Upskilld

Upskill yourself by learning cybersecurity skills online.


Courses

Take one of our free training courses.

course

Learn Regular Expressions

Regular expressions (regex) provide a flexible way of searching for searching using many different tools and programming languages.

course

Computer Networking Foundations

Understand how modern computer networks work.



Lessons

Learn a new skill with our cybersecurity lessons and labs.

lesson

Cyber Threats

Cyber threats are one of the biggest risks to modern organisations. But what do we mean by a cyber threat, and how can we categorise them?

lesson

Network Proxies: The Different Types Explained

Network proxies are seen in many networks and used by enterprises, service providers and individuals. Three of the primary uses for proxies are forward proxies (seen in enterprise networks), reverse proxies (which deliver web services) and privacy/anonymisation focused proxies.

lesson

Using tcpdump: Options, Filters and Examples

'tcpdump' is a command-line tool available for UNIX based systems (including macOS and Linux) that captures network traffic and displays it on screen or saves it to a file. It is a simple but powerful tool for troubleshooting network problems, understanding protocols, investigating suspicious network activity, and much more.

lesson

Network Sockets and Ports

Network sockets are software structures that represent the endpoints of a network connection. A pair of sockets fully specify a network connection, and these connections enable communication in both directions. There are three main types of network socket: datagram, stream and raw.

lesson

Netcat Field Guide

Netcat (nc) is a simple but versatile utility for TCP and UDP communication.

lesson

The Linux Terminal and Shell

Learn about the Linux terminal and why it's so useful.


Articles

Keep up to date with our latest infosec career articles.

article

Free Cybersecurity Labs and Wargames for Beginners

Cybersecurity is a practical field. You need an understanding of concepts like networking and core security principles, but nothing beats hands-on experience with the relevant tools and technologies. It is possible to learn these things through books and videos, but playing with the technology in a lab or 'wargame' environment is the best way to prepare for a real-world career in infosec (Information Security).

article

Free cybersecurity APIs for looking up Indicators of Compromise (IOCs).

Web APIs can provide access to great threat intelligence feeds and other data. This data can help security analysts and researchers to better understand indictors of compromise, access passive DNS records and much more.

article

Free Cybersecurity Courses for Beginners

There are many different ways to learn about cybersecurity online, from free videos on YouTube to fully accredited university degrees costing thousands of dollars. In this article, we've put together a comprehensive curriculum of free online courses which can teach you everything you need to know to get started in cybersecurity.

article

Top Cybersecurity Podcasts for Beginners

As a beginner, podcasts can be a great way to gently increase your understanding of the areas of infosec (information security) and 'cyber' which interest you.

article

Cybersecurity Workforce Frameworks and Curricula

An overview and comparison of workforce/skills frameworks and published curricula for cybersecurity professionals.


Job Roles

Everything you ever wanted to know about cybersecurity job roles.

job-role

Cybersecurity Analyst

The analyst role is one of the most common jobs in cybersecurity. Various titles may be given to analyst roles such as Security Operations Center (SOC) Analyst, Security Analyst or Cyber Defense Analyst. Whatever the job title, ultimately, this job is about analysing data from a range of data sources (such as firewall logs and endpoint events data) to identify and mitigate threats.

job-role

Red Teamer

The red teamer, or red team consultant, job role requires deep knowledge of information security and computer science. These skills are combined with creativity to provide in depth red team engagements for customers.

job-role

Cyber Incident Responder

The Cyber Incident Response job role is vital for defending organisations from cyber threats.


Open Source Cyber Threat Reporting

Explore cyber security threat reporting and intrusion sets by targeted sector.

sector

Aerospace

Cyber threat reports for the aerospace sector.

sector

Agriculture

Cyber threat reports for the agriculture sector.

sector

Automotive

Cyber threat reports for the automotive sector.


Cyber Attack Types

Explore cyber security threat reporting and intrusion sets by threat type.

attack-type

Compromise of accounts for espionage

A cyber adversary gains access to user accounts / services for espionage purposes.

attack-type

Theft of data for financial gain

An attacker steals data in order to extort the victim or sell it on.

attack-type

Disk wiping or encryption for disruption

An attacker wipes disks or deploys encryption against target computers solely for disruptive or destructive purposes.

attack-type

Denial of service to disrupt

A denial of service attack which disrupts the victim's operations.

attack-type

Exploitation for future access

Exploitation of vulnerabilities in order to obtain initial access to victims for potential future use - such as strategic compromise or onward sale.

attack-type

Hack and leak for infamy

Attacking an organisation or individual and publishing details or data for infamy or personal pride.