Source library · 320 curated entries

Where every claim in SecProve comes from.

A dense reading catalog. Every claim is footnoted. Sort by source, filter by pillar, type, or recency. Built for analysts who want to see what we are standing on.

320SOURCES
143ORGS
50DOMAINS
320ADDED · 90 DAYS
Pillar · multi-selectall 4 selected
Domainsselect pillar(s) above
Browsing the full corpus. Pick pillars above to narrow to specific domains.
320 sources · across the catalog · sorted by citation density
Sort
ACybersecurity129 sources
01

NATO-accredited research center on strategic communications, information warfare, and influence operations. Publishes detailed case studies on hybrid-warfare campaigns from a defense perspective.

Test your knowledge · A22
02

Top 10 security risks for APIs. Covers broken object-level authorization, authentication failures, excessive data exposure, and more.

FrameworkIntermediateA4 · Application SecurityNEW · 1mo ago
Test your knowledge · A4
03

International standard for establishing, implementing, maintaining, and continually improving an information security management system (ISMS).

FrameworkIntermediateA1 · Governance, Risk & ComplianceNEW · 1mo ago
Test your knowledge · A1
04

Cataloged threat groups with associated TTPs. Good for questions on attribution, TTP overlap, and intelligence-driven detection.

ToolIntermediateA8 · Threat IntelligenceNEW · 22d ago
Test your knowledge · A8
05

Open-source project for signing, verifying, and protecting software supply chains. Keyless signing for artifacts.

Test your knowledge · A13
06

Open-source investigations of disinformation campaigns and information warfare. Methodology-forward — they publish their workflows, not just findings.

Test your knowledge · A22
07

AWS best practices for designing and operating secure workloads in the cloud. Covers IAM, detection, infrastructure protection, and incident response.

GuideIntermediateA5 · Cloud SecurityNEW · 1mo ago
Test your knowledge · A5
08
Black Hat / DEF CON ArchivesBlack Hat / DEF CON

Conference presentations covering novel attack techniques and defensive research. Essential for cutting-edge offensive/defensive questions. AI Village talks particularly relevant for Pillars B and C.

Test your knowledge · A4
09

Open-source digital forensics tools for disk image analysis. Industry standard for incident investigation and evidence collection.

ToolIntermediateA7 · Incident Response & ForensicsNEW · 1mo ago
Test your knowledge · A7
10
Diamond Model of Intrusion AnalysisCaltagirone, Pendergast, Betz

Four vertices: Adversary, Capability, Infrastructure, Victim. Complements the Kill Chain and ATT&CK. Questions on analytical frameworks and when to apply each model.

ResearchIntermediateA8 · Threat IntelligenceNEW · 22d ago
Test your knowledge · A8
11
CIS Controls v8Center for Internet Security

18 prioritized security controls organized into Implementation Groups (IG1, IG2, IG3). Practical and prescriptive — good for questions about prioritization and which controls matter most for different organization sizes.

Test your knowledge · A1
12

Consensus-based security configuration guides for 100+ technologies. The industry standard for hardening systems.

FrameworkIntermediateA5 · Cloud SecurityNEW · 1mo ago
Test your knowledge · A5
13

Federal hub for ransomware prevention, mitigation, and recovery guidance. Joint advisories with FBI/MS-ISAC, no-cost CISA services, and the ransomware-specific recovery checklist.

Test your knowledge · A23
14

No-cost CISA assessment of operational resilience and cybersecurity practices for critical infrastructure operators. Maps to NIST CSF for gap analysis.

FrameworkIntermediateA23 · Recovery, Resilience & Cyber RecoveryNEW · 1d ago
Test your knowledge · A23
15

Annual federal campaign with current-year themes, free materials, and partner toolkits. Reflects the public-facing federal stance on awareness messaging.

FrameworkIntermediateA20 · Security Awareness & Human FactorsNEW · 1d ago
Test your knowledge · A20
16

Federal hub for cybersecurity training resources, career development pathways, and free CISA-developed training programs. Companion to NICE for workforce-readiness questions.

FrameworkIntermediateA20 · Security Awareness & Human FactorsNEW · 1d ago
Test your knowledge · A20
17

Federal hub for U.S. perspective on foreign influence ops, election integrity, and counter-disinformation guidance. Includes "rumor vs. reality" public briefings.

FrameworkIntermediateA22 · Information Operations & Cognitive SecurityNEW · 1d ago
Test your knowledge · A22
18

Authoritative feed of ICS-CERT advisories covering vulnerabilities in PLCs, HMIs, SCADA platforms, and OT vendors. The primary source for tracking active threats to industrial systems.

FrameworkIntermediateA14 · OT/ICS SecurityNEW · 1d ago
Test your knowledge · A14
19

Federal guidance on protecting GPS/GNSS-dependent infrastructure from spoofing and jamming. Resilient PNT executive order context, sector-specific resilience profiles.

FrameworkIntermediateA17 · Cyber-Electronic WarfareNEW · 1d ago
Test your knowledge · A17
20

Framework for transitioning to zero trust architecture across five pillars: identity, devices, networks, applications, and data.

FrameworkIntermediateA3 · Zero Trust ArchitectureNEW · 1mo ago
Test your knowledge · A3
21

Network traffic trends, DDoS statistics, protocol adoption. Useful for questions about scale and real-world network security challenges, not Cisco product-specific.

GuideIntermediateA2 · Network SecurityNEW · 22d ago
Test your knowledge · A2
22

Open-source network intrusion detection and prevention system. Industry standard for real-time traffic analysis and packet logging.

ToolIntermediateA2 · Network SecurityNEW · 1mo ago
Test your knowledge · A2
23

Cloud-specific control framework with 197 controls across 17 domains. Mapped to NIST 800-53, ISO 27001, PCI DSS, GDPR. The reference for cloud-architecture control questions.

Test your knowledge · A25
24

Peer-ranked cloud threats. The shift from infra issues to identity/access/misconfiguration reflects cloud maturity. Good for questions testing threat prioritization understanding.

ResearchIntermediateA5 · Cloud SecurityNEW · 22d ago
Test your knowledge · A5
25

Set of practical cryptography exercises. Learn by breaking real-world crypto systems — the best way to understand cryptographic vulnerabilities.

GuideIntermediateA15 · CryptographyNEW · 1mo ago
Test your knowledge · A15
26

Curated newsletter covering detection engineering practices, tools, and techniques. Practical resource for SOC and detection teams.

Test your knowledge · A11
27

Mature, widely deployed medium-interaction SSH and Telnet honeypot. Logs attacker commands, captures malware, proxies sessions. The standard reference implementation for SSH-honeypot questions.

ToolIntermediateA19 · Cyber Deception & Active DefenseNEW · 1d ago
Test your knowledge · A19
28

Comprehensive CISO leadership reference. Covers building programs, board communication, metrics, and team development.

GuideIntermediateA18 · Security LeadershipNEW · 22d ago
Test your knowledge · A18
29

UK/international pen test certification body. Their guides cover methodology, reporting standards, and ethics. Useful for questions on professional standards in offensive security.

FrameworkIntermediateA9 · Penetration Testing & Red TeamingNEW · 22d ago
Test your knowledge · A9
30

Comprehensive guidance for cloud security best practices. Covers architecture, governance, compliance, and operations.

GuideIntermediateA5 · Cloud SecurityNEW · 1mo ago
Test your knowledge · A5
31

Annual OT/ICS threat landscape report. Tracks threat groups (Chernovite, Bentonite, etc.) targeting industrial systems. Original research, not marketing.

GuideIntermediateA14 · OT/ICS SecurityNEW · 22d ago
Test your knowledge · A14
32

EU-focused annual threat assessment. Covers ransomware, supply chain, disinformation, state-sponsored threats. Useful counterpoint to US-centric sources.

Test your knowledge · A8
33

13 provisions for consumer IoT security. No default passwords, vulnerability disclosure policy, secure update mechanisms. The emerging regulatory baseline for IoT.

FrameworkIntermediateA16 · Mobile & IoT SecurityNEW · 22d ago
Test your knowledge · A16
34
EUvsDisinfoEU East StratCom Task Force

EU-operated database of pro-Kremlin disinformation cases and analysis. The reference dataset for pro-Russia narrative tracking, with 17,000+ cataloged cases and weekly trend reports.

FrameworkIntermediateA22 · Information Operations & Cognitive SecurityNEW · 1d ago
Test your knowledge · A22
35
EU EEAS — FIMI Threat ReportsEuropean External Action Service

EU's annual reports on Foreign Information Manipulation and Interference. Codifies the FIMI taxonomy increasingly used in EU policy discussions.

FrameworkIntermediateA22 · Information Operations & Cognitive SecurityNEW · 1d ago
Test your knowledge · A22
36

Data subject rights, lawful bases for processing, DPO requirements, breach notification (72 hours), cross-border transfers. The global privacy benchmark.

FrameworkIntermediateA12 · Data Security, Privacy & ProtectionNEW · 22d ago
Test your knowledge · A12
37
GDPR Official TextEuropean Union

Full text of the General Data Protection Regulation. The EU's comprehensive data protection law that applies globally to EU residents' data.

