Training#
Training resources.
Software#
This page lists all projects in this category. Use the index of all projects, the sidebar, or click on tags to browse other categories.
10 Types of Application Security Testing Tools#
List of different application security testing tools and methods.
A Graduate Course in Applied Cryptography Book#
“Throughout the book we present many case studies to survey how deployed systems operate. We describe common mistakes to avoid as well as attacks on real-world systems that illustrate the importance of rigor in cryptography.”
By Dan Boneh and Victor Shoup.
Antisyphon Training#
Approachable, accessible, and affordable public and private training.
Awesome CTF#
“A curated list of Capture The Flag (CTF) frameworks, libraries, resources, softwares and tutorials.”
Backdoors & Breaches#
Incident response card game. Can buy card deck or play online.
Clark#
Largest platform for building and sharing free cybersecurity curriculum.
CMD Challenge#
“Test your shell knowledge by taking the CMD Challenge”
Codecademy Cybersecurity#
Contains multiple cybersecurity focused courses.
Competitive Programmer’s Handbook#
“The purpose of this book is to give you a thorough introduction to competitive programming.”
By Antti Laaksonen.
Computer Systems Security: Planning For Success#
“The text, labs, and review questions in this book are designed as an introduction to the applied topic of computer security.”
By Ryan Tolboom.
Cybersecurity Guide#
A collection of guides on different cybersecurity career paths and certifications.
ForeverCTF#
CTF that is up indefinitely for practice.
GCA Cybersecurity Toolkit#
A toolkit to help improve your personal cyber hygiene.
Google Dorking Tutorial#
Tutorial on Google “dorking” which is the art of using search operators to find what you want.
HackTheBox#
Test your skills against a variety of hacking labs!
HackTricks#
Collection of hacking tricks: e.g reverse shells, encoded text for web, etc.
How To Secure A Linux Server#
“An evolving how-to guide for securing a Linux server.”
DNS Remote Code Execution#
Video series exploiting WAN vulnerabilities in network devices.
Intro to Binary Exploitation#
Intro to Binary Exploitation video series.
Kontra Application Security Training#
Interactive application security training.
Kurose/Ross Networking Book#
Material on understanding computer networks.
By Jim Kurose and Keith Ross.
learnpython.org#
Python references and tutorials.
Linux auditd for Threat Detection#
Blog post on configuring auditd on Linux systems.
Metasploitable#
“Metasploitable is an intentionally vulnerable Linux virtual machine.”
NCAE CyberGames#
“NCAE Cyber Games is dedicated to inspiring college students to enter the exciting (and sometimes profitable!) realm of cyber competitions.”
CISA National Initiative for Cybersecurity Careers and Studies#
“NICCS is the premier online resource for cybersecurity training, education, and career information.”
Nightmare Bin/Rev Guide#
Nightmare is an intro to binary exploitation / reverse engineering course based around ctf challenges.
OSINT Techniques Book#
“Resources for Uncovering Online Information”
By Michael Bazzell.
OverTheWire#
Learn Linux basics through fun-filled games.
Payloads All The Things#
“A list of useful payloads and bypasses for Web Application Security.”
PentesterLab#
Learn how to manually exploit web applications!
picoGym#
CTF that is up indefinitely for practice.
PortSwigger Web Security Academy#
Free, online web security training from the creators of BurpSuite!
Secure the Future#
Palo Alto Network’s academic cybersecurity competition.
Security Certification Roadmap#
A roadmap of differnet cybersecurity certifications.
shellscript.sh#
Tutorials for bash scripting.
Snyk CTF 101 Workshop#
“Check out this hands-on, virtual workshop to learn how to solve Capture the Flag (CTF) challenges, including pwn and web. After the workshop, you’ll have the security skills and experience to compete in CTFs.”
Splunk Work+ Training#
1 year of free Splunk SIEM Training for NJIT students.
Courses should come up as $0. If not, send and email to education@splunk.com.
TryHackMe#
Hand-on cyber security training through real-world scenarios.
VulnHub#
Collection of vulnerable VM images.