Courses to become a “Zero to Hero” in Cyber Security without marketing , you will have to:
- study a lot (we are talking about a “Hero” right?)
- study “non-technical” and “unconventional” things (Quality = Hard Skills + Soft Skills)
- study the same thing more than once (Learn = Repeat + Repeat + Repeat)
Good point:
- The only investment is your time, everything is “on the line”, “free”, “no cost”.
Disclaimer:
- No one needs to be a “Hero” , but always remember the old passage (with translation below for those who haven’t started their English course yet)“Be careful whose advice you buy, but be patient with those who supply it. Advice is a form of nostalgia. Dispensing it is a way of fishing the past from the disposal, wiping it off, painting over the ugly parts and recycling it for more than it’s worth.”“Be careful of people who give you advice, but be patient with them. Advice is a form of nostalgia. Giving advice is a way of rescuing the past from the trash can, cleaning it up, covering up the ugly parts, and recycling it for more than it’s worth.”
Sunscreen (Everybody’s Free) – Baz Luhrmann
Without further ado, I wish you good studies!
Basic – 14 materials
- English
- Kultivi – English course: https://kultivi.com/cursos/idiomas/ingles
- Portuguese
- EV – Written Communication: https://www.ev.org.br/cursos/comunicacao-escrita
- Computing Base
- Netacad – Get Connected: https://www.netacad.com/courses/os-it/get-connected
- FIAP – IT Infrastructure Management: https://on.fiap.com.br/local/movimentobrasildigital/
- General information security
- FGV Nic.Br – Digital Security: https://educacao-executiva.fgv.br/cursos/online/curta-media-duracao-online/seguranca-digital
- FGV Nic.Br – Terms of Use and Privacy Policies: https://educacao-executiva.fgv.br/cursos/online/curta-media-duracao-online/termos-de-uso-e-politicas-de-privacidade
- Netacad – Introduction to Cybersecurity: https://www.netacad.com/courses/cybersecurity/introduction-cybersecurity
- Windows Operating Systems
- MSLearn – Microsoft 365 Path (9 Modules): https://docs.microsoft.com/en-us/learn/paths/m365-getmodern/
- Linux Operating Systems
- Netacad – Linux Unhatched: https://www.netacad.com/courses/os-it/ndg-linux-unhatched
- Software development
- Laracasts – PHP for Beginners: https://laracasts.com/series/php-for-beginners
- Databases
- Coursera Michigan – Introduction to SQL: https://www.coursera.org/learn/intro-sql
- Mosh – MySQL in 3 Hours: https://www.youtube.com/watch?v=7S_tz1z_5bA
- Soft Skills
- Coursera DTS – Learning How to Learn: https://www.coursera.org/learn/learning-how-to-learn
- FM2S – Creativity: Principles and Techniques: https://ead.fm2s.com.br/curso/curso-de-criatividade-principios-e-abordagens/
Beginner – 17 materials
- Portuguese
- EV – Grammar Office: https://www.ev.org.br/cursos/oficina-de-lingua-portuguesa-gramatica
- Computing base
- edX Harvard – cs50x: https://www.edx.org/course/introduction-computer-science-harvardx-cs50x
- Network Base
- Netacad – CCNAv7 Introduction to Networks (by Nic.Br): https://cursoseventos.nic.br/curso/curso-ccna-intro-cisco-nicbr/
- General information security
- Netacad – Cybersecurity Essentials: https://www.netacad.com/courses/cybersecurity/cybersecurity-essentials
- SANS – CyberAces: https://www.sans.org/cyberaces/
- NIC.br – Internet Security Incident Handling, explained by NIC.br: https://youtu.be/flu6JPRHW04
- Windows Operating Systems
- MSLearn – Windows Deployment (5 Modules): https://docs.microsoft.com/en-us/learn/paths/plan-your-windows-10-deployment-strategy/
- MSLearn – Windows Server (5 Modules): https://docs.microsoft.com/en-us/learn/paths/windows-server-deployment-configuration-administration/
- Linux Operating Systems
- Linux Foundation – Introduction to Linux: https://training.linuxfoundation.org/training/introduction-to-linux/
- Firewall Systems