FrameworkIntermediateA12 · Data Security, Privacy & ProtectionNEW · 1mo ago
Test your knowledge · A12
38

Quantitative risk analysis framework. Provides a model for understanding, analyzing, and quantifying information risk in financial terms.

FrameworkAdvancedA1 · Governance, Risk & ComplianceNEW · 1mo ago
Test your knowledge · A1
39

Specifications for passwordless authentication using public key cryptography. The future of secure authentication.

FrameworkIntermediateA6 · Identity & Access ManagementNEW · 1mo ago
Test your knowledge · A6
40

The push toward passwordless authentication. Questions on how FIDO2/WebAuthn works, passkey lifecycle, and comparison to traditional MFA.

FrameworkIntermediateA6 · Identity & Access ManagementNEW · 22d ago
Test your knowledge · A6
41

The standardized vulnerability severity scoring system referenced by virtually every vuln management program. v3.1 widely deployed; v4.0 introduces threat and environmental refinements.

ToolIntermediateA24 · Exposure Management & Attack SurfaceNEW · 1d ago
Test your knowledge · A24
42

Forrester originated the Zero Trust concept (John Kindervag, 2010). Their extended model includes workloads, data, networks, devices, people, visibility/analytics, automation/orchestration.

ResearchIntermediateA3 · Zero Trust ArchitectureNEW · 22d ago
Test your knowledge · A3
43

Originating Gartner article that defined CTEM as a five-stage program: scoping, discovery, prioritization, validation, mobilization. The reference for the CTEM acronym and process model.

ResearchIntermediateA24 · Exposure Management & Attack SurfaceNEW · 1d ago
Test your knowledge · A24
44

The original enterprise ZTA implementation case study. Six published papers covering architecture, migration, and lessons learned. Vendor-specific but pioneered the practical approach to zero trust.

GuideIntermediateA3 · Zero Trust ArchitectureNEW · 22d ago
Test your knowledge · A3
45

The TLS 1.3 specification. Removes legacy cipher suites, adds 0-RTT, mandates forward secrecy. Required reading for any TLS/PKI question.

FrameworkIntermediateA15 · CryptographyNEW · 1d ago
Test your knowledge · A15
46

Indicator hierarchy from hash values (trivial) to TTPs (tough). Foundational concept for detection engineering and threat intelligence questions.

Test your knowledge · A11
47

Investigative journalism on cybercrime, breaches, and network security incidents. Good for real-world scenario questions grounded in actual events.

Test your knowledge · A2
48

Multi-part standard covering security levels, zones and conduits, component requirements. International standard for industrial cybersecurity.

FrameworkIntermediateA14 · OT/ICS SecurityNEW · 22d ago
Test your knowledge · A14
49

Annual workforce gap analysis. The "3.4 million shortfall" and similar stats. Good for questions on workforce development, hiring challenges, and security program building.

ResearchIntermediateA18 · Security LeadershipNEW · 22d ago
Test your knowledge · A18
50

Peer-reviewed methodology for performing security tests. Provides a scientific approach to security testing with measurable results.

FrameworkIntermediateA9 · Penetration Testing & Red TeamingNEW · 1mo ago
Test your knowledge · A9
51

International standard for business continuity management systems. Defines requirements for establishing, implementing, and maintaining a BCMS. Often paired with ISO 27001 for combined audits.

FrameworkIntermediateA23 · Recovery, Resilience & Cyber RecoveryNEW · 1d ago
Test your knowledge · A23
52

Seven phases from Reconnaissance to Actions on Objectives. Widely adopted but also widely critiqued (assumes perimeter-centric model). Good for compare/contrast with ATT&CK and Unified Kill Chain.

Test your knowledge · A8
53
Mandiant APT ReportsMandiant (Google Cloud)

Detailed campaign analyses with TTPs mapped to ATT&CK. APT1, APT28/29, UNC groups. Primary source for threat-actor-specific IR questions. Not marketing — these are original threat research.

Test your knowledge · A7
54
Mandiant M-Trends ReportMandiant (Google Cloud)

Annual IR data: dwell time trends, initial access vectors, detection sources. Empirical data from thousands of engagements. One of the few sources for real-world detection/response metrics.

Test your knowledge · A7
55

Mandiant's FLARE team publishes capa, FLOSS, and other widely-used reversing tools alongside in-depth malware deep-dive blog posts. The reference for vendor-published reversing primitives.

GuideIntermediateA21 · Malware Analysis & Reverse EngineeringNEW · 1d ago
Test your knowledge · A21
56

Business strategy perspective on cyber risk. Useful for questions about communicating security value to executives and boards, ROI of security investments.

ResearchIntermediateA18 · Security LeadershipNEW · 22d ago
Test your knowledge · A18
57

Open-source threat intelligence platform for sharing, storing, and correlating indicators of compromise and threat data.

ToolIntermediateA8 · Threat IntelligenceNEW · 1mo ago
Test your knowledge · A8
58

Adversary engagement framework. Maps deception and denial operations to ATT&CK adversary behaviors. The defensive complement to ATT&CK for planning deception operations.

ToolIntermediateA19 · Cyber Deception & Active DefenseNEW · 1d ago
Test your knowledge · A19
59

Independent evaluations of security products against real-world attack scenarios. Good for questions about detection coverage, visibility gaps, and evaluation methodology.

Test your knowledge · A11
60
SolarWinds / Log4Shell Case StudiesMultiple (CISA, Mandiant, Microsoft)

The two defining supply chain incidents of recent years. CISA's postmortem reports are primary sources for scenario-based questions about detection, response, and prevention.

GuideIntermediateA13 · Supply Chain SecurityNEW · 22d ago
Test your knowledge · A13
61

Expert analysis of how international law applies to cyber operations. Sovereignty, use of force, law of armed conflict in cyberspace. The primary reference for legal/policy questions in cyber warfare.

ResearchIntermediateA17 · Cyber-Electronic WarfareNEW · 22d ago
Test your knowledge · A17
62

Foundational capabilities IoT manufacturers should provide: device identification, configuration, data protection, logical access, software update, cybersecurity state awareness. The baseline US regulators cite.

FrameworkIntermediateA16 · Mobile & IoT SecurityNEW · 1d ago
Test your knowledge · A16
63

NIST's selected post-quantum cryptographic algorithms: ML-KEM, ML-DSA, and SLH-DSA. The future of cryptography in the quantum era.

FrameworkAdvancedA15 · CryptographyNEW · 1mo ago
Test your knowledge · A15
64

Guide for applying the RMF to information systems and organizations. Covers categorization, control selection, implementation, assessment, authorization, and monitoring.

FrameworkIntermediateA1 · Governance, Risk & ComplianceNEW · 1mo ago
Test your knowledge · A1
65

Federal methodology for security assessments: target identification, vulnerability analysis, validation. Underpins both penetration testing and exposure management programs.

Test your knowledge · A24
66

Guide to protecting the confidentiality of personally identifiable information. Covers PII identification, impact assessment, and safeguards.

FrameworkFoundationalA12 · Data Security, Privacy & ProtectionNEW · 1mo ago
Test your knowledge · A12
67

The systems-security-engineering doctrine: lifecycle processes, design principles, and assurance for trustworthy systems. The most rigorous federal reference for security architecture.

FrameworkIntermediateA25 · Security Architecture & EngineeringNEW · 1d ago
Test your knowledge · A25
68

Cyber-resiliency engineering framework. Covers deception, diversity, dynamic positioning, and other techniques for systems designed to operate through compromise. The systems-engineering view of active defense.

Test your knowledge · A19
69

Practices for identifying, assessing, and mitigating cyber supply chain risks. Covers acquisition, development, and operations.

FrameworkIntermediateA13 · Supply Chain SecurityNEW · 1mo ago
Test your knowledge · A13
70

Cybersecurity Supply Chain Risk Management. Integrates C-SCRM into the RMF. Covers acquisition, supplier assessment, and ongoing monitoring.

FrameworkIntermediateA13 · Supply Chain SecurityNEW · 22d ago
Test your knowledge · A13
71

Practical guidance on selecting and implementing cryptographic algorithms. Covers symmetric, asymmetric, hashing, and key management.

FrameworkIntermediateA15 · CryptographyNEW · 22d ago
Test your knowledge · A15
72

Standard taxonomy of cybersecurity work roles, tasks, KSAs. Used for role-based training design and human-risk targeting.

FrameworkIntermediateA20 · Security Awareness & Human FactorsNEW · 1d ago
Test your knowledge · A20
73

Primitives for IoT: sensor, aggregator, communication channel, eUtility, decision trigger. Framework for thinking about IoT security architectures.

FrameworkIntermediateA16 · Mobile & IoT SecurityNEW · 22d ago
Test your knowledge · A16
74

The federal recovery playbook. Covers recovery planning, validation of restored services, post-event improvement. Pairs with NIST CSF Recover function.

FrameworkIntermediateA23 · Recovery, Resilience & Cyber RecoveryNEW · 1d ago
Test your knowledge · A23
75

Definitive guide to zero trust architecture. Defines ZTA concepts, deployment models, and implementation approaches for enterprise environments.

