Resources
Cybersecurity educational resources including training materials, certifications, industry reports, and security documentation.
Explore 263 curated cybersecurity tools, with 15,161 visitors searching for solutions
FEATURED
- Home
- Categories
- Resources
RELATED TASKS
Blog providing cybersecurity, AI security, and leadership insights for CISOs
Blog providing cybersecurity, AI security, and leadership insights for CISOs
Training programs for Delinea identity security solutions and certifications
Training programs for Delinea identity security solutions and certifications
Events page for Delinea webinars, conferences, and podcasts on identity security
Events page for Delinea webinars, conferences, and podcasts on identity security
Cybersecurity educational book covering network, web app, cloud, and mobile security
Cybersecurity educational book covering network, web app, cloud, and mobile security
CISSP exam prep training course covering 8 (ISC)2 knowledge domains
CISSP exam prep training course covering 8 (ISC)2 knowledge domains
CISM exam prep with 620 practice questions across 4 online simulators
CISM exam prep with 620 practice questions across 4 online simulators
Cybersecurity awareness research study and report by Cerebra
Cybersecurity awareness research study and report by Cerebra
Cybersecurity awareness study report by Cerebra (3rd edition)
Cybersecurity awareness study report by Cerebra (3rd edition)
Cybersecurity research blog covering threat intelligence and malware analysis
Cybersecurity research blog covering threat intelligence and malware analysis
Educational initiative promoting API security awareness through stages
Educational initiative promoting API security awareness through stages
Curated cybersecurity frameworks, templates & guides for security programs
Curated cybersecurity frameworks, templates & guides for security programs
SANS survey report on ICS/OT cybersecurity detection and response practices
SANS survey report on ICS/OT cybersecurity detection and response practices
Cybersecurity podcast covering threat analysis and security trends
Industry report on cyber and technology risks for 2024
Industry report on cyber and technology risks for 2024
Online cybersecurity training platform with 150+ courses and hands-on labs
Online cybersecurity training platform with 150+ courses and hands-on labs
E-book guide for evaluating AI-powered pentesting solutions and guardrails
E-book guide for evaluating AI-powered pentesting solutions and guardrails
A comprehensive educational resource that provides structured guidance on penetration testing methodology, tools, and techniques organized around the penetration testing attack chain.
A comprehensive educational resource that provides structured guidance on penetration testing methodology, tools, and techniques organized around the penetration testing attack chain.
A newsletter service that tracks and reports weekly changes in detection engineering rules and updates across multiple GitHub repositories.
A newsletter service that tracks and reports weekly changes in detection engineering rules and updates across multiple GitHub repositories.
SecTemplates provides free security program templates, runbooks, and documentation resources for information security professionals and engineering teams.
SecTemplates provides free security program templates, runbooks, and documentation resources for information security professionals and engineering teams.
A comprehensive guide on utilizing advanced SSH tunneling techniques for network penetration testing and red team engagements, with a focus on Windows environments and firewall bypass methods.
A comprehensive guide on utilizing advanced SSH tunneling techniques for network penetration testing and red team engagements, with a focus on Windows environments and firewall bypass methods.
A comprehensive guide on Linux persistence mechanisms, focusing on scheduled tasks and jobs, their implementation, detection, and hunting strategies.
A comprehensive guide on Linux persistence mechanisms, focusing on scheduled tasks and jobs, their implementation, detection, and hunting strategies.
A comprehensive analysis of AWS IAM Access Analyzer, evaluating its capabilities, limitations, and effectiveness in identifying publicly exposed AWS resources.
A comprehensive analysis of AWS IAM Access Analyzer, evaluating its capabilities, limitations, and effectiveness in identifying publicly exposed AWS resources.
A visual guide that maps attack vectors and exploitation techniques for identifying vulnerabilities in GitHub Actions configurations and CI/CD pipelines.
A visual guide that maps attack vectors and exploitation techniques for identifying vulnerabilities in GitHub Actions configurations and CI/CD pipelines.
The Cloudflare Learning Center provides educational resources covering various cybersecurity and internet-related topics, including DDoS attacks, CDNs, DNS, web application security, serverless computing, encryption protocols, bots, cloud computing, Zero Trust security, SASE, networking, data privacy, video streaming, email security, and AI.
The Cloudflare Learning Center provides educational resources covering various cybersecurity and internet-related topics, including DDoS attacks, CDNs, DNS, web application security, serverless computing, encryption protocols, bots, cloud computing, Zero Trust security, SASE, networking, data privacy, video streaming, email security, and AI.
Resources Tools - FAQ
Common questions about Resources tools including selection guides, pricing, and comparisons.
Cybersecurity educational resources including training materials, certifications, industry reports, and security documentation.