeek,
None Kubernetes, Metasploit
honeypots, VMware Basics,
ESXi, Docker Zerologon, Injection Attacks, Vim, OSI
Networking
Locard’s Model,Principle,
Exchange Command Injection
Forensic (PHP), Web
Analysis, Hosting Network
Timestamps, Basics (Apache),
Security
None Splunk,
Ansible, Zeek
YARA, NMAP, Firewall Overview, PCAP Forensics, Wireshark, Password
Monitoring, Least Privilege, Attack Surface, Process Monitoring, Phishing,
None Cracking
Evidence Abstraction, Defensible
SIEM, Incident Response, MalwareNetwork
Analysis,Architecture, OSINT,Intelligence,
Detection, Threat Diamond
None Model,
Event PICERL,
Log Honeypots,
Analysis, Evidence Handling
Threat
Secure Hunting, LogPhishing
Access Service Management Campaign Analysis,
Edge (SASE),Practices,
IngestingSIEM
Cyber Threat
Alert(Windows
Artifacts
Intelligence, SOC
Rule Development,
Event Logs,
https://discord.com/invite/NxU3uwHZtd
Fundamentals
Operationalizing MITRE&ATT&CK
PCAPS, pfSense, Syslog More), forZeekSOCs, Endpoint
Network Detection
Monitoring, and Response
Monitor Windows
None (EDR).
Event Logs in Real-Time, Using the CLI & SDK, Setting up an MSSP, Detection &
None Incident
Response Response, Threat Hunting, Automation, SIEM, Threat Intelligence, Log
ATT&CK
Analysis,Fundamentals,
OSQuery, Binalyze, ATT&CK SOC Assessments,
Autopsy, PDF Analysis,ATT&CK CyberAnalysis,
Email Header Threat
None Intelligence, ATT&CK Defender
Regex, AWS, Cloud, QRadar, MITRE ATT&CK, Phishing, Windows Forensics,
None Memory
How YARA Forensics, Volatility,
Rules Function, UseMalicious
Cases, YARA Scripts, YARA How to Write YARA
Elements,
None How to Forensically Examine Phishing Emails, Forensic Tools and Techniques,
Rules
How to Investigate Smishing, Vishing, and Social Media Phishes, How to Enable
None Utilizing
Your Users Splunk in aSuspicious
to Spot SOC Environment
Emails, How to Spot Phishing Attempts, Email
None Analysis
BazarLoader, Cobalt Strike, Trickbot, Conti Ransomware, Hancitor, IcedID,
None Incident
Lateral Response Process,
Movement, WebLogic, NIST, MITRE Sodinokibi,
Beacons, ATT&CK, Real-World Scenarios
REvil,Capabilities,
Laravel,
Cobalt Strike
Downloading Tactics,
&Ryuk, Techniques
Installing CSI Linux, and Procedures (TTPs),
Updating the System, Routing Your Traffic
None Cryptominers,
Infrastructure, NetWalker,
C2 Profiles, Dridex
Execution, Evasion, Command and Control, Lateral
Through Tor, Using the Case Management System, Case Management Report
None Movement, Scripts, Cobalt Strike Defense, Sigma
Template, Anonynimity, Communications Tools, Website Collection Rules, YARA Rules for OSINT /
None SOCMINT / Dark Web Investitations, 3rd party Apps
None Bash Scripting, TCP/UDP Connections, Linux Command Line
https://discord.com/invite/tE99TvEKCU
Wireshark, PCAP Analysis, Introduction, Filtering, Statistics
None SELinux, Linux
Cloud Security, AWS Global Infrastructure, DDoS Mitigation, Detective
None Over 240 Incident
Controls, AWS Cloud Topics Data Protection, Data Center Security, Security of
Response,
None Creating
the Cloud, Identity & AccessIdentifying
Security Baselines, Management Security Threats with Azure Security
Center, Azure Monitor Logs, Improving Incident Response with Alerting on
None There
Azure,are over 850
Capturing Web Azure Cloud Topics
Application Logs, Protecting Servers and VMS from
None Attacks with Azure Security Center
None Cloud Storage Forensics
None Cloud Forensics,
Challenges facedMagnet
by experts Axiom
when responding to incidents occurring in a cloud-
None computing ecosystem.
Cloud
Over Forensics,
500 Google Chain
Cloud of Custody,
Topics. Storage
Learning Capacity,
Paths: CloudIdentification,
Infrastructure,
None Container
Preservation Forensics,
and Kubernetes
Collection, Image Acquisition, Live Acquisition, Deleted
Application Development, Kubernetes, Data Engineering & Analytics, API Data,
None Validation
Management, Networking & Security, Machine Learning and AI, Cloud Business
None Leadership, Google Workspace
Building a Malware Lab, Malicious Word Documents, Static Analysis,
None Cloud Forensics
Behavioural in Azure
Analysis, Active
Cuckoo Directory,
Sandbox, Challenges,
Persistance Methodology
Reverse Engineering, Environment Setup, WindowsTechniques,
PE C Program,x32dbg,
X86
None Emotet, Stack Memory, Hashed API Functions, x64dbg,
Assembly Language, Attack Flow, Tools, Triage Analysis, Static Analysis, Ghidra
None Dynamic Analysis, Encryption, Evasion Techniques, Packing, PE Injection
None Reverse Engineering, x86 Assembly, IDA, OllyDbg, Call Stack
None Cloud Foreniscs, Google Cloud, Logging
https://discord.com/invite/MalwareTech
None
None Uses for Reverse
Assembler Basics,Engineering, ProcessInternals,
IDA Pro, Windows of Reverse Engineering,
OllyDbg, Methodology
System-Level Analysis,
None Ghidra
None Ghidra, Reverse Engineering, x86_64 Architecture, Assembly Language
Android Application Fundamentals, DEX Bytecode, Native Libraries,
None Obfuscation
None CPU Architecture (x86 and x64_86), Registers, Endianness, Flags, Assembly
None Obfuscation
macOS, Malware,Techniques, Deobfuscation
Static Analysis, Dynamic Techniques
Analysis, Infection Vectors,
None Bitcoin
Lab &
Persistance,Cryptography,
Anti-Analysis
Environment, Static Encryption,
Techniques
Analysis, Randomness,
Dissasembly, Cryptographic
Dynamic Analysis, Security,
Sandboxing,
Malware
Block Analysis,
Ciphers, Static
Stream Analysis,
Ciphers, HashDynamic Analysis,
Functions, Keyed X86 Disassembly,
Hashing, OllyDbg,
Authenticated
None Debuggers,
IDA Pro, VirusTotal,
WinDbg, MalwareString Analysis,
Behavior PEiD Tool, CFF Explorer, Resource
Encryption, RSA, Diffie-Hellman,
Hacker, PeStudio, IDA free, Ghidra,Elliptic Curves,
Process TLS, Quantum
Monitor, and Post-
Process Explorer,
None Quantum
Regshot, INetSim, Cuckoo
VirtualBox, Malware, StaticSandbox,
Analysis,Windows Sandbox,Dynamic
x86 Disassembly, NetworkAnalysis,
Traffic Run-
None Analysis
Time Analysis, YARA, PDF and Office Document Analysis, Java & SWF Malware
None IoT Forensic
Analysis, Challenges,
Android Malware Shodan, Firmware
Analysis, File-lessModification, IoT Architecture,
MalwareIntrospection
Analysis
VM Introspection,
Digital Certificates,Memory Forensics,
Public Key Virtualization,
Infrastructure, Cracking Passwords, WiFi,Capabilities,
None Volatility
Bluetooth,
How to Set Zigbee, botnets,
up a Sandbox data transport
Environment, protocols,
Static Analysis,forensic acquisition
File Type Identification,
None methods
Generating and tools
Malware Hashes, Extracting Strings, Packers & Unpacking, PE
Reverse Engineering, Malware Analysis, Ghidra, Cuckoo Sandbox, Maldocs,
None Headers, Creating YARA Rules, Stuxnet Analysis with Ghidra
Unpacking, Debugging, Oledump, Reversing C++ Objects, Using Ghidra to
None Statically XOR Obfuscated Shellcode, x64dbg, AutoIt
View Options, Unicode Files, Edit, Line Width, Group, Division Lines, View
None None
Areas, Highlighting, Ruler, Status Bar, File Offsets,Anti-Monitoring,
Relative Offsets, Antivirus
Search,
Anti-Debugging, Anti-Disassembly, Anti-Forensic,
None Format,
Evasion, Tools Menu, Templates,
Data Obfuscation, DevenseInspector
Evasion, Network Evasion, Packers,
None IDA Pro,Manipulating,
Process Botnet Reverse Engineering,
Sandbox Reverse
Evasion, Engineering C++, WinDbg, YARA,
and more.
Unpacking Process Injection Malware. They also have Open Analysis Live
None Reversing, Anti-Reversing,
tutorials where De-Obfuscation,
they demonstrate malware Obfusctation
analysis techniques (includes the
Tools, Tactics, and Techniques for Analyzing Malware, Obfuscation,
https://discord.com/invite/UWdMC3W2qn
samples).
Deobfuscation, Emotet, WannaCry, SUNBURST, Maldocs, Building a Malware
None .NET Malware,Ransomware,
Lab, Phishing, Malware Analysis
HTML Deobfuscation, Excel Macros Analysis,
None JavaScript Deobfuscation.
None Techniques Used by Malware, Reverse Engineering
None NET Malware,
Malware Malware
Analysis Analysis Creating an Analysis Lab, Hashing Algorithms,
Fundamentals,
None Strings, Process Monitoring
https://discord.com/invite/gEUeKm8
None
None None
None None
https://discord.com/invite/NxU3uwHZtd
None
None None
None None
None None
None None
None This is a hands-on walkthrough of an AWS Cloud Incident Response scenario
https://discord.com/invite/zkKK4Zr
None
None None
None None
https://discord.com/invite/WQGdYaB
None
https://discord.com/invite/yNHUQfJ
None
None Memory Forensics
None None
None None
https://discord.com/invite/tryhackme
None
None None
