Machine Learning for Security
a self-paced machine learning course from data gathering to implementation in python
Course Materials from the National Cybersecurity Training & Education Center
cybersecurity lessons, modules, and course materials including critical infrastructure, cryptography, threats, risk, ethics, camp, identity, secure coding and networking
K12 Free Cybersecurity Curricula
cyber education resources and curriculum for K12 teachers
CyberStart America
a cyber start for high school students to master cybersecurity, over 200 challenges in CTF
Hacker Highschool
self-guided curriculum for cybersafety and cybersecurity designed for 12-20 years old
Cybersecurity Guide
guide for cybersecurity careers, internships, certifications, coding, scholarships, security clearance, degrees, and online programs
Free Online Course for Community College Students
offensive security and digital forensics, internet of things, cryptography, and blockchain technologies
A Graduate Course in Applied Cryptography
secret key cryptography, public key cryptography, protocols, and cryptography theory
Free Training from SANS
forensics, intrusion detection, security operations, pentesting via quizzes, exams, and tutorials
Cybersecurity for Future Presidents Course
a course to promote understanding cybersecurity, privacy, and intellectual property issues from technical and social perspectives
Digital Forensics Courses and Hands-on Labs
incident response, pentesting, malware and software analysis, IoT labs, etc.
Network Penetration Testing for Beginners Course
15 hours of video, 10 week course, with notes and detailed demonstration of a full penetration test, from start to finish
INCUBATE
INjecting and Assessing Cybersecurity edUcation with little internal suBject matter expertise
GENI Security Labs
search 'security' or find at the bottom; labs include: MITM, WiFi sniffing, DoS, IDS, covert storage channel communication, correlation on SDN, certificate authority
Online Computer Science Courses Including Security
hundreds of computer science courses, including basic cybersecurity, proactive computer security, cybersecurity for business and enterprises; web, software, cloud, hardware, network, cyber-physical systems security
CLARK
cybersecurity curriculum for K12, colleges and universities with assignments
Sample High School Curriculum
ethics, security principles, cryptography, malware, physical and web security
CyberSeek
interactive cybersecurity job market map, career pathways
SANS Cybersecurity Skills Roadmap
interactive training roadmap finding the right courses for cyber skill development
GenCyberCoin
web-platform for teaching cryptocurrency, bug bounty, social engineering, password management, and rewarding students with real items on the market
CTF Unplugged
a CTF that does not require any technical preparation, contact for answers
CSEC 2017
curricular guidelines for post-secondary degree programs in cybersecurity - a cybersecurity framework with knowledge areas and industry perspectives
Cybersecurity Certifications Roadmap
Paul Jerimy's extensive security certifications/certs roadmap
National Cyber Scholarship Foundation
college scholarships, cybersecurity training, cyber scholarship competition, CyberStart America
Internship Resources from NCYTE Center
U.S. Intelligence Student Programs Search, DHS Cybersecurity Internship Program, Jobs.cyberindustry.org
Cybersecurity Scholarship Sources
CyberCorps, ISSA, NCWIT, ISC2, CRA-W, and CISCO scholarships
A Variety of Cybersecurity Scholarships
scholarships for women, undergraduate, graduate, veterans, ISC2 scholarships
Cyber Degrees
an extensive search of schools with online, associates, bachelors, masters, PhD, and certificate programs in security based on ranking and location
Cybersecurity Education
find the closest to you degree programs including online, associates, bachelors, and masters in security-related fields
Centers of Academic Excellence in Cyber Defense
colleges and universities that were designated to be CAE in cyber defense expertise
Centers of Academic Excellence in Cyber Operations
colleges and universities that were designated to be CAE in cyber operations expertise
CyberCorps: Scholarship for Service
provides 3-year scholarships for bachelors, masters, or PhD degrees, covering full tuition, conference attendance, and pays a generous stipend on top of that
DoD Cyber Scholarship Program (CySP)
provides tuition, books, and fees coverage for students to study cybersecurity
Labs from Cyber Threat Hunting
malware analysis, login location anomaly detection, resource anomaly detection, employee activity anomaly detection
Secure Scripting
introduction to Linux, secure coding principles and practices, introduction to Python
Malware Traffic Analysis
PCAP files for malware traffic analysis, exercises, and tutorials with wireshark
Hack Lock Challenge by Vitaly Ford
hack the lock on the website
Decode Steganography by Vitaly Ford
find what message is hidden
Mysterious Song by Vitaly Ford
reverse engineer the given code and figure out the name of the song
TalkBack
smart infosec resource and news aggregator
NetSec on Reddit
security vulnerablities, walk-throughs, events, tools, write-ups
Krebs on Security
security investigations, national/global level
Hacker News
mostly computer science, physics, engineering and geek news
Threatpost
independent security news site
Tabletop Games
a list of security-focused board games
Becoming a SOC analyst
creating a set of virtual machines for security operations center (SOC) jobs
Open Source Security Guide
learning resources, security standards, security tools, network security
Certificate Preparation Videos
Professor Messer videos for CompTIA Security+, A+, Network+ preparation
SecurityTube
security teaching videos on WiFi, exploits, assembly, linux, buffer overflow,
Open Security Training
63 days worth of open source class materials; 29 classes; 24 instructors (and still growing)
Awesome Cyber Skills
100+ hacking environments to train cyber skills legally
Cybrary
beginner, intermediate, and advanced security training
E-books
security, programming, software development
Hacksplaining
interactive lessons explaining how different vulnerabilities work
Learn Metasploit
free ethical hacking course using metasploit
Mindmaps
mindmaps for hacking, forensics, cryptography, web, etc. challenges
Hands-on Security Know-How
null-byte's practical security-related projects that can be used for club presentations and self-study
Security Training for Developers
interactive training that walks your through everything
WiCyS Resources
Women in Cybersecurity resource portal: readings, online learning, students, certificates, etc.
