FREE CYBER RESOURCES
An awesome list of resources for training, conferences, speaking, labs, reading, etc that are **free** all the time that cybersecurity professionals with downtime can take advantage of to improve their skills and marketability to come out on the other side ready to rock.
Drop me a subscribe on YouTube and lets connect more:
Nox Cyber Jay Jay Davey site full of curated cybersecurity training resources. https://noxcyber.co.uk/
WebSecurity Academy Free online web security training from the creators of Burp Suite https://portswigger.net/web-security
Mosse Cyber Security Institute Introduction to cybersecurity free certification with 100+ hours of training, no expiry/renewals, https://www.mosse-institute.com/certifications/mics-introduction-to-cyber-security.html
BugCrowd University Free bug hunting resources and methodologies in form of webinars, education and training. https://www.bugcrowd.com/hackers/bugcrowd-university/
Certified Network Security Specialist Certification and training; Expires Aug 31 2020 Use coupon code #StaySafeHome during checkout to claim your free access. Offer is valid till 31/08/2020. £500.00 Value https://www.icsi.co.uk/courses/icsi-cnss-certified-network-security-specialist-covid-19
Metasploit Unleashed Most complete and in-depth Metasploit guide available, with contributions from the authors of the No Starch Press Metasploit Book. https://www.offensive-security.com/metasploit-unleashed/
AWS Cloud Certified Get skills in AWS to be more marketable. Training is quality and free. https://www.youtube.com/watch?v=3hLmDS179YE Have to create an AWS account, Exam is $100.
SANS Faculty Free Tools List of OSS developed by SANS staff. https://www.sans.org/media/free/free-faculty-tools.pdf?msc=sans-free-lp
"Using ATT&CK for Cyber Threat Intelligence Training" - 4 hour training The goal of this training is for students to understand the following: at: https://attack.mitre.org/resources/training/cti/
Coursera -"Coursera Together: Free online learning during COVID-19" Lots of different types of free training. https://blog.coursera.org/coursera-together-free-online-learning-during-covid-19/
Fortinet Security Appliance Training Free access to the FortiGate Essentials Training Course and Network Security Expert courses 1 and 2 https://www.fortinet.com/training/cybersecurity-professionals.html
Chief Information Security Officer (CISO) Workshop Training - The Chief Information Security Office (CISO) workshop contains a collection of security learnings, principles, and recommendations for modernizing security in your organization. This training workshop is a combination of experiences from Microsoft security teams and learnings from customers. - https://docs.microsoft.com/en-us/security/ciso-workshop/ciso-workshop
CLARK Center Plan C - Free cybersecurity curriculum that is primarily video-based or provide online assignments that can be easily integrated into a virtual learning environments https://clark.center/home
Hack.me is a FREE, community based project powered by eLearnSecurity. The community can build, host and share vulnerable web application code for educational and research purposes. It aims to be the largest collection of "runnable" vulnerable web applications, code samples and CMS's online. The platform is available without any restriction to any party interested in Web Application Security. https://hack.me/
Hacker101 - Free classes for web security - https://www.hacker101.com/
ElasticStack - Free on-demand Elastic Stack, observability, and security courses. https://training.elastic.co/learn-from-home Hoppers Roppers - Community built around a series of free courses that provide training to beginners in the security field. https://www.hoppersroppers.org/training.html
IBM Security Learning Academy Free technical training for IBM Security products. https://www.securitylearningacademy.com/
M.E. Kabay Free industry courses and course materials for students, teachers and others are welcome to use for free courses and lectures. http://www.mekabay.com/courses/index.htm
Open P-TECH Free digital learning on the tech skills of tomorrow. https://www.ptech.org/open-p-tech/
Udemy - Online learning course platform "collection from the free courses in our learning marketplace" https://www.udemy.com/courses/free/
Enroll Now Free: PCAP Programming Essentials in Python https://www.netacad.com/courses/programming/pcap-programming-essentials-python Python is the very versatile, object-oriented programming language used by startups and tech giants, Google, Facebook, Dropbox and IBM. Python is also recommended for aspiring young developers who are interested in pursuing careers in Security, Networking and Internet-of-Things. Once you complete this course, you are ready to take the PCAP – Certified Associate in Python programming. No prior knowledge of programming is required.
