Platform
Explore
PLATFORM
Platform
ELITE TECHNOLOGY
AI-Engine
INTELLIGENT TOOLS
Rapid7 Labs
TRUSTED INTELLIGENCE
SOLUTIONS
Managed Threat Complete
MANAGED XDR
Surface Command
ATTACK SURFACE MANAGEMENT
Exposure Command
EXPOSURE MANAGEMENT
Products
Request Demo
DETECTION & RESPONSE
Next-Gen SIEM
INSIGHTIDR
Threat Intelligence
THREAT COMMAND
EXPOSURE MANAGEMENT
Exposure Management
EXPOSURE COMMAND
Attack Surface Management
SURFACE COMMAND
Vulnerability Management
INSIGHTVM
Cloud-Native Application Protection
INSIGHTCLOUDSEC
Application Security Testing
INSIGHTAPPSEC
Services
Request Demo
DETECTION & RESPONSE
Managed XDR
MANAGED THREAT COMPLETE
Incident Response Services
EXPERIENCING A BREACH?
EXPOSURE MANAGEMENT
Managed Vulnerability Management
OPTIMIZED RISK ASSESSMENT
Managed Application Security
MANAGED DAST
Continuous Red Teaming
VECTOR COMMAND
Penetration Testing Services
TEST YOUR DEFENSES
Resources
READ NOW
STAY CURRENT
About Rapid7 Labs
MEET THE RESEARCH TEAM
Events & Webinars
CATCH US LIVE
Resources Library
DIVE INTO THE DETAILS
The Rapid7 Blog
STAY UP-TO-DATE
Exploit Database
SEARCH THOUSANDS OF CVES
Cybersecurity Fundamentals
LEARN THE BASICS
PRODUCT SUPPORT
Contact Sales
TALK TO AN EXPERT
Customer Support Portal
CONTACT SUPPORT
Product Integrations
CONNECT EVERYTHING
Product Documentation
PRODUCT AND SERVICES GUIDES
Product Release Notes
LATEST FEATURES
Company
OVERVIEW
About Us
OUR STORY
Leadership
EXECUTIVE TEAM & BOARD
News & Press Releases
THE LATEST FROM OUR NEWSROOM
Careers
JOIN RAPID7
Our Customers
Their Success Stories
Partners
Rapid7 Partner Ecosystem
Investors
Investor Relations
COMMUNITY & CULTURE
Social Good
OUR COMMITMENT & APPROACH
Rapid7 Cybersecurity Foundation
BUILDING THE FUTURE
Diversity, Equity & Inclusion
EMPOWERING PEOPLE
Open Source
STRENGTHENING CYBERSECURITY
Public Policy
ENGAGEMENT & ADVOCACY
Boston Bruins
Our Partnership
Partners
en
English
Deutsch
日本語
Sign In
Explore Platform
Platform
Explore
PLATFORM
Platform
ELITE TECHNOLOGY
AI-Engine
INTELLIGENT TOOLS
Rapid7 Labs
TRUSTED INTELLIGENCE
SOLUTIONS
Managed Threat Complete
MANAGED XDR
Surface Command
ATTACK SURFACE MANAGEMENT
Exposure Command
EXPOSURE MANAGEMENT
Products
Request Demo
DETECTION & RESPONSE
Next-Gen SIEM
INSIGHTIDR
Threat Intelligence
THREAT COMMAND
EXPOSURE MANAGEMENT
Exposure Management
EXPOSURE COMMAND
Attack Surface Management
SURFACE COMMAND
Vulnerability Management
INSIGHTVM
Cloud-Native Application Protection
INSIGHTCLOUDSEC
Application Security Testing
INSIGHTAPPSEC
Services
Request Demo
DETECTION & RESPONSE
Managed XDR
MANAGED THREAT COMPLETE
Incident Response Services
EXPERIENCING A BREACH?
EXPOSURE MANAGEMENT
Managed Vulnerability Management
OPTIMIZED RISK ASSESSMENT
Managed Application Security
MANAGED DAST
Continuous Red Teaming
VECTOR COMMAND
Penetration Testing Services
TEST YOUR DEFENSES
Resources
READ NOW
STAY CURRENT
About Rapid7 Labs
MEET THE RESEARCH TEAM
Events & Webinars
CATCH US LIVE
Resources Library
DIVE INTO THE DETAILS
The Rapid7 Blog
STAY UP-TO-DATE
Exploit Database
SEARCH THOUSANDS OF CVES
Cybersecurity Fundamentals
LEARN THE BASICS
PRODUCT SUPPORT
Contact Sales
TALK TO AN EXPERT
Customer Support Portal
CONTACT SUPPORT
Product Integrations
CONNECT EVERYTHING
Product Documentation
PRODUCT AND SERVICES GUIDES
Product Release Notes
LATEST FEATURES
Company
OVERVIEW
About Us
OUR STORY
Leadership
EXECUTIVE TEAM & BOARD
News & Press Releases
THE LATEST FROM OUR NEWSROOM
Careers
JOIN RAPID7
Our Customers
Their Success Stories
Partners
Rapid7 Partner Ecosystem
Investors
Investor Relations
COMMUNITY & CULTURE
Social Good
OUR COMMITMENT & APPROACH
Rapid7 Cybersecurity Foundation
BUILDING THE FUTURE
Diversity, Equity & Inclusion
EMPOWERING PEOPLE
Open Source
STRENGTHENING CYBERSECURITY
Public Policy
ENGAGEMENT & ADVOCACY
Boston Bruins
Our Partnership
Partners
en
English
Deutsch
日本語
Sign In
Explore Platform
Home
Fundamentals
Extend Your Knowledge with Our Cybersecurity Fundamentals
Search our library of topics to stay on top of cybersecurity best practices, guides and more.
