Learn Anything Online

10 Best Cyber Security Resources

Learn Anything Online offers the best resources for learning about cyber security. From fundamentals to advanced concepts, explore a curated collection of courses, tutorials, papers and more to enhance your cyber security education.

Free

30 days ago

What Is a Crypto Wallet?
Revoke.cash
Learn what a crypto wallet is, the different types, account abstraction and how to choose the right wallet.
Free

30 days ago

Cloudflare WAF Rules V3
Web Hero Agency
Learn to create some custom firewall rules on Cloudflare to help protect your site from bots, spammers, hackers, etc. This is a great starting point and can be achieved on the free tier.
Free

Last month

Spyware Injection Into Your ChatGPT's Long-Term Memory (SpAIware)
Johann Rehberger
This post explains an attack chain for the ChatGPT macOS application. Through prompt injection from untrusted data, attackers could insert long-term persistent spyware into ChatGPT’s memory. This led to continuous data exfiltration of any information the user typed or responses received by ChatGPT, including any future chat sessions.
$49.00 - $1,099.00 / month

3 months ago

Shodan Search Engine
Shodan
Shodan is the world's first search engine for Internet-connected devices. Discover how Internet intelligence can help you make better decisions.
Free

3 months ago

DIY Single Sign-On for SSH
Carl Tashian
Learn to set up Google single sign-on (SSO) for SSH using OpenID Connect (OIDC), short-lived SSH certificates, and Smallstep's step-ca and step packages. Create an SSH Certificate Authority to bootstrap a new host and user. Though it requires more initial effort than a typical SSH key setup, this method simplifies key management by eliminating the need for managing authorized_keys files and offers additional benefits beyond SSO.
Free

3 months ago

Have I Been Pwned
Troy Hunt · Charlotte Hunt · Stefán Jökull Sigurðarson
This site provides a public service and helps people check if their details were included in a data breach. Data breaches are rampant and many people don't appreciate the scale or frequency with which they occur. The creators hope that it not only helps victims learn of compromises of their accounts, but also highlights the severity of the risks of online attacks on today's internet.
Free

3 months ago

How to properly manage ssh keys for server access
Marc Päpper
How do you manage SSH keys when a developer leaves a company? Marc explores a solution that avoids having a single point of failure that is commonly found with commercial and open-source solutions.
Free

3 months ago

How To Protect Your Linux Server From Hackers!
LiveOverflow
There are many suggested “best practices” on the internet around protecting your servers however how many of them have you actually questioned for it’s validity? LiveOverflow critically breaks down some of the most common “best practices” to give you a better understanding of where they came from and considerations of what to do.
Free

3 months ago

OWASP Cheat Sheet Series
OWASP
The OWASP Cheat Sheet Series was created to provide a concise collection of high value information on specific application security topics.
Free

3 months ago

KC7 - The Case Vault
KC7 Foundation
A free cyber detective game with different cases. In each case, a company has been compromised by vicious hackers. We'll give you all the tools required to track down and defeat the adversaries.