FrameworkIntermediateA3 · Zero Trust ArchitectureNEW · 1mo ago
Test your knowledge · A3
76

Risk assessment methodology: threat sources, vulnerabilities, likelihood, impact. Complements 800-37. Good for questions comparing quantitative vs. qualitative risk assessment.

FrameworkIntermediateA1 · Governance, Risk & ComplianceNEW · 22d ago
Test your knowledge · A1
77

Comprehensive contingency planning: BIA, recovery strategies, plan testing, training, and maintenance. The reference for RTO/RPO and recovery tier questions.

FrameworkIntermediateA23 · Recovery, Resilience & Cyber RecoveryNEW · 1d ago
Test your knowledge · A23
78

The 7-step RMF (Prepare, Categorize, Select, Implement, Assess, Authorize, Monitor). Questions should test understanding of step sequencing, roles (AO, ISSO, ISSM), and continuous monitoring vs. point-in-time assessment.

FrameworkIntermediateA1 · Governance, Risk & ComplianceNEW · 22d ago
Test your knowledge · A1
79

Guidelines on firewalls and firewall policy. Covers types of firewall technologies, deployment architectures, and policy management.

FrameworkFoundationalA2 · Network SecurityNEW · 1mo ago
Test your knowledge · A2
80

The federal model for awareness program design — needs assessment, scoping, content design, evaluation. The default reference for "what does an awareness program look like."

FrameworkIntermediateA20 · Security Awareness & Human FactorsNEW · 1d ago
Test your knowledge · A20
81

Four phases: Preparation, Detection & Analysis, Containment/Eradication/Recovery, Post-Incident Activity. The canonical IR reference. Questions should test decision-making within phases, not just naming them.

FrameworkIntermediateA7 · Incident Response & ForensicsNEW · 22d ago
Test your knowledge · A7
82

Comprehensive guidelines for digital identity services. Covers enrollment, authentication, and federation at three assurance levels.

FrameworkIntermediateA6 · Identity & Access ManagementNEW · 1mo ago
Test your knowledge · A6
83

Identity Assurance Levels (IAL), Authenticator Assurance Levels (AAL), and Federation Assurance Levels (FAL). The 2024 revision is significant. Questions on appropriate assurance level selection for different risk scenarios.

FrameworkIntermediateA6 · Identity & Access ManagementNEW · 22d ago
Test your knowledge · A6
84

Updated terminology from ICS to OT. Covers Purdue Model, network segmentation, patching challenges in OT environments. The primary OT security reference.

FrameworkIntermediateA14 · OT/ICS SecurityNEW · 22d ago
Test your knowledge · A14
85

Guide to integrating forensic techniques into incident response. Covers data collection, examination, analysis, and reporting.

FrameworkIntermediateA7 · Incident Response & ForensicsNEW · 1mo ago
Test your knowledge · A7
86

Guide to computer security log management. Covers log generation, storage, analysis, and the role of logs in incident response.

FrameworkFoundationalA10 · Security OperationsNEW · 1mo ago
Test your knowledge · A10
87

The standard textbook used in most university and SANS courses. Covers static, dynamic, behavioral analysis with hands-on labs. Cite for any "how do you analyze X" pedagogical question.

ResearchIntermediateA21 · Malware Analysis & Reverse EngineeringNEW · 1d ago
Test your knowledge · A21
88

Practitioner-oriented cryptography textbook. Covers modern symmetric/asymmetric algorithms, protocols, and implementation pitfalls. Good for applied crypto questions vs. pure theory.

ResearchIntermediateA15 · CryptographyNEW · 22d ago
Test your knowledge · A15
89

NSA technical guidance on nation-state TTPs, hardening guidance for high-value targets, and joint advisories with CISA/FBI. Useful for advanced cyber-EW and military-adjacent questions.

FrameworkIntermediateA17 · Cyber-Electronic WarfareNEW · 1d ago
Test your knowledge · A17
90

NSA's open-source software reverse-engineering framework. Disassembler, decompiler, scripting. The free standard for malware analysis training and most public reversing work.

ToolIntermediateA21 · Malware Analysis & Reverse EngineeringNEW · 1d ago
Test your knowledge · A21
91

Based on real red/blue team assessments. Includes default configurations, improper privilege separation, lack of network segmentation. Excellent for practical scenario questions.

Test your knowledge · A2
92

Structured Threat Information Expression (STIX) and Trusted Automated Exchange of Intelligence Information (TAXII). The standard for sharing cyber threat intelligence.

FrameworkIntermediateA8 · Threat IntelligenceNEW · 1mo ago
Test your knowledge · A8
93

High-performance network IDS/IPS and security monitoring engine. Supports multi-threading, protocol identification, and file extraction.

ToolIntermediateA2 · Network SecurityNEW · 1mo ago
Test your knowledge · A2
94
OpenSSF ScorecardOpen Source Security Foundation

Automated security health checks for open source projects. Checks branch protection, dependency pinning, fuzzing, SAST. Good for practical supply chain assessment questions.

ToolIntermediateA13 · Supply Chain SecurityNEW · 22d ago
Test your knowledge · A13
95

Framework of security requirements for designing, developing, and testing secure web applications. Three verification levels.

FrameworkIntermediateA4 · Application SecurityNEW · 1mo ago
Test your knowledge · A4
96

Practical methodology for identifying and reducing attack surface in applications. Covers entry points, data flows, and trust boundaries. The application-layer complement to network EASM.

ToolIntermediateA24 · Exposure Management & Attack SurfaceNEW · 1d ago
Test your knowledge · A24
97

OWASP IoT Top 10 (weak passwords, insecure network services, etc.) plus testing guides. The IoT analog to the OWASP Top 10 for web apps.

ToolIntermediateA16 · Mobile & IoT SecurityNEW · 1d ago
Test your knowledge · A16
98

MASVS (verification standard) and MASTG (testing guide). The primary mobile security testing reference. L1 and L2 verification levels.

ToolIntermediateA16 · Mobile & IoT SecurityNEW · 22d ago
Test your knowledge · A16
99

Five business functions (Governance, Design, Implementation, Verification, Operations) for measuring and improving AppSec programs. Good for maturity model questions.

Test your knowledge · A4
100

The most widely referenced web application security awareness document. Covers injection, broken auth, XSS, and more.

FrameworkFoundationalA4 · Application SecurityNEW · 1mo ago
Test your knowledge · A4
101

Open-source detection engineering methodology. Goal, categorization, strategy abstract, technical context, blind spots. Well-regarded community resource despite vendor origin.

GuideIntermediateA11 · Detection Engineering & Threat HuntingNEW · 22d ago
Test your knowledge · A11
102

Web application security testing tool. Industry standard for manual and automated web vulnerability assessment.

ToolIntermediateA9 · Penetration Testing & Red TeamingNEW · 1mo ago
Test your knowledge · A9
103

The world's most used penetration testing framework. Provides exploit development, payload generation, and post-exploitation capabilities.

ToolIntermediateA9 · Penetration Testing & Red TeamingNEW · 1mo ago
Test your knowledge · A9
104

Open-source and dark web intelligence trends. Useful for questions about intelligence sources, collection methods, and the intelligence lifecycle.

Test your knowledge · A8
105

Curated Linux distribution preloaded with hundreds of reverse-engineering and malware-analysis tools. Maintained by Lenny Zeltser. The default sandbox VM in most malware-analysis training courses.

ToolIntermediateA21 · Malware Analysis & Reverse EngineeringNEW · 1d ago
Test your knowledge · A21
106

Business-driven security architecture framework. Six-layer model (contextual → operational) widely used in enterprise security architecture programs. Vendor-neutral; common in EA practice.

GuideIntermediateA25 · Security Architecture & EngineeringNEW · 1d ago
Test your knowledge · A25
107

Practitioner-oriented IR methodology. Six steps (Preparation, Identification, Containment, Eradication, Recovery, Lessons Learned). Compare/contrast with NIST for methodology questions.

GuideIntermediateA7 · Incident Response & ForensicsNEW · 22d ago
Test your knowledge · A7
108

Practical, defender-focused control framework: ICS Incident Response, Defensible Architecture, ICS Network Visibility, Secure Remote Access, Risk-Based Vulnerability Management. The de-facto starter list.

GuideIntermediateA14 · OT/ICS SecurityNEW · 1d ago
Test your knowledge · A14
109

Five-stage maturity model (Non-Existent → Compliance → Promoting → Long-Term Sustainment → Metrics) widely used to benchmark awareness programs. Practitioner-tested.

GuideIntermediateA20 · Security Awareness & Human FactorsNEW · 1d ago
Test your knowledge · A20
110
Security OnionSecurity Onion Solutions

Free and open-source Linux distribution for threat hunting, enterprise security monitoring, and log management.

ToolIntermediateA10 · Security OperationsNEW · 1mo ago
Test your knowledge · A10
111

Fast, open-source static analysis tool for finding bugs and enforcing code standards. Supports 30+ languages with custom rules.

