If you are a complete beginner to IT, I recommend starting with the Hopper’s Roppers courses at the top of the list.
Name & Direct Link | Platform | For Beginners | Hands-On Component | Proof of Completion | Topics |
---|---|---|---|---|---|
Introduction to Computing Fundamentals | Hopper's Roppers (Roppers Academy) | Yes | Yes | Home Lab, Linux, Windows, Internet, Python, Github, Hardware | |
Introduction to Security | Hopper's Roppers (Roppers Academy) | Hopper's Roppers Introduction to Computing Fundamentals is recommended. | Yes | Risk, Threats, Attacks, Cyber Kill Chain, Malware Types, Password Security, Networks | |
Introduction to Capture the Flag | Hopper's Roppers (Roppers Academy) | Hopper's Roppers Introduction to Computing Fundamentals is recommended. | Yes | Forensics, Cryptography, Web Exploitation, Wireshark | |
A+ 220-1001 Training Course | YouTube - Professor Messer | Yes | Computer Hardware, Mobile Devices, Networking, BIOS | ||
A+ 220-1002 Training Course | YouTube - Professor Messer | A+ 200-1001 Training Course | Windows, Linux, macOS, Attacks, Malware, Scripting | ||
Cybersecurity Fundamentals | edX | Yes | Costs Extra | Security Concepts and Problems, Cryptography, Networking, Systems Administration, Malware, Forensics, Detection, Prevention | |
Cybersecurity Basics: A Hands-On Approach | edX | Basic knowledge of networking and operating systems. | Yes | Costs Extra | Cybersecurity landscape, reverse engineering, network attacks, malware, vulnerability management, pentesting |
Introduction to Cybersecurity | OpenLearn | Yes | Yes - Statement of Participation | Threat Landscape, Phishing, Malware, Authentication, Networking, Cryptography, Laws, Risk | |
Introduction to Cybersecurity | Cisco Networking Academy | Yes | Yes | Yes - Certificate of Completion | Cybersecurity Overview, CIA Triad, Breaches, Attacks, Threats, Cyberwarfare, Firewalls, Detection, Cyber Kill Chain |
Cybersecurity Essentials | Cisco Networking Academy | Introduction to Cybersecurity is recommended. | Yes | Yes - Certificate of Completion | CIA Triad (in depth), Countermeasures, Cybersecurity Domains, ISO, Threats, Vulnerabilities, Attacks, Malware, Cryptography, Access Controls, Stenography, Obfuscation, Incident Response, Hardening, Disaster Recovery, Cyber Laws |
SANS Cyber Aces Tutorials | SANS Cyber Aces | Yes | Yes | Windows, Linux, Networking, Bash Scripting, PowerShell, Python | |
Free Short Course: Phishing Countermeasures | Charles Sturt University | This is an intermediate course. Hopper's Roppers Introduction to Computing Fundamentals and Introduction to Security is recommended. | Yes | Yes - Certificate of Completion | Network Security, Threat Intelligence, Cybersecurity Architecture, Risk Management, Application Security |
Free Short Course: Cyber Warfare and Terrorism | Charles Sturt University | This is an intermediate course. Hoppers Ropper's Introduction to Computing Fundamentals and Introduction to Security is recommended. | Yes - Certificate of Completion | Cyber Weapons, Cyber Attacks, Cyber Terrorism, Military Cyber Preparedness | |
Free Short Course: Enterprise Cybersecurity Fundamentals | Charles Sturt University | This is an intermediate course. Hopper's Roppers Introduction to Computing Fundamentals and Introduction to Security is recommended. | Yes - Certificate of Completion | Threats, Attacks, Secure Design, Physical Security, Disaster Recovery, Business Continuity, Network Security, System Security, Defense in Depth | |
IBM Security Learning Academy | IBM Security Learning Academy | Hopper's Roppers Introduction to Computing Fundamentals and Introduction to Security are recommended. | Yes | Yes - Progress Report and Digital Badges | IBM Products (QRadar, Resilient SOAR, etc), Cryptography, Encryption, Cloud, Mobile Security, Access Management, and more. |
Palo Alto Networks Free Training | Palo Alto Networks | Hopper's Roppers Introduction to Computing Fundamentals is recommended. | Cybersecurity, Cloud Security, Security Operations Center (SOC), Network Security, Cortex XDR, Firewalls, Prisma | ||
