Source library · 320 curated entries

Where every claim in SecProve comes from.

A dense reading catalog. Every claim is footnoted. Sort by source, filter by pillar, type, or recency. Built for analysts who want to see what we are standing on.

320SOURCES
143ORGS
50DOMAINS
320ADDED · 90 DAYS
Pillar · multi-select1 of 4
Domains · Aall in pillar
129 sources · matching filters · sorted by citation density
Sort
ACybersecurity129 sources
01

NATO-accredited research center on strategic communications, information warfare, and influence operations. Publishes detailed case studies on hybrid-warfare campaigns from a defense perspective.

Test your knowledge · A22
02

Top 10 security risks for APIs. Covers broken object-level authorization, authentication failures, excessive data exposure, and more.

FrameworkIntermediateA4 · Application SecurityNEW · 1mo ago
Test your knowledge · A4
03

International standard for establishing, implementing, maintaining, and continually improving an information security management system (ISMS).

FrameworkIntermediateA1 · Governance, Risk & ComplianceNEW · 1mo ago
Test your knowledge · A1
04

Cataloged threat groups with associated TTPs. Good for questions on attribution, TTP overlap, and intelligence-driven detection.

ToolIntermediateA8 · Threat IntelligenceNEW · 22d ago
Test your knowledge · A8
05

Open-source project for signing, verifying, and protecting software supply chains. Keyless signing for artifacts.

Test your knowledge · A13
06

Open-source investigations of disinformation campaigns and information warfare. Methodology-forward — they publish their workflows, not just findings.

Test your knowledge · A22
07

AWS best practices for designing and operating secure workloads in the cloud. Covers IAM, detection, infrastructure protection, and incident response.

GuideIntermediateA5 · Cloud SecurityNEW · 1mo ago
Test your knowledge · A5
08
Black Hat / DEF CON ArchivesBlack Hat / DEF CON

Conference presentations covering novel attack techniques and defensive research. Essential for cutting-edge offensive/defensive questions. AI Village talks particularly relevant for Pillars B and C.

Test your knowledge · A4
09

Open-source digital forensics tools for disk image analysis. Industry standard for incident investigation and evidence collection.

ToolIntermediateA7 · Incident Response & ForensicsNEW · 1mo ago
Test your knowledge · A7
10
Diamond Model of Intrusion AnalysisCaltagirone, Pendergast, Betz

Four vertices: Adversary, Capability, Infrastructure, Victim. Complements the Kill Chain and ATT&CK. Questions on analytical frameworks and when to apply each model.

ResearchIntermediateA8 · Threat IntelligenceNEW · 22d ago
Test your knowledge · A8
11
CIS Controls v8Center for Internet Security

18 prioritized security controls organized into Implementation Groups (IG1, IG2, IG3). Practical and prescriptive — good for questions about prioritization and which controls matter most for different organization sizes.

Test your knowledge · A1
12

Consensus-based security configuration guides for 100+ technologies. The industry standard for hardening systems.

FrameworkIntermediateA5 · Cloud SecurityNEW · 1mo ago
Test your knowledge · A5
13

Federal hub for ransomware prevention, mitigation, and recovery guidance. Joint advisories with FBI/MS-ISAC, no-cost CISA services, and the ransomware-specific recovery checklist.

Test your knowledge · A23
14

No-cost CISA assessment of operational resilience and cybersecurity practices for critical infrastructure operators. Maps to NIST CSF for gap analysis.

FrameworkIntermediateA23 · Recovery, Resilience & Cyber RecoveryNEW · 1d ago
Test your knowledge · A23
15

Annual federal campaign with current-year themes, free materials, and partner toolkits. Reflects the public-facing federal stance on awareness messaging.

FrameworkIntermediateA20 · Security Awareness & Human FactorsNEW · 1d ago
Test your knowledge · A20
16

Federal hub for cybersecurity training resources, career development pathways, and free CISA-developed training programs. Companion to NICE for workforce-readiness questions.

