Free Educational Resources

Cyber Security
Academy

Master cybersecurity with our comprehensive guides. From network fundamentals to advanced penetration testing.

373
Articles
10
Pillar Guides
15
Categories
All 373 Networking 64 Red Team 54 Blue Team 35 Cloud 23 Cryptography 9 Identity 7 Threats 1 Coding 8 Compliance 17 Career 2 AI Security 86
Cloud

DDoS Mitigation Strategies

Surviving the flood. Layer 7 vs Layer 4 attacks. Cloudflare vs AWS Shield.

Read Article
Cloud

Docker Container Breakout

Containers are not Virtual Machines. Exploiting privileged containers to escape to the host OS.

Read Article
Cloud

Google Cloud IAM Policy Security

Roles, Permissions, and Service Accounts. How to avoid granting 'Owner' permission to everyone.

Read Article
Cloud

Azure AD (Entra ID) Vulnerabilities

Hacking the Cloud Identity. Device Code Phishing, PRT Theft, and Conditional Access Bypass.

Read Article
Cloud

AWS S3 Bucket Security Guide

Fixing the most common cloud vulnerability. Finding Leaky Buckets, Bucket Policies, and ACLs.

Read Article
Cloud

Kubernetes (K8s) Security: The Hacking Guide

A complete guide to attacking and defending Kubernetes. Pod escape techniques, RBAC enumeration, API Server attacks, and sidecar injection.

Read Article
Cloud

Azure & GCP Penetration Testing

Enumerating blob storage, pivoting through IAM roles, and cloud metadata attacks.

Read Article
Cloud

Container Breakout Techniques

Escaping Docker & Kubernetes. Privileged containers, Mounted Sockets, and Kernel exploitation.

Read Article
Cloud

Docker & Kubernetes Security: Protecting Containers

Containers changed the world. Learn how to secure Docker images and Kubernetes clusters from escape attacks and privilege escalation.

Read Article
Cloud

Cloud Computing Security: AWS, Azure, GCP Experts Guide

The ultimate guide to Cloud Security. Shared Responsibility Model, IAM, S3 Buckets, and how to secure your infrastructure on AWS, Azure, and GCP.

Read Article
Cloud

GDPR & CCPA: Your Privacy Rights Explained

What does the GDPR actually accomplish? Learn about the 'Right to be Forgotten' and how to force companies to delete your data.

Read Article
1 2

Page 2 of 2 • Showing 11 of 23 articles