Resources

Here is a detailed compilation of cybersecurity resources, organized into categories such as Cyber News, Tools, and Upskilling Courses. Designed to support you in your cybersecurity learning journey – whether you’re a beginner or an experienced professional, you’ll find the resources you need to stay informed and enhance your skills.

Cyber News

CISO Series

CSO Online

Dark Reading

Krebs on Security

SANS NewsBites

Schneier on Security

SecurityWeek

Cyber Tools

Active Countermeasures Free Tools – A list of free and open-source tools from Active Countermeasures.

Ciphey – Is a tool that automates a lot of decryptions & decodings such as multiple base encodings, classical ciphers, hashes or more advanced cryptography.

Common Vulnerability Scoring System Version 3.0 Calculator – CVSS Version 3.0 calculator from the FIRST (Forum of Incident Response and Security Teams) organization.

Crontab.guru – Quick and simple editor for cron schedule expressions by Cronitor.

CVE.org – Identifies, defines, and catalogs publicly disclosed cybersecurity vulnerabilities. 

CyberChef – A simple and intuitive web app for analyzing and decoding data without having to deal with complex tools or programming languages. CyberChef encourages both technical and non-technical people to explore data formats, encryption and compression.

D3FEND Matrix by MITRE – A framework/model that can precisely specify cybersecurity countermeasure components and capabilities. 

dnstwister – Is an anti-phishing domain name search engine and DNS monitoring service which grants users the ability to quickly scan broad DNS namespaces for “similar” typo-squatted domains.

EmailRep – Uses hundreds of factors like domain age, traffic rankings, presence on social media sites, professional networking sites, personal connections, public records, deliverability, data breaches, dark web credential leaks, phishing emails, threat actor emails, and more to illuminate the reputation behind an email address.

explainshell – Provides a detailed breakdown of what a Linux command does and how it works using the manpage repository.

Exploit Database – A CVE-compliant archive of public exploits and corresponding vulnerable software, developed for use by penetration testers and vulnerability researchers.

FreeFormatter – Website that provides developers with free online tools like formatters, validators, code minifiers, string escapers, encoders and decoders, message digesters, web resources and more.

Glossary – NIST’s glossary of cybersecurity terms.

Have I Been Pwned – Check if your email has been compromised in a data breach.

IPAddressGuide – CIDR to IPv4 Conversion Tool

JSON Lint – Online JSON validator and formatter.

MITRE ATT&CK® – Is a globally accessible knowledge base of adversary tactics and techniques based on real-world observations. The ATT&CK knowledge base is used as a foundation for the development of specific threat models and methodologies in the private sector, in government, and in the cybersecurity product and service community.

MyEventLog – Is a free searchable database containing solutions and comments to event log and syslog messages. 

Pagodo – Automates Google searching for potentially vulnerable web pages and applications on the Internet. It replaces manually performing Google dork searches with a web GUI browser.

PimEyes – Face recognition search engine and reverse image search.

Talos Intelligence Search – Provides access to expansive threat data and related information.

Tools4noobs – Online hash calculator.

URL Encode/Decode – Online tool that either encodes or decodes a string of text.

VirusTotal – Tool that analyzes suspicious files, domains, IPs, and URLs to detect malware and other breaches.

Whois Lookup – Domain & IP search tool.

Windows Security Log Encyclopedia – Windows security log lookup tool.

CTFs/Cyber Games

247CTF – Is a security Capture The Flag (CTF) learning environment. The platform contains a number of hacking challenges where you can test your skills across web, cryptography, networking, reversing and exploitation by solving problems to recover flags.

OverTheWire: Wargames – Offered by the OverTheWire community, it helps you learn and practice security concepts in the form of fun-filled games.

The Cyber Challenge – Produced by the United States Department of Defense (DoD) as a resource for young adults, parents and educators curious about the mission of cybersecurity in the U.S. Military.

Home Labs/Projects

First Contributions – Make your first open-source project contribution.

Labtainers – Fully packaged Linux-based computer science lab exercises with an initial emphasis on cybersecurity.

SIFT Workstation – Virtual machine that contains a collection of free and open-source incident response and forensic tools designed to perform detailed digital forensic examinations in a variety of settings. 

