I Traded This to Save You a Student Loan in Cybersecurity
Share

General Cyber Security Courses/Training/Resources.
###if you liked this you might want to try this click###
Amazing Resources For Learning
FSU Course
RPI Classes
MIT OpenCourseWare
Linux Stuff
Complete Noob Intro to Cyber Security
Programming/Comp Sci/SE Things
Programming Courses and Tutorials
Specific Programming Language Stuff (C/C++/Python/Java/etc)
C Stuff
GT Recommended
Books and References
Translation Phases
Style Things
Coding Standards
Other Useful Things
c preprocessor - #define macro for debug printing in C? - Stack Overflow
Useful Tutorials and Tools
Data Structures
Embedded Programming
Pointer Stuff
Courses
C++ Stuff
Good Learning Material
Books
Beginner Books
Intermediate Books
Courses
Translation Phases
Best Practices
Pass By Reference vs Pass By Value
c++ - Why is list initialization (using curly braces) better than the alternatives? - Stack Overflow
Coding Standards
Data Structures
Memory Management
Smart Pointers
Solutions to Problems
Python
Courses
Videos To Learn From
Advanced Python Style/OOP Stuff
Python Issue Fixes
Useful Python things
Numpy/SciPy
Profiling/Timing
Projects
Books
Java Stuff
Data Structures
Rust
x86 Assembly
Full Stack Development
Front End Development
JavaScript
Frameworks
Unix Stuff (Shell Stuff)
Courses
Intro Courses/Tutorials/Books
Books
Harvard Stuff (CS 50)
Carnegie Mellon - Intro to Comp Sci
Berkeley Intro to CS, DS, and Comp Arch
MIT - Writing Good Code
Awesome Videos
Blog Posts To Read
Is CS Useful? What is CS?
Other Good CS Stuff
Best Practices and Advanced Topics for Programming
Books and Videos
Makefile/CMake
Optimization
Refactoring, Object Oriented Programming, and Design Patterns
Object Oriented Programming
Books for OOP
Videos for OOP
Courses for OOP
Design Patterns
Refactoring
Pointer Stuff
User Programming References
Interview Stuff
General Data Structures and Algorithms Stuff
Algorithms
Courses
Intro To Algorithms Courses
Graduate Intro to Algorithms
Advanced Algorithms Courses
Good Videos For Algorithms
Data Structures
Good Videos for Data Structures
Software Engineering
Computer Organization and Architecture
Operating Systems and Systems Programming
Books and Videos
Carnegie Mellon University OS Course
Processes and Threads
Good Books for Operating Systems
Good Videos for Operating Systems
OS Courses
Georgia Tech
Georgia Tech Graduate Intro to Operating Systems
Lecture Notes
Recommended Research Papers
Georgia Tech Advanced Operating Systems
MIT
Stanford
Berkeley
Thread and Process Stuff
RTOS
Linux Specific Stuff
Linux Kernel Research Stuff
Linux Interrupt Handling
IPC - Interprocess Communication Mechanisms
Memory Management
Shared Memory
Mapped Memory
Process & Threads
Pthreads
Linux Kernel and Device Driver Programming
Generic Kernels and Kernel Programming
Distributed Systems and Parallel Computing
CMU - Distributed Systems
UMBC Distributed Systems
Functional Programming / Programming Language Design
Compilers
Compiler Specific Courses
Machine Learning/AI/Data Science
Intro to Machine Learning?
Machine Learning Books
Machine Learning Courses
Crash Courses
Cornells Machine Learning for Intelligent Systems
Meh
AI Courses
Data Science
Reinforcement Learning
Q Learning
Machine Learning Challenges
Computer Vision
Secure Programming
Network Programming
High Performance Computing
SW Reverse Engineering/Malware Analysis
Courses/Learning/Challenges
Books
Intro Courses
Good Hands On Intro to Cracking and Basic RE
Video Presentations
Open Security Training
Challenges
Bombs
Crackme
Crypto
CTF Writeups/Challenges
SAN 2015 Challenge #ShmooCon - writeup
Programming/Assembly Concepts for RE
Linux RE - 64bit
Windows RE - 64bit
Wargames
Debugging
GDB - Debugger
Record and Replay
x64dbg - Debugger
Windbg - Windows Debugger
Immunity Debugger
OllyDbg - Debugger
Anti-Debug Stuff
Tools (Disassemblers/Decompilers/Hex Editors)
GHIDRA - Static Analysis - Disassembler/Decompiler
Ghidra Plugins
Using NSA's Ghidra to make a keyboard backlight match in-game graphics of SuperHexagon : programming
SLEIGH
IDA Pro/HexRays - Static Analysis - Disassembler/Decompiler
IDA Shortcuts [PDF]
Binary Ninja - Static Analysis - Disassembler/Decompiler
Radare2 - Static Analysis - Disassembler/Decompiler
Hopper - Linux and MacOS Disassembler/Decompiler
Hex Editors
Angr - static and dynamic symbolic ("concolic") binary analysis
dnSpy (RE tool for .NET)
Assembly Language Stuff
Intel x86/64
Open Security Training
ARM
MIPS
Calling Conventions
Good Resources
File Format/Protocol Stuff
File Formats
ELF Stuff
Data Structures
Windows Stuff
Linux OS Stuff
Mobile Phones
iOS
Malware Analysis
VM's and Environments for Malware Analysis
Apple (MacOS)
Intro Courses for Malware Analysis
Tools for Malware Analysis
Books
Videos to learn from
Challenges
Encryption in Malware
Cheatsheets and Tips
MalwareTech
Malware Samples
Indicators Of Compromise Searching
Anti-Debugging Techniques
Windows
Software Cracking
Game Hacking
PwnAdventure
Crypto
Statically Rewriting x86 Binaries Without Heuristics (Paper and GitHub Sources) - ReverseEngineering
Comp Eng/Hardware/Embedded Systems Hacking
Books and Research Papers
Courses
Computer Engineering Stuff
Videos to learn from
Tools to Use
JTAG
Lifting and Reversing Firmware
Reversing Integrated Circuits
Video Game Console Reversing
Reversing IoT Devices
Reversing Protocols
Vulnerability Research and Exploitation
Good Courses/Challenges/Learning/Books
Sites/Blog Posts To Learn From
Books
Courses
Videos to learn from
Wargames
CVEs to Review
Chrome Bugs
External Training
Exploit Development/Shellcoding Stuff
Tools
Courses
Linux Specific Tutorials
Windows Exploit Development Tutorials
Fuzzy Security Tutorials
Shellcoding
Books
Buffer Overflow/Memory Corruption
GOT/PLT Overwriting (Global Offset Table and Procedure Linkage Table)
Return Oriented Programming (ROP)
Format String Exploitation
Heap Exploitation
Fuzzing
Kernel Exploitation
Bug Bounty Stuff
Mobile Devices
Android Exploitation
Tools for Mobile Exploitation
Mitigation Techniques and Bypasses
Windows CFG
Car Hacking
Bluetooth Hacking
Emulation