None None
None None
None None
None None
None None
None None
Digital Forensics,OSIData Acquisition, Windows, Virtual Machines, Networks,
Ports,
OSI Protocols,
Layers, Network Layers,
Protocols,Network
Peer toTopologies, WAN,
Peer Networks, Device Hardening,
Routing Algorithms and
None Social Media,
Authentication, Tools
Access Controls, Wireless,
Protocols, VLANs, Ethernet, RIP OSPF, BGP,Best Practices, Business
Cryptography, Continuity,
Confidentiality,
None Disaster Recovery
Identification, Message Integrity, Firewalls, IntrusionIPv4,
Detection Systems,
OSI Model, Ethernet, Ports, IP, Routing & Switching, IPv6, IGP, EGP, TCP,
NAT,
None UDP,
Access HTTP, SMTP,
Controls, FTP
Subnetting, Binary, Topologies, Wireless, Cellular, DHCP, NTP,
Firewalls, Intrusion Detection/Prevention, cryptographic ciphers, AAA
None DNS, WAN, Remote Access, Attacks, Segmentation, Protocols
(Authentication, Authorization, Accounting), server and client security, secure
None policy
Packetgeneration
Sniffing, Password Cracking, Port Scanning, Exploits, Access Control
None Lists, Snort, DHCP,Networking,
Software-Defined DNS, Attacks,Internet
Mitigation
of Things (IoT), Network Architecture,
None Virtualization
None Cryptography, TLS, SSL,
Switching, Routing, IPSec, Layer
IP Addressing 2 Security, Wireless
& Subnetting, Security
Static Routes, VLANS & Trunks,
None IP Services. Some courses are still under development
Networking Protocols, Networking Layers, Security, Multimedia, Cloud, TCP/IP
None Stack
Network+, Packet Tracer, SSH, DNS, Telnet, NTP, DHCP, TCP, UDP, ICMP, Static
None Routs,
Plan andRIP, EIGRP,
install VLANs,
a home orMAC
smallAddresses, ARP, Subnetting,
business network, VLSM
Cisco Packet Tracer,
None Troubleshooting Connectivity, Recognize and mitigate
IPv6 Address Planning, IPv6 Fundamentals, Routing Basics, Routing security threats
None Fundamentals
None x86 Assembly Language
None Assembly Language,
x86-64 Assembly, ReverseInstructions,
Assembly EngineeringComputer Registers, The Stack,
None Calling Functions, windbg, Windows Binary Debugging,
None C Programming
None Python: Part 1 – Beginner, Part 2 – Intermediate
None Several Python resources including videos, books, tutorials, and challenges
None Python
None NASM Assembly
None egular Expressions (Regex), Syntax, Search Patterns
None Regular Expressions (Regex)
https://discord.com/invite/vFrjnxP
PowerShell Scripts, Tutorials, PowerShell 101 ebook, PowerShell communities
None Linux BashVBS
Microsoft Shell Scripting
(Visual Basic Script) syntax, Variables, Operators, Loops, Events,
None Cookies, Strings, Arrays, Regex
None JSON Syntax, Objects, Schemas, Examples, Data Types
None JSON, jq, Nested Objects, Array Elements, JSON Structure, Filtering
None SQLite
SQLite
Python,Database,
C++, Java,Query Structure,
JavaScript, C#, C,Operators, DataLearning,
SQL, Machine Types, Table
DataJoins,
Science with
None Timestamp Conversion, CLI Options
Python, HTML, PHP, CSS, JQuery, Ruby, React + Redux, Angular + NestJS, Swift,
https://www.sololearn.com/discuss
R, Kotlin, Go
None Installation, Workflow, Configuration, Git Clone, Push, Command Line
None Git, BitbuckettoCloud,
Introduction GitHub,GitIntroduction
SSH, Versionto Control, Setting
Git, Best up a Repository
Practices, Pull Requests,
None Commits, Workflows, GitHub Script, Branching and Merging
None Application Programming Interface (API)
Bots and Botnets, Logic Bombs, Password Attacks, Physical Attacks, Adversarial
Artificial Intelligence, Supply Chain Attacks, Cloud-Based vs On-Premises
Attacks, Cryptographic Attacks, Privilege Escalation, Cross-Site Scripting,
Injection Attacks, Buffer Overflows, Replay Attacks, Request Forgeries, Driver
Manipulation, SSL Stripping, Race Conditions, Application Attacks, Rogue
Access Points and Evil Twins, Bluejacking, Bluesnarfing, Wireless Disassociation
Attacks, Wireless
Build a secure web Jamming,
app withRFID and NFC
HelmetJS, Attacks,
Build a TCPRandomizing
Client & NMAP Cryptography,
Port Scanner
On-Path
https://forum.freecodecamp.org/Attacks, MAC Flooding
in Python, Create Other Infosec Projects and Cloning, DNS Attacks, Denial of Service,
Malicious
Writing ARM Scripts, ThreatARM
Assembly, Actors,Data Attack
TypesVectors, Threat Intelligence,
and Registers, ARM Instruction ThreatSet,
None JSON
Memory – What
Research, it’s used Loading
Vulnerability
Instructions: for, syntax,
Types, examples
Third-Party
and Storing Risks, Threatand
Data, Load Hunting, Vulernability
Store Multiple,
None Scans, SIEM, Penetration
Conditional andTesting, Reconnaissance, Security Teams,
DFIR PythonExecution
Configuration Study Group
Management,
Branching,
using the book
Protecting
Stack and First
“Head
Data,
Functions
Data Loss Python: A Brain-Friendly
Prevention, Managing
https://aboutdfir.com/a-beginners-guide-to-the-digital-forensics-discord-server/
Guide,
Security,2nd
CommandSite edition”
LineResiliency,
Operations, Honeypots, Cloud Models,
Linux Distributions, EdgeConfigurations,
System and Fog Computing, Linux
None Open
GUI, Source
Designing
Common theSoftware
Cloud,
Linux and Licensing,
Infrastructure
Applications asCommand Line, LinuxSecurity,
Code, Virtualization Filesystem,SecureFiles
Linux InstallationArchiving
and Directories, and Configuration, Linux Command Line Interface (CLI), Linux
Deployments, Provisioningand andCompression,
Deprovisioning, Basic Scripting,
Secure CodingComputer
Techniques,
None Virtual
Hardware,
Software Machine
Data Storage,
Diversity, Systemand
Automation & User Security,
Scripting, Users & Groups,
Authentication Ownership
Methods,
None & Permissions
Biometrics, Multi-Factor Authentication (MFA), Disk Redundancy, Network
None Redundancy,
Shell Commands, Power Redundancy,
Linux Filesystem, Replication
Linux Terminal, Backup Types, Embedded
Data Types
Systems, and Operators,
Physical Control Flow,
Security Controls, Secure Conditional Expressions,
Data Destriction, Functions,
Cryptography,
None Scripting
Hashing and Digital Signatures, Stenography, Quantum Computing, Stream and
Linux
Block Command Line, UserTechnology,
Ciphers, Blockchain Management, Permissions,
Endpoint Processes,
Protection, Packages,
Hardening,
None Linux
Devices, Filesystem, Kernel, Init, Process Utilization, Logging, Network Sharing,
Application Security, Mobile Device Security, Cloud Security, Access Control,
None Network
Packet Basics,
Tools, Subnetting,
Forensic Routing,
Tools, Incident Network Configuration, DNS
NIST Cyber Security Framework, Core Response
Functions,Process, Managing
Categories, Evidence,
Sub-Categories,
None Security Frameworks,
Implementation Risk, Policies
Analyzing Assets,Tiers, Profiles
Securing and Components,
Network Five Mainand
Servers, Workstations Functions,
Databases, SP 800-
None 53
Governance, Cloud IAM, Software and Infrastructure, Authentication, Ticket-
Security Layers, Core Security Principles, Physical Security, Authentication,
None Granting Servers,
Authorization, Identity and
Accounting, Access
Audit, Management
Encryption, SecuritySystems
Policies, Password
Cloud Security, Cyber Defense, Digital Forensics, Incident Response, Industrial
None Attacks, PasswordPenetration
Control Systems, Policies Testing, Webcasts, Cheat Sheets, Summits, CTFs,
None Blogs, Podcasts, White Papers, Tools
Software Vulnerabilites, Networking, Network Traffic Analysis, Crypto Labs,
None None
Web Security, System Security and Operations, Industrial Control System
None Linux,
SecurityPassword Cracking, Hacking, Network Enumeration with NMAP,
Geared
Windows, toward Fortinet
JavaScript Products, Cloud,
Deobfuscation, SecureWireless,
Coding,SIEM,
ActiveThreat Protection,
Directory LDAP,
None Next Generation
Building
Directory aTraversal, Firewall
Host PC, Installing
OSINT, VMWare,
SQLMap, ConfiguringAssembly
Bloodhound, pfsense Firewall
Language, for Python,
Home
Network Labs, SOC Analyst&Interview
Segmentation Security, Questions,
ConfiguringSOC Analyst
Security Skills,Configuring
Onion, Tools, Kali,Kali
https://discord.com/invite/hackthebox
Web Proxies
Vulnerability Scanning, Certifications Roadmap, Entry Level Cyber Jobs
Linux, Configuring a Windows Server as a Domain Controller, Configuring
https://discord.com/invite/pXueMZNfFV
Explained, Getting into Cybersecurity, Resumes, Webgoat
Windows Desktops, Configuring Splunk, Configuring Nessus on Kali, Ubunti,
https://discord.com/invite/TRRdKW8HmJ
CentOS, Metasploitable, DVWA, Vulnhub
None None
None Maltego,
