Monday, January 19, 2015

Open Security Training

Another resource for my fellow autodidacts, tinkerers, people working in resource constrained environments, and those who seek to exercise their innate sense of curiosity.

Current stats:
61 days of open source class materials
28 classes (13 with videos)
24 instructors

Includes What’s New at the Site? to annotate changes and modifications

Beginner Classes
•Android Forensics & Security Testing
•Certified Information Systems Security Professional (CISSP)® Common Body of Knowledge (CBK)® Review
•Flow Analysis & Network Hunting
•Hacking Techniques and Intrusion Detection
•Introductory Intel x86: Architecture, Assembly, Applications, & Alliteration
•Introductory Intel x86-64: Architecture, Assembly, Applications, & Alliteration
•Introduction to ARM
•Introduction to Cellular Security
•Introduction to Network Forensics
•Introduction to Secure Coding
•Introduction to Vulnerability Assessment
•Introduction to Trusted Computing
•Offensive, Defensive, and Forensic Techniques for Determining Web User Identity
•Pcap Analysis & Network Hunting
•Malware Dynamic Analysis
•Secure Code Review
•Smart Cards
•The Life of Binaries
•Understanding Cryptology: Core Concepts
•Understanding Cryptology: Cryptanalysis

Intermediate Classes
•Introduction to Software Exploits (Exploits 1)
•Exploits 2: Exploitation in the Windows Environment
•Intermediate Intel x86: Architecture, Assembly, Applications, & Alliteration

Advanced Classes
•Advanced x86: Virtualization with Intel VT-x
•Introduction to Reverse Engineering Software
•Reverse Engineering Malware
•Rootkits: What they are, and how to find them
•The Adventures of a Keystroke: An in-depth look into keylogging on Windows

External Resources

No comments: