Cybersecurity
Attack
Learning Path
Cybersecurity Foundation: A Practitioner's Guide
A comprehensive practitioner's guide to building a real foundation in cybersecurity — mindset, core skills, lab building, and methodology.
Free Cybersecurity Resources
A curated list of free tools, training platforms, cheat sheets, and references for cybersecurity students and professionals.
Blog Posts
Snort IDS – Part 01: Installing Snort
How to install Snort on Kali Linux using both repository and source-based methods.
Snort IDS – Part 02: Basic Configuration of Snort 3
Configuring Snort 3 for intrusion detection in your home lab environment.
OSINT Fundamentals
Core techniques and tools for open source intelligence gathering and reconnaissance.
Penetration Testing Basics
An introduction to penetration testing methodology, tools, and responsible disclosure.
Lab Projects
Building a Cybersecurity Home Lab
Step-by-step guide to setting up your own cybersecurity home lab for hands-on learning and practice.
Deploying Vulnerable Applications
Setting up intentionally vulnerable applications in your home lab for ethical hacking practice.
Advanced Network Scanner
A comprehensive Python-based network scanning and security assessment tool.
Building a Custom Password Manager with Encryption
Create your own secure password manager using modern encryption techniques.
Practice Platforms
TryHackMe
Best platform for beginners — guided, structured, hands-on labs.
Hack The Box
Intermediate to advanced machines and challenges.
PortSwigger Web Security Academy
The best free resource for web application security.
PicoCTF
Beginner-friendly CTF challenges from Carnegie Mellon.
VulnHub
Download vulnerable VMs to practice on locally.
OverTheWire
Security wargames and Linux challenges.
Defend
Blog Posts
Splunk Part 01: Installation & SPL Basics
How to install Splunk Enterprise and perform basic searches using SPL for security monitoring.
Splunk Part 02: MITRE ATT&CK and Behavioral Mapping
Understanding the MITRE ATT&CK framework and how security events in Splunk align with adversary behavior.
Splunk Part 03: Advanced Detection
Advanced detection techniques and correlation searches in Splunk for threat hunting.
How Cloudflare Works: A Security Blueprint
An in-depth, defensive guide to Cloudflare with practical steps, configuration tips, and verification suggestions.
How Cloudflare Works: Part 2 — Testing & Hardening
Testing and hardening your Cloudflare configuration for maximum security effectiveness.
Lab Projects
Network Security Monitoring with Suricata
Deploy and configure Suricata IDS/IPS in your home lab for real-time network threat detection.
Incident Response Automation in the Home Lab
Automate incident detection and response workflows using open-source SOAR tools.
Network Forensics and Full Packet Capture
Implement full packet capture and network forensics workflows to analyze security incidents.
Secure SDLC Checklist
Essential security requirements to integrate secure coding practices throughout the development lifecycle.
Defense Frameworks
MITRE ATT&CK
Knowledge base of adversary tactics, techniques, and procedures.
NIST Cybersecurity Framework
Standards and best practices for managing cybersecurity risk.
OWASP Top 10
The most critical web application security risks.
Lockheed Martin Cyber Kill Chain
Framework for identifying and stopping cyberattacks at each stage.
CyberDefenders
Interactive blue team training and SOC simulations.
Blue Team Labs Online
Hands-on defensive security challenges and investigations.