OpenSecurityTraining2 Profile Banner
OpenSecurityTraining2 Profile
OpenSecurityTraining2

@OpenSecTraining

Followers
8,586
Following
16
Media
22
Statuses
609

501(c)3 Nonprofit providing Open Source and Open Access computer security training material. #OST2 re-launched July 2021! OpenSecurityTraining2 @infosec .exchange

Internets!
Joined November 2011
Don't wanna be here? Send us removal request.
Explore trending content on Musk Viewer
Pinned Tweet
@OpenSecTraining
OpenSecurityTraining2
17 days
📣"Trusted Computing 1102: Intermediate Trusted Platform Module (TPM) usage" by Dimi Tomov of is now released!📣 Topics include: * Introduction to the Enhanced System API (ESAPI) and the tpm2-tss * The Endorsement Hierarchy and
Tweet media one
0
2
23
@OpenSecTraining
OpenSecurityTraining2
3 years
The new #OpenSecurityTraining2 site has been launched at ! 🎉🥳 Anyone can now sign up for the public betas of the first classes (with more to come soon!)
5
197
378
@OpenSecTraining
OpenSecurityTraining2
3 years
We did it! We're officially a non-profit now! We've received 501c3 public charity status from the IRS! 🎉🥳
8
18
188
@OpenSecTraining
OpenSecurityTraining2
2 years
And Gal Zaban @0xgalz has one more #OST2 1st birthday gift for you 🎁 "Reverse Engineering 3011: Reversing C++ Binaries" has been released!
@OpenSecTraining
OpenSecurityTraining2
2 years
🥳 #OST2 is 1 year old today!🎉 Thanks to the instructors ( @XenoKovah , @pietrushnic , @barbieauglend , @glitchnsec , @0xgalz ) for all their hard work! Let’s celebrate with the release of a new class! “Architecture 4021: Introductory UEFI” by @pietrushnic !
2
24
65
3
51
168
@OpenSecTraining
OpenSecurityTraining2
3 years
We're currently at 790 registered users. Help spread the word about #OpenSecurityTraining2 and we can probably reach our first 1000 users this re-opening weekend!
2
66
143
@OpenSecTraining
OpenSecurityTraining2
2 years
📣Call for beta testers for new #OST2 classes📣 Cedric Halbronn @saidelike has created multiple days of classes on Windows kernel debugging, internals, and exploitation To sign up, fill out the survey here:
3
33
105
@OpenSecTraining
OpenSecurityTraining2
3 years
📣A new #OST2 class, "Architecture 4001: x86-64 Intel Firmware Attack & Defense" by @XenoKovah is now open to the public!📸💻⚔️🖖🎉
1
33
106
@OpenSecTraining
OpenSecurityTraining2
10 days
📣"Debuggers 1101: Introductory IDA" released!📣 This mini-class by Christina Johns @bitmaize provides students with a hands-on introduction to the IDA interface, and using the IDA debugger. Dbg1101 is also incorporated into the #OST2
Tweet media one
0
25
103
@OpenSecTraining
OpenSecurityTraining2
1 year
📣New #OST2 class!!!📣"Debuggers 3301: HyperDbg"📣 This ~16 hour class (based on average beta tester completion time) by Sina Karvandi @intel80x86 covers his hypervisor-based debugger HyperDbg
2
21
92
@OpenSecTraining
OpenSecurityTraining2
1 year
📣New #OST2 class!!📣"Exploitation 4011: Windows Kernel Exploitation: Race Condition + UAF in KTM"📣 This ~33 hour(!) class by Cedric Halbronn @saidelike from NCC Group @NCCGroupInfosec , is the longest and most advanced class offered at OST2 to date!
4
32
90
@OpenSecTraining
OpenSecurityTraining2
1 year
🎉It's OpenSecurityTraining2's 2nd anniversary!🥳 Let's say thanks to the instructors who released many days worth of classes this past year! 🧵👇
1
21
79
@OpenSecTraining
OpenSecurityTraining2
4 months
📣Debuggers 1102: Introductory Ghidra released!📣 This class by Erin Cornelius and @XenoKovah provides students with a hands-on introduction to Ghidra as a debugger, wrapping GDB or WinDbg, thus providing decompilation support.