FrameworkIntermediateA20 · Security Awareness & Human FactorsNEW · 1d ago
Test your knowledge · A20
17

Federal hub for U.S. perspective on foreign influence ops, election integrity, and counter-disinformation guidance. Includes "rumor vs. reality" public briefings.

FrameworkIntermediateA22 · Information Operations & Cognitive SecurityNEW · 1d ago
Test your knowledge · A22
18

Authoritative feed of ICS-CERT advisories covering vulnerabilities in PLCs, HMIs, SCADA platforms, and OT vendors. The primary source for tracking active threats to industrial systems.

FrameworkIntermediateA14 · OT/ICS SecurityNEW · 1d ago
Test your knowledge · A14
19

Federal guidance on protecting GPS/GNSS-dependent infrastructure from spoofing and jamming. Resilient PNT executive order context, sector-specific resilience profiles.

FrameworkIntermediateA17 · Cyber-Electronic WarfareNEW · 1d ago
Test your knowledge · A17
20

Framework for transitioning to zero trust architecture across five pillars: identity, devices, networks, applications, and data.

FrameworkIntermediateA3 · Zero Trust ArchitectureNEW · 1mo ago
Test your knowledge · A3
21

Network traffic trends, DDoS statistics, protocol adoption. Useful for questions about scale and real-world network security challenges, not Cisco product-specific.

GuideIntermediateA2 · Network SecurityNEW · 22d ago
Test your knowledge · A2
22

Open-source network intrusion detection and prevention system. Industry standard for real-time traffic analysis and packet logging.

ToolIntermediateA2 · Network SecurityNEW · 1mo ago
Test your knowledge · A2
23

Cloud-specific control framework with 197 controls across 17 domains. Mapped to NIST 800-53, ISO 27001, PCI DSS, GDPR. The reference for cloud-architecture control questions.

Test your knowledge · A25
24

Peer-ranked cloud threats. The shift from infra issues to identity/access/misconfiguration reflects cloud maturity. Good for questions testing threat prioritization understanding.

ResearchIntermediateA5 · Cloud SecurityNEW · 22d ago
Test your knowledge · A5
25

Set of practical cryptography exercises. Learn by breaking real-world crypto systems — the best way to understand cryptographic vulnerabilities.

GuideIntermediateA15 · CryptographyNEW · 1mo ago
Test your knowledge · A15
26

Curated newsletter covering detection engineering practices, tools, and techniques. Practical resource for SOC and detection teams.

Test your knowledge · A11
27

Mature, widely deployed medium-interaction SSH and Telnet honeypot. Logs attacker commands, captures malware, proxies sessions. The standard reference implementation for SSH-honeypot questions.

ToolIntermediateA19 · Cyber Deception & Active DefenseNEW · 1d ago
Test your knowledge · A19
28

Comprehensive CISO leadership reference. Covers building programs, board communication, metrics, and team development.

GuideIntermediateA18 · Security LeadershipNEW · 22d ago
Test your knowledge · A18
29

UK/international pen test certification body. Their guides cover methodology, reporting standards, and ethics. Useful for questions on professional standards in offensive security.

FrameworkIntermediateA9 · Penetration Testing & Red TeamingNEW · 22d ago
Test your knowledge · A9
30

Comprehensive guidance for cloud security best practices. Covers architecture, governance, compliance, and operations.

GuideIntermediateA5 · Cloud SecurityNEW · 1mo ago
Test your knowledge · A5
31

Annual OT/ICS threat landscape report. Tracks threat groups (Chernovite, Bentonite, etc.) targeting industrial systems. Original research, not marketing.

GuideIntermediateA14 · OT/ICS SecurityNEW · 22d ago
Test your knowledge · A14
32

EU-focused annual threat assessment. Covers ransomware, supply chain, disinformation, state-sponsored threats. Useful counterpoint to US-centric sources.

Test your knowledge · A8
33

13 provisions for consumer IoT security. No default passwords, vulnerability disclosure policy, secure update mechanisms. The emerging regulatory baseline for IoT.