Simple Network Scanner Web App (nmap) by Eli the Computer Guy – This project allows you to create a simple network scanner that is accessible from a web browser on the network.

Slingshot Linux Distribution – An Ubuntu-based Linux distribution with the MATE Desktop Environment built for use in the SANS penetration testing curriculum and beyond. It includes many standard pen testing tools, as well as the PenTesters Framework (PTF).

VulnHub – Provides materials that allows anyone to gain practical hands-on experience in digital security, computer software & network administration.

Job Search

Cyber Now Education – Provides a monthly updated list of SOC Analyst jobs requiring no cybersecurity experience.

Infosec Job Hunting w/ BanjoCrashland – Job hunt like a hacker.

TryHackMe – Preparing for a Security Engineering Interview.

Upskill

Active Directory Domain Services (AD DS)

Bash Scripting Tutorial

Computing Courses from the Raspberry Pi Foundation

CS50’s Introduction to Cybersecurity

CS50’s Introduction to Programming with Python

Cyber Security Analyst Learning Path

FedVTE Public Courses

freeCodeCamp.org

Git Cheat Sheet

Google Dorking

Hacksplaining

Introduction to APIs

Introduction to Canarytokens

Introduction to PowerShell

Kubernetes Goat

Learning Resources from HackerOne

Linux Journey

Metasploit Unleashed

NoSQLZoo

PowerShell Commands Library

Practical Cryptography

Prompting

RegexOne – Learn Regular Expressions

Search Query Fundamentals – Shodan

Security Operations Engineer Trailmix from Salesforce Trailhead

SQLZoo

Verizon Skill Forward

Windows PowerShell Scripting Crash Course

Veterans Resources

Fortinet Veterans Program – As part of Fortinet’s Education Outreach program, the Fortinet Veterans program works to fill the cybersecurity skills gap by helping facilitate the transition of military service members, veterans, and military spouses into the cybersecurity industry. The program has a presence in the US, Canada, UK, and Australia as well as having a reach throughout the world with Fortinet’s network of partners.

Hiring Our Heroes – Connects the military community; service members, military spouses, and veterans with American businesses to create economic opportunity and a strong and diversified workforce.

Onward to Opportunity (O2O) – A no-cost industry-focused and validated career skills program that connects transitioning service members and military spouses to high-demand careers in Customer Service Excellence, Information Technology, and Business Management. 

Outside the Wire – Designed to help recently discharged service members gain the skills and knowledge necessary to train for an in-demand career as an IT professional.

Veterati – Mentoring network for the military that lets you choose your own mentors and as many as you would like. Join thousands of Service Members, Veterans, and Military Spouses in setting up free 1-hr mentorship phone calls with successful professionals.

Vets2Industry – Provides a free resource library for the military community – active, guard, reserve, veteran, military-spouse, dependent children, Blue-Star & Gold-Star Families, and caregivers – so they know which organizations provide free services and benefits.

VetSuccess Immersion Academy by the SANS Institute – An intensive, accelerated training program that provides world-class SANS training and GIAC certifications to launch careers quickly and effectively in cybersecurity.

Volunteer Opportunities

CyberPeace Builders – Give back to impactful nonprofits using your cybersecurity skills.

Cyber Volunteer Resource Center – List of cyber volunteer programs across the United States.

Information Technology Disaster Resource Center (ITDRC) – Harnesses the collective power of the technology community along with a professional network of volunteers to support communities impacted by disasters.

Safe and Secure Online Volunteer – Empowers tweens, teens, parents, and senior citizens to protect themselves in the digital age by learning safe cybersecurity practices. Volunteers worldwide passionately share their expertise with local communities, especially underserved and underrepresented populations, while also raising awareness of exciting cyber career possibilities. 

Texas Volunteer Incident Response Team (VIRT) – Comprised of volunteers with expertise addressing cybersecurity events that supports Texas agencies, institutions of higher education, and local government organizations to respond to significant cybersecurity events.

Volunteer with Cyber-Seniors – Offers a rewarding volunteer experience for individuals looking to make a difference in their community. Acquire new skills while providing a valuable service to senior citizens who truly appreciate your help.

Volunteering with ISC2 – Offers a variety of ways for ISC2 members and candidates to get involved, from short-term volunteer projects to committee, council, and board service.