0
17
76
@OpenSecTraining
OpenSecurityTraining2
10 days
We have updated the #OST2 Learning Paths to better show the relationship of classes like Dbg1101 Intro IDA and Dbg1102 Intro Ghidra to other debugger and assembly classes. As a reminder, everywhere you're seeing white boxes, that means we're looking for volunteers to help fill
Tweet media one
Tweet media two
Tweet media three
Tweet media four
4
18
68
@OpenSecTraining
OpenSecurityTraining2
2 years
🥳 #OST2 is 1 year old today!🎉 Thanks to the instructors ( @XenoKovah , @pietrushnic , @barbieauglend , @glitchnsec , @0xgalz ) for all their hard work! Let’s celebrate with the release of a new class! “Architecture 4021: Introductory UEFI” by @pietrushnic !
@OpenSecTraining
OpenSecurityTraining2
3 years
The new #OpenSecurityTraining2 site has been launched at ! 🎉🥳 Anyone can now sign up for the public betas of the first classes (with more to come soon!)
5
197
378
2
24
65
@OpenSecTraining
OpenSecurityTraining2
3 years
We're currently searching for professional C/C++/ObjC developers to beta test the new Vulnerabilities 1001 class. You will learn about stack/heap buffer overflows, non-linear out-of-bound writes, integer over/underflows, and signedness vulns Sign up here:
2
15
64
@OpenSecTraining
OpenSecurityTraining2
3 years
#OpenSecurityTraining2 public betas open tomorrow, July 16th 2021. The new URL will be the primary address, and will be switched over to the #OST2 main page too. OST1 content will remain accessible at old URLs until it's updated
1
13
54
@OpenSecTraining
OpenSecurityTraining2
13 days
We have updated our course completion certificates to add the average time that it takes to complete the class. This is for folks who'd like an easy way to count that time towards continuing education credits. We don't have good data for our mini, sub-day-classes like the
Tweet media one
0
8
54
@OpenSecTraining
OpenSecurityTraining2
2 years
Massive thanks to the all-star instructors who released new #OST2 classes in 2022! Thanks to Gal Zaban @0xgalz for Reverse Engineering 3011: Reversing C++ Binaries
1
13
49
@OpenSecTraining
OpenSecurityTraining2
2 years
Over 6000 students are currently registered at OST2! 👩‍🎓👨‍🎓👩‍🎓👨‍🎓👩‍🎓👨‍🎓👩‍🎓👨‍🎓👩‍🎓👨‍🎓👩‍🎓👨‍🎓 Thanks to those who help spread the word! But there are many more who haven't heard about the site yet. Reminder: now's a good time to tell high school / college students to go level up over the summer
0
11
48
@OpenSecTraining
OpenSecurityTraining2
1 month
One year ago Cedric Halbronn @saidelike released his "Exploitation 4011: Windows Kernel Exploitation: Race Condition + UAF in KTM" class , and helper classes on Windows Internals and Advanced WinDbg !
1
9
46
@OpenSecTraining
OpenSecurityTraining2
6 months
The playlist for the #OST2 "Architecture 2821: Windows Kernel Internals 2" class by @saidelike is now public for those who like to download videos. But as always the best class experience is with the full lab instructions at
0
11
44
@OpenSecTraining
OpenSecurityTraining2
3 years
Thank you to everyone who's donated time and money to #OST2 since our relaunch 6 months ago! Thank you to the instructors who are working on new classes! Thank you to the students who've taken and completed classes! 2022 will be even better!
4
6
42
@OpenSecTraining
OpenSecurityTraining2
3 months
📢Call for beta testers!📢 "Debuggers 1101: Introductory IDA" by Christina Johns @bitmaize will start July 26th, and run for 4 weeks. It is a mini-class and will take only ~3 hours to complete If you're interested in participating, please sign up below:
Tweet media one
2
7
35
@OpenSecTraining
OpenSecurityTraining2
9 years
The 2 day class "Introduction to BIOS & SMM" has been uploaded, thanks to the @legbacore folks http://t.co/nJuNbwuaRe
0
26
36
@OpenSecTraining
OpenSecurityTraining2
9 years
Day 3 of Veronica Kovah's "Malware Dynamic Analysis" videos are posted at last http://t.co/Q44DQDtnrN
0
17
34
@OpenSecTraining
OpenSecurityTraining2
1 year
So in reality, with these 3 most recent classes @saidelike created a ~44 hour course(!), that we requested he break up slightly so we could reuse some of the general-purpose debugger/windows internals information on other learning. An outstanding achievement by Cedric!👏
1
3
35
@OpenSecTraining
OpenSecurityTraining2
2 years
Happy 1st anniversary to @NonprofitCyber !
Tweet media one
0
9
35
@OpenSecTraining
OpenSecurityTraining2
4 months
#OST2 's 3rd anniversary since the relaunch is coming up next week! Now's a great time to let people know about all the free classes they could be taking over the summer to level up their security expertise!
