I Traded This to Save You a Student Loan in Cybersecurity
Share

General Cyber Security Courses/Training/Resources.
###if you liked this you might want to try this click###
Amazing Resources For Learning
FSU Course
RPI Classes
MIT OpenCourseWare
Linux Stuff
Complete Noob Intro to Cyber Security
Programming/Comp Sci/SE Things
Programming Courses and Tutorials
Specific Programming Language Stuff (C/C++/Python/Java/etc)
C Stuff
GT Recommended
Books and References
Translation Phases
Style Things
Coding Standards
Other Useful Things
c preprocessor - #define macro for debug printing in C? - Stack Overflow
Useful Tutorials and Tools
Data Structures
Embedded Programming
Pointer Stuff
Courses
C++ Stuff
Good Learning Material
Books
Beginner Books
Intermediate Books
Courses
Translation Phases
Best Practices
Pass By Reference vs Pass By Value
c++ - Why is list initialization (using curly braces) better than the alternatives? - Stack Overflow
Coding Standards
Data Structures
Memory Management
Smart Pointers
Solutions to Problems
Python
Courses
Videos To Learn From
Advanced Python Style/OOP Stuff
Python Issue Fixes
Useful Python things
Numpy/SciPy
Profiling/Timing
Projects
Books
Java Stuff
Data Structures
Rust
x86 Assembly
Full Stack Development
Front End Development
JavaScript
Frameworks
Unix Stuff (Shell Stuff)
Courses
Intro Courses/Tutorials/Books
Books
Harvard Stuff (CS 50)
Carnegie Mellon - Intro to Comp Sci
Berkeley Intro to CS, DS, and Comp Arch
MIT - Writing Good Code
Awesome Videos
Blog Posts To Read
Is CS Useful? What is CS?
Other Good CS Stuff
Best Practices and Advanced Topics for Programming
Books and Videos
Makefile/CMake
Optimization
Refactoring, Object Oriented Programming, and Design Patterns
Object Oriented Programming
Books for OOP
Videos for OOP
Courses for OOP
Design Patterns
Refactoring
Pointer Stuff
User Programming References
Interview Stuff
General Data Structures and Algorithms Stuff
Algorithms
Courses
Intro To Algorithms Courses
Graduate Intro to Algorithms
Advanced Algorithms Courses
Good Videos For Algorithms
Data Structures
Good Videos for Data Structures
Software Engineering
Computer Organization and Architecture
Operating Systems and Systems Programming
Books and Videos
Carnegie Mellon University OS Course
Processes and Threads
Good Books for Operating Systems
Good Videos for Operating Systems
OS Courses
Georgia Tech
Georgia Tech Graduate Intro to Operating Systems
Lecture Notes
Recommended Research Papers
Georgia Tech Advanced Operating Systems
MIT
Stanford
Berkeley
Thread and Process Stuff
RTOS
Linux Specific Stuff
Linux Kernel Research Stuff
Linux Interrupt Handling
IPC - Interprocess Communication Mechanisms
Memory Management
Shared Memory
Mapped Memory
Process & Threads
Pthreads
Linux Kernel and Device Driver Programming
Generic Kernels and Kernel Programming
Distributed Systems and Parallel Computing
CMU - Distributed Systems
UMBC Distributed Systems
Functional Programming / Programming Language Design
Compilers
Compiler Specific Courses
Machine Learning/AI/Data Science
Intro to Machine Learning?
