Welcome to the Cyber Security Hub, a platform dedicated to promoting and connecting cyber security training providers from around the world! Our community project aims to serve as a comprehensive resource hub, providing an overview of the diverse range of courses offered by these providers while offering them increased visibility and recognition.
In today's rapidly evolving digital landscape, the demand for skilled cyber security professionals is at an all-time high. At Cyber Security Hub, we believe that access to quality training is essential for individuals and organizations to thrive in this ever-changing field. That's why we've gathered an extensive directory of cyber security training providers, spanning various domains and expertise areas.
Our platform serves two primary purposes. First, it acts as a one-stop destination for individuals seeking cyber security training opportunities. Whether you are a novice eager to enter the world of cyber security or a seasoned professional looking to expand your skill set, our community project provides you with a curated list of reputable training providers. You can explore their offerings, browse through different courses, and easily navigate to the provider's website for more detailed information.
Second, we aim to empower training providers by offering them increased visibility and exposure. By featuring their courses on our platform, we enable them to reach a wider audience and showcase their expertise. We believe in fostering collaboration and supporting the growth of the cyber security training community as a whole.
Provider | Focus Topics | Courses | Price Category | Keywords | YAML |
---|---|---|---|---|---|
Applied Network Defense | DE🧰 SM📡 TH🏹 | 13 | 🟨 Value | Threat Hunting, Splunk, Log Analysis, Detection Engineering, Sigma, Honeypots, Packet Analysis, Cyber Chef, OSquery, Elk, Security Writing, Regular Expressions | Trainings |
Cybrary | TH🏹 IR🪖 MA😈 | 41 | 🟩 Budget | Virtual environments, CVE analysis, APT, CrackMe, Cryptography, CTF, CompTIA, CySA+, CISSP, CEH, Compliance | - |
Kaspersky | MA😈 DF🔍 RE🔬 DE🧰 | 10 | 🟧 Premium | Reverse Engineering, Malware Analysis, Windows Incident Response, Security Operations, Threat Hunting, YARA, APTs, ICT, Suricata, Incident Response, Ghidra | |
PluralSight | NA🌎 | 50+ | 🟩 Budget | - | - |
Sektor7 | RT🔴 PT🪓 MD🤖 | 6 | 🟨 Value | API hooking, 32-/64-bit Migrations, Reflective Binaries, Cobalt Strike, COFFs, Rootkit, OST, Evasion, Persistence, Privilege Escalation, | - |
TryHackMe | PT🪓 VR🧨 DF🔍 TH🏹 | 500+ | 🟩 Budget | - | - |
Xintra | PT🪓 DF🔍 RE🔬 | 2 | 🟧 Premium | Azure, Cloud, M356, iOS, Reverse Engineering, ARM | Trainings |
Provider | Focus Topics | Courses | Price Category | Keywords | YAML |
---|---|---|---|---|---|
binary-offensive.com | RT🔴 PT🪓 | 1 | 🟧 Premium | Mythic, C2, Evasion, Maldocs, MSI, HTML Smuggling, Infection Chains, PE Backdooring, Obfuscation, Shell Code Loaders | Trainings |
Cyber5W | DF🔍 MA😈 | 5 | 🟧 Premium | Data recovery, carving, Anti-Forensics, File System, Caches, Artifacts | - |
CyberDefenders | DF🔍 DE🧰 TH🏹 | 1 | 🟧 Premium | Disk forensics, Memory Forensics, Network Forensics, Velociraptor, Email Security, Canary Tokens, ELK, OSSEC, RITA, USB Forensics, GoPhish, Sysmon, Vulnerability Management, Sentinel, Suricata, Phishing Attacks | YAML |
Nexus InfoSec | RT🔴 PT🪓 | 1 | 🟧 Premium | Kali Linux, Nessus, Nmap, Port Scanning, OpenVAS, Metasploit, Bloodhound, Kerberoasting, PowerView, Adversary Emulation, OPSEC, MITRE ATT&CK, Obfuscation | Trainings |
ost2 | RE🔬 | 14 | 🟩 Budget | Reverse Engineering, Assembly, Debugger, WinDbg, Gdb, Firmware | - |
RET2 | VR🧨 RE🔬 | 2 | 🟧 Premium | War Games, virtual environment, gamified learning | Trainings |
Signal Labs | VR🧨 RE🔬 MD🤖 | 3 | 🟥 Exclusive | 0-days, fuzzing, bypass, EDR, AV, C2, implants, Cobalt Strike, Kernel, Rootkit, Ghidra, Binary Ninja, IDA, Hypervisor | Trainings |
The Taggart Institute | OS🖥️ RT🔴 | 8 | 🟩 Budget | Python, Vim, Git, Linux command line, regular expressions | Trainings |
Altered Security | RT🔴 PT🪓 | 6 | 🟨 Value | Active Directory, Enterprise Security, Azure, Privilege Escalation, Lateral Movement, Persistence, Cross Trust Attacks, Deception, Evasion, MDI, WDAC, Graph API, Conditional Access Policies, Azure AD Identity Protection | Trainings |
Provider | Focus Topics | Courses | Price Category | Keywords | YAML |
---|---|---|---|---|---|