0
10
33
@OpenSecTraining
OpenSecurityTraining2
3 years
Here's a great article written by one of the #OST2 "Reverse Engineering 3201: Symbolic Analysis" beta test students, @conaned6 , where he turned around and used what he learned from @barbieauglend to solve a crackme challenge:
3
5
32
@OpenSecTraining
OpenSecurityTraining2
3 months
Periodic call for volunteers: We're looking for instructors for an "Introduction to Fuzzing" class, and an "Introduction to Dynamic Malware Analysis" class. If you'd be interested in teaching one of these classes, reach out at teach @
0
9
34
@OpenSecTraining
OpenSecurityTraining2
2 years
We've started hearing from a few instructors who work in a pentesting/red team role. So it's time to start putting together a learning path in this area. If you're an instructor and would like to contribute, reach out at teach @ost2 .fyi
1
8
33
@OpenSecTraining
OpenSecurityTraining2
4 years
D
2
0
34
@OpenSecTraining
OpenSecurityTraining2
8 months
📣"Trusted Computing 1101: Introductory Trusted Platform Module (TPM) usage" is now released!📣 Topics include use of TPMs for digital signing, HMAC, secure storage, protecting external data, and how to enable TPM's protection against physical MITM attack
1
13
32
@OpenSecTraining
OpenSecurityTraining2
1 year
📣New #OST2 class!!!📣"Architecture 2821: Windows Kernel Internals 2"📣 This is a ~5 hour class (based on average beta tester completion time) by Cedric Halbronn @saidelike from NCC Group @NCCGroupInfosec .
2
8
33
@OpenSecTraining
OpenSecurityTraining2
1 year
Last July, Gal Zaban @0xgalz released Reverse Engineering 3011: Reversing C++ Binaries An advanced reverse engineering class teaching existing reverse engineers who are already comfortable with IDA Pro, how to use it for reversing code written in C++
1
2
32
@OpenSecTraining
OpenSecurityTraining2
3 years
The next great #OST2 class is now public thanks to @barbieauglend !
Exciting news!! My “RE 3201: Symbolic Analysis" is finally available to y'all at #OST2 ! Thanks @XenoKovah for putting this awe-inspiring platform of knowledge sharing together and giving me a chance to have a small part on it :) check it out here:
2
53
172
0
8
30
@OpenSecTraining
OpenSecurityTraining2
4 years
We are currently looking for steering committee members for the following OST2 learning paths: Exploits, Malware Analysis, DFIR, Hardware Hacking, Wireless Security, Web AppSec, Applied Cryptography, and Trusted Systems Design
1
16
31
@OpenSecTraining
OpenSecurityTraining2
1 year
📣New #OST2 class!!!📣"Debuggers 3011: Advanced WinDbg"📣 This is a ~6 hour class (based on average beta tester completion time) by Cedric Halbronn @saidelike from NCC Group @NCCGroupInfosec
1
4
30
@OpenSecTraining
OpenSecurityTraining2
2 years
Update on OST2 student registration: it's over 9000!🥳 Now's a great time to tell security students to take in a new class or two over the winter break
Tweet media one
2
9
30
@OpenSecTraining
OpenSecurityTraining2
3 months
After our Open edX upgrade, we can now make classes fully open, so that students (and search engines!) can dive deep into a class to see what's inside. Though it's still recommended to enroll to track your completion progress and get a completion cert e.g.
1
4
28
@OpenSecTraining
OpenSecurityTraining2
4 months
The YouTube playlist for #OST2 “Exploitation 4011: Windows Kernel Exploitation: Race Condition + UAF in KTM” class by Cedric Halbronn @saidelike is now public for those who like to download videos:
0
9
28
@OpenSecTraining
OpenSecurityTraining2
7 months
📣"Architecture 1005: RISC-V Assembly" is now released!📣 This class is templated on the #OST2 Arch1001 x86-64 assembly class. It covers the @risc_v RV32I/RV64I base ISAs, the "C" Compressed instructions, and the "M" multiply/divide/remainder extension.
0
12
26
@OpenSecTraining
OpenSecurityTraining2
3 years
Excellent! 1105 users as of right now! Thanks everyone for making some noise!
@OpenSecTraining
OpenSecurityTraining2
3 years
We're currently at 790 registered users. Help spread the word about #OpenSecurityTraining2 and we can probably reach our first 1000 users this re-opening weekend!