Packt Web Development Course Web Development Get to grips with the fundamentals of the modern web Unlock one year of free online access. https://courses.packtpub.com/pages/free?fbclid=IwAR1FtKQcYK8ycCmBMXaBGvW_7SgPVDMKMaRVwXYcSbiwvMfp75gazxRZlzY
Stanford University Webinar - Hacked! Security Lessons from Big Name Breaches 50 minute cyber lecture from Stanford.You Will Learn: -- The root cause of key breaches and how to prevent them; How to measure your organization’s external security posture; How the attacker lifecycle should influence the way you allocate resources
Stanford University Webinar - Hash, Hack, Code: Emerging Trends in Cyber Security Join Professor Dan Boneh as he shares new approaches to these emerging trends and dives deeper into how you can protect networks and prevent harmful viruses and threats. 50 minute cyber lecture from Stanford.
Kill Chain: The Cyber War on America's Elections (Documentary) (Referenced at GRIMMCON), In advance of the 2020 Presidential Election, Kill Chain: The Cyber War on America’s Elections takes a deep dive into the weaknesses of today’s election technology, an issue that is little understood by the public or even lawmakers. https://www.hbo.com/documentaries/kill-chain-the-cyber-war-on-americas-elections
Intro to Cybersecurity Course (15 hours) Learn how to protect your personal data and privacy online and in social media, and why more and more IT jobs require cybersecurity awareness and understanding. Receive a certificate of completion. https://www.netacad.com/portal/web/self-enroll/c/course-1003729
Cybersecurity Essentials (30 hours) Foundational knowledge and essential skills for all cybersecurity domains, including info security, systems sec, network sec, ethics and laws, and defense and mitigation techniques used in protecting businesses. https://www.netacad.com/portal/web/self-enroll/c/course-1003733
Pluralsight and Microsoft Partnership to help you become an expert in Azure. With skill assessments and over 200+ courses, 40+ Skill IQs and 8 Role IQs, you can focus your time on understanding your strengths and skill gaps and learn Azure as quickly as possible.https://www.pluralsight.com/partners/microsoft/azure
Blackhat Webcast Series Monthly webcast of varying cyber topics. I will post specific ones in the training section below sometimes, but this is worth bookmarking and checking back. They always have top tier speakers on relevant, current topics. https://www.blackhat.com/html/webcast/webcast-home.html
Federal Virtual Training Environment - US Govt sponsored free courses. There are 6 available, no login required. They are 101 Coding for the Public, 101 Critical Infrastructure Protection for the Public, Cryptocurrency for Law Enforcement for the Public, Cyber Supply Chain Risk Management for the Public, 101 Reverse Engineering for the Public, Fundamentals of Cyber Risk Management. https://fedvte.usalearning.gov/public_fedvte.php
Harrisburg University CyberSecurity Collection of 18 curated talks. Scroll down to CYBER SECURITY section. You will see there are 4 categories Resource Sharing, Tools & Techniques, Red Team (Offensive Security) and Blue Teaming (Defensive Security). Lot of content in here; something for everyone. https://professionaled.harrisburgu.edu/online-content/
OnRamp 101-Level ICS Security Workshop Starts this 4/28. 10 videos, Q&A / discussion, bonus audio, great links. Get up to speed fast on ICS security. It runs for 5 weeks. 2 videos per week. Then we keep it open for another 3 weeks for 8 in total. https://onramp-3.s4xevents.com
HackXOR WebApp CTF Hackxor is a realistic web application hacking game, designed to help players of all abilities develop their skills. All the missions are based on real vulnerabilities I've personally found while doing pentests, bug bounty hunting, and research. https://hackxor.net/
Suricata Training 5-part training module using a simulation as a backdrop to teach how to use Suricata. https://rangeforce.com/resource/suricata-challenge-reg/
flAWS System Through a series of levels you'll learn about common mistakes and gotchas when using Amazon Web Services (AWS). Multiple levels, "Buckets" of fun. http://flaws.cloud/
Stanford CS 253 Web Security A free course from Stanford providing a comprehensive overview of web security. The course begins with an introduction to the fundamentals of web security and proceeds to discuss the most common methods for web attacks and their countermeasures. The course includes video lectures, slides, and links to online reading assignments. https://web.stanford.edu/class/cs253
Linux Journey A free, handy guide for learning Linux. Coverage begins with the fundamentals of command line navigation and basic text manipulation. It then extends to more advanced topics, such as file systems and networking. The site is well organized and includes many examples along with code snippets. Exercises and quizzes are provided as well. https://linuxjourney.com
Ryan's Tutorials A collection of free, introductory tutorials on several technology topics including: Linux command line, Bash scripting, creating and styling webpages with HTML and CSS, counting and converting between different number systems, and writing regular expressions. https://ryanstutorials.net