hextree | WH🕸️ RE🔬 PT🪓 | ? | ? | - | - |
Acronym | Meaning |
---|---|
PT🪓 | Penetration Testing |
WH🕸️ | Web Hacking |
VR🧨 | Vulnerability Research |
RE🔬 | Reverse Engineering |
RT🔴 | Red Teaming |
MD🤖 | Malware Development |
Acronym | Meaning |
---|---|
DF🔍 | Digital Forensics |
IR🪖 | Incident Response |
DE🧰 | Detection Engineering |
TH🏹 | Threat Hunting |
MA😈 | Malware Analysis |
TI🗺️ | Threat Intelligence |
DT🪤 | Deception Technology |
SM📡 | Security Monitoring |
SH💎 | System Hardening |
SC🔐 | Secure Coding |
Acronym | Meaning |
---|---|
NA🌎 | No recognizable focus |
NT🛜 | Networking |
OS🖥️ | Operating Systems and Tools |
MC🧭 | Management and Compliance |
The keyword column in the overview tables isn't mean as a repetition of the "Focus Topics" column but should include more specific keywords like products, tools, languages, services, protocols, project names.
Examples:
Focus Topic: Threat Hunting Keywords: OSQuery, Splunk, YARA, Sigma
Focus Topic: Reverse Engineering Keywords: IDA, Ghidra, ARM, iOS
The name of the training provider.
- The website of the training provider
- A URL linking to a sub page listing available trainings (e.g. see Kaspersky)
Price Category | Price* | Description |
---|---|---|
🟩 Budget | <100 USD | Free or very affordable options for those on a tight budget |
🟨 Value | <500 USD | Affordable courses; solid value for your investment, offering comprehensive content and practical skills at a reasonable price point |
🟧 Premium | <2000 USD | High-quality, in-depth training, often with advanced features, personalized support, and expert-led instruction, providing a deeper level of knowledge and expertise |
🟥 Exclusive | >2000 USD | Top-tier category designed for organizations or individuals looking for bespoke, tailored training solutions. These offerings may include custom training environments, hands-on simulations, dedicated coaching, and specialized certifications |
* per course or monthly subscription
Preview means the availability of actual course content in a form in which is is offered after the purchase. It includes, e.g.:
- Video-based trainings: freely accessible subchapters as videos
- Lab-based trainings: Example exercise and a video or a demo instance that can be accessed
It does NOT include, e.g.:
- Video-based trainings: text abstract or screenshots of slides
- Lab-based trainings: screenshots of the lab environment or slides
A direct link to one of the previews.
Indicates whether the purchase of multiple trainings is eligible for a discount.
"Focus area" refers to the specific subject or topic of expertise offered by online training providers. It highlights the main area of concentration or specialization in their course offerings.
See the category "Focus Area". Don't use the emojis in the YAML files.
Use at maximum 4 focus areas. If a person is required to select more than four focus areas, it means that they won't have a specific focus area at all and the field should be removed (leave it empty -
in the overview list).
- Name: title of the training
- Short-Description: a short description of the training using less than 256 characters.
- Description: a long description of the training using less than 4096 characters.
- Tags: keywords related to the contents of the training
- Price: the price of the training
- Duration: the approximate time it takes to complete the training in hours
- With-Labs: indicates of the training contains hands-on labs
- Type: indicates the type of the training (see schema for available values)
To contribute to Cyber Security Hub, simply perform the following steps.
- Fork the repository
- Make changes to the forked repository either by a.) cloning it and working locally (e.g. using the Github client or any other git client) or b.) editing / adding files using the online editor provided by Github
- Create a Pull Request where your fork is the source and our repository the target
- Add a
.yml
file to the sub folder./trainings
. Please only use lower case characters for that file name and replace space characters_
. - Check the
training-schema.rx.yml
for all available fields and add as much information as possible. - Edit the
index.md
file in the root folder and add a new line with basic information on the new provider to theUnreviewed
table. (just copy and paste from the acronym tables below in order to get the right emojis)
Contact me on Twitter @cyb3rops