ToolIntermediateA4 · Application SecurityNEW · 1mo ago
Test your knowledge · A4
112

Industry-standard tool for external attack surface discovery. Scans the public internet, exposes service banners, supports queries for specific exposures. The reference for EASM tooling questions.

ToolIntermediateA24 · Exposure Management & Attack SurfaceNEW · 1d ago
Test your knowledge · A24
113

Generic signature format for SIEM detection rules. Platform-agnostic detection logic. Questions on detection rule writing, tuning, and false positive management.

ToolIntermediateA11 · Detection Engineering & Threat HuntingNEW · 22d ago
Test your knowledge · A11
114

Annual SOC operations survey: alert volumes, MTTD/MTTR, staffing challenges, tool sprawl. Vendor but based on broad survey data across SOC teams.

GuideIntermediateA10 · Security OperationsNEW · 22d ago
Test your knowledge · A10
115

Consumer rights (know, delete, opt-out of sale), CPRA additions (correct, limit sensitive data). Compare/contrast with GDPR for jurisdiction-specific questions.

FrameworkIntermediateA12 · Data Security, Privacy & ProtectionNEW · 22d ago
Test your knowledge · A12
116

Annual analysis of open source usage and vulnerability data. Key stats on open source in commercial codebases (typically 70-80%+). Grounds supply chain and AppSec questions in real data.

Test your knowledge · A4
117
The Honeynet ProjectThe Honeynet Project

Long-running international research community focused on honeypots and deception research. Source of many open-source honeypot tools (Cowrie, Conpot for ICS).

ToolIntermediateA19 · Cyber Deception & Active DefenseNEW · 1d ago
Test your knowledge · A19
118
FAIR (Factor Analysis of Information Risk)The Open Group / FAIR Institute

Quantitative risk analysis framework. Decomposes risk into Loss Event Frequency and Loss Magnitude. Questions on translating risk into business terms and comparing to qualitative methods.

Test your knowledge · A1
119
Canary Tokens (Thinkst)Thinkst Applied Research

Free, lightweight tripwire tokens (DNS, AWS keys, Word docs, Kubeconfig). Trivial to deploy, high signal — any access is suspicious by definition. The standard reference for canary-style deception.

ToolIntermediateA19 · Cyber Deception & Active DefenseNEW · 1d ago
Test your knowledge · A19
120
Threat Modeling ManifestoThreat Modeling Manifesto authors

Authored by Adam Shostack and other practitioners. Defines values, principles, and patterns for effective threat modeling. The reference for "what is good threat modeling."

GuideIntermediateA25 · Security Architecture & EngineeringNEW · 1d ago
Test your knowledge · A25
121
DoD Cyber Strategy (2023)U.S. Department of Defense

Defend forward, persistent engagement, building partner capacity. Context for military cyber operations questions.

FrameworkIntermediateA17 · Cyber-Electronic WarfareNEW · 22d ago
Test your knowledge · A17
122

Joint doctrine for cyberspace operations: offensive/defensive cyberspace operations, DoDIN ops, command relationships. The U.S. military's authoritative cyber doctrine.

FrameworkIntermediateA17 · Cyber-Electronic WarfareNEW · 1d ago
Test your knowledge · A17
123
NCSC Cyber Security Design PrinciplesUK National Cyber Security Centre

Five top-level principles (establish context, make compromise difficult, make disruption difficult, make compromise detection easier, reduce the impact of compromise) with sub-principles. Concise, vendor-neutral, widely cited in architecture practice.

FrameworkIntermediateA25 · Security Architecture & EngineeringNEW · 1d ago
Test your knowledge · A25
124

Annual report with empirical data on flaw prevalence by language, fix rates, and security debt. Useful for data-driven AppSec questions. Vendor but based on scan data across thousands of orgs.

GuideIntermediateA4 · Application SecurityNEW · 22d ago
Test your knowledge · A4
125

Annual analysis of real breach data. The gold standard for empirical questions about attack patterns, threat actor motivations, and time-to-detection. Updated annually.

Test your knowledge · A7
126

Rule language for identifying malware families by binary patterns and metadata. Foundational for both detection engineering and malware classification.

Test your knowledge · A21
127

Pattern matching tool for malware researchers. Create rules to identify and classify malware based on textual or binary patterns.

ToolIntermediateA11 · Detection Engineering & Threat HuntingNEW · 1mo ago
Test your knowledge · A11
128
Volatility FrameworkVolatility Foundation

Open-source memory forensics framework. Extracts digital artifacts from volatile memory (RAM) dumps.

ToolAdvancedA7 · Incident Response & ForensicsNEW · 1mo ago
Test your knowledge · A7
129

Annual survey of cyber leaders on resilience, workforce, geopolitics, and emerging tech including AI. Excellent for leadership and strategy questions.

Test your knowledge · A1
BApplied AI in Security49 sources
01

Catalog of security and privacy controls for information systems and organizations. The foundation for federal security compliance.

FrameworkIntermediateB6 · AI for GRC & ComplianceC7 · AI Governance & RiskNEW · 1mo ago
Test your knowledge · B6
02

Official guide to effective prompt engineering with Claude. Covers system prompts, chain-of-thought, few-shot examples, and best practices.

GuideFoundationalB8 · Prompt Engineering for SecurityNEW · 1mo ago
Test your knowledge · B8
03

Computer security incident handling guide covering detection, analysis, containment, eradication, and recovery.

Test your knowledge · B1
04

Data-driven model for estimating the probability that a vulnerability will be exploited in the wild. Uses ML to prioritize patching.

ToolIntermediateB3 · AI for Vulnerability ManagementNEW · 1mo ago
Test your knowledge · B3
05

Knowledge base of adversary tactics and techniques based on real-world observations. The industry standard for threat modeling.

Test your knowledge · B5
06

The most comprehensive open-source guide for web application security testing. Covers testing methodology, tools, and techniques.

GuideIntermediateB4 · AI in Offensive SecurityNEW · 1mo ago
Test your knowledge · B4
07

Generic signature format for SIEM systems. Documentation on writing, testing, and deploying detection rules.

Test your knowledge · B8
08

Comprehensive survey of ML applications in cybersecurity. Covers supervised/unsupervised approaches for intrusion detection, malware analysis, phishing detection. Maps ML techniques to security use cases with performance benchmarks.

Test your knowledge · B1
09

Open-source testing framework and toolkit for AI governance. Helps organizations validate AI systems against governance principles.

Test your knowledge · B7
10

Public database tracking real-world AI incidents and controversies. Invaluable for risk assessment and governance case studies.

Test your knowledge · B6
11

Techniques for effective prompting including for safety and security use cases. Covers system prompts, chain-of-thought, and reducing hallucination.

ResearchIntermediateB8 · Prompt Engineering for SecurityNEW · 22d ago
Test your knowledge · B8
12

Evaluates model capabilities for autonomous cyber operations at each AI Safety Level (ASL). Defines thresholds where AI capability in offensive security requires additional safeguards. Key reference for responsible AI in offensive security.

Test your knowledge · B4
13

Research on using AI for penetration testing automation: reconnaissance, vulnerability discovery, exploit generation. Practitioner perspective on what's practical vs. theoretical.

GuideIntermediateB4 · AI in Offensive SecurityC5 · AI Red TeamingNEW · 22d ago
Test your knowledge · B4
14

Authoritative list of vulnerabilities actively exploited in the wild. Used for prioritizing remediation — required for federal agencies.

FrameworkFoundationalB3 · AI for Vulnerability ManagementNEW · 1mo ago
Test your knowledge · B3
15

CISA's decision-tree approach to vulnerability prioritization. Considers exploitation status, automatable exposure, and mission impact.

FrameworkIntermediateB3 · AI for Vulnerability ManagementNEW · 1mo ago
Test your knowledge · B3
16
MLflowDatabricks

Open-source platform for managing the end-to-end ML lifecycle. Covers experiment tracking, model registry, and deployment.

Test your knowledge · B7
17

Open-source detection rules for Elastic Security. Covers a wide range of attack techniques mapped to MITRE ATT&CK.

Test your knowledge · B1
18

Law enforcement perspective on how LLMs enable cybercrime (phishing, malware, social engineering) and how AI assists threat intelligence and investigation.

Test your knowledge · B5
19

Open-source platform for managing cyber threat intelligence. Integrates with MITRE ATT&CK and STIX/TAXII.

ToolIntermediateB5 · AI for Threat IntelligenceNEW · 1mo ago
Test your knowledge · B5
20

Common Vulnerability Scoring System version 4.0. The standard method for rating the severity of security vulnerabilities.

FrameworkIntermediateB3 · AI for Vulnerability ManagementNEW · 1mo ago
Test your knowledge · B3
21

Evaluation criteria for AI/ML platforms including security features. Good for questions about what to look for when evaluating AI security tooling.

ResearchIntermediateB7 · AI Security Tool LandscapeNEW · 22d ago
Test your knowledge · B7
22

Market categorization of AI security tools: model monitoring, adversarial robustness, privacy, compliance. Useful for understanding the vendor landscape without favoring specific vendors.