FrameworkIntermediateA16 · Mobile & IoT SecurityNEW · 22d ago
Test your knowledge · A16
34
EUvsDisinfoEU East StratCom Task Force

EU-operated database of pro-Kremlin disinformation cases and analysis. The reference dataset for pro-Russia narrative tracking, with 17,000+ cataloged cases and weekly trend reports.

FrameworkIntermediateA22 · Information Operations & Cognitive SecurityNEW · 1d ago
Test your knowledge · A22
35
EU EEAS — FIMI Threat ReportsEuropean External Action Service

EU's annual reports on Foreign Information Manipulation and Interference. Codifies the FIMI taxonomy increasingly used in EU policy discussions.

FrameworkIntermediateA22 · Information Operations & Cognitive SecurityNEW · 1d ago
Test your knowledge · A22
36

Data subject rights, lawful bases for processing, DPO requirements, breach notification (72 hours), cross-border transfers. The global privacy benchmark.

FrameworkIntermediateA12 · Data Security, Privacy & ProtectionNEW · 22d ago
Test your knowledge · A12
37
GDPR Official TextEuropean Union

Full text of the General Data Protection Regulation. The EU's comprehensive data protection law that applies globally to EU residents' data.

FrameworkIntermediateA12 · Data Security, Privacy & ProtectionNEW · 1mo ago
Test your knowledge · A12
38

Quantitative risk analysis framework. Provides a model for understanding, analyzing, and quantifying information risk in financial terms.

FrameworkAdvancedA1 · Governance, Risk & ComplianceNEW · 1mo ago
Test your knowledge · A1
39

Specifications for passwordless authentication using public key cryptography. The future of secure authentication.

FrameworkIntermediateA6 · Identity & Access ManagementNEW · 1mo ago
Test your knowledge · A6
40

The push toward passwordless authentication. Questions on how FIDO2/WebAuthn works, passkey lifecycle, and comparison to traditional MFA.

FrameworkIntermediateA6 · Identity & Access ManagementNEW · 22d ago
Test your knowledge · A6
41

The standardized vulnerability severity scoring system referenced by virtually every vuln management program. v3.1 widely deployed; v4.0 introduces threat and environmental refinements.

ToolIntermediateA24 · Exposure Management & Attack SurfaceNEW · 1d ago
Test your knowledge · A24
42

Forrester originated the Zero Trust concept (John Kindervag, 2010). Their extended model includes workloads, data, networks, devices, people, visibility/analytics, automation/orchestration.

ResearchIntermediateA3 · Zero Trust ArchitectureNEW · 22d ago
Test your knowledge · A3
43

Originating Gartner article that defined CTEM as a five-stage program: scoping, discovery, prioritization, validation, mobilization. The reference for the CTEM acronym and process model.

ResearchIntermediateA24 · Exposure Management & Attack SurfaceNEW · 1d ago
Test your knowledge · A24
44

The original enterprise ZTA implementation case study. Six published papers covering architecture, migration, and lessons learned. Vendor-specific but pioneered the practical approach to zero trust.

GuideIntermediateA3 · Zero Trust ArchitectureNEW · 22d ago
Test your knowledge · A3
45

The TLS 1.3 specification. Removes legacy cipher suites, adds 0-RTT, mandates forward secrecy. Required reading for any TLS/PKI question.

FrameworkIntermediateA15 · CryptographyNEW · 1d ago
Test your knowledge · A15
46

Indicator hierarchy from hash values (trivial) to TTPs (tough). Foundational concept for detection engineering and threat intelligence questions.

Test your knowledge · A11
47

Investigative journalism on cybercrime, breaches, and network security incidents. Good for real-world scenario questions grounded in actual events.

Test your knowledge · A2
48

Multi-part standard covering security levels, zones and conduits, component requirements. International standard for industrial cybersecurity.

FrameworkIntermediateA14 · OT/ICS SecurityNEW · 22d ago
Test your knowledge · A14
49

Annual workforce gap analysis. The "3.4 million shortfall" and similar stats. Good for questions on workforce development, hiring challenges, and security program building.

ResearchIntermediateA18 · Security LeadershipNEW · 22d ago
Test your knowledge · A18
50

Peer-reviewed methodology for performing security tests. Provides a scientific approach to security testing with measurable results.

