OpenSecurityTraining2 provides free and open-source cybersecurity training classes, available to anyone at any time, with a focus on multi-class learning paths to help students develop high-skill, high-pay cybersecurity job skills. The platform offers a range of classes, with materials available under open-source licenses, allowing instructors to use and remix materials in their own classes. With platinum, gold, and bronze sponsors, OpenSecurityTraining2 is a community-driven initiative to provide accessible cybersecurity education.
FEATURES
EXPLORE BY TAGS
SIMILAR TOOLS
A comprehensive guide to using Metasploit, including searching for modules, specifying exploits and payloads, and using auxiliary modules.
A comprehensive guide to understanding and responding to modern ransomware attacks, covering incident response, cyber threat intelligence, and forensic analysis.
A practical guide to developing a comprehensive security monitoring and incident response strategy, covering incident response fundamentals, threat analysis, and data analysis.
Comprehensive security training platform for web developers, offering hands-on experience with real, vulnerable applications and concrete advice for securing code.
A detailed SSH cheat sheet for managing SSH connections and troubleshooting common issues.
A condensed field guide for cyber security incident responders, covering incident response processes, attacker tactics, and practical techniques for handling incidents.
A comprehensive guide to developing an incident response capability through intelligence-based threat hunting, covering theoretical concepts and real-life scenarios.
A comprehensive guide to digital forensics and incident response, covering incident response frameworks, digital forensic techniques, and threat intelligence.
A comprehensive guide to incident response, providing effective techniques for responding to advanced attacks against local and remote network resources.
PINNED

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.