Learning Resources

Learning Resources – Cybersecurity, Ethical Hacking & Networking

20 Feb 2026
Learning Resources – Cybersecurity, Ethical Hacking & Networking

Cybersecurity is a field that constantly evolves. New technologies appear, systems grow more complex, and new threats emerge. Because of this, learning never really stops. What makes the field especially rewarding is the opportunity to continuously explore, understand, and improve how digital systems function and how they can be protected.

This page collects resources, platforms, frameworks, and tutorials that are widely used in cybersecurity education and professional environments. Many of them are excellent starting points for students, professionals, and anyone curious about IT security, networking, and ethical hacking.

Why IT and Cybersecurity Inspire Me

What fascinates me about IT is the complexity and structure behind modern systems. Networks, servers, cloud services, and applications all interact in ways that are both intricate and elegant. Understanding how these systems function — and how they can be secured — is something I find deeply rewarding.

Ethical hacking encourages curiosity and responsibility. Instead of simply using technology, you learn how systems work internally, where vulnerabilities may appear, and how they can be prevented or fixed before they become real threats.

Networking is another area that inspires me. The fact that information travels across global infrastructure in milliseconds highlights how important stable and secure networks are for modern society.

Personal Goals

My long-term goal is to continue developing my knowledge within cybersecurity and IT infrastructure.

After completing my current education, I plan to pursue a Bachelor’s degree in IT by studying independent university courses in Sweden through distance and online learning and combining them into a full academic degree.

After that, I hope to continue my education by applying to the Master’s programme in Cyber Security at Luleå University of Technology (LTU) at the Skellefteå campus.

For me, studying IT is not only about formal qualifications but about curiosity, problem solving, and continuous learning.

Continuous Learning

Cybersecurity is not a destination but an ongoing journey. New technologies, new vulnerabilities, and new defense techniques appear every year.

Staying curious, learning from the community, and practicing regularly are essential parts of developing cybersecurity skills. The resources below represent some of the platforms, frameworks, and communities that help people grow in the field.

Security Frameworks & Methodologies

Understanding structured security frameworks is important for anyone working in cybersecurity.

MITRE ATT&CK Framework https://attack.mitre.org

A globally recognized knowledge base describing attacker tactics and techniques based on real-world observations.

OWASP Top 10 https://owasp.org/www-project-top-ten/

OWASP Top 10 lists the most critical web application security risks. It is widely used by developers and security professionals to understand common vulnerabilities such as injection attacks, authentication failures, and insecure configurations.

NIST Cybersecurity Framework https://www.nist.gov/cyberframework

The NIST Cybersecurity Framework provides structured guidelines for managing cybersecurity risks. It is widely used by organizations and government agencies to build strong security programs.

Threat Intelligence & Internet Exposure Tools

Understanding how systems appear on the public internet is important for security professionals.

Shodan https://www.shodan.io

Shodan is often described as a search engine for internet-connected devices. It allows researchers to discover exposed services, servers, and devices across the internet.

SOC Analyst Learning Path

Security Operations Centers (SOC) monitor and respond to cyber threats within organizations. A typical learning path for SOC analysts includes:

  • Networking fundamentals
  • Linux system administration
  • Log analysis
  • SIEM platforms
  • Threat intelligence
  • Incident response
  • MITRE ATT&CK mapping
  • Useful learning platforms include:

    TryHackMe SOC Level 1 path https://tryhackme.com

    Microsoft Sentinel learning paths https://learn.microsoft.com

    Splunk training resources https://www.splunk.com/en_us/training.html

    Hands-On Ethical Hacking Platforms

    Learning cybersecurity effectively requires practical exercises.

    TryHackMe https://tryhackme.com

    Provides guided labs covering networking, Linux, ethical hacking tools, and defensive security techniques.

    Hack The Box https://www.hackthebox.com

    Offers realistic penetration testing environments used by students and security professionals worldwide.

    Bug Bounty Platforms

    Bug bounty programs allow security researchers to report vulnerabilities responsibly and help organizations improve their security.

    HackerOne https://www.hackerone.com

    One of the largest vulnerability disclosure platforms where researchers can report security issues to companies.

    Bugcrowd https://www.bugcrowd.com

    Another major platform where ethical hackers participate in vulnerability research programs.

    Open-Source Cybersecurity Labs

    Hands-on labs help build practical cybersecurity skills.

    Security Onion https://securityonion.net

    An open-source platform for threat detection, network monitoring, and log analysis.

    DetectionLab https://github.com/clong/DetectionLab

    A powerful open-source lab environment used for practicing detection engineering and SIEM monitoring.

    Metasploitable https://sourceforge.net/projects/metasploitable/

    A deliberately vulnerable virtual machine used for penetration testing practice.

    SIEM & Security Monitoring Learning

    Security monitoring is an essential part of cybersecurity operations.

    Microsoft Sentinel (SIEM) https://learn.microsoft.com/en-us/azure/sentinel/

    A cloud-native SIEM platform used for threat detection, incident response, and log analysis.

    Elastic Security / ELK Stack https://www.elastic.co/security

    Used for centralized logging, monitoring, and threat detection.

    Splunk Security Training https://www.splunk.com/en_us/training.html

    Provides training resources for learning log analysis and security monitoring.

    Kali Linux & Ethical Hacking Tools

    Kali Linux is widely used in cybersecurity education and penetration testing.

    https://www.kali.org/docs/

    Common tools include:

  • Nmap
  • Wireshark
  • Burp Suite
  • Metasploit
  • Hydra
  • Aircrack-ng
  • Learning these tools helps security professionals understand vulnerabilities and improve system security.

    Cisco Networking & Security Learning

    Networking knowledge is essential for cybersecurity.

    Popular certifications include:

  • CCNA – Cisco Certified Network Associate
  • CCNP Security
  • Cisco CyberOps Associate
  • Preparation courses can often be found on:

    https://www.udemy.com https://www.netacad.com

    Cybersecurity Certification Paths

    Professional certifications help demonstrate cybersecurity knowledge and skills.

    Entry level certifications include:

    CompTIA Security+ CompTIA Network+ CompTIA Linux+

    Typical exam price is usually around $350–$425 USD depending on the certification.

    Intermediate certifications include:

    CompTIA CySA+ CompTIA PenTest+ Certified Ethical Hacker (CEH)

    Advanced certifications include:

    CISSP OSCP CISM CASP+

    Certification Exams in Sweden

    Most cybersecurity certification exams can be taken through Pearson VUE test centers.

    https://home.pearsonvue.com

    Testing centers are available in cities such as:

    Stockholm Göteborg Malmö Lund Uppsala

    Many certifications can also be taken through remote proctoring.

    YouTube Channels for Cybersecurity Learning

    NetworkChuck https://www.youtube.com/@NetworkChuck

    David Bombal https://www.youtube.com/@davidbombal

    John Hammond https://www.youtube.com/@_JohnHammond

    The Cyber Mentor (TCM Security) https://www.youtube.com/@TCMSecurityAcademy

    LiveOverflow https://www.youtube.com/@LiveOverflow

    Resources for Children and Young Learners

    Technology education can begin early, and introducing children to programming, networking, and cybersecurity in a responsible way can inspire curiosity and creativity.

    Scratch (MIT) https://scratch.mit.edu

    Code.org https://code.org

    CyberStart https://cyberstart.com

    These platforms are designed for younger learners and can help parents encourage children to explore technology safely and responsibly while developing logical thinking and problem-solving skills.

    / Daniel Ölund, 12th of March 2026

    Author
    Daniel Ölund