FrameworkIntermediateA9 · Penetration Testing & Red TeamingNEW · 1mo ago
Test your knowledge · A9
51

International standard for business continuity management systems. Defines requirements for establishing, implementing, and maintaining a BCMS. Often paired with ISO 27001 for combined audits.

FrameworkIntermediateA23 · Recovery, Resilience & Cyber RecoveryNEW · 1d ago
Test your knowledge · A23
52

Seven phases from Reconnaissance to Actions on Objectives. Widely adopted but also widely critiqued (assumes perimeter-centric model). Good for compare/contrast with ATT&CK and Unified Kill Chain.

Test your knowledge · A8
53
Mandiant APT ReportsMandiant (Google Cloud)

Detailed campaign analyses with TTPs mapped to ATT&CK. APT1, APT28/29, UNC groups. Primary source for threat-actor-specific IR questions. Not marketing — these are original threat research.

Test your knowledge · A7
54
Mandiant M-Trends ReportMandiant (Google Cloud)

Annual IR data: dwell time trends, initial access vectors, detection sources. Empirical data from thousands of engagements. One of the few sources for real-world detection/response metrics.

Test your knowledge · A7
55

Mandiant's FLARE team publishes capa, FLOSS, and other widely-used reversing tools alongside in-depth malware deep-dive blog posts. The reference for vendor-published reversing primitives.

GuideIntermediateA21 · Malware Analysis & Reverse EngineeringNEW · 1d ago
Test your knowledge · A21
56

Business strategy perspective on cyber risk. Useful for questions about communicating security value to executives and boards, ROI of security investments.

ResearchIntermediateA18 · Security LeadershipNEW · 22d ago
Test your knowledge · A18
57

Open-source threat intelligence platform for sharing, storing, and correlating indicators of compromise and threat data.

ToolIntermediateA8 · Threat IntelligenceNEW · 1mo ago
Test your knowledge · A8
58

Adversary engagement framework. Maps deception and denial operations to ATT&CK adversary behaviors. The defensive complement to ATT&CK for planning deception operations.

ToolIntermediateA19 · Cyber Deception & Active DefenseNEW · 1d ago
Test your knowledge · A19
59

Independent evaluations of security products against real-world attack scenarios. Good for questions about detection coverage, visibility gaps, and evaluation methodology.

Test your knowledge · A11
60
SolarWinds / Log4Shell Case StudiesMultiple (CISA, Mandiant, Microsoft)

The two defining supply chain incidents of recent years. CISA's postmortem reports are primary sources for scenario-based questions about detection, response, and prevention.

GuideIntermediateA13 · Supply Chain SecurityNEW · 22d ago
Test your knowledge · A13
61

Expert analysis of how international law applies to cyber operations. Sovereignty, use of force, law of armed conflict in cyberspace. The primary reference for legal/policy questions in cyber warfare.

ResearchIntermediateA17 · Cyber-Electronic WarfareNEW · 22d ago
Test your knowledge · A17
62

Foundational capabilities IoT manufacturers should provide: device identification, configuration, data protection, logical access, software update, cybersecurity state awareness. The baseline US regulators cite.

FrameworkIntermediateA16 · Mobile & IoT SecurityNEW · 1d ago
Test your knowledge · A16
63

NIST's selected post-quantum cryptographic algorithms: ML-KEM, ML-DSA, and SLH-DSA. The future of cryptography in the quantum era.

FrameworkAdvancedA15 · CryptographyNEW · 1mo ago
Test your knowledge · A15
64

Guide for applying the RMF to information systems and organizations. Covers categorization, control selection, implementation, assessment, authorization, and monitoring.

FrameworkIntermediateA1 · Governance, Risk & ComplianceNEW · 1mo ago
Test your knowledge · A1
65

Federal methodology for security assessments: target identification, vulnerability analysis, validation. Underpins both penetration testing and exposure management programs.

Test your knowledge · A24
66

Guide to protecting the confidentiality of personally identifiable information. Covers PII identification, impact assessment, and safeguards.

