← All Courses
Learn Cybersecurity
Coming SoonDefend systems, find vulnerabilities, think like an attacker
Cybersecurity Ethical Hacking CTF Networking OWASP
Coming Soon
Understand how systems break so you can build them stronger. Cybersecurity covers network defense, web application security, cryptography, and ethical penetration testing — the skills that protect modern infrastructure.
This course builds from networking fundamentals through OWASP Top 10 to CTF challenges and security architecture design.
Start Here — Learning Roadmap
A suggested path from zero to mastery. Follow these steps in order:
- Learn networking fundamentals — Understand TCP/IP, DNS, HTTP/HTTPS, ports, subnets, and how data moves across networks
- Master Linux command line — Security tools run on Linux; learn file permissions, process management, and shell scripting
- Understand the CIA triad — Learn confidentiality, integrity, and availability as the foundation of all security thinking
- Study the OWASP Top 10 — Know the most critical web application security risks: injection, broken auth, XSS, SSRF, and more
- Practice on CTF platforms — Start with PicoCTF and TryHackMe to build hands-on skills in a safe, legal environment
- Learn cryptography basics — Understand symmetric/asymmetric encryption, hashing, TLS, certificates, and key management
- Perform web application testing — Use Burp Suite to intercept requests, find injection points, and test authentication flows
- Study network security — Learn firewall rules, IDS/IPS, VPNs, Wireshark packet analysis, and network segmentation
- Explore offensive security — Practice penetration testing methodology: recon, scanning, exploitation, post-exploitation, reporting
- Pursue certifications — CompTIA Security+ for foundations, CEH for ethical hacking breadth, OSCP for hands-on penetration testing mastery
Official & Core Documentation
- OWASP Top 10 — The most critical web application security risks, updated regularly (Beginner)
- NIST Cybersecurity Framework — Security standards, guidelines, and best practices for organizations (Intermediate)
- MITRE ATT&CK — Adversary tactics and techniques knowledge base used by defenders worldwide (Intermediate)
- CWE (Common Weakness Enumeration) — Catalog of software and hardware weakness types with mitigation guidance (Intermediate)
- OWASP Cheat Sheet Series — Concise security guidance for auth, crypto, input validation, and more (All levels)
- SANS Reading Room — Thousands of free cybersecurity research papers and whitepapers (All levels)
- CVE Database — Public database of known cybersecurity vulnerabilities with unique identifiers (Intermediate)
- CIS Benchmarks — Consensus-based security configuration guides for operating systems and applications (Intermediate)
- Cybersecurity Roadmap — Visual step-by-step guide to the cybersecurity learning path (Beginner)
GitHub Awesome Lists & Curated Collections
- Awesome-Hacking — Collection of awesome lists for hackers, pentesters, and security researchers (87k+ stars)
- awesome-security — Software, libraries, documents, books, and resources about security (12k+ stars)
- awesome-pentest — Penetration testing resources, tools, and other shiny things (22k+ stars)
- awesome-web-security — Web security materials and resources covering XSS, CSRF, SQLi, and more (11k+ stars)
- awesome-ctf — CTF frameworks, libraries, resources, and software for competitions (10k+ stars)
- awesome-osint — Open Source Intelligence tools and resources for investigations (19k+ stars)
- awesome-cyber-security-university — Free educational resources focused on learning by doing
- awesome-cyber-skills — Hacking environments where you can train cyber skills legally and safely
Interactive Courses & Hands-On Platforms
Free Courses
- TryHackMe — Guided cybersecurity labs with structured learning paths, excellent for beginners (Beginner)
- PicoCTF — Beginner-friendly Capture The Flag challenges from Carnegie Mellon University (Beginner)
- OverTheWire Wargames — Progressive security challenges via SSH covering Bandit, Natas, and Leviathan (Beginner)
- PortSwigger Web Security Academy — Free web security training with interactive labs for SQLi, XSS, SSRF (Intermediate)
- OWASP Juice Shop — Deliberately vulnerable web app for hands-on security testing practice (Intermediate)
- Fortinet Free Training — Free cybersecurity courses and NSE certifications (Beginner)
University & MOOC Courses
- Google Cybersecurity Certificate — Beginner program covering security fundamentals and incident response (Beginner)
- CS50 — Cybersecurity (Harvard) — Harvard’s introduction to cybersecurity for technical and non-technical learners (Beginner)
- IBM Cybersecurity Analyst Certificate — Professional certificate covering network security, threat intelligence, and forensics (Beginner)
Practice & Challenges
- Hack The Box — Hands-on hacking challenges, vulnerable machines, and pro labs for advanced practice (Intermediate)
- VulnHub — Downloadable vulnerable VMs for offline penetration testing practice (Intermediate)
- CryptoHack — Fun, free platform for learning modern cryptography through challenges (Intermediate)
- CTFtime — Global CTF competition calendar, team rankings, and writeups for live events (All levels)
- Root Me — Hacking challenges covering web, network, forensics, and reverse engineering (Intermediate)
