Upskill yourself by learning cybersecurity skills online.


Take one of our free training courses.


Learn Regular Expressions

Regular expressions (regex) provide a flexible way of searching for searching using many different tools and programming languages.


Computer Networking Foundations

Understand how modern computer networks work.


Learn a new skill with our cybersecurity lessons and labs.


Cyber Threats

Cyber threats are one of the biggest risks to modern organisations. But what do we mean by a cyber threat, and how can we categorise them?


Network Proxies: The Different Types Explained

Network proxies are seen in many networks and used by enterprises, service providers and individuals. Three of the primary uses for proxies are forward proxies (seen in enterprise networks), reverse proxies (which deliver web services) and privacy/anonymisation focused proxies.


Using tcpdump: Options, Filters and Examples

'tcpdump' is a command-line tool available for UNIX based systems (including macOS and Linux) that captures network traffic and displays it on screen or saves it to a file. It is a simple but powerful tool for troubleshooting network problems, understanding protocols, investigating suspicious network activity, and much more.


Network Sockets and Ports

Network sockets are software structures that represent the endpoints of a network connection. A pair of sockets fully specify a network connection, and these connections enable communication in both directions. There are three main types of network socket: datagram, stream and raw.


Netcat Field Guide

Netcat (nc) is a simple but versatile utility for TCP and UDP communication.


The Linux Terminal and Shell

Learn about the Linux terminal and why it's so useful.


Keep up to date with our latest infosec career articles.


Free Cybersecurity Labs and Wargames for Beginners

Cybersecurity is a practical field. You need an understanding of concepts like networking and core security principles, but nothing beats hands-on experience with the relevant tools and technologies. It is possible to learn these things through books and videos, but playing with the technology in a lab or 'wargame' environment is the best way to prepare for a real-world career in infosec (Information Security).


Free cybersecurity APIs for looking up Indicators of Compromise (IOCs).

Web APIs can provide access to great threat intelligence feeds and other data. This data can help security analysts and researchers to better understand indictors of compromise, access passive DNS records and much more.


Free Cybersecurity Courses for Beginners

There are many different ways to learn about cybersecurity online, from free videos on YouTube to fully accredited university degrees costing thousands of dollars. In this article, we've put together a comprehensive curriculum of free online courses which can teach you everything you need to know to get started in cybersecurity.


Top Cybersecurity Podcasts for Beginners

As a beginner, podcasts can be a great way to gently increase your understanding of the areas of infosec (information security) and 'cyber' which interest you.


Cybersecurity Workforce Frameworks and Curricula

An overview and comparison of workforce/skills frameworks and published curricula for cybersecurity professionals.

Job Roles

Everything you ever wanted to know about cybersecurity job roles.


Cybersecurity Analyst

The analyst role is one of the most common jobs in cybersecurity. Various titles may be given to analyst roles such as Security Operations Center (SOC) Analyst, Security Analyst or Cyber Defense Analyst. Whatever the job title, ultimately, this job is about analysing data from a range of data sources (such as firewall logs and endpoint events data) to identify and mitigate threats.


Red Teamer

The red teamer, or red team consultant, job role requires deep knowledge of information security and computer science. These skills are combined with creativity to provide in depth red team engagements for customers.


Cyber Incident Responder

The Cyber Incident Response job role is vital for defending organisations from cyber threats.

Open Source Cyber Threat Reporting

Explore cyber security threat reporting and intrusion sets by targeted sector.



Cyber threat reports for the aerospace sector.



Cyber threat reports for the agriculture sector.



Cyber threat reports for the automotive sector.

Cyber Attack Types

Explore cyber security threat reporting and intrusion sets by threat type.


Compromise of accounts for espionage

A cyber adversary gains access to user accounts / services for espionage purposes.


Theft of data for financial gain

An attacker steals data in order to extort the victim or sell it on.


Disk wiping or encryption for disruption

An attacker wipes disks or deploys encryption against target computers solely for disruptive or destructive purposes.


Denial of service to disrupt

A denial of service attack which disrupts the victim's operations.


Exploitation for future access

Exploitation of vulnerabilities in order to obtain initial access to victims for potential future use - such as strategic compromise or onward sale.


Hack and leak for infamy

Attacking an organisation or individual and publishing details or data for infamy or personal pride.