The Ultimate List of SANS Cheat Sheets Massive collection of free cybersecurity cheat sheets for quick reference (login with free SANS account required for some penetration testing resources). https://www.sans.org/blog/the-ultimate-list-of-sans-cheat-sheets/
CYBER INTELLIGENCE ANALYTICS AND OPERATIONS Learn:The ins and outs of all stages of the intelligence cycle from collection to analysis from seasoned intel professionals. How to employ threat intelligence to conduct comprehensive defense strategies to mitigate potential compromise. How to use TI to respond to and minimize impact of cyber incidents. How to generate comprehensive and actionable reports to communicate gaps in defenses and intelligence findings to decision makers. https://www.shadowscape.io/cyber-intelligence-analytics-operat
Linux Command Line for Beginners 25 hours of training - In this course, you’ll learn from one of Fullstack’s top instructors, Corey Greenwald, as he guides you through learning the basics of the command line through short, digestible video lectures. Then you’ll use Fullstack’s CyberLab platform to hone your new technical skills while working through a Capture the Flag game, a special kind of cybersecurity game designed to challenge participants to solve computer security problems by solving puzzles. Finally, through a list of carefully curated resources through a series of curated resources, we’ll introduce you to some important cybersecurity topics so that you can understand some of the common language, concepts and tools used in the industry. https://prep.fullstackacademy.com/
Hacking 101 6 hours of free training - First, you'll take a tour of the world and watch videos of hackers in action across various platforms (including computers, smartphones, and the power grid). You may be shocked to learn what techniques the good guys are using to fight the bad guys (and which side is winning). Then you'll learn what it's like to work in this world, as we show you the different career paths open to you and the (significant) income you could make as a cybersecurity professional. https://cyber.fullstackacademy.com/prepare/hacking-101
Choose Your Own Cyber Adventure Series: Entry Level Cyber Jobs Explained YouTube Playlist (videos from my channel #simplyCyber) This playlist is a collection of various roles within the information security field, mostly entry level, so folks can understand what different opportunities are out there. https://www.youtube.com/playlist?list=PL4Q-ttyNIRAqog96mt8C8lKWzTjW6f38F
HackerSploit - HackerSploit is the leading provider of free and open-source Infosec and cybersecurity training. https://hackersploit.org/
CyberStart America - "A new program designed to give high school students in the US free access to cybersecurity learning resources written and developed by industry professionals, which can also be used to train and qualify for a National Cyber Scholarship." Sponsored by the SANS Institue and the National Cyber Scholarship Foundation, the program is open to high school students who are at least 13 years old and enrolled in 9th, 10th, 11th or 12th grade at a public or private school (or the homeschool equivalent) in the US. https://www.cyberstartamerica.orgPENTESTING TRAINING LABS (curated from https://github.com/michelbernardods/labs-pentest)
Academy Hackaflag (Spanish) https://academy.hackaflag.com.br/
Try Hack Me https://tryhackme.com/
alert to win https://alf.nu/alert1
CTF Komodo Security https://ctf.komodosec.com/
CMD Challenge https://cmdchallenge.com
Explotation Education https://exploit.education/
Google CTF https://capturetheflag.withgoogle.com/
Hacker Security https://capturetheflag.com.br/
Labs Wizard Security https://labs.wizard-security.net
Practical Pentest Labs https://practicalpentestlabs.com
Penetration Testing Practice Labs http://www.amanhardikar.com/mindmaps/Practice.html
PentestIT LAB https://lab.pentestit.ru
Root in Jail http://ctf.rootinjail.com
SANS Challenger https://www.holidayhackchallenge.com/
Try Hack Me https://tryhackme.com/
The Cryptopals Crypto Challenges https://cryptopals.com/
Building Secure & Reliable Systems
Best Practices for Designing, Implementing and Maintaining Systems (O'Reilly)
By Heather Adkins, Betsy Beyer, Paul Blankinship, Ana Oprea, Piotr Lewandowski, Adam Stubblefield
Security Engineering By Ross Anderson - A guide to building dependable distributed systems. (and Ross Anderson is brilliant //OP editorial)
The Cyber Skill Gap By Vagner Nunes - The Cyber Skill Gap: How To Become A Highly Paid And Sought After Information Security Specialist! (Use COUPON CODE: W4VSPTW8G7 to make it free)
The Beginner’s Guide to Information Security By Limor Elbaz - Offers insight and resources to help readers embark on a career in one of the 21st century’s most important—and potentially lucrative—fields.
Texas A&M Security Courses The web-based courses are designed to ensure that the privacy, reliability, and integrity of the information systems that power the global economy remain intact and secure. The web-based courses are offered through three discipline-specific tracks: general, non-technical computer users; technical IT professionals; and business managers and professionals.