None Google Hacking (Dorks), Shodan, Harvester, Mining Twitter with
OSINT
Twint, Investigations,
FOCA for Metadata,Objectives,
recon-ng, Sources of Information,
metagoofil, Spiderfoot,Effective
Censys, Google and
Gathering
None Geolocation,
Social
Tools Media
for OSINT Reverse
Searching, Image
investigations Search,
Documenting
related Facebook
and
to OSINT,
Recording
Usernames, Google Maps,
Information,
Email Addresses, Finding
VPNs Domain
Aircraft
User and Flight
Accounts AcrossDataSocial
with Media,
Radarbox, DNS Queries,
Discovering Venmo, Wigle,Domains,
DNS Typosquatting Bitcoin,
None Names,
Maritime IPVessel
Addresses, Images
Tracking, & Videos,
Spyse, Facial Social Networks,
Recognition, Instant Messaging,
Deepfakes
Using
People APIs to Reveal
Search, DatingHidden
Sites, Open Source
Phone Numbers, Information, Using robots.txt
BusinessSearch
Records, Files
PublicSocial
Records,
Open Source
https://discord.com/invite/FHagzwXqbT
for OSINT Intelligence (OSINT) Tools & Resources: Engines,
Transportation,
Media Intelligence, Geolocation,
People Search, ThreatBusiness
Intelligence,
Search,Malicious File Analysis, Dark
Web Directories,
None Web, Metadata, Terrorism, Digital Currency,
Translation Service, Government Records, Maps, Web Scraping Classifies, and more. Tools, Website
None Monitoring
A curated
This Services,
list
is a database of OSINT IP tools
of free Address
OSINT Tracking
andresources
resources. and more
Search
and tools,Engines,
research Meta
cheat Search,
sheets,
None Visual Search,
and other online Pastebins, Codeaids.
investigative Search, Social Networks, Social Media Tools,
Blog Search, Forums and Discussion Board Search, Username Check, People
https://www.linkedin.com/groups/12373405
Free OSINT Webcasts,Search,
Investigations, Videos,Company
Summit Talks, Blogs, andServices,
Communities
Foundations ofEmail OSINT, Investigative Research,
Process VPN
Flowcharts, OCR Tools, and
OSINT Set-Up,
None more.
Hardware, Virtual Machines, Internet Intelligence & Investigations, LinkedIn
None Searching
None Tor, Bitcoin, PGP, Tails, Deep Web Markets, Common Myths
None Dark WebOSINT,
Malware Investigations,
Darknet, Tor Cryptocurrency, People OSINT, Dark Web Markets,
None Breached Data History, Geolocation and more.
None OSINT,
Getting Social
Started Engineering,
withImagery,
Maltego’sOPSEC, freeSources
CaseFile oftool,
OSINT Combining Graphs, Importing
Geo Locating From Investigating Information Campaigns, Developing
None Data, Exporting and Reports, Collaboration
OSINT Capability for Organizations, Online Safety & Personal Exposure,
None Disinformation, Corporate Intelligence, Due-Dilligence
None Telegram,
Twint, LicenseOSINT for OSINT,
Plate Good, OSINT
PhotonMind-State,
Scanner, OSINTSock Browser
Puppets,Extensions,
GitHub Analysis
None Maltego, EXIF Data, Aircraft OSINT, Business OSINT
Shodan, Malware OSINT, Sock Puppets, Artificial Intelligence, Reddit, TikTok,
Facebook, Gab, Building a Username Search Tool, Pokémon Go, Creating
Custom JavaScript Bookmarklets, LinkedIn, Getting an OSINT Job, SOCMINT,
None The Intelligence Cycle, OCR, Missing Person
None OSINT Tools and Resources
None Dark Web,
Reverse Automation,
Image OPSEC, Dark Web
Search,Darknet,
EXIF/Metadata, Hunting
Search Methods
Operators, Geolocation, Satellite
Search Engine OSINT, TOR, Deebweb, Aircraft OSINT, People Search,
None Imagery
Company Search, Phone Number Search, Document Search, Metadata, Image
None Burp
OSINT,Suite, HTTP Protocols,
Fix Blurred or DistortedWireshark,
Images TCP, UDP, Programming, OSINT, NMAP,
Vulnerability Assessment, Nessus, XSS, SQL Injections, Google Hacking,
None OSINT
Malware,& Social Engineering
Web Attacks, System Attacks, Network Attacks, Metasploit,
https://community.ine.com/
Networking, Azure, Python
Various Ethical Hacking Tutorials (Wireless, Password Cracking, Evading AV,
None Anti-Forensics, WebApp Hacking, Bluetooth Hacking, etc)
None Various
Scoping, Ethical Hackingand
Enumeration Videos
Vulnerability Scanning, Exploitation and Password
Free
Web ebook
Cache & free course,
Poisoning, Linux
InformationFundamentals, Installing
Disclosure, XXE Kali,XSS,
Injection, Configuring Kali,
SQL Injection,
None Cracking,
Debian Report
Package Writing and
Management, Risk Analysis
Kali Linux in the Enterprise, Intro to Security
CSRF, HTTP Request Smuggling, OS Command Injection, Directory Traversal,
None Assessments
Access Control Vulnerabilities, Authentication, Business Logic, Vulnerabilities
Kali Linux,
Linux, BlackArch
Password Linux,Hacking,
Cracking, Metasploitable,
NetworkPython for Penetration
Enumeration with NMAP, Testing,
None and
Burp more
Suite, OWASP Juice Shop, Recon-ng, Arch Linux, Network Sniffing &
Windows, JavaScript Deobfuscation, Secure Coding, Active Directory LDAP,
None Spoofing,
Directory NMAP, VulnHub, HTB, TryHackMe, OpenVAS, Bug Bounty
PE Format,Traversal,
DLLS, BugOSINT, SQLMap,
Hunting, Fuzzing,Bloodhound, Assembly
Buffer Overflows, Language, Python,
Metasploit,
https://discord.com/invite/hackthebox
Web Proxies
Mitigation Techniques, Egghunter, Post Exploitation, x86 and x64 Assembly,
None Reverse Engineering
Supply Chain Risk Management, Supply Chain Security, Supply Chain Life
None Cycles,
Basic Adversaries
Cloud Operations and Security,
Web and Email Server Attacks, Cyber Cloud Security
Hygiene Risks andImpacts
Best Practices, Threats,ofIncident
Web
None Response, Application Security, Data Security, Resource Security
and Email Server Attacks, Effective Organizational Response, Identify, Mitigate
None & Recover from Web and Email Server Attacks
None None
None None
https://discord.com/invite/WQGdYaB
None
Algorithms, Programming Languages, Human Computer Interaction, Data
None None
Representation, Coding, Encryption, Artificial Intelligence, Computer Graphics,
None Network Communication Protocols, Software Engineering, Big Data
None None
None None
None None
None None
None None
Malware Analysis, Email Security for SOC Analysts, SOC Fundamentals,
None None
Evidence Acquisition, Linux Forensics, Writing Forensic Reports, Virtual Hard
https://discord.com/invite/MWxKntJztx
Disks
None None
None None
None None
None None
None None
None None
None None
None None
None None
Log Analysis, SIEM Tools, Regular Expressions, Using Windows and Linux Tools
None None
to Analyze Incidents, Methods and Tools for Malware Analysis, IOCs, Incident
None Response Process, Forensic Analysis, Mitigation, Windows Event Logs
Changing Your Column Display, Display Filter Expressions, Identifying Hosts and
Users, Exporting Objects from a PCAP, Examining Trickbot Infections,
Examining Ursnif Infections, Examining Qakbot Infections, Decrypting HTTPS
None None
Traffic, Examining Dridex Infection Traffic, Examining Emotet Infection Traffic,
None Examining Traffic from Hancitor Infections
None None
None None
None None
UNIX-Based
CIA Operating
Triad, Threats Systems,Defense-in-Depth,
and Attacks, Windows, Apple, Processes and Threads,
Cryptographic Models,
None None
Synchronization, CPU Scheduling, Deadlock, Memory Management, File
Ciphers, Algorithms, Access Control, Identification and Authentication,
None Systems,
Network Security, Networking
Security, Operating System Security, Intrusion Detection and
Threat Landscape, Threat Actors, Passive & Active Defense, Security Policies,
None Prevention Systems, Privacy Laws
Ethical Hacking, Cyber Security Standards and Frameworks, Advanecd
None Persistant
Information Threats,
SystemsIndicators
Auditing,ofBusiness
Compromise
Application Development and the
None Roles of IS Auditors, IS Maintenance and ControlFrameworks of Data Privacy
Privacy in the Digital Age, Risks in Data Privacy,
None Law
AWS Identity and Access Management (IAM), IAM Policies, IAM Roles, Best
None Practices
None Installation
AES 256 with and Configuration,
JavaScript, Base64,Logging, Rule Writing,
Combination Snort
Encoding, 2, Snort
Custom 3
Encoding,
None XOR Encoding in JavaScript
None Threat Hunting Reading List, Threat Hunting Procedures
None None
None None
Python Basics, Flow Control, Functions, Exception Handling, Lists, Dictionaries
None None
and Structuring Data, Sets, itertools, Comprehensions, Manipulating Strings,
None String
None Formatting, Regular Expressions, Handling File and Directory Paths,
Basics,
ReadingLoops, Data Types,
and Writing Files, Strings, Variables,
JSON, YAML, If – Else, Dates,
Configuration Events, Numbers
Files, Debugging,
None and Math, Global Functions, Regular Expressions, Arrays,
