Upskill yourself by learning cybersecurity skills online.


Take one of our free training courses.


Learn Regular Expressions

Regular expressions (regex) provide a flexible way of searching for searching using many different tools and programming languages.


Computer Networking Foundations

Understand how modern computer networks work.


Learn a new skill with our cybersecurity lessons and labs.


Network Proxies: The Different Types Explained

Network proxies are seen in many networks and used by enterprises, service providers and individuals. Three of the primary uses for proxies are forward proxies (seen in enterprise networks), reverse proxies (which deliver web services) and privacy/anonymisation focused proxies.


Using tcpdump: Options, Filters and Examples

'tcpdump' is a command-line tool available for UNIX based systems (including macOS and Linux) that captures network traffic and displays it on screen or saves it to a file. It is a simple but powerful tool for troubleshooting network problems, understanding protocols, investigating suspicious network activity, and much more.


Network Sockets and Ports

Network sockets are software structures that represent the endpoints of a network connection. A pair of sockets fully specify a network connection, and these connections enable communication in both directions. There are three main types of network socket: datagram, stream and raw.


Netcat Field Guide

Netcat (nc) is a simple but versatile utility for TCP and UDP communication.


The Linux Terminal and Shell

Learn about the Linux terminal and why it's so useful.


How to use the man pages on Linux

Getting help on Linux with the 'man pages' and where else to look.


Keep up to date with our latest infosec career articles.


Free Cybersecurity Labs and Wargames for Beginners

Cybersecurity is a practical field. You need an understanding of concepts like networking and core security principles, but nothing beats hands-on experience with the relevant tools and technologies. It is possible to learn these things through books and videos, but playing with the technology in a lab or 'wargame' environment is the best way to prepare for a real-world career in infosec (Information Security).


Free cybersecurity APIs for looking up Indicators of Compromise (IOCs).

Web APIs can provide access to great threat intelligence feeds and other data. This data can help security analysts and researchers to better understand indictors of compromise, access passive DNS records and much more.


Free Cybersecurity Courses for Beginners

There are many different ways to learn about cybersecurity online, from free videos on YouTube to fully accredited university degrees costing thousands of dollars. In this article, we've put together a comprehensive curriculum of free online courses which can teach you everything you need to know to get started in cybersecurity.


Top Cybersecurity Podcasts for Beginners

As a beginner, podcasts can be a great way to gently increase your understanding of the areas of infosec (information security) and 'cyber' which interest you.


Cybersecurity Workforce Frameworks and Curricula

An overview and comparison of workforce/skills frameworks and published curricula for cybersecurity professionals.

Job Roles

Everything you ever wanted to know about cybersecurity job roles.


Cybersecurity Analyst

The analyst role is one of the most common jobs in cybersecurity. Various titles may be given to analyst roles such as Security Operations Center (SOC) Analyst, Security Analyst or Cyber Defense Analyst. Whatever the job title, ultimately, this job is about analysing data from a range of data sources (such as firewall logs and endpoint events data) to identify and mitigate threats.


Red Teamer

The red teamer, or red team consultant, job role requires deep knowledge of information security and computer science. These skills are combined with creativity to provide in depth red team engagements for customers.


Cyber Incident Responder

The Cyber Incident Response job role is vital for defending organisations from cyber threats.