Resources for Cybersecurity
Cybersecurity training materials, courses, and educational resources for skill development. Task: Cybersecurity
Explore 45 curated tools and resources
RELATED TASKS
PINNED
ImmuniWeb Discovery is an attack surface management platform that continuously monitors an organization's external digital assets for security vulnerabilities, misconfigurations, and threats across domains, applications, cloud resources, and the dark web.
ImmuniWeb Discovery is an attack surface management platform that continuously monitors an organization's external digital assets for security vulnerabilities, misconfigurations, and threats across domains, applications, cloud resources, and the dark web.
An AI-powered career platform that automates the creation of cybersecurity job application materials and provides company-specific insights for job seekers.
An AI-powered career platform that automates the creation of cybersecurity job application materials and provides company-specific insights for job seekers.
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.
A cloud-native web application and API security solution that uses contextual AI to protect against known and zero-day threats without signature-based detection.
A cloud-native web application and API security solution that uses contextual AI to protect against known and zero-day threats without signature-based detection.
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.
LATEST ADDITIONS
An AI-powered career platform that automates the creation of cybersecurity job application materials and provides company-specific insights for job seekers.
An AI-powered career platform that automates the creation of cybersecurity job application materials and provides company-specific insights for job seekers.
A guide on how to contribute to the Ayehu Custom Activities Repository
A guide on how to contribute to the Ayehu Custom Activities Repository
ENISA Training Resources offers online training material for cybersecurity specialists, covering technical areas such as artefact handling and analysis.
ENISA Training Resources offers online training material for cybersecurity specialists, covering technical areas such as artefact handling and analysis.
A comprehensive cybersecurity resource for learning and education
The SOC Academy offers official VirusTotal certification courses to help cybersecurity professionals maximize its functionalities and advance their careers.
The SOC Academy offers official VirusTotal certification courses to help cybersecurity professionals maximize its functionalities and advance their careers.
Collection of cybersecurity conference videos recorded by Cooper (@Ministraitor)
Collection of cybersecurity conference videos recorded by Cooper (@Ministraitor)
Free cyber security training and resources for career development.
A weekly newsletter covering computer security news and tutorials
Collection of industry and community cybersecurity courses and materials by M. E. Kabay.
Collection of industry and community cybersecurity courses and materials by M. E. Kabay.
A comprehensive guide to digital forensics and incident response, covering incident response frameworks, digital forensic techniques, and threat intelligence.
A comprehensive guide to digital forensics and incident response, covering incident response frameworks, digital forensic techniques, and threat intelligence.
A repository of CTF challenges and resources from various cybersecurity competitions.
A repository of CTF challenges and resources from various cybersecurity competitions.
Guidelines for contributing to a cybersecurity tools and resources list
Guidelines for contributing to a cybersecurity tools and resources list
A comprehensive list of search filters for the SHODAN search engine.
A comprehensive list of search filters for the SHODAN search engine.