Lambda Functions, Ternary Conditional Operator, args and kwargs, JSON, Errors
Context
None Manager, Dataclasses, Virtual Environment
None None
None None
None None
None None
None OSINT, GEOINT, SOCMINT, FOSINT
None None
Getting Started with Python, Artifact Report, Mobile Device Forensics,
None None
Investigating Embedded Metadata, Network Forensics, Important Artifacts in
None Windows,
MITRE ATT&CK Investigation
Framework, of Log Based
Real TimeArtifacts
Detection and Alerting, Detecting
None Advanced Threats
None None
None None
None None
None None
The site contains Exam Tips, Flashcards, Acronyms, Hands-On Labs,
None Performance-Based Questions (PBQS), Mock Exams, and Glossaries.
None None
Creating a Virtual Machine, Looking at Files, Vi Text Editor, Hardware, Users
None and
NTFS,Groups,
MasterFileFileAttributes,
Table (MFT) Partitioning and Formatting, Mounting and
Unmounting Disks/Partitions, Imaging and Verification Tools, Mounding of dd
None None
and EWF Images, Networking, Netcat, Live Capture, Incident Response,
None Mobile
NetworkData Sources,Linux
Aquisition, Mobile Devices, EveryMac, SIM Cards, Media Storage
Commands
Cards, Call Data Records, Backups, Cloud, IoT, Networks, Computer vs Mobile
None x86, ARM-32,
Forensics, x64, ARM-64,
Training, Procedures,PicoTools,
HackingImage Types, Timestamps, Bit, Bytes,
None Nibble, Analysis Methodology, 3rd Party App Analysis
Application Security, Blockchain Security, Bug Bounty, Cloud Security,
Defensive Security,
Digital Forensics Ethical
Discord Hacking,
Server, Infosec
Malware Soft Skills,
Analysis, IT Security
Password Compliance,
Cracking for
None None
Network Security, Offensive Security, Penetration Testing, Security
Beginners, Android Application Analysis, De-Obfuscating PowerShell Payloads,
None Certifications
CTFs, Law Enforcement Digital Forensics Laboratory, Artifacts as Evidence,
None Forensic Imaging in a Nutshell, Linux and Digital Forensics
Name
Computer Science courses with video lectures
Cryptography I
Software Security
Intro to Information Security
Cyber-Physical Systems Security
Finding Your Cybersecurity Career Path
Building a Cybersecurity Toolkit
Cybersecurity: The CISO's View
Introduction to Cybersecurity
Cyber Attack Countermeasures
Introduction to Cyber Attacks
Enterprise and Infrastructure Security
Network Security
Real-Time Cyber Threat Detection and Mitigation
the course and start learning than having to read 60Description pages of text. If you are student or from non-CS
background, please try few courses to decide for yourself
tampers with traffic. We will examine many deployed protocols as to which coursemistakes
and analyze suits yourinlearning
existing curve bestThe
systems.
second
take a "build security in" mentality, considering techniques at each phase of the development cycle thatkey
half of the course discusses public-key techniques that let two parties generate a shared secret can be
used to strengthen the security of software systems
undergraduate and graduate — understand this important priority in society today. Offered at Georgia Tech as
CS 6035cyber-physical systems including industrial control systems and those considered critical infrastructure
various
systems. 16 week
cybersecurity course
career - Offered
success. at Georgia
You will determine Tech as CS
your own 8803
incoming skills, talent, and deep interests to apply
toward
they a meaningful
really need to add andtoinformed exploration
their “toolkits” – a setofof32skills
Digital
thatPathways of Cybersecurity
is constantly evolving, not all technical, but
fundamentally rooted in problem-solving
How does cybersecurity work across industries? What is the professionals' point of view? How do we keep
information secure
well as national (USA) and international perspectives on the field. We will cover the legal environment that
impacts cybersecurity
Learners will be introducedas welltoas predominant
a series threat
of different actors
authentication solutions and protocols, including RSA
SecureID and Kerberos, in the context of a canonical schema
worms, and Trojan horses in software utilities. Network attacks such as distributed denial of service (DDOS) and
botnet-
are shownattacks are also
to provide andescribed
opportunityandtoillustrated
fix many ofusing
the real examples
security from the
weaknesses past couple
in modern of decade
perimeter local area
networks
elements of cryptography, cryptanalysis, and systems security, and continues by covering a number of seminal
papers and monographs
the techniques in a wide
used to design andrange of security
configure firewallareas
solutions such as packet filters and proxies to protect
enterprise assets
Verified Link
https://github.com/Developer-Y/cs-video-courses?utm_campaign=meetedgar&utm_medium=social&utm_source=mee
https://www.coursera.org/learn/crypto
https://www.coursera.org/learn/software-security
https://www.udacity.com/course/intro-to-information-security--ud459
https://www.udacity.com/course/cyber-physical-systems-security--ud279
https://www.edx.org/course/finding-your-cybersecurity-career-path
https://www.edx.org/course/building-a-cybersecurity-toolkit
https://www.edx.org/course/cybersecurity-the-cisos-view
https://www.edx.org/course/introduction-to-cybersecurity
https://www.coursera.org/learn/cyber-attack-countermeasures
https://www.coursera.org/learn/intro-cyber-attacks
https://www.coursera.org/learn/enterprise-infrastructure-security
https://www.udacity.com/course/network-security--ud199
https://www.coursera.org/learn/real-time-cyber-threat-detection
August 13, 2022 – Paul Jerimy https://pauljerimy.com/security-certification-roadmap/
List of all cyber certifications
n-roadmap/ 460 certifications listed | August 2022
Name
VirusTotal
Any.Run
Privilege-Escalation
Malware analysis tools and resources
Analyzing Malicious Documents Cheat Sheet
ReverseEngineering Cheat Sheet
SQL Injection | Various DBs
Nmap Cheat Sheet and Pro Tips
PENTESTING LocalFileInclude Cheat Sheet
Penetration Testing Tools Cheat Sheet
Reverse Shell Cheat Sheet
nbtscan Cheat Sheet
Linux Commands Cheat Sheet
Kali Linux Cheat Sheet
Hacking Tools Cheat Sheet (Diff tools)
Google Search Operators: The Complete List (42 Advanced Ope
Cheat Sheets - Imgur (Multiple)
Active-Directory-Exploitation-Cheat-Sheet: A cheat sheet th
Shodan Query Filters
Getting Real with XSS - A reference on the new technquies to XSS
Windows and Linux Terminals & Command Lines
TCP/IP and tcpdump
IPv6 Pocket Guide
Powershell Cheat Sheet
Writing Tips for IT Professionals
Tips for Creating and Managing New IT Products
Tips for Getting the Right IT Job
Tips for Creating a Strong Cybersecurity Assessment Report
Critical Log Review Checklist for Security Incidents
Security Architecture Cheat Sheet for Internet Applications
Tips for Troubleshooting Human Communications
Security Incident Survey Cheat Sheet for Server Administrators
Network DDoS Incident Response Cheat Sheet
Information Security Assessment RFP Cheat Sheet
SIFT Workstation Cheat Sheet
Tips for Reverse-Engineering Malicious Code
REMnux Usage Tips for Malware Analysis on Linux
Analyzing Malicious Documents
Malware Analysis and Reverse-Engineering Cheat Sheet
SQlite Pocket Reference Guide
Eric Zimmerman's tools Cheat Sheet
Rekall Memory Forensics Cheat Sheet
Linux Shell Survival Guide
Windows to Unix Cheat Sheet
Memory Forensics Cheat Sheet
Hex and Regex Forensics Cheat Sheet
FOR518 Mac & iOS HFS+ Filesystem Reference Sheet
The majority of DFIR Cheat Sheets can be found here
Swiss Army Knife collection of PenTesting Cheatsheets
SQLite Injection Cheat Sheet
SSL/TLS Vulnerability Cheat Sheet
Windows Intrusion Discovery Cheat Sheet v3.0
Intrusion Discovery Cheat Sheet v2.0 (Linux)
Intrusion Discovery Cheat Sheet v2.0 (Windows 2000)
Windows Command Line
Netcat Cheat Sheet
Misc Tools Cheat Sheet
Python 3 Essentials
Windows Command Line Cheat Sheet
SMB Access from Linux Cheat Sheet
Pivot Cheat Sheet
Google Hacking and Defense Cheat Sheet
Scapy Cheat Sheet
Nmap Cheat Sheet
Multicloud Cheat Sheet
Linux CLI 101
Linux CLI
PowerShell Primer
PowerShell Get-WinEvent
Description
Analyze suspicious files and URLs to detect types of malware, automatically share them wit
Malware hunting with live access to the heart of an incident
This cheasheet
Defund is aimed
the Police. at the to
Contribute CTF Players and Beginners to help them understand the funda
rshipp/awesome-malware-analysis
development by creating an account on GitHub.