Computer Science courses with video lectures Intent of this list is to act as Online bookmarks/lookup table for freely available online video courses. Focus would be to keep the list concise so that it is easy to browse. It would be easier to skim through 15 page list, find the course and start learning than having to read 60 pages of text. If you are student or from non-CS background, please try few courses to decide for yourself as to which course suits your learning curve best.
Cryptography I -offered by Stanford University - Rolling enrollment - Cryptography is an indispensable tool for protecting information in computer systems. In this course you will learn the inner workings of cryptographic systems and how to correctly use them in real-world applications. The course begins with a detailed discussion of how two parties who have a shared secret key can communicate securely when a powerful adversary eavesdrops and tampers with traffic. We will examine many deployed protocols and analyze mistakes in existing systems. The second half of the course discusses public-key techniques that let two parties generate a shared secret key.
Software Security Rolling enrollment -offered by University of Maryland, College Park via Coursera - This course we will explore the foundations of software security. We will consider important software vulnerabilities and attacks that exploit them -- such as buffer overflows, SQL injection, and session hijacking -- and we will consider defenses that prevent or mitigate these attacks, including advanced testing and program analysis techniques. Importantly, we take a "build security in" mentality, considering techniques at each phase of the development cycle that can be used to strengthen the security of software systems.
Intro to Information Security Georgia Institute of Technology via Udacity - Rolling Enrollment. This course provides a one-semester overview of information security. It is designed to help students with prior computer and programming knowledge — both undergraduate and graduate — understand this important priority in society today. Offered at Georgia Tech as CS 6035
Cyber-Physical Systems Security Georgia Institute of Technology via Udacity - This course provides an introduction to security issues relating to various cyber-physical systems including industrial control systems and those considered critical infrastructure systems. 16 week course - Offered at Georgia Tech as CS 8803
Finding Your Cybersecurity Career Path - University of Washington via edX - 4 weeks long - self paced - In this course, you will focus on the pathways to cybersecurity career success. You will determine your own incoming skills, talent, and deep interests to apply toward a meaningful and informed exploration of 32 Digital Pathways of Cybersecurity.
Building a Cybersecurity Toolkit - University of Washington via edX - 4 weeks self-paced The purpose of this course is to give learners insight into these type of characteristics and skills needed for cybersecurity jobs and to provide a realistic outlook on what they really need to add to their “toolkits” – a set of skills that is constantly evolving, not all technical, but fundamentally rooted in problem-solving.
Cybersecurity: The CISO's View - University of Washington via edX - 4 weeks long self-paced - This course delves into the role that the CISO plays in cybersecurity operations. Throughout the lessons, learners will explore answers to the following questions: How does cybersecurity work across industries? What is the professionals' point of view? How do we keep information secure
Introduction to Cybersecurity - University of Washington via edX - In this course, you will gain an overview of the cybersecurity landscape as well as national (USA) and international perspectives on the field. We will cover the legal environment that impacts cybersecurity as well as predominant threat actors. -
Cyber Attack Countermeasures New York University (NYU) via Coursera - This course introduces the basics of cyber defense starting with foundational models such as Bell-LaPadula and information flow frameworks. These underlying policy enforcements mechanisms help introduce basic functional protections, starting with authentication methods. Learners will be introduced to a series of different authentication solutions and protocols, including RSA SecureID and Kerberos, in the context of a canonical schema. -
Introduction to Cyber Attacks New York University (NYU) via Coursera - This course provides learners with a baseline understanding of common cyber security threats, vulnerabilities, and risks. An overview of how basic cyber attacks are constructed and applied to real systems is also included. Examples include simple Unix kernel hacks, Internet worms, and Trojan horses in software utilities. Network attacks such as distributed denial of service (DDOS) and botnet- attacks are also described and illustrated using real examples from the past couple of decades.
Enterprise and Infrastructure Security New York University (NYU) via Coursera - This course introduces a series of advanced and current topics in cyber security, many of which are especially relevant in modern enterprise and infrastructure settings. The basics of enterprise compliance frameworks are provided with introduction to NIST and PCI. Hybrid cloud architectures are shown to provide an opportunity to fix many of the security weaknesses in modern perimeter local area networks.
Network Security Georgia Institute of Technology via Udacity - This course provides an introduction to computer and network security. Students successfully completing this class will be able to evaluate works in academic and commercial security, and will have rudimentary skills in security research. The course begins with a tutorial of the basic elements of cryptography, cryptanalysis, and systems security, and continues by covering a number of seminal papers and monographs in a wide range of security areas. -
Real-Time Cyber Threat Detection and Mitigation - New York University (NYU) via Coursera This course introduces real-time cyber security techniques and methods in the context of the TCP/IP protocol suites. Explanation of some basic TCP/IP security hacks is used to introduce the need for network security solutions such as stateless and stateful firewalls. Learners will be introduced to the techniques used to design and configure firewall solutions such as packet filters and proxies to protect enterprise assets.
