Cybersecurity Learning Resources
Find essential cybersecurity resources including online courses, books, hands-on labs, communities, news sites, podcasts, and newsletters to boost your skills.
Dive into these resources to accelerate your learning journey in cybersecurity. Find materials suitable for beginners and experienced professionals alike.
Online Courses
-
AWS Skill Builder (Security)
Official AWS training, including security-specific courses and certifications paths.
Visit Resource → -
Coursera Cybersecurity Specializations
University-backed courses covering fundamentals to advanced topics (e.g., IBM, Google certs).
Visit Resource → -
Cybrary
Free and paid courses, virtual labs, and practice tests covering IT, cybersecurity, and cloud.
Visit Resource → -
Google Cloud Skills Boost (Security)
Official Google Cloud training including security pathways and certifications.
Visit Resource → -
INE (eLearnSecurity)
Offers various cybersecurity training paths (pentesting, incident response, etc.) with hands-on labs.
Visit Resource → -
Microsoft Learn (Security)
Official Microsoft training for Azure security, Microsoft 365 security, and SC certifications.
Visit Resource → -
Offensive Security (OSCP)
Provider of the notoriously challenging Penetration Testing with Kali Linux course and OSCP certification.
Visit Resource → -
Pluralsight Cybersecurity Path
Subscription service with structured paths and courses on various security domains.
Visit Resource → -
SANS Institute
Industry-leading, in-depth training and certifications (GIAC) (expensive).
Visit Resource → -
TCM Security Academy
Practical Ethical Hacking and other hands-on courses.
Visit Resource → -
Udemy Cybersecurity Courses
Wide range of affordable courses on ethical hacking, network security, specific tools.
Visit Resource → -
edX Cybersecurity Programs
Courses and MicroMasters programs from universities like RIT, HarvardX, etc.
Visit Resource →
Books
-
Applied Network Security Monitoring
Practical guide to NSM tools and techniques.
(Search online retailers) -
Blue Team Field Manual (BTFM)
Concise reference guide for blue teamers and incident responders.
(Search online retailers) -
CISSP All-in-One Exam Guide
Popular comprehensive guide for CISSP preparation.
(Search online retailers) -
CompTIA Security+ Study Guide
Comprehensive guides for Security+ exam prep.
(Search online retailers) -
Cult of the Dead Cow
History of a seminal hacking group and its impact.
(Search online retailers) -
Hacking: The Art of Exploitation, 2nd Edition
Fundamentals of hacking techniques, exploit development, C programming.
(Search online retailers) -
Metasploit: The Penetration Tester's Guide
Covers the Metasploit framework.
(Search online retailers) -
Practical Malware Analysis
Essential for learning malware analysis.
(Search online retailers) -
Red Team Field Manual (RTFM)
Quick reference guide for penetration testers and red teamers.
(Search online retailers) -
Sandworm
Compelling narrative about nation-state cyber attacks.
(Search online retailers) -
Serious Cryptography
Detailed guide to modern cryptography.
(Search online retailers) -
The Phoenix Project
Essential reading for understanding DevOps/DevSecOps context.
(Search online retailers) -
The Practice of Network Security Monitoring
Focuses on building and running effective NSM operations.
(Search online retailers) -
The Web Application Hacker's Handbook
The definitive guide to web app security testing.
(Search online retailers) -
Threat Modeling: Designing for Security
Foundational text on threat modeling methodologies.
(Search online retailers)
Hands-on Labs
-
CTFtime
Aggregator for Capture The Flag events worldwide.
Visit Resource → -
CyberDefenders
Blue-team focused challenges involving DFIR, threat hunting, and malware analysis.
Visit Resource → -
Hack The Box
Popular platform offering vulnerable machines, challenges, and labs (CTF style).
Visit Resource → -
Immersive Labs
Enterprise-focused platform with browser-based labs across various security domains.
Visit Resource → -
LetsDefend
Blue team focused training platform with SOC simulation and incident response scenarios.
Visit Resource → -
Offensive Security Proving Grounds (PG)
Practice labs from the creators of OSCP.
Visit Resource → -
PentesterLab
Offers exercises focused specifically on web application penetration testing.
Visit Resource → -
PicoCTF
Free CTF platform run by Carnegie Mellon University, great for beginners.
Visit Resource → -
RangeForce
Cybersecurity training platform with interactive modules and simulations.
Visit Resource → -
TryHackMe
Gamified learning platform with structured learning paths and labs.
Visit Resource → -
VulnHub
Provides downloadable vulnerable VMs for offline practice.
Visit Resource →
YouTube Channels
-
Black Hills Information Security
Webcasts, talks, tool demos from BHIS.
Visit Resource → -
Chris Titus Tech
Windows/Linux optimization, some security topics, hardware.
Visit Resource → -
David Bombal
Networking (CCNA/CCNP), ethical hacking, Python, interviews.
Visit Resource → -
Gerald Auger (Simply Cyber)
Cybersecurity careers, interviews, resume advice.
Visit Resource → -
Hak5
Hacking hardware, pentesting tools, cybersecurity news.
Visit Resource → -
InsiderPhD (Katie Paxton-Fear)
Bug bounty hunting, web security, PhD journey.
Visit Resource → -
IppSec
Detailed Hack The Box machine walkthroughs.
Visit Resource → -
John Hammond
Malware analysis, CTFs, programming, Python.
Visit Resource → -
LiveOverflow
Deeper dives into binary exploitation, reverse engineering, CTFs.