Test your knowledge · B7
23

Sec-PaLM and Security AI Workbench for threat intelligence summarization and detection. Shows how LLMs are being applied to SOC workflows — not just pattern matching but contextual threat analysis.

Test your knowledge · B1
24

Research on using LLMs for automated triage, alert correlation, and response orchestration. Includes studies on analyst productivity gains and error reduction.

Test your knowledge · B2
25

Annual survey data on AI adoption in audit, risk, and compliance functions. Adoption rates, barriers, trust levels. Practitioner perspective on AI-augmented GRC.

ResearchIntermediateB6 · AI for GRC & ComplianceNEW · 22d ago
Test your knowledge · B6
26

LLM-powered security assistant. Technical docs cover prompt engineering for security, incident summarization, KQL generation. Useful for questions about practical LLM integration in SOC, not product features.

Test your knowledge · B1
27

MITRE's automated adversary emulation platform. Runs pre-defined or custom attack sequences to test defenses.

Test your knowledge · B4
28

Web-based tool for annotating and exploring the ATT&CK matrix. Useful for threat modeling, gap analysis, and red team planning.

Test your knowledge · B5
29

Knowledge graph of cybersecurity countermeasures. Maps defensive techniques to the ATT&CK techniques they counter.

Test your knowledge · B1
30

Workshop proceedings covering the bidirectional relationship between AI and security. Sections on automation risks (adversarial evasion of AI detectors, automation bias in SOC).

Test your knowledge · B2
31

The U.S. government repository of standards-based vulnerability management data. Includes CVE entries, severity scores, and affected product references.

FrameworkFoundationalB3 · AI for Vulnerability ManagementNEW · 1mo ago
Test your knowledge · B3
32

NVIDIA's open-source toolkit for adding programmable guardrails to LLM applications. Supports input/output validation and topic control.

Test your knowledge · B7
33

International principles for responsible AI adopted by 46 countries. Covers inclusive growth, transparency, accountability, and security.

FrameworkFoundationalB6 · AI for GRC & ComplianceC7 · AI Governance & RiskNEW · 1mo ago
Test your knowledge · B6
34

Official guidance on prompt construction, system prompts, and safety. The baseline for understanding prompt engineering before adding security-specific techniques.

ResearchIntermediateB8 · Prompt Engineering for SecurityNEW · 22d ago
Test your knowledge · B8
35

Comprehensive guide covering AI security threats, privacy risks, and practical controls for AI-powered applications.

Test your knowledge · B7
36

Detailed testing techniques for identifying web vulnerabilities. Practical, hands-on approach to security assessment.

GuideIntermediateB4 · AI in Offensive SecurityNEW · 1mo ago
Test your knowledge · B4
37

SOAR platform with 800+ integrations. The playbook marketplace shows real-world automation patterns: phishing triage, enrichment, containment. Useful for understanding what's actually automatable vs. aspirational.

GuideIntermediateB2 · AI-Driven Security AutomationNEW · 22d ago
Test your knowledge · B2
38

Practical governance framework providing guidance on deploying AI responsibly. Includes implementation checklists.

FrameworkIntermediateB6 · AI for GRC & ComplianceC7 · AI Governance & RiskNEW · 1mo ago
Test your knowledge · B6
39

Bug bounty platform focused on AI/ML vulnerabilities. Real-world vulnerability data in ML frameworks and models. Good for grounding tool security questions in actual discovered vulnerabilities.

Test your knowledge · B7
40

Comprehensive standard for penetration testing methodology. Covers intelligence gathering, threat modeling, vulnerability analysis, exploitation, and reporting.

FrameworkFoundationalB4 · AI in Offensive SecurityNEW · 1mo ago
Test your knowledge · B4
41

Analysis of how NLP/LLMs are being used for automated threat intelligence: dark web monitoring, malware family classification, campaign attribution. Practical applications beyond the hype.

GuideIntermediateB5 · AI for Threat IntelligenceNEW · 22d ago
Test your knowledge · B5
42
Atomic Red TeamRed Canary

Library of tests mapped to the MITRE ATT&CK framework. Small, portable detection tests for validating security controls.

Test your knowledge · B4
43

Practitioner-oriented guide to using LLMs in security workflows: log analysis, detection rule writing, incident triage, report generation. Practical prompt templates for security tasks.

GuideIntermediateB8 · Prompt Engineering for SecurityNEW · 22d ago
Test your knowledge · B8
44

Demonstrated GPT-4 exploiting real-world web vulnerabilities autonomously. 73% success rate on day-one CVEs. Key reference for questions about AI-augmented offensive capabilities and the asymmetry debate.

Test your knowledge · B4
45

Analysis of how LLMs can be used for offensive security tasks and the implications for defensive guardrails. Covers the dual-use nature of security LLMs.

Test your knowledge · B4
46

Comprehensive taxonomy of 58+ prompting techniques with effectiveness analysis. Covers chain-of-thought, few-shot, self-consistency, and adversarial prompting. Academic grounding for prompt engineering questions.

ResearchIntermediateB8 · Prompt Engineering for SecurityNEW · 22d ago
Test your knowledge · B8
47

Annual threat landscape reports with empirical data on vulnerability exploitation timelines, patch adoption rates, and the efficacy of risk-based prioritization. Use for data-driven questions, not vendor comparisons.

GuideIntermediateB3 · AI for Vulnerability ManagementNEW · 22d ago
Test your knowledge · B3
48

Platform for ML experiment tracking, model versioning, and collaborative model development with security considerations.

Test your knowledge · B7
49

U.S. Executive Order (Oct 2023) establishing AI safety requirements, red-teaming standards, and reporting obligations for frontier AI systems.

FrameworkIntermediateB6 · AI for GRC & ComplianceC7 · AI Governance & RiskNEW · 1mo ago
Test your knowledge · B6
CCybersecurity of AI Systems91 sources
01

The definitive security risk list for LLM-powered applications. Covers prompt injection, insecure output handling, training data poisoning, and more.

FrameworkC2 · LLM-Specific AttacksC5 · AI Red Teaming★ STARTERNEW · 1mo ago
Test your knowledge · C2
02

Comprehensive taxonomy of adversarial ML attacks and mitigations. Covers evasion, poisoning, extraction, and inference attacks with standardized terminology.

FrameworkIntermediateC1 · Adversarial Machine LearningC5 · AI Red TeamingNEW · 1mo ago
Test your knowledge · C1
03

Adversarial Threat Landscape for AI Systems. ATT&CK-style knowledge base of adversarial ML techniques, tactics, and real-world case studies.

Test your knowledge · C1
04

Comprehensive guide to AI red teaming from Microsoft's dedicated AI security team. Covers methodology, tools, and findings.

GuideIntermediateC5 · AI Red TeamingNEW · 1mo ago
Test your knowledge · C5
05

The authoritative framework for managing AI risks. Defines four core functions: Govern, Map, Measure, Manage. Essential reading for anyone building or deploying AI systems.

FrameworkC7 · AI Governance & Risk★ STARTERNEW · 1mo ago
Test your knowledge · C7
06

Updated cybersecurity framework with six core functions: Govern, Identify, Protect, Detect, Respond, Recover.

FrameworkFoundationalC7 · AI Governance & Risk★ STARTERNEW · 1mo ago
Test your knowledge · C7
07

Introduced DP-SGD for training neural networks with formal differential privacy guarantees. Foundation for private ML.

ResearchAdvancedC4 · AI Data SecurityNEW · 1mo ago
Test your knowledge · C4
08

First practical membership inference attack against ML models. Showed that ML APIs leak information about their training data.

ResearchAdvancedC4 · AI Data SecurityNEW · 1mo ago
Test your knowledge · C4
09

Introduced PGD-based adversarial training, currently the most reliable defense against adversarial examples. Established the robustness-accuracy tradeoff.

ResearchAdvancedC1 · Adversarial Machine LearningNEW · 1mo ago
Test your knowledge · C1
10

International standard for establishing and maintaining an AI management system. Includes 39 controls across 10 areas.

FrameworkAdvancedC7 · AI Governance & RiskNEW · 1mo ago
Test your knowledge · C7
11

Seminal backdoor attack paper. Demonstrated trojaned models in transfer learning scenarios. Foundational for AI supply chain security questions.

Test your knowledge · C3
12

Demonstrated that adversarial examples transfer between models, enabling black-box attacks via surrogate models. Key work on transferability.

ResearchAdvancedC1 · Adversarial Machine LearningNEW · 1mo ago
Test your knowledge · C1
13

Introduced the C&W attack, demonstrating that defensive distillation and other defenses could be reliably bypassed. Changed how robustness is evaluated.

ResearchAdvancedC1 · Adversarial Machine LearningNEW · 1mo ago
Test your knowledge · C1
14

Collection of Anthropic's published research on AI safety, alignment, interpretability, and security.

Test your knowledge · C8
15
EU AI ActEuropean Union

The European Union's comprehensive AI regulation. Classifies AI systems by risk level and sets requirements for high-risk systems.

FrameworkIntermediateC7 · AI Governance & RiskNEW · 1mo ago
Test your knowledge · C7
16

Python Risk Identification Toolkit for generative AI. Automated red teaming framework for testing LLM applications.