Risky Business Published weekly, the Risky Business podcast features news and in-depth commentary from security industry luminaries. Hosted by award-winning journalist Patrick Gray, Risky Business has become a must-listen digest for information security professionals.
Pauls Security Weekly This show features interviews with folks in the security community; technical segments, which are just that, very technical; and security news, which is an open discussion forum for the hosts to express their opinions about the latest security headlines, breaches, new exploits and vulnerabilities, “not” politics, “cyber” policies and more.
Security Now - Steve Gibson, the man who coined the term spyware and created the first anti-spyware program, creator of Spinrite and ShieldsUP, discusses the hot topics in security today with Leo Laporte.
Daily Information Security Podcast ("StormCast”) Stormcasts are daily 5-10 minute information security threat updates. The podcast is produced each work day, and typically released late in the day to be ready for your morning commute.
ShadowTalk Threat Intelligence Podcast by Digital Shadow_. The weekly podcast highlights key findings of primary-source research our Intelligence Team is conducting, along with guest speakers discussing the latest threat actors, campaigns, security events and industry news.
Don't Panic - The Unit 42 Podcast Don't Panic! is the official podcast from Unit 42 at Palo Alto Networks. We find the big issues that are frustrating cyber security practitioners and help simplify them so they don't need to panic.
Recorded Future Recorded Future takes you inside the world of cyber threat intelligence. We’re sharing stories from the trenches and the operations floor as well as giving you the skinny on established and emerging adversaries. We also talk current events, technical tradecraft, and offer up insights on the big picture issues in our industry.
The Cybrary Podcast Listen in to the Cybrary Podcast where we discuss a range topics from DevSecOps and Ransomware attacks to diversity and how to retain of talent. Entrepreneurs at all stages of their startup companies join us to share their stories and experience, including how to get funding, hiring the best talent, driving sales, and choosing where to base your business.
Cyber Life The Cyber Life podcast is for cyber security (InfoSec) professionals, people trying to break into the industry, or business owners looking to learn how to secure their data. We will talk about many things, like how to get jobs, cover breakdowns of hot topics, and have special guest interviews with the men and women "in the trenches" of the industry.
Career Notes Cybersecurity professionals share their personal career journeys and offer tips and advice in this brief, weekly podcast from The CyberWire. podcasts Added from here:
Down the Security Rabbithole Down the Security Rabbithole is hosted by Rafal Los and James Jardine who discuss, by means of interviewing or news analysis, everything about Cybersecurity which includes Cybercrime, Cyber Law, Cyber Risk, Enterprise Risk & Security and many more. If you want to hear issues that are relevant to your organization, subscribe and tune-in to this podcast.
The Privacy, Security, & OSINT Show The Privacy, Security, & OSINT Show, hosted by Michael Bazzell, is your weekly dose of digital security, privacy, and Open Source Intelligence (OSINT) opinion and news. This podcast will help listeners learn some ideas on how to stay secure from cyber-attacks and help them become “digitally invisible”.
Defensive Security Podcast Hosted by Andrew Kalat (@lerg) and Jerry Bell (@maliciouslink), the Defensive Security Podcasts aims to look/discuss the latest security news happening around the world and pick out the lessons that can be applied to keeping organizations secured. As of today, they have more than 200 episodes and some of the topics discussed include Forensics, Penetration Testing, Incident Response, Malware Analysis, Vulnerabilities and many more.
Darknet Diaries Darknet Diaries Podcast is hosted and produced by Jack Rhysider that discuss topics related to information security. It also features some true stories from hackers who attacked or have been attacked. If you’re a fan of the show, you might consider buying some of their souvenirs here (
Brakeing Down Security Brakeing Down Security started in 2014 and is hosted by Bryan Brake, Brian Boettcher, and Amanda Berlin. This podcast discusses everything about the Cybersecurity world, Compliance, Privacy, and Regulatory issues that arise in today’s organizations. The hosts will teach concepts that Information Security Professionals need to know and discuss topics that will refresh the memories of seasoned veterans.
Open Source Security Podcast Open Source Security Podcast is a podcast that discusses security with an open-source slant. The show started in 2016 and is hosted by Josh Bressers and Kurt Siefried. As of this writing, they now posted around 190+ podcasts
Cyber Motherboard Ben Makuch is the host of the podcast CYBER and weekly talks to Motherboard reporters Lorenzo Franceschi-Bicchierai and Joseph Cox. They tackle topics about famous hackers and researchers about the biggest news in cybersecurity. The Cyber- stuff gets complicated really fast, but Motherboard spends its time fixed in the infosec world so we don’t have to.
