US Government Resources

NOTE: Some of these, such as NIST documents, may be listed below in topical areas.

Ethical Hacking Educational Resources

Following is a list of Web sites that provide learning resources for ethical hacking.

  • Learn How To Hack – Ethical Hacking Resources | HackerOne

  • The Ultimate Guide to Ethical Hacking – InfoSec Resources

  • Ethical Hacking Resources | IEEE Innovation at Work

  • Top Resources To Learn Ethical Hacking

General Resources

Security Blogs






Planning for Security and Contingencies


·         Contingency Planning Guide for Federal Information Systems —

·         Guide for Developing Security Plans for Federal Information Systems —

·         Computer Security Incidents: Assessing, Managing, And Controlling The Risks – ITL Security Bulletin —

·         Techniques for System and Data Recovery – ITL Security Bulletin —

·         System and Network Security Acronyms and Abbreviations —

·         Guide to Integrating Forensic Techniques into Incident Response —

·         Office of the President of the United States: International Strategy for Cyberspace —



Information Security Policy




Developing the Security Program




Security Management Models




Security Management Practices




Risk Management: Identifying and Controlling Risk













Vulnerabilities and Threats


·         Guide to Malware Incident Prevention and Handling —

·         National Vulnerability Database: Helping Information Technology System Users And Developers Find Current Information About Cyber Security Vulnerabilities – ITL Security Bulletin —

·         Creating A Program To Manage Security Patches And Vulnerabilities: NIST Recommendations For Improving System Security – ITL Security Bulletin —

·         Norton Cybercrime Report 2011 —


Protection Mechanisms


·         Federal Agency Use of Public Key Technology for Digital Signatures and Authentication —

·         Guideline for Implementing Cryptography in the Federal Government —

·         DoD Cyber Protect Network Security Game —

·         TLS – Transport Layer Security —

·         SSL Certificates —

· Free Online Antivirus, Spyware and Firewall reviews —



Personnel and Security



  • How to Become CISM Certified


  • How to Become CISA Certified






Security Law and Ethics








Trend Micro’s Botnet Connection Dashboard

Akamai real time web monitor

FireEye’s map shows attacks as they happen

Checkpoint Threat live map


Industry Vendor Collaborations




Oracle Academy


Amazon AWS Educate


IBM Skills Academy


Checkpoint Secure Academy


Palo Alto Network Cybersecurity Academy


Splunk Higher Education Academic Licenses