Master Nmap quickly with this cheat sheet of common and not so common
options. A handy
LFI Explained andreference for experts
the techniques and those
to leverage getting
a shell from started with Nmap.
a local file
inclusion vulnerability.
Penetration testing toolsHow to get
cheat a shell
sheet, from
a high LFI overview / quick
level
reference cheat sheet for penetration testing.
back on Linux/Windows with PHP, Python, Powershell, nc (Netcat), JSP, Java,
Bash, PS etc.
nbtscan install, examples and nbtscan commands cheatsheet
Linux Command Cheat Sheet and examples for penetration testing.

this list of 42 Google advanced search operators, plus 15 actionable ways


to userate
Find, them toshare
and accomplish specific
the best memes SEO
andtasks.
images. Discover the magic of the
Internet at Imgur.
S1ckB0y1337/Active-Directory-Exploitation-Cheat-Sheet: A cheat sheet that
contains
A common
list of shodan enumeration
filters. and
Contribute toattack methods for Windows Active Directory.
JavierOlmedo/shodan-filters
development by creating an account on GitHub.
chnquies to XSS
A collection of cybersecurity resources along with helpful links to SANS
websites, web
A collection of content and free
cybersecurity cybersecurity
resources resources.
along with helpful links to SANS
websites, web content and free cybersecurity resources.

dministrators
A list of useful payloads and bypass for Web Application Security and
Pentest/CTF
A cheat sheet- GitHub - swisskyrepo/PayloadsAllTheThings:
for attacking SQLite viathe
SQLi. Contribute to A oflist of useful
A quick reference
payloads and for for
bypass understanding
Web Application nature andand
Security severity
Pentest/CTF
unicornsasfuel/sqlite_sqli_cheat_sheet
vulnerabilities in TLS configurations anddevelopment by creating
implementations. - GitHub an- account
on GitHub.
IBM/tls-vuln-cheatsheet: A quick reference for understanding the nature
Offensive Operations training at SANS institute - Learn more about our and
severity
courses of vulnerabilities
& Operations
certifications in TLS
offered configurations and implementations.
Offensive training atboth
SANSlive and online
institute or more
- Learn sign up for one
about ourof
our offensive operations webcasts
courses & certifications offered both live and online or sign up for one of
our offensive operations webcasts
Offensive Operations training at SANS institute - Learn more about our
courses
Offensive & Operations
certifications offered
training atboth
SANSlive and online
institute or more
- Learn sign up for one
about ourof
our offensive
courses operationsoffered
webcasts
Offensive Operations training at SANS institute - Learn more about ourof
& certifications both live and online or sign up for one
our offensive
courses operationsoffered
& certifications webcastsboth live and online or sign up for one of
our offensive operations webcasts
SANS Penetration Testing blog pertaining to SANS Cheat Sheet: Python 3

This document aims to be a quick reference outlining all Google operators,


their meaning, and examples of their usage.

