Skip to main content

    Start here

    We will build out a full role-based and industry-based reading order over the coming months. For now, here is the practitioner-recommended starting path.

    If you are an end-user (any role)

    Start with phishing — it is the attack you are most likely to encounter:

    If you are in finance, AP, treasury or executive support

    BEC is the single highest-financial-impact attack. Start there, then add the broader phishing context:

    If you are an IT admin or security lead

    Read the modules above for end-user context, then use them as a controls checklist for your environment. Watch for the upcoming clusters on passwords/auth and cloud/SaaS.

    More modules and a role-based reading path are coming.

    Need an adversary in your environment?

    HackersHub runs paid red-team engagements.

    Talk to an expert

    This module is HackersHub-endorsed exactly as you see it here, watermark and all. Free under CC-BY-ND 4.0. Edit the content? Remove our watermark first. — The HackersHub team View license details.