Security Courses

Contents

Security Courses#

The best courses to learn how to cyber security are open. So open access. Open access (OA) means freely available, online and without borders as a required registration.

We only collect real open open access security courses that use a Creative Commons license.

Tip

Instead of creating yet another cyber security training or course, why not making an existing training resources better?

Courses#

Applied Cryptography 101: Building Blocks

An introductory course on the fundamental cryptographic primitives: symmetric-key encryption, message authentication codes, authenticated encryption, hash functions, key establishment, public-key encryption, and digital signatures.

https://cryptography101.ca/crypto101-building-blocks/

Basic course on security awareness

This is not a course like many others. This digital security course (or “security awareness”) will allow you to find out what are the correct behaviors to keep to manage information securely.

https://teamdigitale.github.io/security-awareness/en/

CTF Field Guide

Learn to win at Capture The Flag (CTF). These competitions distill major disciplines of professional computer security work into short, objectively measurable exercises. The focus areas that CTF competitions tend to measure are vulnerability discovery, exploit creation, toolkit creation, and operational tradecraft. Repository: trailofbits/ctf

CTFtime

Great site with an archive of many Capture The Flag (CTF) competitions. See the best teams, players and find competitions. A real complete archive of past and future CTF events.

https://ctftime.org/

Capture The Flag 101

Capture The Flags, or CTFs, are a kind of computer security competition. Teams of competitors (or just individuals) are pitted against each other in a test of computer security skill. In this guide/wiki/handbook you’ll learn the techniques, thought processes, and methodologies you need to succeed in Capture the Flag competitions.

https://ctf101.org/

Computer Networks: A Systems Approach

Great resource for learning all about network security. For starters and full professionals. Sources of this book are on SystemsApproach/book Created by Larry Peterson and Bruce Davie.

Data Protection

Course on protecting the confidentiality of sensitive data shared on a blockchain network.

https://widgets.weforum.org/blockchain-toolkit/data-protection/index.html

Developing Secure Software

The “Developing Secure Software” (LFD121) course is available on the Linux Foundation Training & Certification platform. It focuses on the fundamentals of developing secure software. Both the course and certificate of completion are free.

https://training.linuxfoundation.org/training/developing-secure-software-lfd121/

Digital Identity

This module covers considerations and questions to guide the design of a responsible digital identity system as it relates to blockchain for supply chain.

https://widgets.weforum.org/blockchain-toolkit/digital-identity/index.html#q01

MITRE:Cyber Threat Intelligence Training

Great cyber threat intelligence (CTI) for everyone who is active in a large (governmental)organisation. The training contains five modules that consist of videos and exercises.

https://attack.mitre.org/resources/training/cti/

Malware Analysis

Developed and used by RPISEC to teach Malware Analysis. Free to use and to improve.

https://github.com/RPISEC/Malware

OWASP Juice Shop

OWASP Juice Shop: Probably the most modern and sophisticated insecure web application. This application can be used in security trainings or awareness trainings. The Juice Shop encompasses vulnerabilities from the OWASP Top Ten along with many other security flaws as present in many real world applications…

http://owasp-juice.shop

Open-Source Phishing Framework

Gophish is an open-source phishing toolkit designed for businesses and penetration testers. It provides the ability to quickly and easily setup and execute phishing engagements and security awareness training. Download the toolkit from: Ne0nd0g/gophish

Security By Design

This Security by Design playbook outlines the core elements of the Security by Design methodology. This playbook is initially created by the same team that started in 2015 with this open Security Reference Architecture. Join the community: nocomplexity/securitybydesign

Security awareness base course

Nice awareness training. Created by the an Italian Govermental organisation. Note you need to install Hugo first in order to launch te course.

https://github.com/teamdigitale/security-awareness

Security risks of untrusted WiFi networks

Is Untrusted (Public) WiFi Safe? A question that divides security professionals. A great learning quizz for everyone!

https://lolwifi.network/

Sha256 algorithm explained

Simple is often the best. This internet page is dedicated to learn you the SHA256 algorithm. The site will help you understand how a sha256 hash is calculated from start to finish. All is done online in your browser and step by step visually. Source code: dmarman/sha256algorithm

The Animated Elliptic Curve

Visuals always help when learning a new concept. This page guides you with great visuals through the essentials of Elliptic Curve Cryptography.

https://curves.xargs.org/

The Cyber Law Toolkit

The Cyber Law Toolkit is a dynamic interactive web-based resource for legal professionals who work with matters at the intersection of international law and cyber operations.

https://cyberlaw.ccdcoe.org/wiki/Main_Page

The Fuzzing Book

Software has bugs, and catching bugs can involve lots of effort. This book addresses this problem by automating software testing, specifically by generating tests automatically. You can interact with chapters as Jupyter Notebooks. Git repository: uds-se/fuzzingbook

The Illustrated TLS 1.3 Connection

TLS can be black magic. So learning the details of the protocol helps. This great tutorial guides you with great visuals through your TLS journey. In this demonstration a client connects to a server, negotiates a TLS 1.3 session, sends “ping”, receives “pong”, and then terminates the session.

https://tls13.xargs.org/

Wargames

The wargames offered by the OverTheWire community can help you to learn and practice security concepts in the form of fun-filled games. All OSS with the code on Github.

http://overthewire.org/wargames/

Wireshark Labs

This course is a Supplement to the book Computer Networking: A Top-Down Approach, 8th ed., J.F. Kurose and K.W. Ross. The version 8.1 Wireshark labs have been significantly modernized and updated in 2021, and come with new Wireshark traces files taken in 2021.

https://gaia.cs.umass.edu/kurose_ross/wireshark.php

eBPF.party

Learn eBPF through hands-on exercises. Write, compile, and run programs directly from your browser. Repository at DavidVentura/ebpf.party