← All Courses
Learn Cybersecurity logo

Learn Cybersecurity

Coming Soon

Defend systems, find vulnerabilities, think like an attacker

Cybersecurity Ethical Hacking CTF Networking OWASP

Coming Soon

Understand how systems break so you can build them stronger. Cybersecurity covers network defense, web application security, cryptography, and ethical penetration testing — the skills that protect modern infrastructure.

This course builds from networking fundamentals through OWASP Top 10 to CTF challenges and security architecture design.

Start Here — Learning Roadmap

A suggested path from zero to mastery. Follow these steps in order:

  1. Learn networking fundamentals — Understand TCP/IP, DNS, HTTP/HTTPS, ports, subnets, and how data moves across networks
  2. Master Linux command line — Security tools run on Linux; learn file permissions, process management, and shell scripting
  3. Understand the CIA triad — Learn confidentiality, integrity, and availability as the foundation of all security thinking
  4. Study the OWASP Top 10 — Know the most critical web application security risks: injection, broken auth, XSS, SSRF, and more
  5. Practice on CTF platforms — Start with PicoCTF and TryHackMe to build hands-on skills in a safe, legal environment
  6. Learn cryptography basics — Understand symmetric/asymmetric encryption, hashing, TLS, certificates, and key management
  7. Perform web application testing — Use Burp Suite to intercept requests, find injection points, and test authentication flows
  8. Study network security — Learn firewall rules, IDS/IPS, VPNs, Wireshark packet analysis, and network segmentation
  9. Explore offensive security — Practice penetration testing methodology: recon, scanning, exploitation, post-exploitation, reporting
  10. Pursue certifications — CompTIA Security+ for foundations, CEH for ethical hacking breadth, OSCP for hands-on penetration testing mastery

Official & Core Documentation

  • OWASP Top 10 — The most critical web application security risks, updated regularly (Beginner)
  • NIST Cybersecurity Framework — Security standards, guidelines, and best practices for organizations (Intermediate)
  • MITRE ATT&CK — Adversary tactics and techniques knowledge base used by defenders worldwide (Intermediate)
  • CWE (Common Weakness Enumeration) — Catalog of software and hardware weakness types with mitigation guidance (Intermediate)
  • OWASP Cheat Sheet Series — Concise security guidance for auth, crypto, input validation, and more (All levels)
  • SANS Reading Room — Thousands of free cybersecurity research papers and whitepapers (All levels)
  • CVE Database — Public database of known cybersecurity vulnerabilities with unique identifiers (Intermediate)
  • CIS Benchmarks — Consensus-based security configuration guides for operating systems and applications (Intermediate)
  • Cybersecurity Roadmap — Visual step-by-step guide to the cybersecurity learning path (Beginner)

GitHub Awesome Lists & Curated Collections

  • Awesome-Hacking — Collection of awesome lists for hackers, pentesters, and security researchers (87k+ stars)
  • awesome-security — Software, libraries, documents, books, and resources about security (12k+ stars)
  • awesome-pentest — Penetration testing resources, tools, and other shiny things (22k+ stars)
  • awesome-web-security — Web security materials and resources covering XSS, CSRF, SQLi, and more (11k+ stars)
  • awesome-ctf — CTF frameworks, libraries, resources, and software for competitions (10k+ stars)
  • awesome-osint — Open Source Intelligence tools and resources for investigations (19k+ stars)
  • awesome-cyber-security-university — Free educational resources focused on learning by doing
  • awesome-cyber-skills — Hacking environments where you can train cyber skills legally and safely