Use CLIs to interact with the three most popular cloud platforms: Amazon
Web Services (AWS), Microsoft Azure, and the Google Cloud Platform (GCP).
Link
https://www.virustotal.com/gui/
https://any.run/
https://github.com/Ignitetechnologies/Privilege-Escalation
https://github.com/rshipp/awesome-malware-analysis
https://zeltser.com/analyzing-malicious-documents/
https://www.cybrary.it/wp-content/uploads/2017/11/cheat-sheet-reverse-v6.png
http://pentestmonkey.net/category/cheat-sheet/sql-injection
https://hackertarget.com/nmap-cheatsheet-a-quick-reference-guide/
https://highon.coffee/blog/lfi-cheat-sheet/
https://highon.coffee/blog/penetration-testing-tools-cheat-sheet/
https://highon.coffee/blog/reverse-shell-cheat-sheet/
https://highon.coffee/blog/nbtscan-cheat-sheet/
https://highon.coffee/blog/linux-commands-cheat-sheet/
https://i.redd.it/9bu827i9tr751.jpg
https://i.redd.it/fviaw8s43q851.jpg
https://ahrefs.com/blog/google-advanced-search-operators/
https://imgur.com/gallery/U5jqgik
https://github.com/S1ckB0y1337/Active-Directory-Exploitation-Cheat-Sheet
https://github.com/JavierOlmedo/shodan-filters
https://labs.f-secure.com/blog/getting-real-with-xss/
https://assets.contentstack.io/v3/assets/blt36c2e63521272fdc/bltea7de5267932e94b/5eb08aafcf88d36e47cf0644/C
https://www.sans.org/security-resources/tcpip.pdf?msc=Cheat+Sheet+Blog
https://www.sans.org/security-resources/ipv6_tcpip_pocketguide.pdf?msc=Cheat+Sheet+Blog
https://assets.contentstack.io/v3/assets/blt36c2e63521272fdc/bltf146e4f361db3938/5e34a7bc946d717e2eab6139/
https://zeltser.com/writing-tips-for-it-professionals/
https://zeltser.com/new-product-management-tips/
https://zeltser.com/getting-the-right-it-job-tips/
https://zeltser.com/security-assessment-report-cheat-sheet/
https://zeltser.com/security-incident-log-review-checklist/
https://zeltser.com/security-architecture-cheat-sheet/
https://zeltser.com/human-communications-cheat-sheet/
https://zeltser.com/security-incident-survey-cheat-sheet/
https://zeltser.com/ddos-incident-cheat-sheet/
https://zeltser.com/cheat-sheets/
https://digital-forensics.sans.org/media/sift_cheat_sheet.pdf?msc=Cheat+Sheet+Blog
https://digital-forensics.sans.org/media/reverse-engineering-malicious-code-tips.pdf?msc=Cheat+Sheet+Blog
https://digital-forensics.sans.org/media/remnux-malware-analysis-tips.pdf?msc=Cheat+Sheet+Blog
https://digital-forensics.sans.org/media/analyzing-malicious-document-files.pdf?msc=Cheat+Sheet+Blog
https://digital-forensics.sans.org/media/malware-analysis-cheat-sheet.pdf?msc=Cheat+Sheet+Blog
https://digital-forensics.sans.org/media/SQlite-PocketReference-final.pdf?msc=Cheat+Sheet+Blog
https://digital-forensics.sans.org/media/EricZimmermanCommandLineToolsCheatSheet-v1.0.pdf?msc=Cheat+Sheet+B
https://digital-forensics.sans.org/media/rekall-memory-forensics-cheatsheet.pdf?msc=Cheat+Sheet+Blog
https://digital-forensics.sans.org/media/linux-shell-survival-guide.pdf?msc=Cheat+Sheet+Blog
https://digital-forensics.sans.org/media/windows_to_unix_cheatsheet.pdf?msc=Cheat+Sheet+Blog
https://digital-forensics.sans.org/media/volatility-memory-forensics-cheat-sheet.pdf?msc=Cheat+Sheet+Blog
https://digital-forensics.sans.org/media/hex_file_and_regex_cheat_sheet.pdf?msc=Cheat+Sheet+Blog
https://assets.contentstack.io/v3/assets/blt36c2e63521272fdc/blt61c336e02577e733/5eb0940e248a28605479ccf0
https://digital-forensics.sans.org/community/cheat-sheets?msc=Cheat+Sheet+Blog.
https://github.com/swisskyrepo/PayloadsAllTheThings
https://github.com/unicornsasfuel/sqlite_sqli_cheat_sheet
https://github.com/IBM/tls-vuln-cheatsheet
https://pen-testing.sans.org/retrieve/windows-cheat-sheet.pdf?msc=Cheat+Sheet+Blog
https://pen-testing.sans.org/retrieve/linux-cheat-sheet.pdf?msc=Cheat+Sheet+Blog
https://assets.contentstack.io/v3/assets/blt36c2e63521272fdc/bltd6fa777a3215f34a/5eb08aae08d37e6d82ef77fe/w
https://pen-testing.sans.org/retrieve/windows-command-line-sheet.pdf?msc=Cheat+Sheet+Blog
https://pen-testing.sans.org/retrieve/netcat-cheat-sheet.pdf?msc=Cheat+Sheet+Blog
https://pen-testing.sans.org/retrieve/misc-tools-sheet.pdf?msc=Cheat+Sheet+Blog
https://www.sans.org/blog/sans-cheat-sheet-python-3/?msc=Cheat+Sheet+Blog
https://assets.contentstack.io/v3/assets/blt36c2e63521272fdc/blt4e45e00c2973546d/5eb08aae4461f75d77a48fd4/
https://assets.contentstack.io/v3/assets/blt36c2e63521272fdc/blta6a2ae64ec0ed535/5eb08aaeead3926127b4df44/
https://assets.contentstack.io/v3/assets/blt36c2e63521272fdc/blt0f228a4b9a1165e4/5ef3d602395b554cb3523e7b/
https://www.sans.org/security-resources/GoogleCheatSheet.pdf?msc=Cheat+Sheet+Blog
https://wiki.sans.blue/Tools/pdfs/ScapyCheatSheet_v0.2.pdf
https://assets.contentstack.io/v3/assets/blt36c2e63521272fdc/blte37ba962036d487b/5eb08aae26a7212f2db1c1da
https://www.sans.org/security-resources/posters/cloud/multicloud-cheat-sheet-215?msc=blog-ultimate-list-cheat-sh
https://wiki.sans.blue/Tools/pdfs/LinuxCLI101.pdf
https://wiki.sans.blue/Tools/pdfs/LinuxCLI.pdf
https://wiki.sans.blue/Tools/pdfs/PowerShell.pdf
https://wiki.sans.blue/Tools/pdfs/Get-WinEvent.pdf
from https://ericzimmerman.github.io/#!index.md

Name -
AmcacheParser
AppCompatCacheParser
bstrings
EvtxECmd
EZViewer
Hasher
JLECmd
JumpList Explorer
LECmd
MFTECmd
MFTExplorer
PECmd
RBCmd
RecentFileCacheParser
RECmd
Registry Explorer
RLA
SDB Explorer
SBECmd
ShellBags Explorer
SQLECmd
SrumECmd
SumECmd
Timeline Explorer
VSCMount
WxTCmd
GitHub Sponsors

PayPal

Patreon
Description
Amcache.hve parser with lots of extra features. Handles locked files
AppCompatCache aka ShimCache parser. Handles locked files
Find them strings yo. Built in regex patterns. Handles locked files
Event log (evtx) parser with standardized CSV, XML, and json output! Custom maps, locked file support,
and more! zero dependency viewer for .doc, .docx, .xls, .xlsx, .txt, .log, .rtf, .otd, .htm, .html, .mht, .csv,
Standalone,
and
Hash.pdf. Anythings
all the non-supported files are shown in a hex editor (with data interpreter!)
Jump List parser
GUI based Jump List viewer
Parse lnk files
$MFT, $Boot, $J, $SDS, $I30, and $LogFile (coming soon) parser. Handles locked files
Graphical $MFT viewer
Prefetch parser
Recycle Bin artifact (INFO2/$I) parser
RecentFileCache parser
Powerful command line Registry tool searching, multi-hive support, plugins, and more
Registry viewer with searching, multi-hive support, plugins, and more. Handles locked files
Replay transaction logs and update Registry hives so they are no longer dirty. Useful when tools do not
know how to handle
Shim database GUI transaction logs
ShellBags Explorer, command line edition, for exporting shellbag data
GUI for browsing shellbags data. Handles locked files
Find and process SQLite files according to your needs with maps!
Process SRUDB.dat and (optionally) SOFTWARE hive for network, process, and energy info!
Process Microsoft User Access Logs found under 'C:\Windows\System32\LogFiles\SUM'
View CSV and Excel files, filter, group, sort, etc. with ease
Mount all VSCs on a drive letter to a given mount point
Windows 10 Timeline database parser
August 2022 24