- Jose Bravo – PFSense (43 Videos): https://www.youtube.com/watch?v=aRVJmlqXAdQ&list=PLHh9jhztlMypPs0EIcpHE5R-5sc27r4Bc
- Software development
- Netacad – Python: https://www.netacad.com/courses/programming/pcap-programming-essentials-python
- Mosh – What is a REST API: https://www.youtube.com/watch?v=SLwpqD8n3d0
- Databases
- Coursera Michigan – Database Design PostgreSQL: https://www.coursera.org/learn/database-design-postgresql
- Data Science
- Data Science Academy – Big Data Fundamentos 3.0: https://www.datascienceacademy.com.br/cursosgratuitos
- Data Science Academy – Artificial Intelligence Fundamentals 2.0: https://www.datascienceacademy.com.br/cursosgratuitos
- Data Science Academy – Introduction to Data Science 3.0: https://www.datascienceacademy.com.br/cursosgratuitos
- Soft Skills
- EV – Personal Organization: https://www.ev.org.br/cursos/organizacao-pessoal
Beginner – 25 materials
- Portuguese
- EV – Writing Techniques: https://www.ev.org.br/cursos/tecnicas-de-redacao
- IT Processes
- LearnQuest Coursera – ITIL4: https://www.coursera.org/learn/itil-4-exam-preparation
- Network Base
- Netacad – CCNAv7 Switching, Routing e Wireless Essentials (pelo Nic.Br): https://cursoseventos.nic.br/curso/curso-ccna-srwe-cisco-nicbr/
- Computing Base
- Princeton University Coursera – Computer Architecture: https://www.coursera.org/learn/comparch
- Cloud computing base
- FIAP – Cloud Fundamentals: https://on.fiap.com.br/local/movimentobrasildigital/
- General information security
- FIAP – Cybersecurity: https://on.fiap.com.br/local/movimentobrasildigital/
- AacadiTI – Network Defense Essentials: https://acaditi.com.br/essentials-series/#nde
- Coursera – New York University: https://www.coursera.org/specializations/intro-cyber-security
- Cert.br – Recommendations for Security Incident Notifications: https://www.cert.br/docs/whitepapers/notificacoes/
- SANS – The Cycle of Cyber Threat Intelligence: https://youtu.be/J7e74QLVxCk
- MITRE – Using ATT&CK for Cyber Threat Intelligence Training: https://attack.mitre.org/resources/training/cti/
- MITRE – Foundations of Operationalizing MITRE ATT&CK: https://academy.attackiq.com/courses/foundations-of-operationalizing-mitre-attck
- Pentest
- DESEC – Introduction to Pentest: https://desecsecurity.com/curso/introducao-pentest
- Offensive Security
- AacadiTI – Ethical Hacking Essentials: https://acaditi.com.br/essentials-series/#ehe
- Portswigger Web Security Academy – Server-side topics (93 Labs): https://portswigger.net/web-security/learning-path
- Computer forensics
- AcadiTI – Digital Forensics Essentials: https://acaditi.com.br/essentials-series/#dfe
- BASIS – Intro to DFIR: https://dfir-training.basistech.com/courses/intro-to-divide-and-conquer
- “Capture the Flag” Exercises
- Exploit Alley – Challenge #2: https://youtube.com/playlist?list=PLHBDBcFA_l_WBcUJWf8cp5BaPsUkquRQU
- Linux Operating Systems
- Aurelio – Shell Portal: https://aurelio.net/shell/
- Windows Operating Systems
- MSLearn – PowerShell (6 Módulos): https://docs.microsoft.com/en-us/learn/paths/powershell/
- Software development
- Netacad – JavaScript: https://www.netacad.com/courses/programming/javascript-essentials-1
- Toolbox
- Linux Foundation – Git: https://training.linuxfoundation.org/training/git-for-distributed-software-development-lfd109x/
- Data Science
- Data Science Academy – Microsoft Power BI for Data Science, Version 2.0: https://www.datascienceacademy.com.br/cursosgratuitos
- Soft Skills
- FIAP – DevOps & Agile Culture: https://on.fiap.com.br/local/movimentobrasildigital/
- SrgioBuria – XGH Extreme Go Horse (how NOT to solve things in YOU): https://en.slideshare.net/SrgioBuria/xgh-extreme-go-horse
Intermediate – 30 materials
- Network Base
- Nic.Br – Basic IPv6 Course: https://cursoseventos.nic.br/curso/curso-basico-ipv6-ead/
