Introduction
Welcome to the Cyber Security Hub, a platform dedicated to promoting and connecting cyber security training providers from around the world! Our community project aims to serve as a comprehensive resource hub, providing an overview of the diverse range of courses offered by these providers while offering them increased visibility and recognition.
In today’s rapidly evolving digital landscape, the demand for skilled cyber security professionals is at an all-time high. At Cyber Security Hub, we believe that access to quality training is essential for individuals and organizations to thrive in this ever-changing field. That’s why we’ve gathered an extensive directory of cyber security training providers, spanning various domains and expertise areas.
Our platform serves two primary purposes. First, it acts as a one-stop destination for individuals seeking cyber security training opportunities. Whether you are a novice eager to enter the world of cyber security or a seasoned professional looking to expand your skill set, our community project provides you with a curated list of reputable training providers. You can explore their offerings, browse through different courses, and easily navigate to the provider’s website for more detailed information.
Second, we aim to empower training providers by offering them increased visibility and exposure. By featuring their courses on our platform, we enable them to reach a wider audience and showcase their expertise. We believe in fostering collaboration and supporting the growth of the cyber security training community as a whole.
Overview
Reviewed
Provider | Focus Topics | Courses | Price Category | Keywords | YAML |
---|---|---|---|---|---|
Applied Network Defense | DE🧰 SM📡 TH🏹 | 13 | 🟨 Value | Threat Hunting, Splunk, Log Analysis, Detection Engineering, Sigma, Honeypots, Packet Analysis, Cyber Chef, OSquery, Elk, Security Writing, Regular Expressions | Trainings |
Cybrary | TH🏹 IR🪖 MA😈 | 41 | 🟩 Budget | Virtual environments, CVE analysis, APT, CrackMe, Cryptography, CTF, CompTIA, CySA+, CISSP, CEH, Compliance | - |
Kaspersky | MA😈 DF🔍 RE🔬 DE🧰 | 10 | 🟧 Premium | Reverse Engineering, Malware Analysis, Windows Incident Response, Security Operations, Threat Hunting, YARA, APTs, ICT, Suricata, Incident Response, Ghidra | |
PluralSight | NA🌎 | 50+ | 🟩 Budget | - | - |
Sektor7 | RT🔴 PT🪓 MD🤖 | 6 | 🟨 Value | API hooking, 32-/64-bit Migrations, Reflective Binaries, Cobalt Strike, COFFs, Rootkit, OST, Evasion, Persistence, Privilege Escalation, | - |
TryHackMe | PT🪓 VR🧨 DF🔍 TH🏹 | 500+ | 🟩 Budget | - | - |
Xintra | PT🪓 DF🔍 RE🔬 | 2 | 🟧 Premium | Azure, Cloud, M356, iOS, Reverse Engineering, ARM | Trainings |
Unreviewed
Provider | Focus Topics | Courses | Price Category | Keywords | YAML |
---|---|---|---|---|---|
Altered Security | RT🔴 PT🪓 | 6 | 🟨 Value | Active Directory, Enterprise Security, Azure, Privilege Escalation, Lateral Movement, Persistence, Cross Trust Attacks, Deception, Evasion, MDI, WDAC, Graph API, Conditional Access Policies, Azure AD Identity Protection | Trainings |
binary-offensive.com | RT🔴 PT🪓 | 1 | 🟧 Premium | Mythic, C2, Evasion, Maldocs, MSI, HTML Smuggling, Infection Chains, PE Backdooring, Obfuscation, Shell Code Loaders | Trainings |
Cyber5W | DF🔍 MA😈 | 5 | 🟧 Premium | Data recovery, carving, Anti-Forensics, File System, Caches, Artifacts | - |
CyberDefenders | DF🔍 DE🧰 TH🏹 | 1 | 🟧 Premium | Disk forensics, Memory Forensics, Network Forensics, Velociraptor, Email Security, Canary Tokens, ELK, OSSEC, RITA, USB Forensics, GoPhish, Sysmon, Vulnerability Management, Sentinel, Suricata, Phishing Attacks | YAML |
CyberKraft | OS🖥️ PT🪓 MC🧭 | 20 | 🟨 Value | ISC(2), CompTIA, CCSP, CISSP, Network Security, Cloud Security Basics, Linux, Penetration Testing | - |
Invictus Incident Response | DF🔍 IR🪖 | 1 | 🟥 Exclusive | Digital Forensics, Incident Response, Cloud Security, Microsoft Azure, Microsoft 365 | Trainings |
MalDev Academy | MD🤖 | N/A | 🟩 Budget | Process Injection, Compile-Time API Hashing, API Hooking, Static Evasion, Anti-Debugging, Payload Staging, Argument Spoofing | - |
Nexus InfoSec | RT🔴 PT🪓 | 1 | 🟧 Premium | Kali Linux, Nessus, Nmap, Port Scanning, OpenVAS, Metasploit, Bloodhound, Kerberoasting, PowerView, Adversary Emulation, OPSEC, MITRE ATT&CK, Obfuscation | Trainings |
ost2 | RE🔬 | 14 | 🟩 Budget | Reverse Engineering, Assembly, Debugger, WinDbg, Gdb, Firmware | - |
RET2 | VR🧨 RE🔬 | 2 | 🟧 Premium | War Games, virtual environment, gamified learning | Trainings |
Signal Labs | VR🧨 RE🔬 MD🤖 | 3 | 🟥 Exclusive | 0-days, fuzzing, bypass, EDR, AV, C2, implants, Cobalt Strike, Kernel, Rootkit, Ghidra, Binary Ninja, IDA, Hypervisor | Trainings |
The Taggart Institute | OS🖥️ RT🔴 | 8 | 🟩 Budget | Python, Vim, Git, Linux command line, regular expressions | Trainings |
Zero Point Security | RT🔴 MD🤖 | 7 | 🟨 Value | Red Teaming, Malware Development, C2s, C#, Driver Development | - |