Hak5 Hak5 is a brand that is created by a group of security professionals, hardcore gamers and “IT ninjas”. Their podcast, which is mostly uploaded on YouTube discusses everything from open-source software to penetration testing and network infrastructure. Their channel currently has 590,000 subscribers and is one of the most viewed shows when you want to learn something about security networks.
Threatpost Podcast Series Threatpost is an independent news site which is a leading source of information about IT and business security for hundreds of thousands of professionals worldwide. With an award-winning editorial team produces unique and high-impact content including security news, videos, feature reports and more, with their global editorial activities are driven by industry-leading journalist Tom Spring, editor-in-chief.
CISO-Security Vendor Relationship Podcast Co-hosted by the creator of the CISO/Security Vendor Relationship Series, David Spark, and Mike Johnson, in 30 minutes, this weekly program challenges the co-hosts, guests, and listeners to critique, share true stories. This podcast, The CISO/Security Vendor Relationship, targets to enlighten and educate listeners on improving security buyer and seller relationships.
Getting Into Infosec Podcast Stories of how Infosec and Cybersecurity pros got jobs in the field so you can be inspired, motivated, and educated on your journey. -
Unsupervised Learning Weekly podcasts and biweekly newsletters as a curated summary intersection of security, technology, and humans, or a standalone idea to provoke thought, by Daniel Miessler.
CISO Series - Daily Security Headlines - 7 minutes daily show that has the cyber news today. (This is what I personally listen to daily).
Monica Talks Cyber - Monica Verma CISO podcast series interviewing industry experts on various cyber topics.
_This list was originally forked/curated from here: on (7/29/2020) Attribution and appreciation to d4rckh_
SimplyCyber Weekly vids, Simply Cyber brings Information security related content to help IT or Information Security professionals take their career further, faster. Current cyber security industry topics and techniques are explored to promote a career in the field. Topics cover offense, defense, governance, risk, compliance, privacy, education, certification, conferences; all with the intent of professional development.
Tradecraft Security Weekly - Want to learn about all of the latest security tools and techniques?
Derek Rook - CTF/Boot2root/wargames Walkthrough - lots of lengthy screenshot instructional vids Adrian Crenshaw - lots of lengthy con-style talks
LionSec - lots of brief screenshot instructional vids, no dialog
Zer0Mem0ry - lots of brief c++ security videos, programming intensive
webpwnized - lots of brief screenshot vids, some CTF walkthroughs
Waleed Jutt - lots of brief screenshot vids covering web security and game programming
Troy Hunt - lone youtuber, medium length news videos, 16K followers, regular content
Tradecraft Security Weekly - Want to learn about all of the latest security tools and techniques?
SSTec Tutorials - lots of brief screenshot vids, regular updates
Shozab Haxor - lots of screenshot style instructional vids, regular updates, windows CLI tutorial
Seytonic - variety of DIY hacking tutorials, hardware hacks, regular updates
Security Weekly - regular updates, lengthy podcast-style interviews with industry pros
SecureNinjaTV - brief news bites, irregular posting, 18K followers
Samy Kamkar’s Applied hacking
rwbnetsec - lots of medium length instructional videos covering tools from Kali 2.0, no recent posts.
Penetration Testing in Linux
Pentester Academy TV - lots of brief videos, very regular posting, up to +8 a week
Open SecurityTraining - lots of lengthy lecture-style vids, no recent posts, but quality info.
NetSecNow - channel of pentesteruniversity.org, seems to post once a month, screenshot instructional vids
Metasploitation - lots of screenshot vids, little to no dialogue, all about using Metasploit, no recent vids.
LiveOverflow - Lots of brief-to-medium instructional vids, covering things like buffer overflows and exploit writing, regular posts.
LionSec - lots of brief screenshot instructional vids, no dialog
Latest Hacking News 10K followers, medium length screenshot videos, no recent releases
John Hammond - Solves CTF problems. contains penTesting tips and tricks
JackkTutorials - lots of medium length instructional vids with some AskMe vids from the youtuber
iExplo1t - lots of screenshot vids aimed at novices, 5.7K Followers, no recent posts
HACKING TUTORIALS - handful of brief screenshot vids, no recent posts.
HackerSploit - regular posts, medium length screenshot vids, with dialog
GynvaelEN - Security streams from Google Researcher. Mainly about CTFs, computer security, programing and similar things.