FrameworkFoundationalA12 · Data Security, Privacy & ProtectionNEW · 1mo ago
Test your knowledge · A12
67

The systems-security-engineering doctrine: lifecycle processes, design principles, and assurance for trustworthy systems. The most rigorous federal reference for security architecture.

FrameworkIntermediateA25 · Security Architecture & EngineeringNEW · 1d ago
Test your knowledge · A25
68

Cyber-resiliency engineering framework. Covers deception, diversity, dynamic positioning, and other techniques for systems designed to operate through compromise. The systems-engineering view of active defense.

Test your knowledge · A19
69

Practices for identifying, assessing, and mitigating cyber supply chain risks. Covers acquisition, development, and operations.

FrameworkIntermediateA13 · Supply Chain SecurityNEW · 1mo ago
Test your knowledge · A13
70

Cybersecurity Supply Chain Risk Management. Integrates C-SCRM into the RMF. Covers acquisition, supplier assessment, and ongoing monitoring.

FrameworkIntermediateA13 · Supply Chain SecurityNEW · 22d ago
Test your knowledge · A13
71

Practical guidance on selecting and implementing cryptographic algorithms. Covers symmetric, asymmetric, hashing, and key management.

FrameworkIntermediateA15 · CryptographyNEW · 22d ago
Test your knowledge · A15
72

Standard taxonomy of cybersecurity work roles, tasks, KSAs. Used for role-based training design and human-risk targeting.

FrameworkIntermediateA20 · Security Awareness & Human FactorsNEW · 1d ago
Test your knowledge · A20
73

Primitives for IoT: sensor, aggregator, communication channel, eUtility, decision trigger. Framework for thinking about IoT security architectures.

FrameworkIntermediateA16 · Mobile & IoT SecurityNEW · 22d ago
Test your knowledge · A16
74

The federal recovery playbook. Covers recovery planning, validation of restored services, post-event improvement. Pairs with NIST CSF Recover function.

FrameworkIntermediateA23 · Recovery, Resilience & Cyber RecoveryNEW · 1d ago
Test your knowledge · A23
75

Definitive guide to zero trust architecture. Defines ZTA concepts, deployment models, and implementation approaches for enterprise environments.

FrameworkIntermediateA3 · Zero Trust ArchitectureNEW · 1mo ago
Test your knowledge · A3
76

Risk assessment methodology: threat sources, vulnerabilities, likelihood, impact. Complements 800-37. Good for questions comparing quantitative vs. qualitative risk assessment.

FrameworkIntermediateA1 · Governance, Risk & ComplianceNEW · 22d ago
Test your knowledge · A1
77

Comprehensive contingency planning: BIA, recovery strategies, plan testing, training, and maintenance. The reference for RTO/RPO and recovery tier questions.

FrameworkIntermediateA23 · Recovery, Resilience & Cyber RecoveryNEW · 1d ago
Test your knowledge · A23
78

The 7-step RMF (Prepare, Categorize, Select, Implement, Assess, Authorize, Monitor). Questions should test understanding of step sequencing, roles (AO, ISSO, ISSM), and continuous monitoring vs. point-in-time assessment.

FrameworkIntermediateA1 · Governance, Risk & ComplianceNEW · 22d ago
Test your knowledge · A1
79

Guidelines on firewalls and firewall policy. Covers types of firewall technologies, deployment architectures, and policy management.

FrameworkFoundationalA2 · Network SecurityNEW · 1mo ago
Test your knowledge · A2
80

The federal model for awareness program design — needs assessment, scoping, content design, evaluation. The default reference for "what does an awareness program look like."

FrameworkIntermediateA20 · Security Awareness & Human FactorsNEW · 1d ago
Test your knowledge · A20
81

Four phases: Preparation, Detection & Analysis, Containment/Eradication/Recovery, Post-Incident Activity. The canonical IR reference. Questions should test decision-making within phases, not just naming them.

FrameworkIntermediateA7 · Incident Response & ForensicsNEW · 22d ago
Test your knowledge · A7
82

Comprehensive guidelines for digital identity services. Covers enrollment, authentication, and federation at three assurance levels.