Link
1.5.1.0 | 1.5.1.0
1.5.0.0 | 1.5.0.0
1.5.2.0 | 1.5.2.0
1.5.0.0 | 1.5.0.0
1.0.0.0 | 2.0.0.0
2.0.0.0 | -
1.5.0.0 | 1.5.0.0
1.4.0.0 | 2.0.0.0
1.5.0.0 | 1.5.0.0
1.2.1.0 | 1.2.1.0
0.5.1.0 | 2.0.0.0
1.5.0.0 | 1.5.0.0
1.5.0.0 | 1.5.0.0
1.5.0.0 | 1.5.0.0
1.6.0.0 | 2.0.0.0
1.6.0.0 | 2.0.0.0
2.0.0.0 | 2.0.0.0
1.0.0.0 | 2.0.0.0
2.0.0.0 | 2.0.0.0
1.4.0.0 | 2.0.0.0
1.0.0.0 | 1.0.0.0
0.5.1.0 | 0.5.1.0
0.5.2.0 | 0.5.2.0
1.3.0.0 | 2.0.0.0
1.5.0.0 | 1.5.0.0
1.0.0.0 | 1.0.0.0
Name
Academy Hackaflag
Try Hack Me
Attack-Defense
alert to win
CTF Komodo Security
CMD Challenge
Exploitation Education
Google CTF

HackTheBox
Hacksplaining
Hacker101
Hacker Security
Hacking-Lab
ImmersiveLabs
NewbieContest
OverTheWire
Practical Pentest Labs
Pentestlab
Penetration Testing Practice Labs
PentestIT LAB
PicoCTF
PWNABLE
Root-Me
SANS Challenger
SmashTheStack
Try Hack Me
The Cryptopals Crypto Challenges
Vulnhub
W3Challs
WHO4REYOU
WeChall
Zenk-Security
Link
https://cmdchallenge.com
https://tryhackme.com/
https://attackdefense.com/
https://alf.nu/alert1
https://ctf.komodosec.com/
https://cmdchallenge.com
https://exploit.education/
https://capturetheflag.withgoogle.com/

https://www.hackthebox.eu
https://www.hacksplaining.com/exercises
https://ctf.hacker101.com
https://capturetheflag.com.br/
https://www.hacking-lab.com/index.html
https://immersivelabs.com/
https://www.newbiecontest.org/
http://overthewire.org
https://practicalpentestlabs.com
https://pentesterlab.com/
http://www.amanhardikar.com/mindmaps/Practice.html
https://lab.pentestit.ru
https://picoctf.com
https://pwnable.kr/play.php
https://www.root-me.org/
https://www.holidayhackchallenge.com/
http://smashthestack.org/wargames.html
https://tryhackme.com/
https://cryptopals.com/
https://www.vulnhub.com
https://w3challs.com/

http://www.wechall.net/
Description

Loading...

Loading...
Loading...
Loading...
Loading...

Loading...
Loading...

Loading...

Loading...

Loading...

Loading...
Loading...

Loading...
Name
Building Secure & Reliable Systems
Security Engineering
The Cyber Skill Gap
The Beginner’s Guide to Information Security
Texas A&M Security Courses
Description
Best Practices for Designing, Implementing and Maintaining Systems
A guide
The Cyberto Skill
building
Gap:dependable distributed
How To Become systems
A Highly Paid And Sought After Information Security
Specialist! (Use COUPON CODE: W4VSPTW8G7
Offers insight and resources to help readers embarkto make
on aitcareer
free) in one of the 21st century’s
most important—and
courses potentially
are offered through threelucrative—field
discipline-specific tracks: general, non-technical computer
users; technical IT professionals; and business managers and professionals.
Authors
Heather Adkins, Betsy Beyer, Paul Blankinship, Ana Oprea, Piotr Lewandowski, Adam
Stubblefield
Ross Anderson
Vagner Nunes
Limor Elbaz
Link
https://landing.google.com/sre/books/
https://www.cl.cam.ac.uk/~rja14/book.html
https://payhip.com/b/PdkW
https://www.amazon.com/Beginners-Guide-Information-Security-Kickstart-ebook/dp/B01JTDDSAM
https://teex.org/program/dhs-cybersecurity/
Name
Risky Business
Pauls Security Weekly
Security Now
Daily Information Security Podcast ("StormCast”)
ShadowTalk
Don't Panic - The Unit 42 Podcast
Recorded Future
The Cybrary Podcast
Cyber Life
Career Notes
Down the Security Rabbithole
The Privacy, Security, & OSINT Show
Defensive Security Podcast
Darknet Diaries
Brakeing Down Security
Open Source Security Podcast
Cyber Motherboard
Hak5
Threatpost Podcast Series
CISO-Security Vendor Relationship Podcast
Getting Into Infosec Podcast
Unsupervised Learning
Hosted by award-winning journalist Patrick Gray, Risky Business Description
has become a must-listen digest for information security
professionals
and security news, which is an open discussion forum for the hosts to express their opinions about the latest security
headlines,
Steve Gibson,breaches,
the man newwho exploits
coinedandthevulnerabilities,
term spyware and “not” politics,
created the“cyber” policies andprogram,
first anti-spyware more creator of Spinrite and
ShieldsUP, discusses the hot topics in security today with Leo Laporte
Stormcasts are daily 5-10 minute information security threat updates. The podcast is produced each work day, and typically
released lateTeam
Intelligence in theisday to be ready
conducting, forwith
along yourguest
morning commute
speakers discussing the latest threat actors, campaigns, security events
and industry news
Don't Panic! is the official podcast from Unit 42 at Palo Alto Networks. We find the big issues that are frustrating cyber
security practitioners
operations floor as well andashelp simplify
giving you the them so they
skinny don't needand
on established to panic
emerging adversaries. We also talk current events,
technical tradecraft, and offer up insights on the big picture issues
how to retain of talent. Entrepreneurs at all stages of their startup companies in our industryjoin us to share their stories and experience,
including how to get funding, hiring the best talent, driving sales,
owners looking to learn how to secure their data. We will talk about many things, and choosing where to base
like how your
to get business
jobs, cover breakdowns of
hot topics, and have special guest interviews with the men and women "in the trenches" of the industry
Cybersecurity professionals share their personal career journeys and offer tips and advice in this brief, weekly podcast from
The CyberWire
analysis, everything about Cybersecurity which includes Cybercrime, Cyber Law, Cyber Risk, Enterprise Risk & Security and
many more. If you want
Source Intelligence (OSINT)to hear issues
opinion andthat areThis
news. relevant to your
podcast organization,
will help listeners subscribe
learn some and tune-in
ideas on howto this podcast
to stay secure from
cyber-attacks and help them become “digitally invisible”
secured. As of today, they have more than 200 episodes and some of the topics discussed include Forensics, Penetration
Testing, Incident Response, Malware Analysis, Vulnerabilities and many more
Darknet Diaries
organizations. ThePodcast
hosts willis hosted and produced
teach concepts by Jack Rhysider
that Information Securitythat discuss topics
Professionals needrelated
to knowtoandinformation security.
discuss topics that It a
will refresh the memories of seasoned veterans
Open Source Security Podcast is a podcast that discusses security with an open-source slant. The show started in 2016 and
is hosted
Joseph by They
Cox. Josh Bressers and Kurt
tackle topics aboutSiefried.
famousAs of thisand
hackers writing, they now
researchers posted
about thearound
biggest190+
newspodcasts
in cybersecurity. The Cyber-
stuff gets complicated really fast, but Motherboard spends its time fixed in the
infrastructure. Their channel currently has 590,000 subscribers and is one of the most viewed shows infosec world so we don’t
whenhaveyoutowant to
Co-hosted by
learn something the creator
about of the
security CISO/Security
networks Vendor Relationship Series, David Spark, and Mike Johnson, in 30 minutes,
including security news, videos, feature reports and more, with their global editorial activities
this weekly program challenges the co-hosts, guests, and listeners to critique, share true stories. This podcast, The are driven by industry-leading
journalist TomVendor
CISO/Security Spring, Relationship,
editor-in-chieftargets to enlighten and educate listeners on improving security buyer and seller
relationships
Stories of how Infosec and Cybersecurity pros got jobs in the field so you can be inspired, motivated, and educated on your
journey
Weekly podcasts and biweekly newsletters as a curated summary intersection of security, technology, and humans, or a
standalone idea to provoke thought, by Daniel Miessler
Link
https://risky.biz/
https://securityweekly.com/category-shows/paul-security-weekly/
https://twit.tv/shows/security-now
https://isc.sans.edu/podcast.html
https://resources.digitalshadows.com/threat-intelligence-podcast-shadowtalk
https://unit42.libsyn.com/
https://www.recordedfuture.com/free-products
https://www.cybrary.it/info/cybrary-podcast/
https://redcircle.com/shows/cyber-life
https://www.thecyberwire.com/podcasts/career-notes
http://podcast.wh1t3rabbit.net/
https://podcasts.apple.com/us/podcast/the-privacy-security-osint-show/id1165843330
https://defensivesecurity.org/
https://darknetdiaries.com/episode/
https://www.brakeingsecurity.com/
https://www.opensourcesecuritypodcast.com/
https://podcasts.apple.com/us/podcast/cyber/id1441708044
https://shop.hak5.org/pages/videos
https://threatpost.com/category/podcasts/
https://cisoseries.com
https://gettingintoinfosec.com/
https://danielmiessler.com/podcast/
Name
SimplyCyber
IPPSec
Derek Rook
Adrian Crenshaw
LionSec
Zer0Mem0ry
webpwnized
Troy Hunt
0x41414141
Seytonic
Security Weekly
SecureNinjaTV
Samy Kamkar’s Applied hacking
rwbnetsec
Penetration Testing in Linux
Pentester Academy TV
Open SecurityTraining
NetSecNow
Metasploitation
LiveOverflow
John Hammond
iExplo1t
HACKING TUTORIALS
HackerSploit
GynvaelEN
Geeks Fort
Don Does 30
SSTec Tutorials
DemmSec
DEFCON Conference
DedSec
danooct1
BalCCon
Corey Nachreiner
Tradecraft Security Weekly
HackADay
TheCyberMentor
Grant Collins
Description
risk, compliance, privacy, education, certification, conferences; all with the intent of professional
development