Announced
Provider | Focus Topics | Courses | Price Category | Keywords | YAML |
---|---|---|---|---|---|
hextree | WH🕸️ RE🔬 PT🪓 | ? | ? | - | - |
Explanations
Focus Topics
Offensive Security
Acronym | Meaning |
---|---|
PT🪓 | Penetration Testing |
WH🕸️ | Web Hacking |
VR🧨 | Vulnerability Research |
RE🔬 | Reverse Engineering |
RT🔴 | Red Teaming |
MD🤖 | Malware Development |
Defensive Security
Acronym | Meaning |
---|---|
DF🔍 | Digital Forensics |
IR🪖 | Incident Response |
DE🧰 | Detection Engineering |
TH🏹 | Threat Hunting |
MA😈 | Malware Analysis |
TI🗺️ | Threat Intelligence |
DT🪤 | Deception Technology |
SM📡 | Security Monitoring |
SH💎 | System Hardening |
SC🔐 | Secure Coding |
Other
Acronym | Meaning |
---|---|
NA🌎 | No recognizable focus |
NT🛜 | Networking |
OS🖥️ | Operating Systems and Tools |
MC🧭 | Management and Compliance |
Keywords in Overview
The keyword column in the overview tables isn’t mean as a repetition of the “Focus Topics” column but should include more specific keywords like products, tools, languages, services, protocols, project names.
Examples:
Focus Topic: Threat Hunting Keywords: OSQuery, Splunk, YARA, Sigma
Focus Topic: Reverse Engineering Keywords: IDA, Ghidra, ARM, iOS
Values in the YAML files
Name
The name of the training provider.
Website
- The website of the training provider
- A URL linking to a sub page listing available trainings (e.g. see Kaspersky)
Price Category
Price Category | Price* | Description |
---|---|---|
🟩 Budget | <100 USD | Free or very affordable options for those on a tight budget |
🟨 Value | <500 USD | Affordable courses; solid value for your investment, offering comprehensive content and practical skills at a reasonable price point |
🟧 Premium | <2000 USD | High-quality, in-depth training, often with advanced features, personalized support, and expert-led instruction, providing a deeper level of knowledge and expertise |
🟥 Exclusive | >2000 USD | Top-tier category designed for organizations or individuals looking for bespoke, tailored training solutions. These offerings may include custom training environments, hands-on simulations, dedicated coaching, and specialized certifications |
* per course or monthly subscription
Previews Available
Preview means the availability of actual course content in a form in which is is offered after the purchase. It includes, e.g.:
- Video-based trainings: freely accessible subchapters as videos
- Lab-based trainings: Example exercise and a video or a demo instance that can be accessed
It does NOT include, e.g.:
- Video-based trainings: text abstract or screenshots of slides
- Lab-based trainings: screenshots of the lab environment or slides
Preview URL
A direct link to one of the previews.
Discount on Bulk Purchases
Indicates whether the purchase of multiple trainings is eligible for a discount.
Focus Area
“Focus area” refers to the specific subject or topic of expertise offered by online training providers. It highlights the main area of concentration or specialization in their course offerings.
See the category “Focus Area”. Don’t use the emojis in the YAML files.
Use at maximum 4 focus areas. If a person is required to select more than four focus areas, it means that they won’t have a specific focus area at all and the field should be removed (leave it empty -
in the overview list).
Trainings
- Name: title of the training
- Short-Description: a short description of the training using less than 256 characters.
- Description: a long description of the training using less than 4096 characters.
- Tags: keywords related to the contents of the training
- Price: the price of the training
- Duration: the approximate time it takes to complete the training in hours
- With-Labs: indicates of the training contains hands-on labs
- Type: indicates the type of the training (see schema for available values)
Contributions
To contribute to Cyber Security Hub, simply perform the following steps.
You can find the github repository from which this page was built here.
How to create a Pull Request
- Fork the repository
- Make changes to the forked repository either by a.) cloning it and working locally (e.g. using the Github client or any other git client) or b.) editing / adding files using the online editor provided by Github
- Create a Pull Request where your fork is the source and our repository the target
Required Additions
- Add a
.yml
file to the sub folder./trainings
. Please only use lower case characters for that file name and replace space characters ` ` with underscores_
. - Check the
training-schema.rx.yml
for all available fields and add as much information as possible. - Edit the
index.md
file in the root folder and add a new line with basic information on the new provider to theUnreviewed
table. (just copy and paste from the acronym tables below in order to get the right emojis)
Contact
Contact me on Twitter @cyb3rops