FrameworkIntermediateA6 · Identity & Access ManagementNEW · 1mo ago
Test your knowledge · A6
83

Identity Assurance Levels (IAL), Authenticator Assurance Levels (AAL), and Federation Assurance Levels (FAL). The 2024 revision is significant. Questions on appropriate assurance level selection for different risk scenarios.

FrameworkIntermediateA6 · Identity & Access ManagementNEW · 22d ago
Test your knowledge · A6
84

Updated terminology from ICS to OT. Covers Purdue Model, network segmentation, patching challenges in OT environments. The primary OT security reference.

FrameworkIntermediateA14 · OT/ICS SecurityNEW · 22d ago
Test your knowledge · A14
85

Guide to integrating forensic techniques into incident response. Covers data collection, examination, analysis, and reporting.

FrameworkIntermediateA7 · Incident Response & ForensicsNEW · 1mo ago
Test your knowledge · A7
86

Guide to computer security log management. Covers log generation, storage, analysis, and the role of logs in incident response.

FrameworkFoundationalA10 · Security OperationsNEW · 1mo ago
Test your knowledge · A10
87

The standard textbook used in most university and SANS courses. Covers static, dynamic, behavioral analysis with hands-on labs. Cite for any "how do you analyze X" pedagogical question.

ResearchIntermediateA21 · Malware Analysis & Reverse EngineeringNEW · 1d ago
Test your knowledge · A21
88

Practitioner-oriented cryptography textbook. Covers modern symmetric/asymmetric algorithms, protocols, and implementation pitfalls. Good for applied crypto questions vs. pure theory.

ResearchIntermediateA15 · CryptographyNEW · 22d ago
Test your knowledge · A15
89

NSA technical guidance on nation-state TTPs, hardening guidance for high-value targets, and joint advisories with CISA/FBI. Useful for advanced cyber-EW and military-adjacent questions.

FrameworkIntermediateA17 · Cyber-Electronic WarfareNEW · 1d ago
Test your knowledge · A17
90

NSA's open-source software reverse-engineering framework. Disassembler, decompiler, scripting. The free standard for malware analysis training and most public reversing work.

ToolIntermediateA21 · Malware Analysis & Reverse EngineeringNEW · 1d ago
Test your knowledge · A21
91

Based on real red/blue team assessments. Includes default configurations, improper privilege separation, lack of network segmentation. Excellent for practical scenario questions.

Test your knowledge · A2
92

Structured Threat Information Expression (STIX) and Trusted Automated Exchange of Intelligence Information (TAXII). The standard for sharing cyber threat intelligence.

FrameworkIntermediateA8 · Threat IntelligenceNEW · 1mo ago
Test your knowledge · A8
93

High-performance network IDS/IPS and security monitoring engine. Supports multi-threading, protocol identification, and file extraction.

ToolIntermediateA2 · Network SecurityNEW · 1mo ago
Test your knowledge · A2
94
OpenSSF ScorecardOpen Source Security Foundation

Automated security health checks for open source projects. Checks branch protection, dependency pinning, fuzzing, SAST. Good for practical supply chain assessment questions.

ToolIntermediateA13 · Supply Chain SecurityNEW · 22d ago
Test your knowledge · A13
95

Framework of security requirements for designing, developing, and testing secure web applications. Three verification levels.

FrameworkIntermediateA4 · Application SecurityNEW · 1mo ago
Test your knowledge · A4
96

Practical methodology for identifying and reducing attack surface in applications. Covers entry points, data flows, and trust boundaries. The application-layer complement to network EASM.

ToolIntermediateA24 · Exposure Management & Attack SurfaceNEW · 1d ago
Test your knowledge · A24
97

OWASP IoT Top 10 (weak passwords, insecure network services, etc.) plus testing guides. The IoT analog to the OWASP Top 10 for web apps.

ToolIntermediateA16 · Mobile & IoT SecurityNEW · 1d ago
Test your knowledge · A16
98

MASVS (verification standard) and MASTG (testing guide). The primary mobile security testing reference. L1 and L2 verification levels.