Most Popular Topics
What is Managed Detection and Response (MDR)?
Managed Security
Read Topic
Ransomware Guide
Common Cyberattacks
Read Topic
What is Vulnerability Management?
Vulnerability Risk Management
Read Topic
Attack Surface Management
Proactive Exposure Management
Read Topic
Exposure Management
Proactive Exposure Management
Read Topic
Cloud Native Application Protection Platform (CNAPP)
Cloud Security
Read Topic
All Cybersecurity Topics
116 Topics
Detection & Response
Extended Detection and Response (XDR)
Threat Detection
Network Security
Network Detection and Response (NDR)
Network Traffic Analysis
Zero Trust Security
MITRE ATT&CK Framework
Gartner Magic Quadrant for SIEM
Security Information & Event Management (SIEM)
Log Management
User and Entity Behavior Analytics
Threat Intelligence
Dark Web
Incident Response
Indicators of Compromise (IOCs)
Endpoint Security
Endpoint Security
Next Generation Antivirus (NGAV)
Digital Forensics and Incident Response (DFIR)
Threat Hunting
Intrusion Detection and Prevention Systems (IDPS)
Managed Security
Managed Detection and Response (MDR)
Managed Security Service Providers (MSSP)
SOC as a Service (SOCaaS)
Managed Extended Detection and Response (MXDR)
Proactive Exposure Management
Exposure Management
Attack Surface
Attack Surface Management (ASM)
External Attack Surface Management (EASM)
Cyber Asset Attack Surface Management (CAASM)
Digital Risk Protection (DRP)
Continuous Threat Exposure Management (CTEM)
Attack Path Analysis
Breach and Attack Simulation (BAS)
Red Team
Blue Team
Purple Team
Shadow IT
Exposure Assessment Platforms (EAPs)
Cloud Security
What is Cloud Security?
Cloud Detection and Response (CDR)
Cloud Risk Management
Cloud Migration
Cloud Network Security
AWS Cloud Security
Azure Cloud Security
Google Cloud Platform (GCP) Security
Identity and Access Management (IAM)
Least Privilege Access (LPA)
Cloud Infrastructure Entitlement Management (CIEM)
Cloud Security Posture Management (CSPM)
Cloud Workload Protection Platform (CWPP)
Cloud Native Application Protection Platform (CNAPP)
Infrastructure-as-Code (IaC)
Kubernetes Security
Kubernetes Security Posture Management (KSPM)
Container Security
Cloud Compliance
Shared Responsibility Model
Data Security
Data Security
Data Loss Prevention (DLP)
Data Encryption
Data Leakage
Network Access Control (NAC)
Vulnerability Risk Management
Vulnerability Management
Vulnerability Management Program Framework
Vulnerabilities, Exploits, and Threats
Patch Management
Cybersecurity Risk Management
Vulnerability Prioritization Technology (VPT)
Application Security
Dynamic Application Security Testing (DAST)
Web Application Security
Web Application Security Testing
Application Security Testing Programs
Web Application Vulnerabilities
What is API Security?
What is DevSecOps?
Runtime Application Self-Protection (RASP)
Software Development Life Cycle (SDLC)
Web Application Firewalls
Continuous Integration and Continuous Delivery (CI/CD)
SOAR
Security Automation
Security Orchestration
What is ChatOps?
Security Program Basics
What is Cybersecurity?
Security Program Basics
Security Operations Center (SOC)
Security Awareness Training
System Monitoring and Troubleshooting
Governance, Risk, and Compliance
Compliance and Regulatory Frameworks
NIST Cybersecurity Frameworks
Information Security Risk Management
General Data Protection Regulation (GDPR)
CIS Critical Security Controls
NYDFS Cybersecurity Regulation
SOC Reports
Offensive Security
Deception Technology
Honeypots
Penetration Testing
Penetration Testing Tools
Common Cyberattacks
Types of Cybersecurity Attacks
Kerberoasting Attack
Ransomware
Cross-Site Scripting
Cross-Site Request Forgery
Denial-of-Service Attacks
Brute-Force and Dictionary Attacks
Phishing Attacks
Whaling Phishing Attacks
Spear Phishing Attacks
Spoofing Attacks
Man-in-the-Middle (MITM) Attacks
SQL Injection Attacks (SQLi)
Malware Attacks
Supply Chain Attack
Threat Actor
Zero Day Attack