ENISA Training Resources provides online training material for cybersecurity specialists, including handbooks for teachers, toolsets for students, and virtual images to support hands-on training sessions. The training material covers four main areas: Technical, Building artefact handling and analysis environment, Processing and storing artifacts, and Artefact analysis fundamentals. The resources also include good practice guides on training methodologies and a roadmap for providing more proactive and efficient CERT training. The training material was introduced in 2008 and has been continuously updated with new additions, making it an essential resource for success in the CSIRT community and in the field of Cyber Security.
A newsletter providing summarized cyber defense technical content for blue and purple teams to stay informed and protect their estates.
A non-profit organization providing live-fire cyber warfare ranges for training and up-skilling cybersecurity professionals.
Boston Key Party CTF 2013 - cybersecurity competition with challenges in various domains.
An AI-powered career platform that automates the creation of cybersecurity job application materials and provides company-specific insights for job seekers.
Fabric Platform is a cybersecurity reporting solution that automates and standardizes report generation, offering a private-cloud platform, open-source tools, and community-supported templates.
Stay ahead in cybersecurity. Get the week's top cybersecurity news and insights in 8 minutes or less.
Wiz Cloud Security Platform is a cloud-native security platform that enables security, dev, and devops to work together in a self-service model, detecting and preventing cloud security threats in real-time.
A cybersecurity platform that offers vulnerability scanning, Windows Defender and 3rd party AV management, and MFA compliance reporting, among other features.
Adversa AI is a cybersecurity company that provides solutions for securing and hardening machine learning, artificial intelligence, and large language models against adversarial attacks, privacy issues, and safety incidents across various industries.