Training and Resources

146 tools and resources

Tags in this Category

FEATURED

Showcase your innovative cybersecurity solution to our dedicated audience of security professionals.

Reach out!

NEW

Java MODBUS simulator with scriptable functions and dynamic resource creation.

A comprehensive list of search filters for the SHODAN search engine.

A comprehensive guide for hardening GNU/Linux systems with practical step-by-step instructions.

A documentation template library for implementing industrial information security management systems.

An annual jeopardy-style capture-the-flag contest with challenges related to cybersecurity.

A vulnerable web application for learning about web application vulnerabilities and writing secure code.

Haaukins is an automated virtualization platform for cybersecurity education with a focus on capture the flag concept.

A one-stop online resource for cybersecurity degree programs in the US, offering information on undergraduate and graduate levels, online programs, and career options.

Best practices for corporate network segmentation to protect against basic targeted attacks

A series of vulnerable virtual machine images with documentation to teach Linux, Apache, PHP, MySQL security.

Learn about 'Admin Free' Active Directory and the significance of privileged groups in AD.

A game packed with real-life examples of how not to store secrets in software, with 46 challenges to solve.

HTB Academy offers guided cybersecurity training with industry certifications to help you become a market-ready professional.

Free training sessions on Reverse Engineering, Malware Analysis, and Exploit Development.

Wide range of cybersecurity videos covering various topics and conferences.

Connect and learn from experts and peers in the Microsoft Community Hub.

A comprehensive SQL injection cheat sheet covering various database management systems and techniques.

Introductory book about cryptography with instructions for building and translating.

Deliberately vulnerable CI/CD environment with 11 challenges to practice security.

12
3
45