The field of information security encompasses a vast range of topics and technologies. This guide compiles valuable resources across different learning formats to help security professionals and enthusiasts develop their knowledge and skills.
Online learning platforms
Interactive learning
-
- Guided learning paths for different security roles
- Hands-on labs with browser-based attack boxes
- Beginner-friendly CTF-style challenges
- Active community forums for support
-
- Advanced penetration testing challenges
- Retired machines for practice
- Professional labs for enterprise training
- Active Discord community
-
PortSwigger Web Security Academy
- Comprehensive web security training
- Interactive labs for each vulnerability type
- Detailed explanations of web security concepts
- Free access to learning materials
Tip
Start with TryHackMe if you're new to hands-on security training, then progress to HackTheBox as your skills develop.
Video courses
-
- Professional-grade penetration testing courses
- Advanced network security training
- Preparation for GIAC certifications
- Lab environments included
-
- Official OSCP certification training
- Extensive lab environments
- Practical exploitation techniques
- Industry-recognised certifications
-
- Wide range of security topics
- Regular course updates
- Affordable entry-level training
- Varied instructor perspectives
Security news and research
Technical blogs
-
- Web security vulnerability research
- New attack technique demonstrations
- Detailed technical analysis
- Tool development insights
-
- Zero-day vulnerability research
- Detailed exploit analysis
- High-quality technical writing
- Industry impact assessments
-
- Smart contract security
- Tool development posts
- Technical deep dives
- Security engineering insights
-
- Web security research
- Novel attack techniques
- Vulnerability discoveries
- Detailed technical analysis
News aggregators
-
- Current security news
- Vulnerability announcements
- Industry developments
- Tool releases
-
- Security tool archives
- Vulnerability databases
- Security news
- Research papers
-
- Technical news coverage
- Tool reviews
- Research discussions
- Industry analysis
YouTube channels
Technical content
-
- HackTheBox walkthroughs
- Detailed exploitation explanations
- Tool usage demonstrations
- Real-world techniques
-
- Binary exploitation
- Game hacking
- Web security
- Research-focused content
-
- CTF walkthroughs
- Tool demonstrations
- Security news analysis
- Programming tutorials
Note
Consider watching videos at increased playback speed and taking notes to maximise learning efficiency.
Security news and analysis
-
- Weekly security updates
- Technical deep dives
- Historical context
- Industry analysis
-
- Malware analysis
- Threat intelligence
- Security news
- Protection strategies
Podcasts
Technical focus
-
- Historical security incidents
- Attack analysis
- Technical details
- Industry impact
-
- Technical discussions
- Tool reviews
- Expert interviews
- Industry news
-
- Security news analysis
- Product reviews
- Industry developments
- Technical updates
Threat intelligence
-
- Daily security updates
- Threat analysis
- Technical discussions
- Defensive strategies
-
- Industry news
- Threat updates
- Company developments
- Policy changes
GitHub resources
Tools and scripts
-
- Comprehensive payload lists
- Attack techniques
- Tool collections
- Testing methodologies
-
- Security best practices
- Implementation guides
- Defensive techniques
- Framework-specific guidance
-
- Discovery wordlists
- Password lists
- Pattern matching
- Fuzzing payloads
Learning resources
-
- Curated resource lists
- Tool collections
- Learning materials
- Reference documentation
-
- Methodology guides
- Tool recommendations
- Write-up collections
- Program resources
Important
Always review and test security tools in a controlled environment before using them in production or on authorised targets.
Reference documentation
Standards and guidelines
-
OWASP Web Security Testing Guide
- Comprehensive testing methodology
- Tool recommendations
- Risk assessment guidelines
- Remediation strategies
-
- Security program development
- Risk management
- Control implementation
- Assessment guidelines
-
- Threat actor techniques
- Defensive strategies
- Tool mappings
- Incident response guidance
Vulnerability databases
-
- Detailed vulnerability information
- Affected versions
- CVSS scores
- Reference links
-
- Proof-of-concept exploits
- Security papers
- Application documentation
- Author submissions
Getting started
For newcomers to information security, consider this learning progression:
- Begin with TryHackMe's beginner paths
- Follow technical YouTube channels for concepts and demonstrations
- Practice with retired HackTheBox machines
- Participate in bug bounty programs
- Contribute to open source security tools
Tip
Create a structured learning plan that combines theoretical knowledge from documentation and practical experience from hands-on platforms.
Remember to:
- Document your learning progress
- Join security communities for support
- Practice responsible disclosure
- Stay updated with security news
- Share knowledge with others
Information security is a continuously evolving field. Regular engagement with these resources will help maintain current knowledge and develop new skills as technologies and threats evolve.