OpenSecurityTraining

In the spirit of OpenCourseWare and the Khan Academy, OpenSecurityTraining.info is dedicated to sharing training material for computer security classes, on any topic, that are at least one day long.
All material is licensed with an open license like CreativeCommons, allowing anyone to use the material however they see fit, so long as they share modified works back to the community.
We highly encourage people who already know these topic areas to take the provided material and pursue paid and unpaid teaching opportunities.
Those who can, teach.

Sort options

Rootkits: What they are, and how to find them (OST)

This class discusses stealth malware techniques used on Windows. Rootkits are a type of stealth malware that try to hide their presence, and this class shows the data structures they manipulate to achieve this.

Exploits 2: Exploitation in the Windows Environment (OST)

A survey of more advanced stack-based memory corruption bugs (e.g. stack overflow), and how they lead to conditions that allow attackers to execute arbitrary code. The class also covers exploit mitigation technologies found in Microsoft Windows and how attackers bypass these techniques.

Intermediate Intel x86: Architecture, Assembly, Applications, & Alliteration (OST)

This class provides a distilled understanding of some OS mechanisms such as memory management, segmentation, paging, interrupts, and port IO. This knowledge is directly relevant for the future Rootkits and Advanced x86: Virtualization with Intel VT-x classes.

Introduction To Reverse Engineering Software (OST)

A class on general reverse engineering methodology, applicable to malicious and non-malicious programs. Heavily focuses on the use of IDA Pro for aiding reverse engineering.

Exploits 1: Introduction To Software Exploits (OST)

A survey of basic stack and heap-based memory corruption bugs (e.g. stack overflow), and how they lead to conditions that allow attackers to execute arbitrary code.

Introductory Intel x86: Architecture, Assembly, Applications, & Alliteration (OST)

Intel processors have been a major force in personal computing for more than 30 years. An understanding of low level computing mechanisms used in Intel chips as taught in this course serves as a foundation upon which to better understand other hardware, as well as many technical specialties such [...]