Machine Learning Books
Machine Learning Courses
Crash Courses
Cornells Machine Learning for Intelligent Systems
Meh
AI Courses
Data Science
Reinforcement Learning
Q Learning
Machine Learning Challenges
Computer Vision
Secure Programming
Network Programming
High Performance Computing
SW Reverse Engineering/Malware Analysis
Courses/Learning/Challenges
Books
Intro Courses
Good Hands On Intro to Cracking and Basic RE
Video Presentations
Open Security Training
Challenges
Bombs
Crackme
Crypto
CTF Writeups/Challenges
SAN 2015 Challenge #ShmooCon - writeup
Programming/Assembly Concepts for RE
Linux RE - 64bit
Windows RE - 64bit
Wargames
Debugging
GDB - Debugger
Record and Replay
x64dbg - Debugger
Windbg - Windows Debugger
Immunity Debugger
OllyDbg - Debugger
Anti-Debug Stuff
Tools (Disassemblers/Decompilers/Hex Editors)
GHIDRA - Static Analysis - Disassembler/Decompiler
Ghidra Plugins
Using NSA's Ghidra to make a keyboard backlight match in-game graphics of SuperHexagon : programming
SLEIGH
IDA Pro/HexRays - Static Analysis - Disassembler/Decompiler
IDA Shortcuts [PDF]
Binary Ninja - Static Analysis - Disassembler/Decompiler
Radare2 - Static Analysis - Disassembler/Decompiler
Hopper - Linux and MacOS Disassembler/Decompiler
Hex Editors
Angr - static and dynamic symbolic ("concolic") binary analysis
dnSpy (RE tool for .NET)
Assembly Language Stuff
Intel x86/64
Open Security Training
ARM
MIPS
Calling Conventions
Good Resources
File Format/Protocol Stuff
File Formats
ELF Stuff
Data Structures
Windows Stuff
Linux OS Stuff
Mobile Phones
iOS
Malware Analysis
VM's and Environments for Malware Analysis
Apple (MacOS)
Intro Courses for Malware Analysis
Tools for Malware Analysis
Books
Videos to learn from
Challenges
Encryption in Malware
Cheatsheets and Tips
MalwareTech
Malware Samples
Indicators Of Compromise Searching
Anti-Debugging Techniques
Windows
Software Cracking
Game Hacking
PwnAdventure
Crypto
Statically Rewriting x86 Binaries Without Heuristics (Paper and GitHub Sources) - ReverseEngineering
Comp Eng/Hardware/Embedded Systems Hacking
Books and Research Papers
Courses
Computer Engineering Stuff
Videos to learn from
Tools to Use
JTAG
Lifting and Reversing Firmware
Reversing Integrated Circuits
Video Game Console Reversing
Reversing IoT Devices
Reversing Protocols
Vulnerability Research and Exploitation
Good Courses/Challenges/Learning/Books
Sites/Blog Posts To Learn From
Books
Courses
Videos to learn from
Wargames
CVEs to Review
Chrome Bugs
External Training
Exploit Development/Shellcoding Stuff
Tools
Courses
Linux Specific Tutorials
Windows Exploit Development Tutorials
Fuzzy Security Tutorials
Shellcoding
Books
Buffer Overflow/Memory Corruption
GOT/PLT Overwriting (Global Offset Table and Procedure Linkage Table)
Return Oriented Programming (ROP)
Format String Exploitation
Heap Exploitation
Fuzzing
Kernel Exploitation
Bug Bounty Stuff
Mobile Devices
Android Exploitation
Tools for Mobile Exploitation
Mitigation Techniques and Bypasses
Windows CFG
Car Hacking
Bluetooth Hacking
Emulation
Arm Specific Stuff
Rootkits
Cryptography
Books
Courses/Lectures
Pen Testing/Red Team/OSINT
Courses/Learning/Tutorials/Tips
Courses
Videos To Learn From
Books
Kali Stuff
Metasploit and Armitage
Hack The Box
Labs
Vulnerable VM's and Wargames
Methodology/Standards
Other Useful Posts/Blogs/Sites
Pen-Testing Cheat Sheets
OSCP and OSCE Specific Stuff
Recommended for OSCP
Recommended for OSCE
Peoples Experiences of OSCP
Worth Looking At
Vulnerable VMs
1. Recon/Information Gathering/Enumeration
NMAP
Subdomain/DNS Stuff
2. Vulnerability Assessment
3. Exploitation #SQL
4. Post Exploitation
Hack Back
5. Privilege Escalation
Linux Privesc
Windows Privesc
6. Reporting
Active Directory
OSINT (Open Source Intelligence)
Credential Cracking and Brute Forcing
Password Lists
Web Security
Books
Burp
XSS
Red-Team (C2 Stuff and Other Good Things)
C2/Infrastructure
Lock Picking
Social Engineering
CTF Focused Things
Getting Started
Twitch Streams and Videos To Learn From
Writeups
Tools to Use
Crypto
Exploitation/PWN
Reversing/Binary Analysis
Forensics
Steganography
Web Challenges
FlareOn 2019
Challenge 1
Challenge 2
Challenge 3
Challenge 4
DFIR/Blue Team/SOC/Network Security
Books
Tools
SOC Stuff
Network Analysis/Monitoring/Hacking
Netcat
Wireshark
Wireless
Man In The Middle (MITM)
OSWP
ICS/SCADA
Courses
Networking
VM's/Virtualization, Home Lab, Cloud Stuff
Console Virtualization
Home Lab Stuff (VM's, Hardware, RPi)
Rasberry Pi Things
Rasberry Pi VPN
bitcamp
Hardware
VM's/Virtualization Stuff
Windows VMs
Hyper-V
Cloud Stuff
AWS (Amazon Web Services)
Useful Tools, Tips, & Tricks for OS's
Linux
Linux Fixes and Tweaks
Nvidia Graphics, Reboot Freeze, Purple/Black Screen Fix
Kali Things
Airplane mode fix
Tweaks
Sonos on Linux
Helpful Tools for Linux
Tmux
Other Linux Stuff
Windows
Windows Fixes and Tweaks
Electrical Engineering and Math
EE Stuff
Math Stuff
Statistics