- Netacad – CCNAv7 Enterprise Networking, Security, and Automation (pelo Nic.Br): https://cursoseventos.nic.br/curso/curso-ccna-ensa-cisco-nicbr
- Environment monitoring
- Elastic – Observability Fundamentals: https://www.elastic.co/training/observability-fundamentals
- Elastic – Kibana Fundamentals: https://www.elastic.co/training/kibana-fundamentals
- New Relic – Observability 101: The essentials: https://learn.newrelic.com/path/foundations/observability-101-the-essentials
- New Relic – Opentelemetry – An opensource data collection standard: https://learn.newrelic.com/opentelemetry-an-open-source-data-collection-standard
- Offensive Security
- GoHacking – EHC2: https://www.youtube.com/watch?v=bUqu8fh7xUg
- Beco do Exploit – Hacking Dojo: https://becodoexploit.com/HackingDojo/
- Portswigger Web Security Academy – Client-side topics (93 Labs): https://portswigger.net/web-security/learning-path
- GoHacking – BugBounty: https://youtu.be/UHo9TLzJneM
- Defensive Security
- GoHacking – Security Operations 101: https://youtu.be/jHr6o8_sKZo
- SIEM systems
- Jose Bravo – What is a SIEM? (5 Videos): https://www.youtube.com/watch?v=MtqFMe4zSpQ&list=PLHh9jhztlMyp8lyKXt9orVM57ygW_ihPS
- Cybrary – AlienVault OSSIM: https://www.cybrary.it/course/alienvault-ossim/
- Elastic – SIEM Fundamentals: https://www.elastic.co/training/elastic-security-fundamentals-siem
- Firewall Systems
- Checkpoint edX – Network Security: https://www.edx.org/course/jump-start-network-security
- Checkpoint edX – Product Deployment: https://www.edx.org/course/jump-start-product-deployment
- “Capture the Flag” Exercises
- Over the Wire – Wargames: https://overthewire.org/wargames/
- Software Development
- Hackaflag Binary Chat – Modern programming in C: https://hackaflag.com.br/academy.html
- Reverse engineering base
- Hackaflag Binary Chat – Online Reverse Engineering Course: https://hackaflag.com.br/academy.html
- Security Audit in Operating Systems
- IPPSec – Linux Logging with Auditd: https://www.youtube.com/watch?v=lc1i9h1GyMA
- Jose Bravo – Sysmon (36 Videos): https://www.youtube.com/watch?v=Xl31zNp4YUY&list=PLHh9jhztlMyrlWsozcrUEOvByfLJvRBDy
- Personal organization and posture
- EV – Business Communication: https://www.ev.org.br/cursos/comunicacao-empresarial
- Legislation
- ENAP SERPRO – Brazilian Personal Data Protection Law: https://www.escolavirtual.gov.br/curso/603
- Toolbox
- Linux Foundation – Linux Tools: https://training.linuxfoundation.org/training/linux-tools-for-software-development-lfd108x/
- Introduction to digital electronics
- Georgia Tech Coursera – Introduction to Electronics: https://www.coursera.org/learn/electronics
- Georgia Tech Coursera – Linear Circuits DC: https://www.coursera.org/learn/linear-circuits-dcanalysis
- Georgia Tech Coursera – Linear Circuits AC: https://www.coursera.org/learn/linear-circuits-ac-analysis
- UAB Coursera – Digital Systems: From Logic Gates to Processors: https://www.coursera.org/learn/digital-systems
- Soft Skills
- ENAP – Problem Solving Skills: https://www.escolavirtual.gov.br/curso/600
- Prime Cursos – Basics of NLP: https://www.primecursos.com.br/nocoes-basicas-de-pnl/
- Cybrary – Social Engineering: https://www.cybrary.it/course/social-engineering/
- Sarah Granger – Social Engineering Fundamentals, Part I: Hacker Tactics: http://web.archive.org/web/20160425153636/http://www.symantec.com/connect/articles/social-engineering-fundamentals-part-i-hacker-tactics
- Sarah Granger – Social Engineering Fundamentals, Part II: Combat Strategies: https://web.archive.org/web/20140912061257/http://www.symantec.com/connect/articles/social-engineering-fundamentals-part-ii-combat-strategies
Practitioner – 27 materials
- “Capture the Flag” Exercises
- Try Hack Me: https://tryhackme.com
- Hack The Box: https://www.hackthebox.eu
- Vulnerability analysis
- Rapid7 – Fundamentals Vulnerability Risk Management: https://www.rapid7.com/fundamentals/vulnerabilities-exploits-threats/
