Practical Cybersecurity: Course Resources
This page contains additional resources, references, and tools to support your learning journey in cybersecurity.
Reference Materials
Vulnerability Databases
- CVE - Common Vulnerabilities and Exposures
- NVD - National Vulnerability Database
- Exploit-DB - Archive of exploits
- Vulners - Vulnerability database
Practice Labs
Network Security Lab
The following components can be used to build a comprehensive network security lab:
- Network Devices
- Router (physical or virtual)
- Switches (Layer 2/3)
- Firewall appliance
- Server Infrastructure
- Windows Server (Active Directory)
- Linux servers (various distributions)
- Web servers (Apache, Nginx)
- Database servers (MySQL, PostgreSQL)
- Security Tools
- SIEM system (Elastic Stack)
- IDS/IPS (Snort, Suricata)
- Vulnerability scanner (OpenVAS)
- Honeypot (T-Pot)
- Client Systems
- Windows workstations
- Linux desktops
- Mobile device emulators
Web Application Security Lab
Components for a web application security testing environment:
- Vulnerable Applications
- DVWA (Damn Vulnerable Web Application)
- OWASP Juice Shop
- WebGoat
- bWAPP (buggy web application)
- Testing Tools
- Burp Suite
- OWASP ZAP
- Nikto
- SQLmap
- Browser Extensions
- FoxyProxy
- Cookie Editor
- User-Agent Switcher
- HackTools
Malware Analysis Lab
A safe environment for analyzing malicious software:
- Isolated Network
- No internet access or strictly controlled
- Network monitoring tools
- Analysis Systems
- REMnux Linux distribution
- FLARE VM (Windows-based)
- Cuckoo Sandbox
- Analysis Tools
- Static analysis tools (PEStudio, IDA Free)
- Dynamic analysis tools (Process Monitor, Wireshark)
- Memory analysis (Volatility)
Course-Specific Materials
Lab Guides
Detailed step-by-step guides for all course labs will be provided through the learning platform.
Cheat Sheets
- Network commands reference
- Linux security hardening checklist
- Windows security hardening checklist
- OWASP Top 10 mitigation strategies
- Common ports and services
- Incident response procedures
Templates
- Vulnerability assessment report
- Penetration testing report
- Security policy templates
- Incident response playbooks
This resource list will be updated throughout the course. If you have suggestions for additional resources, please share them in the course forum.