Interactive Courses & Hands-On Platforms

Free Courses

  • TryHackMe — Guided cybersecurity labs with structured learning paths, excellent for beginners (Beginner)
  • PicoCTF — Beginner-friendly Capture The Flag challenges from Carnegie Mellon University (Beginner)
  • OverTheWire Wargames — Progressive security challenges via SSH covering Bandit, Natas, and Leviathan (Beginner)
  • PortSwigger Web Security Academy — Free web security training with interactive labs for SQLi, XSS, SSRF (Intermediate)
  • OWASP Juice Shop — Deliberately vulnerable web app for hands-on security testing practice (Intermediate)
  • Fortinet Free Training — Free cybersecurity courses and NSE certifications (Beginner)

University & MOOC Courses

Practice & Challenges

  • Hack The Box — Hands-on hacking challenges, vulnerable machines, and pro labs for advanced practice (Intermediate)
  • VulnHub — Downloadable vulnerable VMs for offline penetration testing practice (Intermediate)
  • CryptoHack — Fun, free platform for learning modern cryptography through challenges (Intermediate)
  • CTFtime — Global CTF competition calendar, team rankings, and writeups for live events (All levels)
  • Root Me — Hacking challenges covering web, network, forensics, and reverse engineering (Intermediate)

Video Courses & YouTube Channels

Structured Course Playlists

Individual Creators & Channels

  • John Hammond — CTF walkthroughs, malware analysis, and security research (Intermediate)
  • LiveOverflow — Binary exploitation, reverse engineering, and security concepts (Advanced)
  • NetworkChuck — Ethical hacking, networking, and Kali Linux tutorials (Beginner)
  • HackerSploit — Free infosec training covering penetration testing and red teaming (Intermediate)
  • David Bombal — Networking, ethical hacking, and certification prep (Beginner)
  • IppSec — Detailed Hack The Box machine walkthroughs with methodology explanations (Advanced)
  • MalwareTech — Malware analysis, reverse engineering, and threat research (Advanced)

Books & Long-Form Reading

Free Online Books

  • Crypto 101 — Free introductory course on cryptography, available as a book (Beginner)
  • The Hacker Playbook (resources) — Companion resources and lab setup guides for penetration testing (Intermediate)
  • OWASP Testing Guide — Free comprehensive guide to web application security testing methodology (Intermediate)

Essential Paid Books

Community, Practice & News

Forums & Discussion

  • r/netsec — Technical information security content, research, and discussions
  • r/cybersecurity — Broad cybersecurity community for news, career advice, and resources
  • Security Stack Exchange — Expert Q&A for information security professionals and enthusiasts
  • Hack Forums — Large security community covering tools, techniques, and discussions

Newsletters & Blogs

  • The Hacker News — Cybersecurity news covering breaches, vulnerabilities, and malware
  • SANS Internet Storm Center — Daily cybersecurity threat analysis and handler diaries
  • Krebs on Security — In-depth investigative reporting on cybercrime and security by Brian Krebs
  • Dark Reading — Enterprise security news, analysis, and threat intelligence
  • tl;dr sec — Weekly newsletter curating the best security content and tools

Ecosystem Resources

  • HackerOne Hacktivity — Real-world vulnerability disclosures from bug bounty programs
  • Bugcrowd — Bug bounty platform connecting security researchers with organizations
  • SANS Cyber Aces — Free introductory cybersecurity courses from SANS

Tools & Environments

  • Kali Linux — Penetration testing Linux distribution with 600+ security tools pre-installed
  • Burp Suite Community — Web application security testing proxy with intercepting, scanning, and repeating
  • Wireshark — World’s foremost network protocol analyzer for packet capture and inspection
  • Nmap — Network discovery and security auditing tool for port scanning and service detection
  • Metasploit Framework — Penetration testing framework for exploit development and vulnerability verification
  • CyberChef — Web app for encoding, decoding, encryption, and data analysis by GCHQ
  • Ghidra — NSA’s free software reverse engineering suite for binary analysis and decompilation
  • OWASP ZAP — Free open-source web application security scanner for finding vulnerabilities automatically
  • Hashcat — Advanced password recovery tool supporting hundreds of hash algorithms

Cheat Sheets & Quick References

Certification Paths