- Tenable – Introduction to Tenable.sc: https://university.tenable.com/pubaccess/learn/course/internal/view/elearning/333/introduction-to-tenablesc
- Information security
- Cert.br – Honeypots and Honeynets: Definitions and Applications: https://www.cert.br/docs/whitepapers/honeypots-honeynets/
- Offensive security in web environments
- Stanford – CS253 Web Security: https://web.stanford.edu/class/cs253/ (Lecture videos: https://www.youtube.com/playlist?list=PL1y1iaEtjSYiiSGVlL1cHsXN_kvJOOhu- )
- Portswigger Web Security Academy – Advanced topics (93 Labs): https://portswigger.net/web-security/learning-path
- Tools for Offensive Security
- Offensive Security – Metasploit Unleashed: https://www.offensive-security.com/metasploit-unleashed/
- GoHacking – Fundamentals of Memory Analysis: https://youtu.be/Iz0Bh7L3iYM
- SIEM systems
- IPPSec – PowerSIEM Analyzing Sysmon Events with PowerShell: https://www.youtube.com/watch?v=MvfhIydxFmw
- Jose Bravo – QRadar (38 Videos): https://www.youtube.com/watch?v=P90e4iEJ32s&list=PLHh9jhztlMyqRRmj64BcVyNBkhApa_LIn
- Internet of Things Technologies
- Netacad – Introduction to IoT: https://www.netacad.com/courses/iot/introduction-iot
- Software development:
- edX – CS50’s Introduction to Programming with Python (CS50P): https://www.edx.org/professional-certificate/harvardx-computer-science-for-python-programming
- Mosh – Learn Node in 1 Hour: https://www.youtube.com/watch?v=TlB_eWDSMt4
- Container Base
- LINUXtips Simplifying Docker (50 videos): https://youtube.com/playlist?list=PLf-O3X2-mxDn1VpyU2q3fuI6YYeIWp5rR
- Offensive Security Techniques
- Beco do Exploit – The Art of Bypass: https://www.youtube.com/watch?v=f0ErvZeTFVQ
- Exploit Alley – Counterintelligence in anonymous networks: https://www.youtube.com/watch?v=E4SYtCOYzQM
- Cloud computing base
- Skills Builder – AWS: https://explore.skillbuilder.aws/learn/course/external/view/elearning/134/aws-cloud-practitioner-essentials
- Coursera Google – GCP: https://www.coursera.org/learn/gcp-fundamentals
- Oracle Academy – OCI: https://mylearn.oracle.com/learning-path/become-an-oci-foundations-associate/98057
- MSLearn – Azure Fundamentals (6 Learning Paths):
- https://docs.microsoft.com/pt-br/learn/paths/az-900-describe-cloud-concepts/
- https://docs.microsoft.com/pt-br/learn/paths/az-900-describe-core-azure-services/
- https://docs.microsoft.com/pt-br/learn/paths/az-900-describe-core-solutions-management-tools-azure/
- https://docs.microsoft.com/pt-br/learn/paths/az-900-describe-general-security-network-security-features/
- https://docs.microsoft.com/pt-br/learn/paths/az-900-describe-identity-governance-privacy-compliance-features/
- https://docs.microsoft.com/pt-br/learn/paths/az-900-describe-azure-cost-management-service-level-agreements/
- Soft Skills
- FM2S – Introduction to Lean: https://ead.fm2s.com.br/curso/introducao-ao-lean/
Fluent – 17 materials
- Internet of Things Technologies
- UCI Coursera – Introduction to Programming the Internet of Things (4 Cursos): https://www.coursera.org/specializations/iot
- Firewall systems
- Network Direction – Palo Alto Firewalls (8 Videos): https://www.youtube.com/playlist?list=PLDQaRcbiSnqFM4qcMEskn2k48LsUGKFga
- Network Direction – CISCO ASA Firewalls (8 Videos): https://www.youtube.com/playlist?list=PLDQaRcbiSnqHXo_r1scHZook0BAED5-YN
- Pentest Tools
- Ryan Basden – Pentesting Team Tools (Twitter Thread): https://twitter.com/_rybaz/status/1544661984666427394?t=gjK3lCt_siNz8SUO-zNhcg&s=19
- SIEM systems
- Splunk
- Praveen – Splunk for beginners: https://youtu.be/lIQJMjSlY8U
- Splunk
- Information security management
- Cert.br – Creating a Computer Security Incident Response Team: A Process to Start Implementation: https://www.cert.br/certcc/csirts/Creating-A-CSIRT-br.html
- Software development