Geeks Fort - KIF - lots of brief screenshot vids, no recent posts https://www.youtube.com/channel/UC09NdTL2hkThGLSab8chJMw
Error 404 Cyber News - short screen-shot videos with loud metal, no dialog, bi-weekly
Don Does 30 - amateur pen-tester posting lots of brief screenshot vids regularly, 9K Followers
Derek Rook - CTF/Boot2root/wargames Walkthrough - lots of lengthy screenshot instructional vids,
DemmSec - lots of pen testing vids, somewhat irregular uploads, 44K followers
DEFCON Conference - lots of lengthy con-style vids from the iconical DEFCON
DedSec - lots of brief screenshot how-to vids based in Kali, no recent posts.
danooct1 - lots of brief screenshot, how-to vids regarding malware, regular content updates, 186K followers
BalCCon - Balkan Computer Congress - Long con-style talks from the Balkan Computer Congress, doesn’t update regularly
Corey Nachreiner - security newsbites, 2.7K subscribers, 2-3 videos a week, no set schedule
Adrian Crenshaw - lots of lengthy con-style talks
0x41414141 - Channel with couple challenges, well explained
HackADay - Hackaday serves up Fresh Hacks Every Day from around the Internet.
TheCyberMentor - Heath Adams uploads regular videos related to various facets of cyber security, from bug bounty hunts to specific pentest methodologies like API, buffer overflows, networking.
Grant Collins - Grant uploads videos regarding breaking into cybersecurity, various cybersecurity projects, building up a home lab amongst many others. Also has a companion discord channel and a resource website.
Security School "We go over how to stay anonymous online / ways to stay anonymous while hacking and browsing the web"
Cybersecurity Meg - Meg discusses career tips, her experiences working as a female in Cybersecurity, trying to empower everyone to explore STEM fields, how she attained my certifications, getting started in Cyber... and dogs too
Krebs On Security In depth security news and investigation
Dark Reading Cyber security's comprehensive news site is now an online community for security professionals.
The Hacker News - The Hacker News (THN) is a leading, trusted, widely-acknowledged dedicated cybersecurity news platform, attracting over 8 million monthly readers including IT professionals, researchers, hackers, technologists, and enthusiasts.
SecuriTeam - A free and independent source of vulnerability information.
SANS NewsBites - "A semiweekly high-level executive summary of the most important news articles that have been published on computer security during the last week. Each news item is very briefly summarized and includes a reference on the web for detailed information, if possible." Published for free on Tuesdays and Fridays.
Professional Networking Discord and Slack (Networking and Communication Opportunities)
_I'm (Gerald Auger) personally a member of the following Discord/Slack groups and have validated their quality and integrity. Message me if you want in those channels Discord: Gerald.Auger | Slack Gerald_Auger_
Unofficial RangeForce (And HOME TO SIMPLYCYBER!) https://discord.gg/C8mtwCPuXq
Metasploit Official Public Slack
BlackHills Information Security Discord
The Cyber Mentor Discord
DERPCON Discord -
GRIMM Con - Public Discord follow channels I'm not a member of and cuarted but have not validated their quality and integrity personally. If you are a member and can message me about these groups I will move them into a validated category_
OWASP (Slack) The Open Web Application Security Project (OWASP) is an online community that produces freely-available articles, methodologies, documentation, tools, and technologies in the field of web application security.
DFIR Community Security folks interested in Digital Forensics & Incident Response.
Binary Ninja Slack This is a channel dedicated to reverse engineering. Reverse engineering also called back engineering is the processes of extracting knowledge or design information from anything man-made and reproducing it or reproducing anything based on the extracted information the process often involves disassembling something a mechanical device electronic component computer program or biological chemical or organic matter and analysing its components and workings in detail.
Security HQ Slack SecurityHQ is a channel most welcoming for all the security professionals and every newbie who wanted to build a career on Information Security or Cyber Security is most welcome to this channel.
CentralSec Slack This is a community of people who are into everything in information security.
Penetration Testers Slack This is a group of ethical hackers and you’re most welcome to this channel if you wanted to start pentesting and find the vulnerabilities and exploits on any website or app and get more help from the fellow members of the channel.
Cybersecurity Mentoring Hub Global session conducted over webex with a discussion/presentation on cybersecurity topic from within the community. Regular shoutouts on LinkedIn.
MeetCyber Regular sessions conducted over crowdcast, can be a training or a workshop, excellent networking and learning opportunities.
REFERENCES / TOOLS /CHEATSHEETS
References/Tools/Cheat SheetsMalware Analysis
Cybersecurity Heatmap for cyber jobs in the US:
VirusTotal - Analyze suspicious files and URLs to detect types of malware, automatically share them with the security community https://www.virustotal.com/gui/
Any.Run Malware hunting with live access to the heart of an incident https://any.run/
Privilege-Escalation: This cheasheet is aimed at the CTF Players and Beginners to help them understand the fundamentals of Privilege Escalation with examples.