Geek University | Geek University | Yes | Yes - Certificate of Completion | CCNA, Linux, VMware ESXi, NMAP, SQL, Raspberry Pi, Apache HTTP Server, VMware Player, Splunk, VirtualBox, Python | |
Cybering.cc | Cybering.cc | Yes | Yes | Linux Command Line, Binary, Octal, Hexadecimal, XOR, Bitwise Operators, Regex, File Formats, Networking, Wireshark, MySQL | |
Security+ Training Course | YouTube - Professor Messer | A+ and Network+ Training | Malware, Attacks, Vulnerabilities, Intrusion Detection and Prevention, Access Controls, VPN, SIEM, Mobile Devices, Networking, Incident Response, Risk Assessment, BIA, Cryptography, Wireless, PKI | ||
Security+ Practice Tests | ExamCompass | Security+ | |||
Security+ Practice Test App | PocketPrep | Security+ | |||
Network and Security Courses | Alison | Costs Extra | A+, Cloud+, Security+, CCNA, CISSP, Networking, NotPetya, WannaCry, Arduino, IoT, Cryptography, Server Administration | ||
An Introduction to Cryptography | Future Learn | Yes | Yes | Costs Extra | Cryptography, hashing, historical ciphers, cryptanalysis |
SANS Free Cybersecurity Community Resources and Programs | SANS | Yes - For some things such as Tech Tuesday Workshops | Yes - For Webcasts, Forums, Summits, and other events. Earn CEUs. | Cloud Security, Cyber Defense, Digital Forensics, Incident Response, Industrial Control Systems, Penetration Testing | |
Labtainers | Naval Postgraduate School | Hopper's Roppers Introduction to Computing Fundamentals and Introduction to Security are recommended. | Yes | Software Vulnerabilities, Networking, PCAP Analysis, Cryptography, Web Security, System Security, ICS Security, quantum algorithms | |
RangeForce Community Edition | RangeForce | Hopper's Roppers Introduction to Computing Fundamentals and Introduction to Security are recommended. | Yes | Yes - Earn CPE Credits after completing 5 modules | Splunk, Suricata, YARA, NMAP, Event Logs, PowerShell, NTLM, Docker, Kubernetes, Linux, SQL Injection, Cross-Site Scripting |
Fortinet Cybersecurity Training | Fortinet | Recommend Professor Messers Network+ and Security+ training. | Yes - Qualifies for (ISC)2 CPE credit. | Geared toward Fortinet Products, Cloud, Wireless, SIEM, Threat Protection, Next Generation Firewall | |
HTB Academy | Hack The Box | Recommend Hopper's Roppers Introduction to Computing Fundamentals, Introduction to Security, and Introduction to Capture the Flags. | Yes | Linux, Password Cracking, Hacking, Network Enumeration with NMAP, Windows, JavaScript Deobfuscation, Secure Coding | |
Gerald Auger - Simply Cyber YouTube Channel | YouTube - Gerald Auger - Simply Cyber | Yes | Home Labs, SOC Analyst Interview Questions, SOC Analyst Skills, Tools, Kali, Vulnerability Scanning, Certifications Roadmap, Entry Level Cyber Jobs Explained, Getting into Cybersecurity | ||
Cyber Warrior Studios YouTube Channel | YouTube - Cyber Warrior Studios | Yes | Various Cybersecurity Topics Including: Phishing, OSINT, Kali, Malware, Cybersecurity Interview Do's and Don'ts | ||
Microsoft Azure | Microsoft Learn | Yes - You can select Beginner Level on the Website. Introduction to Azure Fundamentals is a good place to start. | Yes - Digital Badges | Over 850 Azure topics | |
AWS Free Digital Training | AWS Training and Certification | Yes - Beginners can select the Fundamental experience level on the Website. AWS Cloud Practitioner Essentials is a good place to start. | Over 400 AWS Topics | ||
Google Cloud Training (Select On-Demand Courses) | Google Cloud Training/Qwiklabs | Yes - Beginners can select Introductory level. Google Cloud Essentials is a good place to start. | Yes | Yes - Digital Badges | Over 500 Google Cloud Topics |
Jon Good's YouTube Channel | YouTube - Jon Good | Yes | Beginners Guide to Cyber Security Careers, CySA+ Training, CISSP Training, Linux Training for Cyber Security Beginners, Windows Training for Cyber Security Beginners, Cloud Concepts | ||
Introduction to Security | YouTube - Ming Chow | Yes | Using Kali Linux VM, Packet Analysis Using Wireshark, Basic Recon using Nmap, Scapy, Password Cracking with John the Ripper, Vulnerability Scanning, Burp Suite, Web Security, Really Bad Code, Static Analysis, Malware, Forensics |