Upskilld
Upskill yourself by learning cybersecurity skills online.
Courses
Take one of our free training courses
Learn GQL (Graph Query Language) with Python
Course
Learn Graph Query Language (GQL), how to use graph databases which support GQL, and how to work with them in Python.
ViewLearn Regular Expressions
Course
Regular expressions (regex) provide a flexible way of searching for searching using many different tools and programming languages.
ViewLessons
Learn a new skill with our cybersecurity lessons.
Shodan Query Syntax and Filters
Lesson
Shodan is a powerful tool for searching devices connected to the internet - this includes the Internet of Things as well as traditional web facing systems like servers and routers.
ViewWhat is Graph Query Language (GQL)?
Lesson
Graph Query Language is a standardized syntax for managing, querying and manipulating property graphs.
ViewWAN Technologies - HDLC, PPP, Frame Relay and Ethernet
Lesson
Wide Area Networks may use one of several layer 2 technologies to encapsulate data as it cross a service providers network between a customer’s sites.
ViewTypes of Memory in Computer Architecture
Lesson
There are different types of memory available for storing data in a computer. Learn about what they are and what they are used for.
ViewWhat is a LAN?
Lesson
Learn about devices found on local-area networks and how they are connected.
ViewHow does IPv4 work?
Lesson
IPv4 has been at the heart of the TCP/IP stack since it's inception. It is slowly being replaced by IPv6.
ViewHow to use the man pages on Linux
Lesson
Getting help on Linux with the 'man pages' and where else to look.
ViewArticles
Keep up to date with our latest infosec articles.
Top 10 OT Security Podcasts
Article
Discover new podcasts which could help you learn all about the world of operational technology (OT) cyber security. Find podcasts which cover industry trends, cyber threats that target OT, career development and more.
ViewFree cybersecurity APIs for looking up Indicators of Compromise (IOCs).
Article
Web APIs can provide access to great threat intelligence feeds and other data. This data can help security analysts and researchers to better understand indictors of compromise, access passive DNS records and much more.
ViewTop Cybersecurity Podcasts for Beginners
Article
As a beginner, podcasts can be a great way to gently increase your understanding of the areas of infosec (information security) and 'cyber' which interest you.
ViewFree Cybersecurity Courses for Beginners
Article
There are many different ways to learn about cybersecurity online, from free videos on YouTube to fully accredited university degrees costing thousands of dollars. In this article, we've put together a comprehensive curriculum of free online courses which can teach you everything you need to know to get started in cybersecurity.
ViewFree Cybersecurity Labs and Wargames for Beginners
Article
Cybersecurity is a practical field. You need an understanding of concepts like networking and core security principles, but nothing beats hands-on experience with the relevant tools and technologies. It is possible to learn these things through books and videos, but playing with the technology in a lab or 'wargame' environment is the best way to prepare for a real-world career in infosec (Information Security).
ViewCybersecurity Workforce Frameworks and Curricula
Article
An overview and comparison of workforce/skills frameworks and published curricula for cybersecurity professionals.
ViewJob Roles
Everything you ever wanted to know about cybersecurity job roles.
Cybersecurity Analyst
Job Role
The analyst role is one of the most common jobs in cybersecurity. Various titles may be given to analyst roles such as Security Operations Center (SOC) Analyst, Security Analyst or Cyber Defense Analyst. Whatever the job title, ultimately, this job is about analysing data from a range of data sources (such as firewall logs and endpoint events data) to identify and mitigate threats.
ViewCyber Incident Responder
Job Role
The Cyber Incident Response job role is vital for defending organisations from cyber threats.
ViewRed Teamer
Job Role
The red teamer, or red team consultant, job role requires deep knowledge of information security and computer science. These skills are combined with creativity to provide in depth red team engagements for customers.
View