With the Thanksgiving holiday going on, we took a bit of time off to focus on our families. We are still here, however, and still working on bringing you excellent training spanning all the fields that you need to be a well-rounded partisan. While others are fighting over TVs and brawling in the store aisles, you can sit back and get some much-needed free online cyber security training right there on your couch—including CompTIA certification. Think about that. Free online cyber security training.

Cybrary.it is billed as the “world’s first free and open, online Cyber Security and IT training platform.” They believe cyber security and IT training should be free to all, and they offer entire courses in some pretty critical fields. The following list is JUST their Cyber Security Learning track (they have others as well):

  • CompTIA Security+ – In this class you will gain a stable foundation of Cyber Security and Information Assurance as well as prepare for the security industry’s most sought after entry level certification.

  • Cryptography – Learn how to secure data communications through the use of cryptographic messaging and practices.

  • Ethical Hacking and Penetration Testing – Learn the fundamentals of hacking and penetration testing. Think like a hacker, so that you can stop them from intruding into your systems. This class will help prepare you for the industries most sought after certification, EC-Council’s CEH.

  • Computer and Hacking Forensics – In order to catch cyber criminals, you have to learn how to retrace their steps and correctly acquire and document the evidence. Also prepare for the industry leading CHFI certification from the EC-Council.

  • CompTIA Advanced Security Practitioner (CASP) – This advanced certification covers deep topics that span across both Cyber Security as well as Information Assurance.

  • ISACA Certified Information Systems Auditor (CISA) – Become an expert in information systems auditing and controlling with this leading auditor certification from ISACA.

  • Certified Information Systems Security Professional (CISSP) – The leading certification for Information Assurance management personnel. This course is both very deep, and very broad. Be ready to study hard!

  • Post Exploitation – Learn what to do to maintain your presence and to gather intelligence after you have exploited the target system.

  • Social Engineering and Manipulation – Take a look inside the form, function and flow of a highly skilled social engineering cyber-attack. Learn to protect the human element.

  • Python for Security Professionals – Learn the commands and functions that every aspiring cyber security professional must know from Python. This isn’t a full programming course, but rather a course designed for non-coders who are developing their career in security.

  • Metasploit – An in-depth look inside the Metasploit Framework intended to show you how to use it to its full potential.

  • Malware Analysis and Reverse Engineering – An introduction to reverse engineering malware. This class is for experienced Cyber Security professionals, generally at least two to three years in the field is preferred.

  • Advanced Penetration Testing by Georgia Weidman – This class is for advanced Cyber Security professionals. You will learn in depth, hands-on, advanced hacking techniques to help you target and penetrate almost any highly secured environment.

What does all that mean? It means that you can start at the beginning, and get walked through all the way to advanced skills, including certification, for free (all you pay for is the certification exam if you choose to get certified). It means you no longer have an excuse to not know at least the basics of things like cyber security, social engineering, encryption, and other topics. If nothing else, take the Social Engineering and Manipulation course.  These are skills used against us every day. Learn how to defend against them…or use them yourself.

This weekend while you’re laying around stuffed on turkey leftovers, take a look at Cybrary.it and what they have to offer.

Clef two-factor authentication