ToolIntermediateC5 · AI Red TeamingC2 · LLM-Specific AttacksNEW · 1mo ago
Test your knowledge · C5
17

Voluntary framework for improving privacy through enterprise risk management. Complements the Cybersecurity Framework.

FrameworkIntermediateC4 · AI Data SecurityNEW · 1mo ago
Test your knowledge · C4
18

The seminal paper introducing FGSM (Fast Gradient Sign Method). Established that adversarial examples are a fundamental property of neural networks, not a bug.

ResearchAdvancedC1 · Adversarial Machine LearningNEW · 1mo ago
Test your knowledge · C1
19

Demonstrated that LLMs memorize and can be prompted to regurgitate training data verbatim, including PII. Foundational work on LLM privacy risks.

ResearchAdvancedC2 · LLM-Specific AttacksC4 · AI Data SecurityNEW · 1mo ago
Test your knowledge · C2
20

Coalition for Content Provenance and Authenticity. Technical standard for digital content provenance and integrity.

FrameworkAdvancedC9 · Deepfakes & Synthetic MediaNEW · 1mo ago
Test your knowledge · C9
21

Hugging Face's safe serialization format for ML models. Prevents arbitrary code execution from pickle-based attacks.

GuideFoundationalC3 · AI Supply Chain SecurityNEW · 1mo ago
Test your knowledge · C3
22

Showed that gradually escalating benign conversations can bypass safety filters over multiple turns. Defeats per-message safety checks.

ResearchAdvancedC2 · LLM-Specific AttacksNEW · 1mo ago
Test your knowledge · C2
23

Demonstrated indirect prompt injection attacks through RAG documents, emails, and web content. Essential reading for RAG security.

ResearchIntermediateC2 · LLM-Specific AttacksNEW · 1mo ago
Test your knowledge · C2
24

The GCG attack paper. Showed that adversarial suffixes can bypass safety alignment in LLMs, transferring across models.

ResearchAdvancedC2 · LLM-Specific AttacksNEW · 1mo ago
Test your knowledge · C2
25

CISA guidance on understanding, detecting, and defending against deepfake threats in organizational contexts.

Test your knowledge · C9
26

Five practical safety problems: avoiding side effects, reward hacking, scalable oversight, safe exploration, distributional shift. Still the canonical taxonomy for AI safety research questions.

ResearchIntermediateC8 · AI Safety & AlignmentNEW · 22d ago
Test your knowledge · C8
27

The largest model hub. Security features: malware scanning, pickle scanning, safetensors format. Questions on model provenance, serialization risks (pickle exploits), and model marketplace trust.

ToolIntermediateC3 · AI Supply Chain SecurityNEW · 22d ago
Test your knowledge · C3
28

Security documentation for LangChain agent framework — sandboxing, tool permissions, prompt injection defenses, and deployment hardening.

GuideIntermediateC11 · Agentic AI SecurityNEW · 1mo ago
Test your knowledge · C11
29

Application container security guide covering image, registry, orchestrator, container, and host OS security.

FrameworkIntermediateC6 · AI Infrastructure SecurityNEW · 1mo ago
Test your knowledge · C6
30

NVIDIA's open-source LLM vulnerability scanner. Tests for prompt injection, jailbreaking, data leakage, and more.

ToolIntermediateC5 · AI Red TeamingC2 · LLM-Specific AttacksNEW · 1mo ago
Test your knowledge · C5
31

Reports on state-affiliated actors using AI for influence operations. Documents actual observed misuse, not theoretical risks. Key for questions about real-world AI-enabled disinformation.

ResearchIntermediateC10 · AI-Enabled DisinformationNEW · 22d ago
Test your knowledge · C10
32

Research on propaganda techniques, cognitive security, and information warfare. The "firehose of falsehood" model explains high-volume, multi-channel disinformation. Good for strategic questions.

ResearchIntermediateC10 · AI-Enabled DisinformationNEW · 22d ago
Test your knowledge · C10
33
MLflow / Kubeflow / Ray Security DocumentationVarious (Databricks, Google, Anyscale)

Security docs for major ML platforms. Covers authentication, authorization, experiment tracking security, model registry access controls. Practical infrastructure security questions.

ToolIntermediateC6 · AI Infrastructure SecurityNEW · 22d ago
Test your knowledge · C6
34

Introduced SISA training for efficient machine unlearning — enabling models to "forget" specific training data without full retraining.

ResearchAdvancedC4 · AI Data SecurityNEW · 1mo ago
Test your knowledge · C4
35

Standardized benchmark for evaluating adversarial robustness of ML models. Leaderboard of most robust models.

ToolAdvancedC1 · Adversarial Machine LearningNEW · 1mo ago
Test your knowledge · C1
36

Benchmark measuring whether language models generate truthful answers. Tests for common misconceptions and falsehoods.

ToolAdvancedC8 · AI Safety & AlignmentNEW · 1mo ago
Test your knowledge · C8
37

Industry coalition implementing C2PA. Open-source tools for content credentials. Practical implementation questions about provenance at scale.

ToolIntermediateC9 · Deepfakes & Synthetic MediaNEW · 22d ago
Test your knowledge · C9
38

Largest public AI red teaming event. 2,200+ participants testing multiple foundation models. Established community norms for responsible AI red teaming. Good for questions on practical red team methodology.

GuideIntermediateC5 · AI Red TeamingNEW · 22d ago
Test your knowledge · C5
39

Analysis of risks specific to AI agents: tool use, chain-of-thought exploitation, multi-step task failures, delegation risks. Key for understanding why agents create new attack surfaces beyond single-turn interactions.

ResearchIntermediateC11 · Agentic AI SecurityNEW · 22d ago
Test your knowledge · C11
40

Crowdsourced red teaming methodology with 38,961 attacks across multiple models. Taxonomy of harmful outputs and effectiveness of different red teaming strategies. Key reference for structured AI red teaming.

ResearchIntermediateC5 · AI Red TeamingNEW · 22d ago
Test your knowledge · C5
41

Anthropic's framework for responsible AI development. Defines AI Safety Levels (ASL) and capability thresholds.

GuideIntermediateC8 · AI Safety & AlignmentNEW · 1mo ago
Test your knowledge · C8
42

Anthropic's approach to AI alignment using a set of principles (a "constitution") to train helpful and harmless AI. Foundation of modern RLHF alternatives.

ResearchIntermediateC8 · AI Safety & AlignmentNEW · 1mo ago
Test your knowledge · C8
43

Demonstrated that long-context LLMs can be jailbroken by providing many examples of the desired behavior. Scales with context window size.

ResearchIntermediateC2 · LLM-Specific AttacksNEW · 1mo ago
Test your knowledge · C2
44

Anthropic's open protocol for connecting AI models to external tools and data sources. Critical reading for agentic AI security.

FrameworkIntermediateC11 · Agentic AI SecurityNEW · 1mo ago
Test your knowledge · C11
45

Technical standard for content provenance. Cryptographic binding of creation metadata to content. The leading technical approach to synthetic media authentication. Questions on architecture, limitations, and adoption challenges.

Test your knowledge · C9
46

Comprehensive taxonomy of AI risks: weaponization, misinformation, power concentration, value lock-in, rogue AI. Good for strategic-level safety questions beyond technical alignment.

ResearchIntermediateC8 · AI Safety & AlignmentNEW · 22d ago
Test your knowledge · C8
47

Official Kubernetes documentation on securing clusters, pods, and workloads. Essential for ML infrastructure security.

GuideIntermediateC6 · AI Infrastructure SecurityNEW · 1mo ago
Test your knowledge · C6
48
DISARM FrameworkDISARM Foundation

Framework for analyzing and countering disinformation. Provides a structured approach to information manipulation threats.

FrameworkIntermediateC10 · AI-Enabled DisinformationNEW · 1mo ago
Test your knowledge · C10
49

(See cross-cutting.md.) For C7 specifically: conformity assessments, technical documentation requirements, post-market monitoring, fundamental rights impact assessments. Detailed compliance questions.

FrameworkIntermediateC7 · AI Governance & RiskNEW · 22d ago
Test your knowledge · C7
50

Law enforcement perspective on deepfake threats: evidence tampering, identity fraud, CEO fraud, CSAM. Policy and response frameworks.

FrameworkIntermediateC9 · Deepfakes & Synthetic MediaNEW · 22d ago
Test your knowledge · C9
51

Annual trends report. AI trust, risk, and security management (AI TRiSM) has been featured prominently. Good for strategic-level questions about where the industry is heading.

ResearchIntermediateC11 · Agentic AI SecurityNEW · 22d ago
Test your knowledge · C11
52

Positions AI security technologies on the hype cycle. Useful for questions about technology maturity, adoption timelines, and distinguishing hype from operational readiness.

ResearchIntermediateC7 · AI Governance & RiskNEW · 22d ago
Test your knowledge · C7
53

Analysis of how LLMs can amplify influence operations: cost reduction, scalability, personalization, multilingual content. Framework for assessing disinformation risk from generative AI.

