Free General IT/Cybersecurity Training

If you are a complete beginner to IT, I recommend starting with the Hopper’s Roppers courses at the top of the list.

Name & Direct LinkPlatformFor BeginnersHands-On ComponentProof of CompletionTopics
Introduction to Computing FundamentalsHopper's Roppers (Roppers Academy)YesYesHome Lab, Linux, Windows, Internet, Python, Github, Hardware
Introduction to SecurityHopper's Roppers (Roppers Academy)Hopper's Roppers Introduction to Computing Fundamentals is recommended.YesRisk, Threats, Attacks, Cyber Kill Chain, Malware Types, Password Security, Networks
Introduction to Capture the FlagHopper's Roppers (Roppers Academy)Hopper's Roppers Introduction to Computing Fundamentals is recommended.YesForensics, Cryptography, Web Exploitation, Wireshark
A+ 220-1001 Training CourseYouTube - Professor MesserYesComputer Hardware, Mobile Devices, Networking, BIOS
A+ 220-1002 Training CourseYouTube - Professor MesserA+ 200-1001 Training CourseWindows, Linux, macOS, Attacks, Malware, Scripting
Cybersecurity FundamentalsedXYesCosts ExtraSecurity Concepts and Problems, Cryptography, Networking, Systems Administration, Malware, Forensics, Detection, Prevention
Cybersecurity Basics: A Hands-On ApproachedXBasic knowledge of networking and operating systems.YesCosts ExtraCybersecurity landscape, reverse engineering, network attacks, malware, vulnerability management, pentesting
Introduction to CybersecurityOpenLearnYesYes - Statement of ParticipationThreat Landscape, Phishing, Malware, Authentication, Networking, Cryptography, Laws, Risk
Introduction to CybersecurityCisco Networking AcademyYesYesYes - Certificate of CompletionCybersecurity Overview, CIA Triad, Breaches, Attacks, Threats, Cyberwarfare, Firewalls, Detection, Cyber Kill Chain
Cybersecurity EssentialsCisco Networking AcademyIntroduction to Cybersecurity is recommended.YesYes - Certificate of CompletionCIA Triad (in depth), Countermeasures, Cybersecurity Domains, ISO, Threats, Vulnerabilities, Attacks, Malware, Cryptography, Access Controls, Stenography, Obfuscation, Incident Response, Hardening, Disaster Recovery, Cyber Laws
SANS Cyber Aces TutorialsSANS Cyber AcesYesYesWindows, Linux, Networking, Bash Scripting, PowerShell, Python
Free Short Course: Phishing CountermeasuresCharles Sturt UniversityThis is an intermediate course. Hopper's Roppers Introduction to Computing Fundamentals and Introduction to Security is recommended.YesYes - Certificate of CompletionNetwork Security, Threat Intelligence, Cybersecurity Architecture, Risk Management, Application Security
Free Short Course: Cyber Warfare and TerrorismCharles Sturt UniversityThis is an intermediate course. Hoppers Ropper's Introduction to Computing Fundamentals and Introduction to Security is recommended.Yes - Certificate of CompletionCyber Weapons, Cyber Attacks, Cyber Terrorism, Military Cyber Preparedness
Free Short Course: Enterprise Cybersecurity FundamentalsCharles Sturt UniversityThis is an intermediate course. Hopper's Roppers Introduction to Computing Fundamentals and Introduction to Security is recommended.Yes - Certificate of CompletionThreats, Attacks, Secure Design, Physical Security, Disaster Recovery, Business Continuity, Network Security, System Security, Defense in Depth
IBM Security Learning AcademyIBM Security Learning AcademyHopper's Roppers Introduction to Computing Fundamentals and Introduction to Security are recommended.YesYes - Progress Report and Digital BadgesIBM Products (QRadar, Resilient SOAR, etc), Cryptography, Encryption, Cloud, Mobile Security, Access Management, and more.
