Discover our journey on GitHub

Unlock pages of cybersecurity knowledge

Delve into a curated library of cybersecurity knowledge. Choose a topic below to start your journey!

kali

Offensive

Simulate cyber attacks

Offensive security topics including penetration testing, social engineering, red teaming, and exploitation techniques.

๐Ÿ”„
System Rebootยท11h ago

Server-01 rebooted by admin

Defensive

Defend against cyber criminals

Defending systems and networks, incident response, threat hunting, SIEM, EDR, and blue team operations.

Career
OSCP Logo
Linkedin Logo
GCIA Logo
Splunk Logo

Career

Build your career in cybersecurity

Guidance for building and advancing a career in cybersecurity, including skills development, certifications, and industry insights.

ISO 27001
Manages information security and reduces risks.
NIST Cybersecurity Framework (CSF)
Guides organizations to reduce cybersecurity risks.
COBIT
Aligns IT governance with business goals.
GDPR Compliance
Protects data privacy for individuals in the EU.
CIS Controls
Outlines actionable steps to secure systems.
Cyber Essentials
Defends against common cyber threats.
Zero Trust Architecture
Enforces strict access controls at all levels.
SOC 2
Secures data based on five trust principles.
ITIL
Optimizes IT services to meet business needs.
ISO 27001
Manages information security and reduces risks.
NIST Cybersecurity Framework (CSF)
Guides organizations to reduce cybersecurity risks.
COBIT
Aligns IT governance with business goals.
GDPR Compliance
Protects data privacy for individuals in the EU.
CIS Controls
Outlines actionable steps to secure systems.
Cyber Essentials
Defends against common cyber threats.
Zero Trust Architecture
Enforces strict access controls at all levels.
SOC 2
Secures data based on five trust principles.
ITIL
Optimizes IT services to meet business needs.
ISO 27001
Manages information security and reduces risks.
NIST Cybersecurity Framework (CSF)
Guides organizations to reduce cybersecurity risks.
COBIT
Aligns IT governance with business goals.
GDPR Compliance
Protects data privacy for individuals in the EU.
CIS Controls
Outlines actionable steps to secure systems.
Cyber Essentials
Defends against common cyber threats.
Zero Trust Architecture
Enforces strict access controls at all levels.
SOC 2
Secures data based on five trust principles.
ITIL
Optimizes IT services to meet business needs.
ISO 27001
Manages information security and reduces risks.
NIST Cybersecurity Framework (CSF)
Guides organizations to reduce cybersecurity risks.
COBIT
Aligns IT governance with business goals.
GDPR Compliance
Protects data privacy for individuals in the EU.
CIS Controls
Outlines actionable steps to secure systems.
Cyber Essentials
Defends against common cyber threats.
Zero Trust Architecture
Enforces strict access controls at all levels.
SOC 2
Secures data based on five trust principles.
ITIL
Optimizes IT services to meet business needs.
CMMC
Ensures cybersecurity in defense contractors.
HIPAA Compliance
Protects sensitive patient health data.
FISMA
Secures federal government information systems.
PCI DSS
Protects credit card data in transactions.
ISO 27701
Manages privacy information with ISO 27001.
NIS Directive
Improves cybersecurity for essential services.
CSA STAR
Focuses on cloud security governance.
TOGAF
Aligns enterprise architecture with business goals.
ISO 31000
Provides guidelines for managing risks.
CMMC
Ensures cybersecurity in defense contractors.
HIPAA Compliance
Protects sensitive patient health data.
FISMA
Secures federal government information systems.
PCI DSS
Protects credit card data in transactions.
ISO 27701
Manages privacy information with ISO 27001.
NIS Directive
Improves cybersecurity for essential services.
CSA STAR
Focuses on cloud security governance.
TOGAF
Aligns enterprise architecture with business goals.
ISO 31000
Provides guidelines for managing risks.
CMMC
Ensures cybersecurity in defense contractors.
HIPAA Compliance
Protects sensitive patient health data.
FISMA
Secures federal government information systems.
PCI DSS
Protects credit card data in transactions.
ISO 27701
Manages privacy information with ISO 27001.
NIS Directive
Improves cybersecurity for essential services.
CSA STAR
Focuses on cloud security governance.
TOGAF
Aligns enterprise architecture with business goals.
ISO 31000
Provides guidelines for managing risks.
CMMC
Ensures cybersecurity in defense contractors.
HIPAA Compliance
Protects sensitive patient health data.
FISMA
Secures federal government information systems.
PCI DSS
Protects credit card data in transactions.
ISO 27701
Manages privacy information with ISO 27001.
NIS Directive
Improves cybersecurity for essential services.
CSA STAR
Focuses on cloud security governance.
TOGAF
Aligns enterprise architecture with business goals.
ISO 31000
Provides guidelines for managing risks.

Governance

Manage cybersecurity risk

Covers compliance, regulatory frameworks, audits, and risk management essential for cybersecurity governance.

Concepts

Learn the basics

Core cybersecurity concepts such as defense in depth, least privilege, and CIA triad.

Technology

The knowledge you need

A solid foundation for understanding everything about cybersecurity. From the basics to the most advanced topics.

We use cookies

We use cookies to ensure you get the best experience on our website. For more information on how we use cookies, please see our cookie policy.