CTF/Boot2root/wargames Walkthrough - lots of lengthy screenshot instructional vids


lots of lengthy con-style talks
lots of brief screenshot instructional vids, no dialog
lots of brief c++ security videos, programming intensive
lots of brief screenshot vids, some CTF walkthroughs
lone youtuber, medium length news videos, 16K followers, regular content
Channel with couple challenges, well explained
variety of DIY hacking tutorials, hardware hacks, regular updates
regular updates, lengthy podcast-style interviews with industry pros
brief news bites, irregular posting, 18K followers

lots of medium length instructional videos covering tools from Kali 2.0, no recent posts.

lots of brief videos, very regular posting, up to +8 a week


lots of lengthy lecture-style vids, no recent posts, but quality info.
channel of pentesteruniversity.org, seems to post once a month, screenshot instructional vids
lots
Lots of
of screenshot vids, little
brief-to-medium to no dialogue,
instructional all aboutthings
vids, covering usinglike
Metasploit, no recent
buffer overflows vids
and exploit writing,
regular posts
Solves CTF problems. contains penTesting tips and tricks
lots of screenshot vids aimed at novices, 5.7K Followers, no recent posts
handful of brief screenshot vids, no recent posts.
regular
Securityposts, medium
streams length screenshot
from Google Researcher.vids, withabout
Mainly dialogCTFs, computer security, programing and
similar things
KIF - lots of brief screenshot vids, no recent posts
amateur pen-tester posting lots of brief screenshot vids regularly, 9K Followers
lots of brief screenshot vids, regular updates
lots of pen testing vids, somewhat irregular uploads, 44K followers
lots of lengthy con-style vids from the iconical DEFCON
lots of brief screenshot how-to vids based in Kali, no recent posts
lots of brief
Balkan screenshot,
Computer Congresshow-to vids
- Long regarding
con-style malware,
talks from the regular
Balkancontent updates,
Computer 186Kdoesn’t
Congress, followers
update
regularly
security newsbites, 2.7K subscribers, 2-3 videos a week, no set schedule
Want to learn about all of the latest security tools and techniques?
Hackaday
Heath Adams serves up Fresh
uploads Hacks
regular Everyrelated
videos Day from aroundfacets
to various the Internet
of cyber security, from bug bounty
hunts
Grant uploads videos regarding breaking into cybersecurity, variousnetworking
to specific pentest methodologies like API, buffer overflows, cybersecurity projects, building
up a home lab amongst many others. Also has a companion discord channel and a resource website
Link
https://www.youtube.com/c/GeraldAuger
https://www.youtube.com/channel/UCa6eh7gCkpPo5XXUDfygQQA
https://www.youtube.com/channel/UCMACXuWd2w6_IEGog744UaA
https://www.youtube.com/user/irongeek
https://www.youtube.com/channel/UCCQLBOt_hbGE-b9I696VRow
https://www.youtube.com/channel/UCDk155eaoariJF2Dn2j5WKA
https://www.youtube.com/channel/UCPeJcqbi8v46Adk59plaaXg
https://www.youtube.com/channel/UCD6MWz4A61JaeGrvyoYl-rQ
https://www.youtube.com/channel/UCPqes566OZ3G_fjxL6BngRQ
https://www.youtube.com/channel/UCW6xlqxSY3gGur4PkGPEUeA
https://www.youtube.com/channel/UCg--XBjJ50a9tUhTKXVPiqg
https://www.youtube.com/channel/UCNxfV4yR0nIlhFmfwcdf3BQ
https://www.youtube.com/user/s4myk
https://www.youtube.com/channel/UCAJ8Clc3188ek9T_5XTVzZQ
https://www.youtube.com/channel/UC286ntgASMskhPIJQebJVvA
https://www.youtube.com/channel/UChjC1q6Ami7W0E71TzPZELA
https://www.youtube.com/channel/UCthV50MozQIfawL9a_g5rdg
https://www.youtube.com/channel/UC6J_GnSAi7F2hY4RmnMcWJw
https://www.youtube.com/channel/UC9Qa_gXarSmObPX3ooIQZrg
https://www.youtube.com/channel/UClcE-kVhqyiHCcjYwcpfj9w
https://www.youtube.com/user/RootOfTheNull
https://www.youtube.com/channel/UCx0HClQ_cv0sLNOVhoO2nxg/videos
https://www.youtube.com/channel/UCbsn2kQwNxcIzHwbdDjzehA
https://www.youtube.com/channel/UC0ZTPkdxlAKf-V33tqXwi3Q
https://www.youtube.com/channel/UCCkVMojdBWS-JtH7TliWkVg
https://www.youtube.com/channel/UC09NdTL2hkThGLSab8chJMw
https://www.youtube.com/channel/UCarxjDjSYsIf50Jm73V1D7g
https://www.youtube.com/channel/UCHvUTfxL_9bNQgqzekPWHtg
https://www.youtube.com/channel/UCJItQmwUrcW4VdUqWaRUNIg
https://www.youtube.com/channel/UC6Om9kAkl32dWlDSNlDS9Iw
https://www.youtube.com/channel/UCx34ZZW2KgezfUPPeL6m8Dw
https://www.youtube.com/channel/UCqbkm47qBxDj-P3lI9voIAw
https://www.youtube.com/channel/UCoHypmu8rxlB5Axh5JxFZsA
https://www.youtube.com/channel/UC7dUL0FbVPGqzdb2HtWw3Xg
https://wiki.securityweekly.com/Tradecraft_Security_Weekly
https://hackaday.com/
https://www.youtube.com/c/TheCyberMentor/
https://www.youtube.com/channel/UCTLUi3oc1-a7dS-2-YgEKmA/featured
Name
Krebs On Security
Dark Reading
The Hacker News
SecuriTeam
SANS NewsBites
Hacking Loops
Description
In depth security news and investigation
Cyber security's comprehensive news site is now an online communi
The Hacker News (THN) is a leading, trusted, widely-acknowledged d
A free and independent source of vulnerability information.
A semiweekly
transition fromhigh-level executive summary
certain Information of the
Technology (IT) most
roles important
into the ne
IT Security world
Link
https://krebsonsecurity.com/
https://www.darkreading.com/
https://thehackernews.com
https://securiteam.com/
https://www.sans.org/newsletters/newsbites
https://www.hackingloops.com/metasploit-commands/
Name Description
Metasploit Official Public Slack
BlackHills Information Security Discord
The Cyber Mentor Discord
DERPCON Discord
GRIMM Con - Public Discord
OWASP (Slack) The Open Web Application Security Project (OWAS
CentralSec Slack This is a community of people who are into everything i
Penetration Testers Slack This is a group of ethical hackers and you’re most welc
Cybersecurity Mentoring Hub Global session conducted over webex with a discussion/
Link
https://metasploit.com/slack
https://discord.gg/FWykjNy
https://discord.com/login?redirect_to=%2Fchannels%2F%40me
https://discord.gg/invite/859Zvrm
https://discord.gg/bDdgyaV
https://owasp.slack.com/
https://launchpass.com/centralsec
https://pentestpractice.slack.com/
https://cybersecmentorship.org/

You might also like