ENISA Training Resources provides online training material for cybersecurity specialists, including handbooks for teachers, toolsets for students, and virtual images to support hands-on training sessions. The training material covers four main areas: Technical, Building artefact handling and analysis environment, Processing and storing artifacts, and Artefact analysis fundamentals. The resources provided aim to deliver trainings more efficiently with better and longer-lasting results, and include a good practice guide on training methodologies and a roadmap for more proactive and efficient CERT training.
FEATURES
EXPLORE BY TAGS
SIMILAR TOOLS
A comprehensive reference guide covering Nessus vulnerability scanner configuration, management, API usage, and best practices.
A comprehensive guide to developing an incident response capability through intelligence-based threat hunting, covering theoretical concepts and real-life scenarios.
A repository providing centralized access to presentation slides from major cybersecurity conferences including Black Hat, Offensivecon, and REcon events.
A comprehensive guide to digital forensics and incident response, covering incident response frameworks, digital forensic techniques, and threat intelligence.
Free and open-source cybersecurity training classes with multi-class learning paths for high-skill, high-pay job skills.
A comprehensive guide to using Metasploit, including searching for modules, specifying exploits and payloads, and using auxiliary modules.
A comprehensive SQL injection cheat sheet covering various database management systems and techniques.
A practical guide to developing a comprehensive security monitoring and incident response strategy, covering incident response fundamentals, threat analysis, and data analysis.
PINNED

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.