- GoHacking – Secure Development and DevSecOps: https://youtu.be/oZc0SNpdOaI
- Miguel Grinberg – Flask Mega Tutorial: https://blog.miguelgrinberg.com/post/the-flask-mega-tutorial-part-i-hello-world
- Oracle Academy – Java Explorer: https://learn.oracle.com/ols/learning-path/java-explorer/40805/79726
- Cybrary – Secure Coding: https://www.cybrary.it/course/secure-coding/
Advanced – 7 materials
- Offensive Security
- GoHacking – Post-exploitation activities: https://youtu.be/vCk3sAVRJSM
- GoHacking – Setting up Pentest Environment on mobile devices: https://youtu.be/n72AKrFBlj8
- Information sharing
- FIRST – MISP General Usage Training – Part 1 of 2: https://www.youtube.com/watch?v=-NuODyh1YJE
- FIRST – MISP General Usage Training – Part 2 of 2: https://www.youtube.com/watch?v=LlKnh5b0bgw
- Network technologies
- Juniper – CCNA to JNCIA-Junos: https://learningportal.juniper.net/juniper/user_activity_info.aspx?id=EDU-JUN-WBT-JOL-CCNA-JNCIA-JUNOS
- Juniper – Security, Associate (JNCIA-SEC): https://learningportal.juniper.net/juniper/user_activity_info.aspx?id=EDU-JUN-WBT-JOL-JNCIA-SEC
- Network Direction – Voice Networks (VoIP): https://www.youtube.com/playlist?list=PLDQaRcbiSnqG0b2hevMJlEx62o8RnC41l
- SIEM systems
- ArcSight (2 video series/paylists)
- Paul Brettle – What is Series: https://youtube.com/playlist?list=PL_JhopV-r9zLigctFEOzic-af0sEuHZ-x
- Paul Brettle – ArcSight ESM 101: https://youtube.com/playlist?list=PL_JhopV-r9zIXDz0pX2dmSJvBGVkczF5y
- ArcSight (2 video series/paylists)
Master – 6 materials
- Threat Hunting
- Active Countermeasures – Cyber Threat Hunting Level 1: https://www.youtube.com/watch?v=UEOqTu8cJt0
- Network analysis
- CERT NetSA – Network Traffic Analysis with SiLK: https://tools.netsa.cert.org/silk/analysis-handbook.pdf
- Malware analysis
- CERT.pl – Build Your Own Malware Analysis Pipeline Using New Open Source Tools: https://www.youtube.com/watch?v=dPwzF_hsCow
- Industrial platform technologies
- CISA VLP – 210W-03 Common ICS Components: https://ics-training.inl.gov/learn/course/internal/view/elearning/60/210w-03-common-ics-components
- CISA VLP – 210W-02 Influence of IT Components on Industrial Control Systems: https://ics-training.inl.gov/learn/course/internal/view/elearning/47/210w-02-influence-of-it-components-on-industrial-control-systems
- CISA VLP – 100W Cybersecurity Practices for Industrial Control Systems: https://ics-training.inl.gov/learn/course/internal/view/elearning/45/100w-cybersecurity-practices-for-industrial-control-systems
- High Platform Technologies (Mainframe)
- IBM Z Enterprise Computing Kickstart: https://www.ibm.com/academic/topic/ibm-z
- Introduction to the Mainframe: https://www.ibm.com/academic/topic/ibm-z
“Hero” – 7 materiais
- Industrial platform technologies
- CISA VLP – 210W-04 Cybersecurity Within IT and ICS Domains (FY21): https://ics-training.inl.gov/learn/course/internal/view/elearning/162/210w-04-cybersecurity-within-it-and-ics-domains-fy21
- CISA VLP – 210W-10 Mapping IT Defense-In-Depth Security Solutions to ICS – Part I: https://ics-training.inl.gov/learn/course/internal/view/elearning/51/210w-10-mapping-it-defense-in-depth-security-solutions-to-ics-part-i
- CISA VLP – 210W-11 Mapping IT Defense-In_Depth Security Solutions to ICS – Part II: https://ics-training.inl.gov/learn/course/internal/view/elearning/52/210w-11-mapping-it-defense-indepth-security-solutions-to-ics-part-ii
- CISA VLP – 210W-09 Attack Methodologies in IT & ICS: https://ics-training.inl.gov/learn/course/internal/view/elearning/58/210w-09-attack-methodologies-in-it-ics
- High Platform Technologies (Mainframe)
- z/OS Introduction: https://www.ibm.com/academic/topic/ibm-z
- Introduction to the Cobol Language: https://www.ibm.com/academic/topic/ibm-z
- Linux on IBM Z: https://www.ibm.com/academic/topic/ibm-z
Source: https://github.com/isaqueprofeta/cybersec-path
Views: 11