ENISA Training Resources provides online training material for cybersecurity specialists, including handbooks for teachers, toolsets for students, and virtual images to support hands-on training sessions. The training material covers four main areas: Technical, Building artefact handling and analysis environment, Processing and storing artifacts, and Artefact analysis fundamentals. The resources also include good practice guides on training methodologies and a roadmap for providing more proactive and efficient CERT training. The training material was introduced in 2008 and has been continuously updated with new additions, making it an essential resource for success in the CSIRT community and in the field of Cyber Security.
FEATURES
ALTERNATIVES
A practical guide to enhancing digital investigations with cutting-edge memory forensics techniques, covering fundamental concepts, tools, and techniques for memory forensics.
A comprehensive guide to incident response, providing effective techniques for responding to advanced attacks against local and remote network resources.
Comprehensive tutorial series on ARM Assembly covering various topics.
Collection of industry and community cybersecurity courses and materials by M. E. Kabay.
Free training sessions on Reverse Engineering, Malware Analysis, and Exploit Development.
PINNED
Fabric Platform by BlackStork
Fabric Platform is a cybersecurity reporting solution that automates and standardizes report generation, offering a private-cloud platform, open-source tools, and community-supported templates.
Mandos Brief Newsletter
Stay ahead in cybersecurity. Get the week's top cybersecurity news and insights in 8 minutes or less.
Wiz
Wiz Cloud Security Platform is a cloud-native security platform that enables security, dev, and devops to work together in a self-service model, detecting and preventing cloud security threats in real-time.
Adversa AI
Adversa AI is a cybersecurity company that provides solutions for securing and hardening machine learning, artificial intelligence, and large language models against adversarial attacks, privacy issues, and safety incidents across various industries.