ResearchIntermediateC10 · AI-Enabled DisinformationNEW · 22d ago
Test your knowledge · C10
54

Open-source DP libraries and practical guides. Bridges theory to implementation. Good for questions on real-world DP deployment challenges and privacy budget management.

ResearchIntermediateC4 · AI Data SecurityNEW · 22d ago
Test your knowledge · C4
55

Google's conceptual framework for securing AI systems. Covers supply chain, data governance, and deployment security.

FrameworkIntermediateC7 · AI Governance & RiskC8 · AI Safety & AlignmentNEW · 1mo ago
Test your knowledge · C7
56

Research on reward modeling, debate, recursive reward modeling, and interpretability. Provides an alternative perspective to Anthropic/OpenAI approaches.

ResearchIntermediateC8 · AI Safety & AlignmentNEW · 22d ago
Test your knowledge · C8
57

Framework for evaluating dangerous capabilities: persuasion, deception, cyber operations, self-replication. Defines evaluation methodology for frontier model safety. Questions on what to test and how to interpret results.

ResearchIntermediateC5 · AI Red TeamingC8 · AI Safety & AlignmentNEW · 22d ago
Test your knowledge · C5
58
Google SynthIDGoogle DeepMind

Google DeepMind's watermarking technology for AI-generated content. Embeds imperceptible watermarks in images, audio, and text.

ToolFoundationalC9 · Deepfakes & Synthetic MediaNEW · 1mo ago
Test your knowledge · C9
59

Extracted training data from ChatGPT (production model) using a divergence attack. Showed alignment doesn't prevent memorization. Questions on the gap between safety fine-tuning and data protection.

ResearchIntermediateC4 · AI Data SecurityNEW · 22d ago
Test your knowledge · C4
60

Security best practices for using Hugging Face Hub — model scanning, SafeTensors, access controls, and supply chain considerations.

GuideFoundationalC3 · AI Supply Chain SecurityNEW · 1mo ago
Test your knowledge · C3
61

Comprehensive library for adversarial ML. Supports attacks, defenses, and robustness evaluation across multiple ML frameworks.

Test your knowledge · C1
62

Discovered 100+ malicious models on Hugging Face exploiting pickle deserialization for code execution. Real-world evidence of AI supply chain attacks. Good for scenario-based questions.

GuideIntermediateC3 · AI Supply Chain SecurityNEW · 22d ago
Test your knowledge · C3
63
CounterfitMicrosoft

Microsoft's tool for assessing the security of ML models. Supports evasion, extraction, and inversion attacks.

ToolIntermediateC1 · Adversarial Machine LearningNEW · 1mo ago
Test your knowledge · C1
64

Practical lessons from large-scale LLM red teaming across real products. Covers failure modes, testing methodologies, and organizational patterns. Rare insight into enterprise-scale AI security.

GuideIntermediateC2 · LLM-Specific AttacksC5 · AI Red TeamingNEW · 22d ago
Test your knowledge · C2
65

The theoretical foundation for differential privacy. Essential for questions on privacy-preserving ML training (DP-SGD) and the epsilon-delta framework.

ResearchIntermediateC4 · AI Data SecurityNEW · 22d ago
Test your knowledge · C4
66

Landmark study: false news spreads farther, faster, deeper than true news on social media. Not AI-specific but foundational for understanding why AI-generated disinformation is dangerous.

ResearchIntermediateC10 · AI-Enabled DisinformationNEW · 22d ago
Test your knowledge · C10
67

Companion to AI RMF 1.0 specifically for generative AI. Maps 12 GenAI risks to RMF actions. Covers CBRN, CSAM, confabulation, data privacy, environmental, human-AI interaction, information integrity, IP, obscenity, toxicity, value chain.

Test your knowledge · C5
68

(See cross-cutting.md for details.) The primary AI governance framework for US context. Questions should test practical application of Govern/Map/Measure/Manage, not just recall.

FrameworkIntermediateC7 · AI Governance & RiskNEW · 22d ago
Test your knowledge · C7
69

Extending software bill of materials concepts to AI: model cards, data cards, training provenance. Emerging standard for AI supply chain transparency.

FrameworkIntermediateC3 · AI Supply Chain SecurityNEW · 22d ago
Test your knowledge · C3
70

GPU cluster security, multi-tenant GPU isolation, model serving infrastructure hardening. Vendor-specific but covers unique infrastructure challenges (GPU memory isolation, CUDA vulnerabilities) not covered elsewhere.

GuideIntermediateC6 · AI Infrastructure SecurityNEW · 22d ago
Test your knowledge · C6
71

Framework for agentic AI governance: scope control, human oversight, auditability, containment. Defines key properties agents should have and failure modes to prevent.

ResearchIntermediateC11 · Agentic AI SecurityNEW · 22d ago
Test your knowledge · C11
72

Description of external red teaming program and findings from GPT-4 pre-deployment testing. The system card details risk categories, testing methodology, and residual risks.

ResearchIntermediateC5 · AI Red TeamingC8 · AI Safety & AlignmentNEW · 22d ago
Test your knowledge · C5
73

Research on the core alignment challenge: can weaker systems supervise stronger ones? Showed partial generalization is possible. Key for superalignment and scalable oversight questions.

ResearchIntermediateC8 · AI Safety & AlignmentNEW · 22d ago
Test your knowledge · C8
74

Framework for ensuring the integrity of software artifacts throughout the supply chain. Applicable to ML model pipelines.

FrameworkIntermediateC3 · AI Supply Chain SecurityNEW · 1mo ago
Test your knowledge · C3
75

Extension of the LLM Top 10 specifically for agentic patterns. Covers excessive agency, insecure plugin/tool design, and multi-agent trust boundaries.

Test your knowledge · C11
76

OWASP guidance on securing agentic AI systems — tool use, delegation chains, memory poisoning, and multi-agent architectures.

GuideIntermediateC11 · Agentic AI SecurityNEW · 1mo ago
Test your knowledge · C11
77

Top 10 security risks specific to machine learning systems, including supply chain attacks, data poisoning, and model theft.

Test your knowledge · C1
78

Certification program for responsible AI. Assessment criteria across fairness, explainability, accountability, robustness. Emerging industry certification.

ResearchIntermediateC7 · AI Governance & RiskNEW · 22d ago
Test your knowledge · C7
79

Research group studying abuse in information technologies, including AI-enabled disinformation, platform manipulation, and election interference.

GuideIntermediateC10 · AI-Enabled DisinformationNEW · 1mo ago
Test your knowledge · C10
80
Stanford HAI — AI Index Report (Annual)Stanford Institute for Human-Centered AI

Comprehensive annual data on AI progress: research output, investment, policy, public opinion, technical performance. The best source for quantitative AI landscape questions.

ResearchIntermediateC7 · AI Governance & RiskNEW · 22d ago
Test your knowledge · C7
81

Security audit firm with deep AI/ML expertise. Published research on pickle deserialization attacks, model file format security, and ML pipeline vulnerabilities. Technical depth from a security-first perspective.

Test your knowledge · C6
82

Large-scale benchmark dataset and tools for detecting facial manipulation in images and video. Used for deepfake detection research.

ToolAdvancedC9 · Deepfakes & Synthetic MediaNEW · 1mo ago
Test your knowledge · C9
83

Historical survey tracing adversarial ML from 2004 spam filters through deep learning. Essential for questions on the evolution and taxonomy of adversarial attacks (evasion, poisoning, model extraction).

ResearchIntermediateC1 · Adversarial Machine LearningNEW · 22d ago
Test your knowledge · C1
84

Extended training data extraction to image models. Showed Stable Diffusion memorizes and regurgitates training images. Important for multimodal AI data security questions.

ResearchIntermediateC4 · AI Data SecurityNEW · 22d ago
Test your knowledge · C4
85

The RLHF paper that enabled ChatGPT-style alignment. Reward model from human preferences + PPO. Foundational for understanding modern alignment approaches and their limitations.

ResearchIntermediateC8 · AI Safety & AlignmentNEW · 22d ago
Test your knowledge · C8
86

Survey of tool-using, retrieval-augmented, and reasoning LMs. The architectural foundation for understanding agent capabilities and their security implications.

ResearchIntermediateC11 · Agentic AI SecurityNEW · 22d ago
Test your knowledge · C11
87

Comprehensive survey covering generation techniques (autoencoders, GANs, diffusion), detection approaches (visual artifacts, frequency analysis, physiological signals), and the arms race dynamic.

ResearchIntermediateC9 · Deepfakes & Synthetic MediaNEW · 22d ago
Test your knowledge · C9
88

Largest prompt injection competition dataset. Taxonomy of prompt injection techniques: context ignoring, fake completion, payload splitting, obfuscation. Empirical data on attack success rates across models.

ResearchIntermediateC2 · LLM-Specific AttacksNEW · 22d ago
Test your knowledge · C2
89

Benchmark dataset and detection methods for facial manipulation. Covers DeepFakes, Face2Face, FaceSwap, NeuralTextures. Standard reference for deepfake detection evaluation.