Palo Alto Networks Free TrainingPalo Alto NetworksHopper's Roppers Introduction to Computing Fundamentals is recommended.Cybersecurity, Cloud Security, Security Operations Center (SOC), Network Security, Cortex XDR, Firewalls, Prisma
Geek UniversityGeek UniversityYesYes - Certificate of CompletionCCNA, Linux, VMware ESXi, NMAP, SQL, Raspberry Pi, Apache HTTP Server, VMware Player, Splunk, VirtualBox, Python
Cybering.ccCybering.ccYesYesLinux Command Line, Binary, Octal, Hexadecimal, XOR, Bitwise Operators, Regex, File Formats, Networking, Wireshark, MySQL
Security+ Training CourseYouTube - Professor MesserA+ and Network+ TrainingMalware, Attacks, Vulnerabilities, Intrusion Detection and Prevention, Access Controls, VPN, SIEM, Mobile Devices, Networking, Incident Response, Risk Assessment, BIA, Cryptography, Wireless, PKI
Security+ Practice TestsExamCompassSecurity+
Security+ Practice Test AppPocketPrepSecurity+
Network and Security CoursesAlisonCosts ExtraA+, Cloud+, Security+, CCNA, CISSP, Networking, NotPetya, WannaCry, Arduino, IoT, Cryptography, Server Administration
An Introduction to CryptographyFuture LearnYesYesCosts ExtraCryptography, hashing, historical ciphers, cryptanalysis
SANS Free Cybersecurity Community Resources and ProgramsSANSYes - For some things such as Tech Tuesday WorkshopsYes - For Webcasts, Forums, Summits, and other events. Earn CEUs.Cloud Security, Cyber Defense, Digital Forensics, Incident Response, Industrial Control Systems, Penetration Testing
LabtainersNaval Postgraduate SchoolHopper's Roppers Introduction to Computing Fundamentals and Introduction to Security are recommended. YesSoftware Vulnerabilities, Networking, PCAP Analysis, Cryptography, Web Security, System Security, ICS Security, quantum algorithms
RangeForce Community EditionRangeForceHopper's Roppers Introduction to Computing Fundamentals and Introduction to Security are recommended.YesYes - Earn CPE Credits after completing 5 modulesSplunk, Suricata, YARA, NMAP, Event Logs, PowerShell, NTLM, Docker, Kubernetes, Linux, SQL Injection, Cross-Site Scripting
Fortinet Cybersecurity TrainingFortinetRecommend Professor Messers Network+ and Security+ training.Yes - Qualifies for (ISC)2 CPE credit.Geared toward Fortinet Products, Cloud, Wireless, SIEM, Threat Protection, Next Generation Firewall
HTB AcademyHack The BoxRecommend Hopper's Roppers Introduction to Computing Fundamentals, Introduction to Security, and Introduction to Capture the Flags.YesLinux, Password Cracking, Hacking, Network Enumeration with NMAP, Windows, JavaScript Deobfuscation, Secure Coding
Gerald Auger - Simply Cyber YouTube ChannelYouTube - Gerald Auger - Simply CyberYesHome Labs, SOC Analyst Interview Questions, SOC Analyst Skills, Tools, Kali, Vulnerability Scanning, Certifications Roadmap, Entry Level Cyber Jobs Explained, Getting into Cybersecurity
Cyber Warrior Studios YouTube ChannelYouTube - Cyber Warrior StudiosYesVarious Cybersecurity Topics Including: Phishing, OSINT, Kali, Malware, Cybersecurity Interview Do's and Don'ts
Microsoft AzureMicrosoft LearnYes - You can select Beginner Level on the Website. Introduction to Azure Fundamentals is a good place to start.Yes - Digital BadgesOver 850 Azure topics
AWS Free Digital TrainingAWS Training and CertificationYes - Beginners can select the Fundamental experience level on the Website. AWS Cloud Practitioner Essentials is a good place to start.Over 400 AWS Topics
Google Cloud Training (Select On-Demand Courses)Google Cloud Training/QwiklabsYes - Beginners can select Introductory level. Google Cloud Essentials is a good place to start.YesYes - Digital BadgesOver 500 Google Cloud Topics
Jon Good's YouTube ChannelYouTube - Jon GoodYesBeginners Guide to Cyber Security Careers, CySA+ Training, CISSP Training, Linux Training for Cyber Security Beginners, Windows Training for Cyber Security Beginners, Cloud Concepts
Introduction to SecurityYouTube - Ming ChowYesUsing Kali Linux VM, Packet Analysis Using Wireshark, Basic Recon using Nmap, Scapy, Password Cracking with John the Ripper, Vulnerability Scanning, Burp Suite, Web Security, Really Bad Code, Static Analysis, Malware, Forensics
Introduction to Cloud ComputingUdemy - Xavier CorbettYesService Models, IaaS, PaaS, SaaS, Characteristics, Deployment Models, Public Cloud, Private Cloud