|[Arizona Cyber Warfare Range](http://azcwr.org/)|The ranges offer an excellent platform for you to learn computer network attack (CNA), computer network defense (CND), and digital forensics (DF). You can play any of these roles.|
98
98
|[Avatao](https://www.avatao.com/)|More than 350 hands-on challenges (free and paid) to master IT security and it's growing day by day.|
99
99
|[BodgeIt Store](https://github.com/psiinon/bodgeit)|The BodgeIt Store is a vulnerable web application which is currently aimed at people who are new to pen testing.|
100
-
|[Bright Shadows](http://www.bright-shadows.net/)|Training in Programming, JavaScript, PHP, Java, Steganography, and Cryptography (among others).|
101
100
|[bWAPP](http://www.itsecgames.com/)|bWAPP, or a buggy web application, is a free and open source deliberately insecure web application.|
102
101
|[Cyber Degrees](http://www.cyberdegrees.org/resources/free-online-courses/)|Free online cyber security Massive Open Online Courses (MOOCS).|
103
102
|[Commix testbed](https://github.com/commixproject/commix-testbed)|A collection of web pages, vulnerable to command injection flaws.|