Malware analysis tools and resources. https://github.com/rshipp/awesome-malware-analysis
Analyzing Malicious Documents Cheat Sheet
ReverseEngineering Cheat Sheet
Nmap Cheat Sheet and Pro Tips
PENTESTING LocalFileInclude Cheat Sheet
Penetration Testing Tools Cheat Sheet
Reverse Shell Cheat Sheet
Linux Commands Cheat Sheet
Kali Linux Cheat Sheet
Hacking Tools Cheat Sheet (Diff tools)
Google Search Operators: The Complete List (42 Advanced Operators)
(Multiple) (Good) Cheat Sheets - Imgur
Active-Directory-Exploitation-Cheat-Sheet: A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.
Active-Directory-Exploitation-Cheat-Sheet Shodan Query Filters
Getting Real with XSS - A reference on the new techniques to XSS
SANS Massive List of Cheat Sheets Curated from here: https://www.sans.org/blog/the-ultimate-list-of-sans-cheat-sheets/
Windows and Linux Terminals & Command Lines https://assets.contentstack.io/v3/assets/blt36c2e63521272fdc/bltea7de5267932e94b/5eb08aafcf88d36e47cf0644/Cheatsheet_SEC301-401_R7.pdf
TCP/IP and tcpdump
IPv6 Pocket Guide
Powershell Cheat Sheet
Writing Tips for IT Professionals
Tips for Creating and Managing New IT Products
Tips for Getting the Right IT Job
Tips for Creating a Strong Cybersecurity Assessment Report
Critical Log Review Checklist for Security Incidents
Security Architecture Cheat Sheet for Internet Applications
Tips for Troubleshooting Human Communications
Security Incident Survey Cheat Sheet for Server Administrators
Network DDoS Incident Response Cheat Sheet
Information Security Assessment RFP Cheat Sheet
_Digital Forensics and Incident Response_
SIFT Workstation Cheat Sheet
Plaso Filtering Cheat Sheet
Tips for Reverse-Engineering Malicious Code
Usage Tips for Malware Analysis on Linux
Analyzing Malicious Documents
Malware Analysis and Reverse-Engineering Cheat Sheet
SQlite Pocket Reference Guide
Eric Zimmerman's tools Cheat Sheet
Rekall Memory Forensics Cheat Sheet
Linux Shell Survival Guide
Windows to Unix Cheat Sheet
Memory Forensics Cheat Sheet
Hex and Regex Forensics Cheat Sheet
FOR518 Mac & iOS HFS+ Filesystem Reference Sheet
The majority of DFIR Cheat Sheets can be found here --> https://digital-forensics.sans.org/community/cheat-sheets?msc=Cheat+Sheet+Blog._Penetration
Swiss Army Knife collection of PenTesting Cheatsheets
SQLite Injection Cheat Sheet
SSL/TLS Vulnerability Cheat Sheet
Windows Intrusion Discovery Cheat Sheet v3.0
Intrusion Discovery Cheat Sheet v2.0 (Linux)
Intrusion Discovery Cheat Sheet v2.0 (Windows 2000)
Windows Command Line
Netcat Cheat Sheet
Misc Tools Cheat Sheet
Python 3 Essentials
Windows Command Line Cheat Sheet
SMB Access from Linux Cheat Sheet
Pivot Cheat Sheet
Google Hacking and Defense Cheat Sheet
Scapy Cheat Sheet
https://wiki.sans.blue/Tools/pdfs/ScapyCheatSheet_v0.2.pdf Nmap Cheat Sheet
All Around Defender Primers_
Linux CLI 101 https://wiki.sans.blue/Tools/pdfs/LinuxCLI101.pdf
The following graphic
Exploit Database - The Exploit Database is maintained by Offensive Security, an information security training company that provides various Information Security Certifications as well as high end penetration testing services.
The following table provides perspective on the multiple types of roles that can work in cybersecurity. (credit Naomi Buckwalter)
You supported our country, now lets support you. Below are resources that are available to military as they transition into our cyber workforce.
Operation Archangel - Operation Archangel is a non-profit group with the primary mission of supporting active duty, veterans and spouses throughout their their technology career cycle.
With You With Me - We help veterans get tech jobs without having to invest years and money into training.
Operation Code - Operation Code is a non-profit charity helping the military community learn software development, enter the tech industry, and code the future.
FREE CYBER RESUMES & PROF TEMPLATES
Download and Rock 'on