title_image

Introduction

Welcome to the Cyber Security Hub, a platform dedicated to promoting and connecting cyber security training providers from around the world! Our community project aims to serve as a comprehensive resource hub, providing an overview of the diverse range of courses offered by these providers while offering them increased visibility and recognition.

In today’s rapidly evolving digital landscape, the demand for skilled cyber security professionals is at an all-time high. At Cyber Security Hub, we believe that access to quality training is essential for individuals and organizations to thrive in this ever-changing field. That’s why we’ve gathered an extensive directory of cyber security training providers, spanning various domains and expertise areas.

Our platform serves two primary purposes. First, it acts as a one-stop destination for individuals seeking cyber security training opportunities. Whether you are a novice eager to enter the world of cyber security or a seasoned professional looking to expand your skill set, our community project provides you with a curated list of reputable training providers. You can explore their offerings, browse through different courses, and easily navigate to the provider’s website for more detailed information.

Second, we aim to empower training providers by offering them increased visibility and exposure. By featuring their courses on our platform, we enable them to reach a wider audience and showcase their expertise. We believe in fostering collaboration and supporting the growth of the cyber security training community as a whole.

Overview

Reviewed

Provider Focus Topics Courses Price Category Keywords YAML
Applied Network Defense DE🧰 SM📡 TH🏹 13 🟨 Value Threat Hunting, Splunk, Log Analysis, Detection Engineering, Sigma, Honeypots, Packet Analysis, Cyber Chef, OSquery, Elk, Security Writing, Regular Expressions Trainings
Cybrary TH🏹 IR🪖 MA😈 41 🟩 Budget Virtual environments, CVE analysis, APT, CrackMe, Cryptography, CTF, CompTIA, CySA+, CISSP, CEH, Compliance -
Kaspersky MA😈 DF🔍 RE🔬 DE🧰 10 🟧 Premium Reverse Engineering, Malware Analysis, Windows Incident Response, Security Operations, Threat Hunting, YARA, APTs, ICT, Suricata, Incident Response, Ghidra  
PluralSight NA🌎 50+ 🟩 Budget -  -
Sektor7 RT🔴 PT🪓 MD🤖 6 🟨 Value API hooking, 32-/64-bit Migrations, Reflective Binaries, Cobalt Strike, COFFs, Rootkit, OST, Evasion, Persistence, Privilege Escalation, -
TryHackMe PT🪓 VR🧨 DF🔍 TH🏹 500+ 🟩 Budget - -
Xintra PT🪓 DF🔍 RE🔬 2 🟧 Premium Azure, Cloud, M356, iOS, Reverse Engineering, ARM Trainings

Unreviewed

Provider Focus Topics Courses Price Category Keywords YAML
Altered Security RT🔴 PT🪓 6 🟨 Value Active Directory, Enterprise Security, Azure, Privilege Escalation, Lateral Movement, Persistence, Cross Trust Attacks, Deception, Evasion, MDI, WDAC, Graph API, Conditional Access Policies, Azure AD Identity Protection Trainings
binary-offensive.com RT🔴 PT🪓 1 🟧 Premium Mythic, C2, Evasion, Maldocs, MSI, HTML Smuggling, Infection Chains, PE Backdooring, Obfuscation, Shell Code Loaders Trainings
Cyber5W DF🔍 MA😈 5 🟧 Premium Data recovery, carving, Anti-Forensics, File System, Caches, Artifacts -
CyberDefenders DF🔍 DE🧰 TH🏹 1 🟧 Premium Disk forensics, Memory Forensics, Network Forensics, Velociraptor, Email Security, Canary Tokens, ELK, OSSEC, RITA, USB Forensics, GoPhish, Sysmon, Vulnerability Management, Sentinel, Suricata, Phishing Attacks YAML
CyberKraft OS🖥️ PT🪓 MC🧭 20 🟨 Value ISC(2), CompTIA, CCSP, CISSP, Network Security, Cloud Security Basics, Linux, Penetration Testing -
Invictus Incident Response DF🔍 IR🪖 1 🟥 Exclusive Digital Forensics, Incident Response, Cloud Security, Microsoft Azure, Microsoft 365 Trainings
MalDev Academy MD🤖 N/A 🟩 Budget Process Injection, Compile-Time API Hashing, API Hooking, Static Evasion, Anti-Debugging, Payload Staging, Argument Spoofing -
Nexus InfoSec RT🔴 PT🪓 1 🟧 Premium Kali Linux, Nessus, Nmap, Port Scanning, OpenVAS, Metasploit, Bloodhound, Kerberoasting, PowerView, Adversary Emulation, OPSEC, MITRE ATT&CK, Obfuscation Trainings
ost2 RE🔬 14 🟩 Budget Reverse Engineering, Assembly, Debugger, WinDbg, Gdb, Firmware -
RET2 VR🧨 RE🔬 2 🟧 Premium War Games, virtual environment, gamified learning Trainings
Signal Labs VR🧨 RE🔬 MD🤖 3 🟥 Exclusive 0-days, fuzzing, bypass, EDR, AV, C2, implants, Cobalt Strike, Kernel, Rootkit, Ghidra, Binary Ninja, IDA, Hypervisor Trainings
The Taggart Institute OS🖥️ RT🔴 8 🟩 Budget Python, Vim, Git, Linux command line, regular expressions Trainings
Zero Point Security RT🔴 MD🤖  7  🟨 Value Red Teaming, Malware Development, C2s, C#, Driver Development -