Visit Resource → -
Loi Liang Yang
Tutorials on various security tools and techniques.
Visit Resource → -
NetworkChuck
Energetic IT careers, networking, certs, cyber basics.
Visit Resource → -
Null Byte
Hacking tutorials, cybersecurity news, project ideas.
Visit Resource → -
Professor Messer
Free CompTIA A+, Network+, Security+ courses.
Visit Resource → -
STÖK
Bug bounty, web hacking, recon techniques.
Visit Resource → -
The Cyber Mentor (Heath Adams)
Practical ethical hacking, pentesting, career advice.
Visit Resource →
Twitter / X Accounts
-
@BHinfoSecurity
Black Hills Information Security.
Visit Resource → -
@DanielMiessler
Security, technology, society, Unsupervised Learning.
Visit Resource → -
@DarkReading
Dark Reading news outlet.
Visit Resource → -
@HackersNews
News aggregation feed.
Visit Resource → -
@MalwareTechBlog
Marcus Hutchins, malware analysis, research.
Visit Resource → -
@MarcoDoom
Marco Figueroa, OSINT, cybersecurity insights.
Visit Resource → -
@RealTryHackMe
TryHackMe platform updates.
Visit Resource → -
@RobertMLee
Robert M. Lee, expert in ICS/SCADA security, CEO of Dragos.
Visit Resource → -
@SecurityWeekly
Security Weekly podcast network account.
Visit Resource → -
@SwiftOnSecurity
Cybersecurity commentary, tech insights, humor.
Visit Resource → -
@TCM_Security
The Cyber Mentor / TCM Security Academy.
Visit Resource → -
@TrustedSec
Security company TrustedSec.
Visit Resource → -
@briankrebs
Brian Krebs (KrebsOnSecurity), cybercrime investigations.
Visit Resource → -
@chrissanders88
Chris Sanders, author, trainer, Rural Tech Fund.
Visit Resource → -
@hacks4pancakes
Lesley Carhart, incident response, ICS security.
Visit Resource → -
@hackthebox_eu
Hack The Box platform updates.
Visit Resource → -
@mikko
Mikko Hyppönen, Chief Research Officer at WithSecure.
Visit Resource → -
@shodan_io
Shodan search engine updates and findings.
Visit Resource → -
@thegrugq
Infosec, opsec, geopolitics commentary.
Visit Resource → -
@vxunderground
Malware samples, papers, threat intel.
Visit Resource →
Podcasts
-
CyberWire Daily
Daily cybersecurity news briefings.
Visit Resource → -
Darknet Diaries
True stories from the dark side of the internet.
Visit Resource → -
Malicious Life
Stories about the history of cybersecurity.
Visit Resource → -
Paul's Security Weekly
Long-running podcast covering news, technical segments, and interviews.
Visit Resource → -
Risky Business
Weekly infosec news analysis.
Visit Resource → -
Security Now
Deep dives into security topics with Steve Gibson and Leo Laporte.
Visit Resource → -
Smashing Security
Often humorous take on security news with Graham Cluley and Carole Theriault.
Visit Resource →
Newsletters
-
Risky Biz News
Newsletter accompanying the Risky Business podcast.
Visit Resource → -
SANS NewsBites
Semi-weekly summary of important security news stories.
Visit Resource → -
TLDR Sec
Daily newsletter summarizing top cybersecurity news and articles.
Visit Resource → -
Unsupervised Learning
Daniel Miessler's newsletter on security, tech, and society.
Visit Resource → -
Zero Day (Kim Zetter)
Newsletter from Kim Zetter, investigative cyber journalist.
Visit Resource →
Communities
-
BSides Conferences
Community-organized security conferences held globally.
Visit Resource → -
DEF CON / Black Hat
Major industry conferences (access varies).
Visit Resource → -
Discord Servers
Topic-specific chat communities (search Disboard).
Visit Resource → -
ISC² Community
Community for ISC² certification holders/candidates.
Visit Resource → -
ISSA
Professional organization, local chapters.
Visit Resource → -
Local Meetups (Meetup.com)
Search for local cybersecurity or tech groups.
Visit Resource → -
OWASP
Web app security community, local chapters.
Visit Resource → -
Reddit (r/cybersecurity, r/netsec, etc.)
Active forums for discussion, news, and learning.
Visit Resource → -
SANS Internet Storm Center (ISC)
Forum and daily security handler diaries.
Visit Resource → -
Stack Exchange (Security)
Q&A site for security professionals.
Visit Resource →
News Sites
-
Bleeping Computer
Malware news, tech support info, security alerts.
Visit Resource → -
CISA Alerts
Alerts and advisories from the US Cybersecurity & Infrastructure Security Agency.
Visit Resource → -
CSO Online
Security news, analysis focused on enterprise security.
Visit Resource → -
Dark Reading
IT security threats, technologies, trends.
Visit Resource → -
Krebs on Security
Investigative journalism on cybercrime.
Visit Resource → -
Risky Business
Weekly infosec news podcast/newsletter.
Visit Resource → -
Schneier on Security
Blog by security expert Bruce Schneier.
Visit Resource → -
SecurityWeek
Cybersecurity news, insights, and analysis.
Visit Resource → -
The Hacker News
Cybersecurity news, vulnerabilities, breaches.
Visit Resource → -
Threatpost
Independent cybersecurity news site.
Visit Resource → -
WIRED Security
Security section of WIRED magazine.
Visit Resource → -
ZDNet Security
Security section of ZDNet tech news site.
Visit Resource →
No resources match your search criteria.