Upskilld

Upskill yourself by learning cybersecurity skills online.


Courses

Take one of our free training courses

Learn GQL (Graph Query Language) with Python

Course

Learn Graph Query Language (GQL), how to use graph databases which support GQL, and how to work with them in Python.

View

Computer Networking Foundations

Course

Understand how modern computer networks work.

View

Learn Regular Expressions

Course

Regular expressions (regex) provide a flexible way of searching for searching using many different tools and programming languages.

View

Lessons

Learn a new skill with our cybersecurity lessons.

Shodan Query Syntax and Filters

Lesson

Shodan is a powerful tool for searching devices connected to the internet - this includes the Internet of Things as well as traditional web facing systems like servers and routers.

View

What is Graph Query Language (GQL)?

Lesson

Graph Query Language is a standardized syntax for managing, querying and manipulating property graphs.

View

WAN Technologies - HDLC, PPP, Frame Relay and Ethernet

Lesson

Wide Area Networks may use one of several layer 2 technologies to encapsulate data as it cross a service providers network between a customer’s sites.

View

What is a computer network?

Lesson

An overview of what might constitute a computer network.

View

Block Ciphers

Lesson

Block ciphers operate on blocks of data of a particular size.

View

Types of Memory in Computer Architecture

Lesson

There are different types of memory available for storing data in a computer. Learn about what they are and what they are used for.

View

What is a LAN?

Lesson

Learn about devices found on local-area networks and how they are connected.

View

How does IPv4 work?

Lesson

IPv4 has been at the heart of the TCP/IP stack since it's inception. It is slowly being replaced by IPv6.

View

How to use the man pages on Linux

Lesson

Getting help on Linux with the 'man pages' and where else to look.

View

Articles

Keep up to date with our latest infosec articles.

Top 10 OT Security Podcasts

Article

Discover new podcasts which could help you learn all about the world of operational technology (OT) cyber security. Find podcasts which cover industry trends, cyber threats that target OT, career development and more.

View

Free cybersecurity APIs for looking up Indicators of Compromise (IOCs).

Article

Web APIs can provide access to great threat intelligence feeds and other data. This data can help security analysts and researchers to better understand indictors of compromise, access passive DNS records and much more.

View

Top Cybersecurity Podcasts for Beginners

Article

As a beginner, podcasts can be a great way to gently increase your understanding of the areas of infosec (information security) and 'cyber' which interest you.

View

Free Cybersecurity Courses for Beginners

Article

There are many different ways to learn about cybersecurity online, from free videos on YouTube to fully accredited university degrees costing thousands of dollars. In this article, we've put together a comprehensive curriculum of free online courses which can teach you everything you need to know to get started in cybersecurity.

View

Free Cybersecurity Labs and Wargames for Beginners

Article

Cybersecurity is a practical field. You need an understanding of concepts like networking and core security principles, but nothing beats hands-on experience with the relevant tools and technologies. It is possible to learn these things through books and videos, but playing with the technology in a lab or 'wargame' environment is the best way to prepare for a real-world career in infosec (Information Security).

View

Cybersecurity Workforce Frameworks and Curricula

Article

An overview and comparison of workforce/skills frameworks and published curricula for cybersecurity professionals.

View

Job Roles

Everything you ever wanted to know about cybersecurity job roles.

Cybersecurity Analyst

Job Role

The analyst role is one of the most common jobs in cybersecurity. Various titles may be given to analyst roles such as Security Operations Center (SOC) Analyst, Security Analyst or Cyber Defense Analyst. Whatever the job title, ultimately, this job is about analysing data from a range of data sources (such as firewall logs and endpoint events data) to identify and mitigate threats.

View

Cyber Incident Responder

Job Role

The Cyber Incident Response job role is vital for defending organisations from cyber threats.

View

Red Teamer

Job Role

The red teamer, or red team consultant, job role requires deep knowledge of information security and computer science. These skills are combined with creativity to provide in depth red team engagements for customers.

View