CloudGoat is Rhino Security Labs' 'Vulnerable by Design' AWS deployment tool that allows users to hone their cloud cybersecurity skills through 'capture-the-flag' style scenarios. Each scenario is composed of AWS resources to create structured learning experiences, offering both easy and hard challenges with multiple paths to victory. The tool aims to provide focused, curated, high-quality learning experiences with good documentation.
HTB Academy offers guided cybersecurity training with industry certifications to help you become a market-ready professional.
A collection of computer science courses with video lectures covering a wide range of topics.
Free online ethical hacking course covering penetration testing, web app assessments, exploit development, and security operations.
Best practices for corporate network segmentation to protect against basic targeted attacks
A game packed with real-life examples of how not to store secrets in software, with 46 challenges to solve.
Find books at your favorite store and stay updated on new features with Universal Book Links.
An AI-powered career platform that automates the creation of cybersecurity job application materials and provides company-specific insights for job seekers.
Fabric Platform is a cybersecurity reporting solution that automates and standardizes report generation, offering a private-cloud platform, open-source tools, and community-supported templates.
Stay ahead in cybersecurity. Get the week's top cybersecurity news and insights in 8 minutes or less.
Wiz Cloud Security Platform is a cloud-native security platform that enables security, dev, and devops to work together in a self-service model, detecting and preventing cloud security threats in real-time.
A cybersecurity platform that offers vulnerability scanning, Windows Defender and 3rd party AV management, and MFA compliance reporting, among other features.
Adversa AI is a cybersecurity company that provides solutions for securing and hardening machine learning, artificial intelligence, and large language models against adversarial attacks, privacy issues, and safety incidents across various industries.