# Technical Training Platforms

## Blue Team

In lieu of my Cybersecurity Training and Labs group there are a ton more out there - and I'm pretty sure I haven't even grabbed them all. Some of these are mixed with Red Team learning as well so DYOR.

{% embed url="<https://nationalcyberleague.org/>" %}

— Great for students and overall competitors! If you have a student email highly suggest participating!

{% embed url="<https://www.justhacking.com/>" %}

— Sponsored by John Hammond and Don Donzal from INE. Tons of classes and knowledge from Cyber leaders. Their insights and resources there are invaluable as well! &#x20;

{% embed url="<https://cyberdefenders.org/>" %}

— More labs

{% embed url="<https://immersivelabs.online/>" %}

— Labs, but they also keep track of your learning and compile them into reports to submit for CPEs.

{% embed url="<https://www.blackhillsinfosec.com/services/cyber-range/>" %}

— BHIS has pay what you can entry level SOC Classes and a cyber range as well.

{% embed url="<https://letsdefend.io/>" %}

— Labs

{% embed url="<https://blueteamlabs.online/login>" %}

— More labs

{% embed url="<https://ine.com/>" %}

{% embed url="<https://bots.splunk.com/login?redirect=/>" %}

— great to get accustomed to Splunk tooling and threat hunting.

{% embed url="<https://www.infosecinstitute.com/>" %}

— Decent training

{% embed url="<https://www.sans.org/>" %}

— if you can afford it or have it covered by your employer

## Red Team

{% embed url="<https://redteamvillage.io/>" %}

{% embed url="<https://pentesterlab.com/>" %}

{% embed url="<https://www.hackthebox.eu/>" %}

{% embed url="<https://www.offsec.com/labs/>" %}

{% embed url="<https://www.hackinghub.io/>" %}

{% embed url="<https://www.zeropointsecurity.co.uk/>" %}

{% embed url="<https://portswigger.net/burp>" %}

{% embed url="<https://tcm-sec.com/>" %}

{% embed url="<https://www.alteredsecurity.com/redteamlab>" %}

## Purple Team

{% embed url="<https://www.xintra.org/>" %}

{% embed url="<https://cyberwarfare.live/>" %}

{% embed url="<https://mad20.com/purple-teaming>" %}

## GRC

{% embed url="<https://academy.simplycyber.io/>" %}

— SimplyCyber.io — Geral Auger

{% embed url="<https://niccs.cisa.gov/training/catalog/tta/governance-risk-and-compliance-grc-training>" %}

{% embed url="<https://www.pluralsight.com/paths/governance-risk-and-compliance-grc>" %}

## Intelligence

{% embed url="<https://arcx.io/courses>" %}

— They have an awesome Free Beginner CTI course. Its Crest Certified Test is known across the UK.

{% embed url="<https://github.com/BushidoUK/CTI-Analyst-Challenge>" %}

— Will is an awesome resource to learn from for CTI. No certs in this, but he does run the SANS FOR589 Cyber Crime Investigations

{% embed url="<https://github.com/hslatman/awesome-threat-intelligence>" %}

— A solid repository regarding Threat Intelligence Resources

{% embed url="<https://medium.com/katies-five-cents/a-cyber-threat-intelligence-self-study-plan-part-1-968b5a8daf9a>" %}

— Katie Nickels (shown to me by my intern mentor - Daniel) she's the bees knees

{% embed url="<https://www.eccouncil.org/train-certify/certified-threat-intelligence-analyst-ctia/>" %}

— Not a big EC-Council fan but hey, its there

## Forensics

{% embed url="<https://csilinux.com/>" %}

— Still in the early phases and not truly recognized. I've earn the CSI investigator here and I thoroughly liked the content.

{% embed url="<https://www.iacis.com/courses/>" %}

— Comparable to SANS training, but a little more difficult to obtain. They require already working hours and you have to catch their training specifically when they schedule it.

{% embed url="<https://www.autopsy.com/training/>" %}

— You'll be using lots of Autopsy / Eric Zimmerman Tools throughout your carving journey.

## KQL (Kusto Query Language)

Most corporations are Windows, therefore Defender should be part of their arsenal. KQL is the query language used to identify malicious emails, hashes, scan for qishing etc.

{% embed url="<https://learn.microsoft.com/en-us/kusto/query/?view=microsoft-fabric>" %}

{% embed url="<https://kc7cyber.com/>" %}

{% embed url="<https://academy.bluraven.io/>" %}

{% embed url="<https://detective.kusto.io/inbox>" %}


---

# Agent Instructions: Querying This Documentation

If you need additional information that is not directly available in this page, you can query the documentation dynamically by asking a question.

Perform an HTTP GET request on the current page URL with the `ask` query parameter:

```
GET https://securitysyndicate.gitbook.io/whoami/knowledge-base/resources/technical-training-platforms.md?ask=<question>
```

The question should be specific, self-contained, and written in natural language.
The response will contain a direct answer to the question and relevant excerpts and sources from the documentation.

Use this mechanism when the answer is not explicitly present in the current page, you need clarification or additional context, or you want to retrieve related documentation sections.
