Security Courses#
The best courses to learn how to cyber security are open. So open access. Open access (OA) means freely available, online and without borders as a required registration.
We only collect real open open access security courses that use a Creative Commons license.
Tip
Instead of creating yet another cyber security training or course, why not making an existing training resources better?
Courses#
Applied Cryptography 101: Building Blocks
An introductory course on the fundamental cryptographic primitives: symmetric-key encryption, message authentication codes, authenticated encryption, hash functions, key establishment, public-key encryption, and digital signatures.
Basic course on security awareness
This is not a course like many others. This digital security course (or “security awareness”) will allow you to find out what are the correct behaviors to keep to manage information securely.
CTF Field Guide
Learn to win at Capture The Flag (CTF). These competitions distill major disciplines of professional computer security work into short, objectively measurable exercises. The focus areas that CTF competitions tend to measure are vulnerability discovery, exploit creation, toolkit creation, and operational tradecraft. Repository: trailofbits/ctf
CTFtime
Great site with an archive of many Capture The Flag (CTF) competitions. See the best teams, players and find competitions. A real complete archive of past and future CTF events.
Capture The Flag 101
Capture The Flags, or CTFs, are a kind of computer security competition. Teams of competitors (or just individuals) are pitted against each other in a test of computer security skill. In this guide/wiki/handbook you’ll learn the techniques, thought processes, and methodologies you need to succeed in Capture the Flag competitions.
Computer Networks: A Systems Approach
Great resource for learning all about network security. For starters and full professionals. Sources of this book are on SystemsApproach/book Created by Larry Peterson and Bruce Davie.
Data Protection
Course on protecting the confidentiality of sensitive data shared on a blockchain network.
Developing Secure Software
The “Developing Secure Software” (LFD121) course is available on the Linux Foundation Training & Certification platform. It focuses on the fundamentals of developing secure software. Both the course and certificate of completion are free.
Digital Identity
This module covers considerations and questions to guide the design of a responsible digital identity system as it relates to blockchain for supply chain.
MITRE:Cyber Threat Intelligence Training
Great cyber threat intelligence (CTI) for everyone who is active in a large (governmental)organisation. The training contains five modules that consist of videos and exercises.
Malware Analysis
Developed and used by RPISEC to teach Malware Analysis. Free to use and to improve.
OWASP Juice Shop
OWASP Juice Shop: Probably the most modern and sophisticated insecure web application. This application can be used in security trainings or awareness trainings. The Juice Shop encompasses vulnerabilities from the OWASP Top Ten along with many other security flaws as present in many real world applications…
Open-Source Phishing Framework
Gophish is an open-source phishing toolkit designed for businesses and penetration testers. It provides the ability to quickly and easily setup and execute phishing engagements and security awareness training. Download the toolkit from: Ne0nd0g/gophish
Security By Design
This Security by Design playbook outlines the core elements of the Security by Design methodology. This playbook is initially created by the same team that started in 2015 with this open Security Reference Architecture. Join the community: nocomplexity/securitybydesign
Security awareness base course
Nice awareness training. Created by the an Italian Govermental organisation. Note you need to install Hugo first in order to launch te course.
Security risks of untrusted WiFi networks
Is Untrusted (Public) WiFi Safe? A question that divides security professionals. A great learning quizz for everyone!
Sha256 algorithm explained
Simple is often the best. This internet page is dedicated to learn you the SHA256 algorithm. The site will help you understand how a sha256 hash is calculated from start to finish. All is done online in your browser and step by step visually. Source code: dmarman/sha256algorithm
The Animated Elliptic Curve
Visuals always help when learning a new concept. This page guides you with great visuals through the essentials of Elliptic Curve Cryptography.
The Cyber Law Toolkit
The Cyber Law Toolkit is a dynamic interactive web-based resource for legal professionals who work with matters at the intersection of international law and cyber operations.
The Fuzzing Book
Software has bugs, and catching bugs can involve lots of effort. This book addresses this problem by automating software testing, specifically by generating tests automatically. You can interact with chapters as Jupyter Notebooks. Git repository: uds-se/fuzzingbook
The Illustrated TLS 1.3 Connection
TLS can be black magic. So learning the details of the protocol helps. This great tutorial guides you with great visuals through your TLS journey. In this demonstration a client connects to a server, negotiates a TLS 1.3 session, sends “ping”, receives “pong”, and then terminates the session.
Wargames
The wargames offered by the OverTheWire community can help you to learn and practice security concepts in the form of fun-filled games. All OSS with the code on Github.
Wireshark Labs
This course is a Supplement to the book Computer Networking: A Top-Down Approach, 8th ed., J.F. Kurose and K.W. Ross. The version 8.1 Wireshark labs have been significantly modernized and updated in 2021, and come with new Wireshark traces files taken in 2021.
eBPF.party
Learn eBPF through hands-on exercises. Write, compile, and run programs directly from your browser. Repository at DavidVentura/ebpf.party