Design Virtual Home Hacking Lab
creating a virtual hacking lab with visuals and screenshots
Guide to Learning CTF and Security
CTF write-ups, resources, cheatcheets. Crypto, web, forensics, steganography, binary exploitation, reverse engineering, OSINT.
AWS/GitLab CI/CD themed CTF
Self-hosted hack the cloud CTF on AWS
CTF at Home from GitLab
GitLab's CTF to easily run at home using docker containers
OWASP Coding Dojo
cyber puzzles, CTF, attack and defense lessons, SANS 25, hacking challanges, training and competition platform
KONTRA OWASP Top 10
interactive application security training modules including ruby rest-client backdoor, TikTok xss, Capital Once SSRF, privilege escalation, PII in URL, user enumeration, weak randomness, injections, session fixation, forced browsing, etc.
CryptoHack
modern cryptography challenges including block ciphers, RSA, Diffie-Hellman, Elliptic Curves, etc.
Hivestorm Cyber Defense
free collegiate-focused cyber defense competition, teams of 2-4 players, the goal is to fix security issues in provided virtual machines
SecurityBlueTeam
defensive cyber operations online
Collegiate Cyber Defense Competition (CCDC)
team-based network defense competition to protect it against real pentesters
Collegiate Penetration Testing Competition
team-based pentesting competition where you pentest the network, write and present the report
CTF Time
a calendar and info on almost all CTFs that are out there
CTF Write-ups
a repository of a lot of CTF write-ups and walk-throughs, excellent place to start learning how to do CTFs
VulnHub
CTF-style vulnerable virtual machines
Hack The Box
Online platform with live vulnerable virtual machines and challenges
CyberChef
encodes/decodes/encrypts/descrypts all kids of stuff as a recipe
TryHackMe
hands-on cybersecurity training through real-world scenarious
Azure Goat
vulnerable cloud deployment for cloud pentesting, secure coding, detection and mitigation with Azure
Pentesting Practice Labs
a mindmap of all kinds of vulnerable apps and systems
SecGen
security scenario generator that creates randomly vulnerable virtual machines
Awesome Hacking
a collection of resources for pentesters and security researchers
Awesome Bug Bounty
a list of write-ups on bug bounty hunting
Awesome Sysadmin
awesome open source system administration resources
Awesome IoT Hacks
a collection of articles on IoT getting compromised by researchers
Awesome Reversing
a list of reverse engineering resources
Awesome Exploit Development
tutorials and vulnerable apps for exploit development
Awesome Social Engineering
social engineering resources: books, courses, tools, articles, CTF
Secure Coding Handbook
resources on secure coding, code, training, notes, attacks
Pentestmonkey
reverse shells, SSH, different database injections
High On Coffee
pentesting, LFI, vi, systemd, reverse shells, nbtscan, nmap, linux, etc.
ARM Assembly
32-bit ARM Assembly
Villain
Windows & Linux backdoor generator and multi-session handler that allows users to connect with sibling servers (other machines running Villain) and share their backdoor sessions, handy for working as a team
SecLists
lists of usernames, passwords, URLs, fuzzing payloads, web shells, etc.
WiFi Arsenal
a list of tools, techniques, articles to pentest wireless networks
Awesome Pentest
books, tools, conferences, CTFs, exploitation, databases, etc.
Password Attacks
cracking 12+ character passwords
Red Teamer's Guide to Pivoting
traversing logical network boundaries
Double Pivoting
explore hidden networks
Empire + Death Star
getting Domain Admin with Empire and Death Star
Pentesting Report
a sample of a pseudo-real penetration testing report