ResearchIntermediateC9 · Deepfakes & Synthetic MediaNEW · 22d ago
Test your knowledge · C9
90

ToolEmu framework for evaluating agent risks in sandboxed environments. 36 risk categories across tool use failures. Practical methodology for agent security testing questions.

ResearchIntermediateC11 · Agentic AI SecurityNEW · 22d ago
Test your knowledge · C11
91

Systematic analysis of jailbreak techniques: competing objectives and mismatched generalization. Framework for understanding why safety training is inherently incomplete. Essential for nuanced jailbreak questions.

ResearchIntermediateC2 · LLM-Specific AttacksNEW · 22d ago
Test your knowledge · C2
DQuantum Technologies & Cybersecurity34 sources
01

The canonical quantum computing textbook. Covers qubits, gates, circuits, algorithms, and error correction. The reference for foundational questions — use judiciously as this is deeply technical.

ResearchIntermediateD1 · Quantum Computing FundamentalsNEW · 22d ago
Test your knowledge · D1
02

Federal guidance on preparing for quantum threats. Cryptographic inventory requirements, risk assessment methodology, and migration prioritization. Practical governance questions.

Test your knowledge · D3
03

Practical guidance for cloud providers and enterprises on quantum-safe migration. Covers certificate management, key negotiation, and hybrid deployment models.

Test your knowledge · D6
04

Standards for QKD deployment: interfaces, security proofs, network architecture. The main standardization effort for quantum networking.

FrameworkIntermediateD5 · Quantum Networking & CommunicationNEW · 22d ago
Test your knowledge · D5
05

European Telecommunications Standards Institute guide to quantum key distribution. Covers BB84, E91, and practical deployment considerations.

GuideAdvancedD5 · Quantum Networking & CommunicationNEW · 1mo ago
Test your knowledge · D5
06

Expert survey on when quantum computers will break RSA-2048. Tracks annual probability estimates from leading researchers.

ResearchIntermediateD3 · Quantum Threats to Existing SystemsNEW · 1mo ago
Test your knowledge · D3
07

Quantum supremacy paper (Sycamore, 2019), quantum error correction milestones. Primary source for state-of-the-art capability questions.

ResearchIntermediateD1 · Quantum Computing FundamentalsNEW · 22d ago
Test your knowledge · D1
08

Free courses on quantum computing fundamentals, from qubits and gates to quantum algorithms. Includes hands-on access to real quantum computers.

GuideFoundationalD1 · Quantum Computing FundamentalsNEW · 1mo ago
Test your knowledge · D1
09

Open-source textbook teaching quantum computing through code. Covers linear algebra, quantum circuits, Shor's algorithm, and Grover's algorithm.

GuideIntermediateD1 · Quantum Computing FundamentalsNEW · 1mo ago
Test your knowledge · D1
10

RFC 9180 (HPKE), draft standards for hybrid TLS key exchange, PQ/T hybrid certificates. The engineering details of how PQC gets deployed in real protocols. Questions on protocol-level migration decisions.

FrameworkIntermediateD6 · Quantum Security EngineeringNEW · 22d ago
Test your knowledge · D6
11

Introduction to quantum computing concepts and Q# programming language. Covers quantum mechanics, algorithms, and applications.

GuideFoundationalD1 · Quantum Computing FundamentalsNEW · 1mo ago
Test your knowledge · D1
12

Step-by-step preparation guide: discovery (find all crypto), assessment (prioritize), planning (migration strategy). Practical engineering questions about organizational preparation.

FrameworkIntermediateD6 · Quantum Security EngineeringNEW · 22d ago
Test your knowledge · D6
13

NIST's primary post-quantum key encapsulation mechanism standard. Based on the CRYSTALS-Kyber algorithm. Replaces RSA/ECDH key exchange.

FrameworkAdvancedD2 · Post-Quantum CryptographyNEW · 1mo ago
Test your knowledge · D2
14

NIST's primary post-quantum digital signature standard. Based on CRYSTALS-Dilithium. Replaces RSA/ECDSA signatures.

FrameworkAdvancedD2 · Post-Quantum CryptographyNEW · 1mo ago
Test your knowledge · D2
15

Hash-based post-quantum signature standard. Conservative choice based on well-understood hash function security. Backup to ML-DSA.

FrameworkAdvancedD2 · Post-Quantum CryptographyNEW · 1mo ago
Test your knowledge · D2
16

Detailed technical analysis of the post-quantum cryptographic algorithms evaluated in NIST's third round. Essential for understanding algorithm selection rationale.

Test your knowledge · D6
17

Transition guidance for cryptographic algorithms. Established precedent for how NIST manages algorithm deprecation (e.g., SHA-1, DES). Informs questions about how PQC transition will be mandated.

FrameworkIntermediateD4 · Quantum-Safe ComplianceNEW · 22d ago
Test your knowledge · D4
18

Migration guidance and timelines. Deprecation schedule for current algorithms. Hybrid approaches. The roadmap document for PQC transition questions.

Test your knowledge · D2
19

NSA's mandated quantum-resistant algorithm suite for national security systems. Defines transition timelines for all classified communications.

FrameworkAdvancedD4 · Quantum-Safe ComplianceNEW · 1mo ago
Test your knowledge · D4
20

NSA's guidance on quantum threats to cryptography. Explains which algorithms are vulnerable and timelines for transition.

GuideIntermediateD3 · Quantum Threats to Existing SystemsNEW · 1mo ago
Test your knowledge · D3
21

White House memo requiring federal agencies to inventory cryptographic systems and begin migration to quantum-resistant algorithms.

FrameworkIntermediateD4 · Quantum-Safe ComplianceNEW · 1mo ago
Test your knowledge · D4
22

Open-source C library implementing quantum-safe cryptographic algorithms. Enables testing and integration of PQC into existing systems.

ToolAdvancedD2 · Post-Quantum CryptographyNEW · 1mo ago
Test your knowledge · D2
23

Bulletin on quantum threats to payment card security (AES, RSA in payment protocols). Sector-specific compliance questions for financial services PQC migration.

FrameworkIntermediateD4 · Quantum-Safe ComplianceNEW · 22d ago
Test your knowledge · D4
24

DOE's blueprint for a quantum internet. Five milestones from verification of entanglement to fault-tolerant quantum networking. Questions on quantum network architecture and its security properties.

FrameworkIntermediateD5 · Quantum Networking & CommunicationNEW · 22d ago
Test your knowledge · D5
25

US strategy for quantum R&D. NQI Act of 2018, reauthorized 2024. Context for policy questions about national quantum strategies and investment.

FrameworkIntermediateD1 · Quantum Computing FundamentalsNEW · 22d ago
Test your knowledge · D1
26

Mosca's theorem: if the time to migrate (x) + shelf life of data (y) > time to quantum computer (z), then start migration now. The canonical framework for "harvest now, decrypt later" risk assessment.

ResearchIntermediateD3 · Quantum Threats to Existing SystemsNEW · 22d ago
Test your knowledge · D3
27

Practical risk assessment framework for organizations. Combines timeline estimates with crypto-agility assessment. Good for enterprise-focused quantum security planning questions.

ResearchIntermediateD6 · Quantum Security EngineeringNEW · 22d ago
Test your knowledge · D6
28

The first quantum key distribution (QKD) protocol. Foundational for all quantum networking questions. Security based on quantum mechanics (no-cloning theorem, measurement disturbance).

ResearchIntermediateD5 · Quantum Networking & CommunicationNEW · 22d ago
Test your knowledge · D5
29

Survey of PQC families: lattice, code-based, multivariate, hash-based, isogeny-based. Good for comparative questions on different PQC approaches and their security assumptions.

ResearchIntermediateD2 · Post-Quantum CryptographyNEW · 22d ago
Test your knowledge · D2
30

Entanglement-based QKD. Security based on Bell inequality violations. Compare/contrast with BB84 for protocol design questions.

ResearchIntermediateD5 · Quantum Networking & CommunicationNEW · 22d ago
Test your knowledge · D5
31

Quadratic speedup for unstructured search. Halves the effective key length of symmetric algorithms (AES-128 → 64-bit equivalent). Questions on what Grover's algorithm does and doesn't break.

ResearchIntermediateD3 · Quantum Threats to Existing SystemsNEW · 22d ago
Test your knowledge · D3
32

The paper that started it all. Shor's algorithm breaks RSA, DSA, ECDSA, and Diffie-Hellman. Essential for questions on which classical cryptographic assumptions quantum computing breaks.

ResearchIntermediateD3 · Quantum Threats to Existing SystemsNEW · 22d ago
Test your knowledge · D3
33

Six stages of quantum internet development from trusted repeater to full quantum computing network. Defines the maturity model for quantum networking questions.

ResearchIntermediateD5 · Quantum Networking & CommunicationNEW · 22d ago
Test your knowledge · D5
34

Practical frameworks for achieving cryptographic agility: algorithm abstraction layers, protocol versioning, key management infrastructure updates. Vendor content but covers unique practical challenges.

GuideIntermediateD6 · Quantum Security EngineeringNEW · 22d ago
Test your knowledge · D6

Ready to test what you've learned?

Our questions are built directly from these resources. Take a quiz and see how your knowledge stacks up.