{"id":132,"date":"2025-12-21T17:15:15","date_gmt":"2025-12-21T17:15:15","guid":{"rendered":"https:\/\/cyberstec.com\/?page_id=132"},"modified":"2025-12-21T18:12:47","modified_gmt":"2025-12-21T18:12:47","slug":"resources","status":"publish","type":"page","link":"https:\/\/cyberstec.com\/index.php\/resources\/","title":{"rendered":"RESOURCES"},"content":{"rendered":"\n<p>This is a collection of links to third party websites containing resources on cybersecurity. I hope this can be useful to you. I haven&#8217;t explored them all, so they&#8217;re no particular recommendations!<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">COURSES \/ LABS<\/h3>\n\n\n\n<details class=\"wp-block-details is-layout-flow wp-block-details-is-layout-flow\"><summary>GRC<\/summary>\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/www.simplycyber.io\/\">The Definitive GRC Analyst Masterclass<\/a> by Simply Cyber (includes <strong>labs<\/strong>)<\/li>\n\n\n\n<li><a href=\"https:\/\/www.cpatocybersecurity.com\/\">cpatocybersecurity.org<\/a> (part of Simply Cyber)<\/li>\n\n\n\n<li><a href=\"https:\/\/studygrc.org\/#resources\">studygrc.org<\/a> and their <a href=\"https:\/\/grc.start.me\/p\/YQkngN\/study-grc-resources\">resource directory<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/cybr.com\/\">cybr.com <\/a> Free and paid courses plus <strong>hands-on labs<\/strong> on AWS, Security+, App security)<\/li>\n\n\n\n<li><a href=\"https:\/\/grclab.com\/\">GRCLAB<\/a> paid course for ISO 27001 Lead Implementer Cert + Bootcamp<\/li>\n\n\n\n<li><a href=\"https:\/\/www.mosse-institute.com\/\">Moss\u00e9 Institute<\/a> on GRC and more, courses and bootcamps<\/li>\n\n\n\n<li><a href=\"https:\/\/www.akylade.com\/\">AKYLADE<\/a><\/li>\n<\/ul>\n<\/details>\n\n\n\n<details class=\"wp-block-details is-layout-flow wp-block-details-is-layout-flow\"><summary>VARIOUS IT\/CYBER<\/summary>\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/www.simplycyber.io\/\"><\/a><a href=\"https:\/\/www.professormesser.com\/\">Professor Messer Free IT Training Videos<\/a> (find his channel on Youtube also)<\/li>\n\n\n\n<li><a href=\"https:\/\/www.py4e.com\/lessons\">Dr Chuck Python for everybody<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.isc2.org\/landing\/1mcc\">ISC2 Entry-level Cybersecurity <\/a>Training + Certification Exam<\/li>\n\n\n\n<li>Let&#8217;s Defend (Now part of Hack The Box)<\/li>\n\n\n\n<li>Try Hack Me<\/li>\n\n\n\n<li>Hack The Box<\/li>\n\n\n\n<li>Coursera: all sorts of courses for a subscription, with free trial. If you can be quick, you save! I went thorugh the Microsoft Cybersecurity Analyst Associate course through Coursera.It was my first course in cyber, a great all-round introduction to securing systems, although focused on MS systems. I had also went through the Google one which is more generic; I have found Microsoft&#8217;s course to be much more in depth and detailed.<\/li>\n<\/ul>\n<\/details>\n\n\n\n<h3 class=\"wp-block-heading\">STAYING CURRENT<\/h3>\n\n\n\n<p>PODCASTS<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>CISO series<\/li>\n\n\n\n<li>Cyber Security Headlines<\/li>\n\n\n\n<li>All About Risk<\/li>\n\n\n\n<li>Simply Cyber Daily threat brief <\/li>\n\n\n\n<li>2 Cyber Chicks<\/li>\n\n\n\n<li>Cyber Security Today<\/li>\n\n\n\n<li>Cyberwire daily<\/li>\n\n\n\n<li>Darknet Diaries<\/li>\n\n\n\n<li>David Bombal<\/li>\n\n\n\n<li>Defense in Depth<\/li>\n\n\n\n<li>GRC &amp; Me<\/li>\n\n\n\n<li>GARP Risk Podcast<\/li>\n\n\n\n<li>Hacking Humans<\/li>\n\n\n\n<li>NCSC Cyber Series<\/li>\n\n\n\n<li>Risky Business<\/li>\n\n\n\n<li>The Cyber Security Podcast from PwC<\/li>\n\n\n\n<li>Security NOW<\/li>\n\n\n\n<li>Talos Takes<\/li>\n\n\n\n<li>BrakeSec Education Podcast<\/li>\n\n\n\n<li>Click Here &#8211; Recorded Future News<\/li>\n\n\n\n<li>ITSP Magazine Podcasts<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">OTHER<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/pauljerimy.com\/security-certification-roadmap\/\">Paul Jerimy Certification Roadmap<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/attack.mitre.org\/\">MITRE ATT&amp;CK<\/a> knowledge base of adversary tactics and techniques based on real-world observations<\/li>\n\n\n\n<li><a href=\"https:\/\/www.nist.gov\/cyberframework\">NIST<\/a> Cybersecurity Framework 2.0<\/li>\n\n\n\n<li><a href=\"https:\/\/www.iso.org\/standard\/27001\">ISO\/IEC 27001:2022<\/a> standard for Information Security Management Systems<\/li>\n\n\n\n<li><a href=\"https:\/\/www.youtube.com\/@UnixGuy\">Unix Guy<\/a><\/li>\n<\/ul>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>This is a collection of links to third party websites containing resources on cybersecurity. I hope this can be useful to you. I haven&#8217;t explored them all, so they&#8217;re no&hellip;<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-132","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/cyberstec.com\/index.php\/wp-json\/wp\/v2\/pages\/132","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cyberstec.com\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/cyberstec.com\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/cyberstec.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/cyberstec.com\/index.php\/wp-json\/wp\/v2\/comments?post=132"}],"version-history":[{"count":9,"href":"https:\/\/cyberstec.com\/index.php\/wp-json\/wp\/v2\/pages\/132\/revisions"}],"predecessor-version":[{"id":146,"href":"https:\/\/cyberstec.com\/index.php\/wp-json\/wp\/v2\/pages\/132\/revisions\/146"}],"wp:attachment":[{"href":"https:\/\/cyberstec.com\/index.php\/wp-json\/wp\/v2\/media?parent=132"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}