ToolIntermediateA16 · Mobile & IoT SecurityNEW · 22d ago
Test your knowledge · A16
99

Five business functions (Governance, Design, Implementation, Verification, Operations) for measuring and improving AppSec programs. Good for maturity model questions.

Test your knowledge · A4
100

The most widely referenced web application security awareness document. Covers injection, broken auth, XSS, and more.

FrameworkFoundationalA4 · Application SecurityNEW · 1mo ago
Test your knowledge · A4
101

Open-source detection engineering methodology. Goal, categorization, strategy abstract, technical context, blind spots. Well-regarded community resource despite vendor origin.

GuideIntermediateA11 · Detection Engineering & Threat HuntingNEW · 22d ago
Test your knowledge · A11
102

Web application security testing tool. Industry standard for manual and automated web vulnerability assessment.

ToolIntermediateA9 · Penetration Testing & Red TeamingNEW · 1mo ago
Test your knowledge · A9
103

The world's most used penetration testing framework. Provides exploit development, payload generation, and post-exploitation capabilities.

ToolIntermediateA9 · Penetration Testing & Red TeamingNEW · 1mo ago
Test your knowledge · A9
104

Open-source and dark web intelligence trends. Useful for questions about intelligence sources, collection methods, and the intelligence lifecycle.

Test your knowledge · A8
105

Curated Linux distribution preloaded with hundreds of reverse-engineering and malware-analysis tools. Maintained by Lenny Zeltser. The default sandbox VM in most malware-analysis training courses.

ToolIntermediateA21 · Malware Analysis & Reverse EngineeringNEW · 1d ago
Test your knowledge · A21
106

Business-driven security architecture framework. Six-layer model (contextual → operational) widely used in enterprise security architecture programs. Vendor-neutral; common in EA practice.

GuideIntermediateA25 · Security Architecture & EngineeringNEW · 1d ago
Test your knowledge · A25
107

Practitioner-oriented IR methodology. Six steps (Preparation, Identification, Containment, Eradication, Recovery, Lessons Learned). Compare/contrast with NIST for methodology questions.

GuideIntermediateA7 · Incident Response & ForensicsNEW · 22d ago
Test your knowledge · A7
108

Practical, defender-focused control framework: ICS Incident Response, Defensible Architecture, ICS Network Visibility, Secure Remote Access, Risk-Based Vulnerability Management. The de-facto starter list.

GuideIntermediateA14 · OT/ICS SecurityNEW · 1d ago
Test your knowledge · A14
109

Five-stage maturity model (Non-Existent → Compliance → Promoting → Long-Term Sustainment → Metrics) widely used to benchmark awareness programs. Practitioner-tested.

GuideIntermediateA20 · Security Awareness & Human FactorsNEW · 1d ago
Test your knowledge · A20
110
Security OnionSecurity Onion Solutions

Free and open-source Linux distribution for threat hunting, enterprise security monitoring, and log management.

ToolIntermediateA10 · Security OperationsNEW · 1mo ago
Test your knowledge · A10
111

Fast, open-source static analysis tool for finding bugs and enforcing code standards. Supports 30+ languages with custom rules.

ToolIntermediateA4 · Application SecurityNEW · 1mo ago
Test your knowledge · A4
112

Industry-standard tool for external attack surface discovery. Scans the public internet, exposes service banners, supports queries for specific exposures. The reference for EASM tooling questions.

ToolIntermediateA24 · Exposure Management & Attack SurfaceNEW · 1d ago
Test your knowledge · A24
113

Generic signature format for SIEM detection rules. Platform-agnostic detection logic. Questions on detection rule writing, tuning, and false positive management.

ToolIntermediateA11 · Detection Engineering & Threat HuntingNEW · 22d ago
Test your knowledge · A11
114

Annual SOC operations survey: alert volumes, MTTD/MTTR, staffing challenges, tool sprawl. Vendor but based on broad survey data across SOC teams.