Video Courses & YouTube Channels
Structured Course Playlists
- Professor Messer — Security+ — Free CompTIA Security+ training, comprehensive and well-structured (Beginner)
- The Cyber Mentor — Ethical Hacking — Complete ethical hacking and penetration testing course series (Intermediate)
- freeCodeCamp — Cybersecurity Full Course — Comprehensive cybersecurity fundamentals course (Beginner)
Individual Creators & Channels
- John Hammond — CTF walkthroughs, malware analysis, and security research (Intermediate)
- LiveOverflow — Binary exploitation, reverse engineering, and security concepts (Advanced)
- NetworkChuck — Ethical hacking, networking, and Kali Linux tutorials (Beginner)
- HackerSploit — Free infosec training covering penetration testing and red teaming (Intermediate)
- David Bombal — Networking, ethical hacking, and certification prep (Beginner)
- IppSec — Detailed Hack The Box machine walkthroughs with methodology explanations (Advanced)
- MalwareTech — Malware analysis, reverse engineering, and threat research (Advanced)
Books & Long-Form Reading
Free Online Books
- Crypto 101 — Free introductory course on cryptography, available as a book (Beginner)
- The Hacker Playbook (resources) — Companion resources and lab setup guides for penetration testing (Intermediate)
- OWASP Testing Guide — Free comprehensive guide to web application security testing methodology (Intermediate)
Essential Paid Books
- The Web Application Hacker’s Handbook (2nd Ed.) — The web security bible, essential for web app pentesting (Intermediate, Paid)
- Hacking: The Art of Exploitation (2nd Ed.) — Understanding exploits from the ground up with C and assembly (Advanced, Paid)
- Penetration Testing — Georgia Weidman’s hands-on guide to pentesting methodology (Intermediate, Paid)
- Cybersecurity Ops with bash — Security automation with the command line (Intermediate, Paid)
- Network Security Essentials — William Stallings’ guide to cryptography, firewalls, and IDS (Intermediate, Paid)
- The Art of Invisibility — Kevin Mitnick’s guide to privacy and anonymity in the digital age (Beginner, Paid)
Community, Practice & News
Forums & Discussion
- r/netsec — Technical information security content, research, and discussions
- r/cybersecurity — Broad cybersecurity community for news, career advice, and resources
- Security Stack Exchange — Expert Q&A for information security professionals and enthusiasts
- Hack Forums — Large security community covering tools, techniques, and discussions
Newsletters & Blogs
- The Hacker News — Cybersecurity news covering breaches, vulnerabilities, and malware
- SANS Internet Storm Center — Daily cybersecurity threat analysis and handler diaries
- Krebs on Security — In-depth investigative reporting on cybercrime and security by Brian Krebs
- Dark Reading — Enterprise security news, analysis, and threat intelligence
- tl;dr sec — Weekly newsletter curating the best security content and tools
Ecosystem Resources
- HackerOne Hacktivity — Real-world vulnerability disclosures from bug bounty programs
- Bugcrowd — Bug bounty platform connecting security researchers with organizations
- SANS Cyber Aces — Free introductory cybersecurity courses from SANS
Tools & Environments
- Kali Linux — Penetration testing Linux distribution with 600+ security tools pre-installed
- Burp Suite Community — Web application security testing proxy with intercepting, scanning, and repeating
- Wireshark — World’s foremost network protocol analyzer for packet capture and inspection
- Nmap — Network discovery and security auditing tool for port scanning and service detection
- Metasploit Framework — Penetration testing framework for exploit development and vulnerability verification
- CyberChef — Web app for encoding, decoding, encryption, and data analysis by GCHQ
- Ghidra — NSA’s free software reverse engineering suite for binary analysis and decompilation
- OWASP ZAP — Free open-source web application security scanner for finding vulnerabilities automatically
- Hashcat — Advanced password recovery tool supporting hundreds of hash algorithms
Cheat Sheets & Quick References
- OWASP Top 10 Cheat Sheet — Quick reference for the most critical web application security risks
- Nmap Cheat Sheet — Common scan types, scripts, and output formats for network reconnaissance
- Reverse Shell Cheat Sheet — Quick reference for spawning reverse shells in various languages
- Metasploit Cheat Sheet — Essential Metasploit commands for scanning, exploiting, and post-exploitation
- Linux Privilege Escalation Checklist — Comprehensive checklist for finding privilege escalation vectors on Linux
Certification Paths
- CompTIA Security+ — Foundation certification covering security concepts, accepted under DoD 8570 (Beginner, ~$425)
- Certified Ethical Hacker (CEH) — Broad ethical hacking certification with strong HR recognition (Intermediate)
- OSCP (Offensive Security Certified Professional) — Gold standard for penetration testers with 24-hour hands-on exam (Advanced, ~$1,749+)
- CompTIA CySA+ — Blue team certification focusing on threat detection and security analytics (Intermediate)
- SANS GIAC Certifications — Premium industry certifications covering forensics, incident response, and penetration testing (Advanced)