Announced

Provider Focus Topics Courses Price Category Keywords YAML
hextree WH🕸️ RE🔬 PT🪓 ? ? - -

Explanations

Focus Topics

Offensive Security

Acronym Meaning
PT🪓 Penetration Testing
WH🕸️ Web Hacking
VR🧨 Vulnerability Research
RE🔬 Reverse Engineering
RT🔴 Red Teaming
MD🤖 Malware Development

Defensive Security

Acronym Meaning
DF🔍 Digital Forensics
IR🪖 Incident Response
DE🧰 Detection Engineering
TH🏹 Threat Hunting
MA😈  Malware Analysis
TI🗺️ Threat Intelligence
DT🪤 Deception Technology
SM📡 Security Monitoring
SH💎 System Hardening
SC🔐 Secure Coding

Other

Acronym Meaning
NA🌎 No recognizable focus
NT🛜 Networking
OS🖥️ Operating Systems and Tools
MC🧭 Management and Compliance

Keywords in Overview

The keyword column in the overview tables isn’t mean as a repetition of the “Focus Topics” column but should include more specific keywords like products, tools, languages, services, protocols, project names.

Examples:

Focus Topic: Threat Hunting Keywords: OSQuery, Splunk, YARA, Sigma

Focus Topic: Reverse Engineering Keywords: IDA, Ghidra, ARM, iOS

Values in the YAML files

Name

The name of the training provider.

Website

  • The website of the training provider
  • A URL linking to a sub page listing available trainings (e.g. see Kaspersky)

Price Category

Price Category Price* Description
🟩 Budget <100 USD Free or very affordable options for those on a tight budget
 🟨 Value <500 USD Affordable courses; solid value for your investment, offering comprehensive content and practical skills at a reasonable price point
🟧 Premium <2000 USD High-quality, in-depth training, often with advanced features, personalized support, and expert-led instruction, providing a deeper level of knowledge and expertise
🟥 Exclusive >2000 USD Top-tier category designed for organizations or individuals looking for bespoke, tailored training solutions. These offerings may include custom training environments, hands-on simulations, dedicated coaching, and specialized certifications

* per course or monthly subscription

Previews Available

Preview means the availability of actual course content in a form in which is is offered after the purchase. It includes, e.g.:

  • Video-based trainings: freely accessible subchapters as videos
  • Lab-based trainings: Example exercise and a video or a demo instance that can be accessed

It does NOT include, e.g.:

  • Video-based trainings: text abstract or screenshots of slides
  • Lab-based trainings: screenshots of the lab environment or slides

Preview URL

A direct link to one of the previews.

Discount on Bulk Purchases

Indicates whether the purchase of multiple trainings is eligible for a discount.

Focus Area

“Focus area” refers to the specific subject or topic of expertise offered by online training providers. It highlights the main area of concentration or specialization in their course offerings. See the category “Focus Area”. Don’t use the emojis in the YAML files. Use at maximum 4 focus areas. If a person is required to select more than four focus areas, it means that they won’t have a specific focus area at all and the field should be removed (leave it empty - in the overview list).

Trainings

  • Name: title of the training
  • Short-Description: a short description of the training using less than 256 characters.
  • Description: a long description of the training using less than 4096 characters.
  • Tags: keywords related to the contents of the training
  • Price: the price of the training
  • Duration: the approximate time it takes to complete the training in hours
  • With-Labs: indicates of the training contains hands-on labs
  • Type: indicates the type of the training (see schema for available values)

Contributions

To contribute to Cyber Security Hub, simply perform the following steps.

You can find the github repository from which this page was built here.

How to create a Pull Request

  1. Fork the repository
  2. Make changes to the forked repository either by a.) cloning it and working locally (e.g. using the Github client or any other git client) or b.) editing / adding files using the online editor provided by Github
  3. Create a Pull Request where your fork is the source and our repository the target

Required Additions

  1. Add a .yml file to the sub folder ./trainings. Please only use lower case characters for that file name and replace space characters ` ` with underscores _.
  2. Check the training-schema.rx.yml for all available fields and add as much information as possible.
  3. Edit the index.md file in the root folder and add a new line with basic information on the new provider to the Unreviewed table. (just copy and paste from the acronym tables below in order to get the right emojis)

Contact

Contact me on Twitter @cyb3rops