GuideIntermediateA10 · Security OperationsNEW · 22d ago
Test your knowledge · A10
115

Consumer rights (know, delete, opt-out of sale), CPRA additions (correct, limit sensitive data). Compare/contrast with GDPR for jurisdiction-specific questions.

FrameworkIntermediateA12 · Data Security, Privacy & ProtectionNEW · 22d ago
Test your knowledge · A12
116

Annual analysis of open source usage and vulnerability data. Key stats on open source in commercial codebases (typically 70-80%+). Grounds supply chain and AppSec questions in real data.

Test your knowledge · A4
117
The Honeynet ProjectThe Honeynet Project

Long-running international research community focused on honeypots and deception research. Source of many open-source honeypot tools (Cowrie, Conpot for ICS).

ToolIntermediateA19 · Cyber Deception & Active DefenseNEW · 1d ago
Test your knowledge · A19
118
FAIR (Factor Analysis of Information Risk)The Open Group / FAIR Institute

Quantitative risk analysis framework. Decomposes risk into Loss Event Frequency and Loss Magnitude. Questions on translating risk into business terms and comparing to qualitative methods.

Test your knowledge · A1
119
Canary Tokens (Thinkst)Thinkst Applied Research

Free, lightweight tripwire tokens (DNS, AWS keys, Word docs, Kubeconfig). Trivial to deploy, high signal — any access is suspicious by definition. The standard reference for canary-style deception.

ToolIntermediateA19 · Cyber Deception & Active DefenseNEW · 1d ago
Test your knowledge · A19
120
Threat Modeling ManifestoThreat Modeling Manifesto authors

Authored by Adam Shostack and other practitioners. Defines values, principles, and patterns for effective threat modeling. The reference for "what is good threat modeling."

GuideIntermediateA25 · Security Architecture & EngineeringNEW · 1d ago
Test your knowledge · A25
121
DoD Cyber Strategy (2023)U.S. Department of Defense

Defend forward, persistent engagement, building partner capacity. Context for military cyber operations questions.

FrameworkIntermediateA17 · Cyber-Electronic WarfareNEW · 22d ago
Test your knowledge · A17
122

Joint doctrine for cyberspace operations: offensive/defensive cyberspace operations, DoDIN ops, command relationships. The U.S. military's authoritative cyber doctrine.

FrameworkIntermediateA17 · Cyber-Electronic WarfareNEW · 1d ago
Test your knowledge · A17
123
NCSC Cyber Security Design PrinciplesUK National Cyber Security Centre

Five top-level principles (establish context, make compromise difficult, make disruption difficult, make compromise detection easier, reduce the impact of compromise) with sub-principles. Concise, vendor-neutral, widely cited in architecture practice.

FrameworkIntermediateA25 · Security Architecture & EngineeringNEW · 1d ago
Test your knowledge · A25
124

Annual report with empirical data on flaw prevalence by language, fix rates, and security debt. Useful for data-driven AppSec questions. Vendor but based on scan data across thousands of orgs.

GuideIntermediateA4 · Application SecurityNEW · 22d ago
Test your knowledge · A4
125

Annual analysis of real breach data. The gold standard for empirical questions about attack patterns, threat actor motivations, and time-to-detection. Updated annually.

Test your knowledge · A7
126

Rule language for identifying malware families by binary patterns and metadata. Foundational for both detection engineering and malware classification.

Test your knowledge · A21
127

Pattern matching tool for malware researchers. Create rules to identify and classify malware based on textual or binary patterns.

ToolIntermediateA11 · Detection Engineering & Threat HuntingNEW · 1mo ago
Test your knowledge · A11
128
Volatility FrameworkVolatility Foundation

Open-source memory forensics framework. Extracts digital artifacts from volatile memory (RAM) dumps.

ToolAdvancedA7 · Incident Response & ForensicsNEW · 1mo ago
Test your knowledge · A7
129

Annual survey of cyber leaders on resilience, workforce, geopolitics, and emerging tech including AI. Excellent for leadership and strategy questions.

Test your knowledge · A1

Ready to test what you've learned?

Our questions are built directly from these resources. Take a quiz and see how your knowledge stacks up.