Foundations
Build a solid foundation with networking, operating systems, and security fundamentals
Cybrary
Comprehensive free courses covering IT fundamentals, networking basics, and initial security concepts
Access CoursesProfessor Messer
Free video and course content for foundational cyber security and certifications
Watch VideosOpen Security Training
Free course content for foundational computer science topics like binary
Read ContentOpen Courseware
Free college course content on various topics in Electrical Engineering and Computer Science
Access CoursesLinux Foundation
Free video and course content for a variety of cybersecurity topics with all skill levels
Access CoursesSANS Cyber Ace
Free foundational tutorials on operating systems, networking, and security principles
Access ResourcesAWS Training
Free cloud security training and certifications from Amazon Web Services
Start TrainingIBM Cybersecurity
Free cybersecurity courses and career development resources from IBM
Access CoursesVerizon Portal
Professional pathways in cybersecurity with comprehensive learning modules
Start LearningSecurity Fundamentals
Dive deep into core security concepts, threat landscapes, and defensive strategies
CompTIA Security+
Industry-standard certification covering essential security concepts and best practices
Study GuideSecurity Blue Team
Defensive security training with hands-on labs and real-world scenarios
Start TrainingTCM Security
Practical penetration testing and ethical hacking courses from industry experts
Access AcademyACI Learning
75 hours of free IT and cybersecurity training (scroll down and click "Try for Free")
Get Free AccessOWASP Top 10
Learn about critical web application security risks and mitigation strategies
Learn MoreNIST Cybersecurity Framework
Understand industry-standard framework for managing cybersecurity risk
Read DocumentFortinet Cybersecurity Training
Free comprehensive cybersecurity training for IT professionals from Fortinet
Access TrainingAPI University
Learn API security fundamentals and best practices for secure development
Access CoursesHands-On Practice
Apply knowledge through practical labs, challenges, and real-world scenarios
TryHackMe
Interactive cybersecurity challenges with guided learning paths and practical exercises
Start TrainingLets Defend
Blue team training platform with real-world incident response scenarios
Start TrainingAwesome Cyber Security University
Check out the TryHackMe Guide and open-source tools to use
Access CoursesHack The Box
Advanced penetration testing labs and machine challenges for skill development
Start TrainingVulnHub
Free vulnerable virtual machines for hands-on security testing practice
Download VMsFree Student Resources
Find free resources offered by companies to help students
GitHub Student Developer Pack
Get access to GitHub Pro and various other resources to help along your journey
Start TinkeringCertifications
Prepare for industry certifications to validate your skills and advance your career
Free CC Exam Voucher
ISC2 Certified in Cybersecurity with free exam voucher and training materials
Get VoucherarcX Threat Intelligence
Specialized cyber threat intelligence training and certification program
Start CourseCEH
Certified Ethical Hacker focusing on penetration testing and ethical hacking methodologies
Learn MoreCySA+
Cybersecurity Analyst certification focusing on threat detection and incident response
Learn MoreSecuriti AI Governance
AI governance and security certification for modern cybersecurity challenges
Learn MoreCISSP
Advanced security management certification for experienced cybersecurity professionals
Certification PathCommunity & News
Stay connected with the cybersecurity community and keep up with industry trends
Krebs on Security
In-depth investigative reporting on cybersecurity incidents and industry insights
Read BlogCybersecurity News
Breaking updates, insights, and trends in cybersecurity.
Start ReadingCybersecurity Dive
In-depth articles and analysis on cybersecurity policies, threats, and strategies.
Start ReadingSecurityWeek
Comprehensive coverage of cybersecurity, digital defense, and technology trends.
Start ReadingISSA
Find a chapter near you to participate in quarterly security conferences
Join the CommunityFrameworks & Documents
Stay up to date on new trends and frameworks
CrowdStrike Threat Report
Year in Review report for 2025 based on CrowdStrike.
Start ReadingHuntress Cyber Threat Report 2025
A detailed look at 2025’s evolving cyber threats and defensive insights from Huntress.
Start ReadingSplunk State of Security
Explore the latest findings on security operations, resilience, and emerging attack trends.
Start ReadingCheck Point Security Report
Annual security insights from Check Point covering global cyber threats and key takeaways.
Start ReadingDeloitte Cybersecurity Report 2025
An overview of 2025 cybersecurity challenges and enterprise resilience trends from Deloitte.
Start ReadingFortinet Threat Landscape Report
Fortinet’s insights into the global threat landscape and cyber defense priorities.
Start ReadingIBM Threat Intelligence Index 2025
Comprehensive analysis of global attack trends and industry-targeted threats from IBM Security.
Start ReadingENISA Threat Landscape 2025
European Union Agency for Cybersecurity’s annual assessment of major cyber threat trends.
Start ReadingMicrosoft Digital Defense Report 2025
Microsoft’s annual analysis highlighting ransomware, extortion, and emerging cyber risks.
Start ReadingGlobal Cybersecurity Outlook 2025
World Economic Forum’s perspective on global cyber resilience and security priorities.
Start ReadingDragos OT Cybersecurity Year in Review
An analysis of industrial and operational technology (OT) threats from Dragos.
Start ReadingNIST Cybersecurity Framework (CSF) 2.0
The latest version of National Institute of Standards and Technology’s Cybersecurity Framework, guiding organisations to manage and reduce cyber risks.
Download PDFPCI DSS v4.0 / v4.0.1
The PCI Security Standards Council standard for securing payment-card data; global guidance for transactional systems and data protection.
Download PDFCIS Critical Security Controls v8 / v8.1
The Center for Internet Security’s prioritised best-practices framework to defend against prevalent cyber-threats.
Download PDFCOBIT 2019
The ISACA framework for enterprise-governance of information & technology, aligning IT and business goals.
Download PDF