This section includes industry courses and course materials originally prepared for students at various colleges and universities. Most lectures are available in PowerPoint files (older ones are PPT and newer are PPTX); some other documents such as syllabuses are usually available as PDF files. All students, teachers and others are welcome to use these course materials for free courses and lectures. If you want to use this material in paid courses contact me by email mekabay@gmail.com for permission to do so. Course codes have been converted to current standards wherever possible; however, older syllabuses and course descriptions may still contain older course labels. Community Courses: Safety Online (PDF), Disinformation (PDF PPTX), Using E-mail Effectively (PDF PPTX). Industry Courses: Welcome to My Web Site: overview of sections PPT (narrated) PDF (no narration), Assessing and Auditing Internet Usage Policies PPT PDF, Bugs, Flaws and Features PDF, Basic Medical INFOSEC PPTX, COMPUTER CRIME REVIEW 2000 HTML PDF, INFOSEC UPDATE PDF -- March 2001, INFOSEC UPDATE PDF -- March 2002, INFOSEC UPDATE PDF.
FEATURES
EXPLORE BY TAGS
SIMILAR TOOLS
A newsletter providing summarized cyber defense technical content for blue and purple teams to stay informed and protect their estates.
Security cheatsheets to aid penetration testers and security enthusiasts in remembering useful but not frequently used commands.
A knowledge base of analytics developed by MITRE based on the MITRE ATT&CK adversary model.
Guidelines for contributing to a cybersecurity tools and resources list
A comprehensive guide to using Metasploit, including searching for modules, specifying exploits and payloads, and using auxiliary modules.
A project developed for pentesters to practice SQL Injection concepts in a controlled environment.
Free and open-source cybersecurity training classes with multi-class learning paths for high-skill, high-pay job skills.
An annual jeopardy-style capture-the-flag contest with challenges related to cybersecurity.
PINNED

Mandos
Fractional CISO service that helps B2B companies implement security leadership to win enterprise deals, achieve compliance, and develop strategic security programs.

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.