Cybersecurity career intelligence
Get weekly cybersecurity career intelligence
© 2026 Bespoke Intermedia LLC
Founded by Julian Calvo, Ed.D. · Cybersecurity career intelligence · Est. 2024
Every tool you need to build hands-on cybersecurity skills at zero cost. Organized by skill area with career relevance explained.
Understand how data moves across networks — the foundation of attack detection and response.
Platforms: Windows, macOS, Linux
The industry-standard packet analyzer. Captures and decodes network traffic in real time. Every SOC analyst and network engineer uses it. Start by capturing your own home network to see DNS queries, TCP handshakes, and HTTP traffic.
WHY YOU NEED THIS
Hiring managers expect you to know Wireshark. Packet analysis appears in SOC Level 1 interviews.
Platforms: Windows, macOS, Linux
Network scanner that discovers hosts, open ports, and services. Used in reconnaissance, vulnerability assessments, and network audits. Run it against your home lab to understand port scanning before you encounter it on the defensive side.
WHY YOU NEED THIS
Port scanning is a core concept in Security+ and every hands-on security interview.
Platforms: Linux, macOS
Command-line packet analyzer. Less visual than Wireshark but critical for headless server environments. Used extensively in Linux-heavy SOC and cloud security roles where a GUI isn't available.
WHY YOU NEED THIS
Cloud environments and containers don't have GUIs. Command-line packet capture is an expected skill.
Tools for legally testing systems and finding vulnerabilities before attackers do.
Platforms: VM, bare metal, WSL2, Raspberry Pi
The standard penetration testing operating system. Pre-loaded with 600+ security tools including Metasploit, Nmap, Burp Suite, and John the Ripper. Run it in VirtualBox or VMware for a safe isolated practice environment.
WHY YOU NEED THIS
Any penetration testing role expects you to be comfortable in Kali. It's on every pen test certification study guide.
Platforms: Linux (best), Windows
The most widely used exploitation framework. Contains thousands of exploits, payloads, and auxiliary modules. Use it against DVWA, Metasploitable, or Hack The Box machines — never against systems you don't own or have permission to test.
WHY YOU NEED THIS
Metasploit proficiency appears in PenTest+ and OSCP preparation. Understanding it from the offensive side makes you a better defender.
Platforms: Windows, macOS, Linux
The leading web application security testing platform. Intercepts HTTP traffic between your browser and web apps, letting you inspect, modify, and replay requests. The Community Edition is free and covers most learning scenarios.
WHY YOU NEED THIS
Web app attacks (SQL injection, XSS, CSRF) are in every Security+ and CEH exam. Burp Suite makes these concepts tangible.
Legal, intentionally insecure systems to practice on — no victims, no legal risk.
Platforms: Browser-based (no install needed)
Guided learning platform with pre-built rooms covering networking, web hacking, SOC analysis, and more. The browser-based environment means no local setup required. The free tier has enough content to fill months of study.
WHY YOU NEED THIS
TryHackMe certifications of completion appear on thousands of successful entry-level resumes. Recruiters recognize it.
Platforms: Browser-based (VPN access)
CTF-style platform with realistic vulnerable machines. Harder than TryHackMe — expect to struggle. The free Starting Point machines are perfectly calibrated for beginners learning with Kali Linux.
WHY YOU NEED THIS
Completing Hack The Box machines demonstrates real hands-on skill in a way certifications alone can't. Mention it in interviews.
Platforms: Docker, XAMPP, Linux
Intentionally insecure PHP web application to practice web attack techniques safely on your own machine. Covers SQL injection, XSS, CSRF, file inclusion, and more. Has adjustable difficulty levels.
WHY YOU NEED THIS
Web application attacks are on the OWASP Top 10 and tested in every web security certification. DVWA makes them hands-on.
SIEM, IDS, and log analysis tools used in SOC environments daily.
Platforms: Windows, macOS, Linux
The industry's most common SIEM platform. Ingests logs, runs searches, and generates alerts. The free version handles 500MB of data per day — more than enough to practice log analysis, correlation rules, and dashboard building.
WHY YOU NEED THIS
Splunk appears in 40%+ of SOC Analyst job postings. Hands-on experience gives you a clear interview advantage over candidates who only know it theoretically.
Platforms: Linux, Windows
Free open-source intrusion detection and prevention system (IDS/IPS). Analyzes network traffic against rule sets to detect suspicious activity. Understanding Snort rules teaches you how IDS signatures work — directly applicable to SOC work.
WHY YOU NEED THIS
IDS/IPS concepts appear in Security+ and CySA+. Running Snort gives you practical experience beyond the textbook.
Platforms: Linux, Windows
High-performance network threat detection engine. Handles IDS, IPS, and network security monitoring. More modern than Snort and increasingly common in enterprise environments. Supports Lua scripting for custom detections.
WHY YOU NEED THIS
Threat hunters and advanced SOC roles increasingly use Suricata alongside Splunk for full-spectrum monitoring.
Free frameworks and standards used by GRC Analysts, compliance officers, and security managers.
Platforms: PDF / Web
The National Institute of Standards and Technology's Cybersecurity Framework — the most widely referenced security governance framework in the US. Version 2.0 (2024) expanded its scope to all sectors. Every GRC professional must know it.
WHY YOU NEED THIS
NIST CSF is referenced in virtually every GRC role description. Reading it takes 3–4 hours and immediately makes you more credible.
Platforms: PDF / Web
Security and Privacy Controls for Information Systems — the comprehensive catalog of security controls used by federal agencies and increasingly adopted by private sector organizations. Used in FedRAMP and DoD compliance programs.
WHY YOU NEED THIS
If you're targeting government, federal contracting, or enterprise GRC roles, NIST 800-53 knowledge is expected.
Platforms: PDF / Web
System hardening guides for Windows, Linux, macOS, cloud platforms, and network devices. Practical, actionable configuration recommendations used by security engineers and compliance teams worldwide.
WHY YOU NEED THIS
Security hardening is a core skill. CIS Benchmarks give you a concrete checklist to apply and reference in interviews.
All tools listed are free or have a meaningful free tier. Some links to paid upgrades (TryHackMe, Hack The Box) may be affiliate links. DecipherU may earn a commission at no additional cost to you. Our recommendations are based on career data and industry standards, not affiliate relationships.
Know which tools. Now know which certs.