2
66
143
1
5
26
@OpenSecTraining
OpenSecurityTraining2
2 months
We're going to give Discord another try, with @husseinmuhaisen helping us manage and moderate it. If you'd like to join, you can sign up here:
0
4
24
@OpenSecTraining
OpenSecurityTraining2
2 years
Massive thanks to the all-star instructors who released new #OST2 classes in 2022! Thanks to Xeno Kovah @XenoKovah for Hardware 1101: Intel SPI Analysis
0
5
25
@OpenSecTraining
OpenSecurityTraining2
2 years
#OST2 class URLs are versioned. Here's some short URLs suitable for citation that will always point at the newest full classes: ...
2
10
25
@OpenSecTraining
OpenSecurityTraining2
3 months
It's time to celebrate #OST2 's 3rd anniversary! So what happened this last year at #OST2 ? Let's take a walk down memory hierarchy lane! 👇
Tweet media one
1
4
24
@OpenSecTraining
OpenSecurityTraining2
4 years
The future is now!
@XenoKovah
Xeno Kovah
4 years
So let’s talk about the future of …tldr: I’ve just made it my full time job, and I expect to be working on it for the next 10+ years!
37
153
770
1
1
24
@OpenSecTraining
OpenSecurityTraining2
6 months
📢Call for beta testers!📢 The "Debuggers 1102: Introductory Ghidra" mini-class by @e_er1n will begin May 10th. This class can standalone but will be integrated with #OST2 Assembly classes after beta testing too. Sign up here:
1
6
23
@OpenSecTraining
OpenSecurityTraining2
4 years
A
1
0
24
@OpenSecTraining
OpenSecurityTraining2
2 years
Reminder: Today's #OST2 instructors were yesterday's OST1 students. Today's OST2 students will be tomorrow's OST3 instructors!
1
1
22
@OpenSecTraining
OpenSecurityTraining2
2 years
Thank you to everyone who has contributed time and money to #OST2 this year! As you're thinking about your end-of-year giving please stop by to see how you can contribute time or money towards our mission to make more and better engineers faster
0
10
23
@OpenSecTraining
OpenSecurityTraining2
10 years
Day 1 of Veronica Kovah's Dynamic Malware Analysis class videos are now posted. http://t.co/Q44DQDLwFV One of our "no prereqs" classes.
2
24
22
@OpenSecTraining
OpenSecurityTraining2
5 months
🎉 #OST2 has reached 20k registered users!🥳 Thanks to all our volunteer instructors, students, and sponsors for their support! If you haven't taken a class yet, go check them out here:
0
2
20
@OpenSecTraining
OpenSecurityTraining2
3 years
With the release of Arch4001, it looks like OST2 has just passed 3k users registered for the site! Not bad for 3.5 months after our relaunch!
@OpenSecTraining
OpenSecurityTraining2
3 years
📣A new #OST2 class, "Architecture 4001: x86-64 Intel Firmware Attack & Defense" by @XenoKovah is now open to the public!📸💻⚔️🖖🎉
1
33
106
0
6
21
@OpenSecTraining
OpenSecurityTraining2
2 years
OST2 is a new member of Nonprofit Cyber, an alliance of nonprofits working in...wait for it...CYBER! (security not netics) We're looking forward to working together with the other members like @SAFECode and @ShareInCyber to make our classes even better
0
2
19
@OpenSecTraining
OpenSecurityTraining2
2 years
Massive thanks to the all-star instructors who released new #OST2 classes in 2022! Thanks to Thaís Moreira Hamasaki @barbieauglend for Reverse Engineering 3201: Symbolic Analysis
0
4
19
@OpenSecTraining
OpenSecurityTraining2
3 months
Literally last night we finally got the course completion certificates for classes on #OST2 customized away from the default, so they look *slightly* less plain. This automatically applies to existing certs But if anyone with graphics skills wants to help out we'd welcome it :)
Tweet media one
0
1
19
@OpenSecTraining
OpenSecurityTraining2
3 years
We upgraded our Open edX instance to pick up a bug fix for an issue which was causing course completion certificates to break. Let us know if there's any further issues.
0
3
18
@OpenSecTraining
OpenSecurityTraining2
11 years
Our material stored at archive .org (including the #exploits & #netflow class VMs) are now available as torrents http://t.co/mZIe9Yjee5
2
16
17
@OpenSecTraining
OpenSecurityTraining2
11 days
Looks like we're 3 away from having 23456 #OST2 students :) p.s. "Debuggers 1101: Introductory IDA" mini-class ETA soon!
0
0
17
@OpenSecTraining
OpenSecurityTraining2
2 years
Massive thanks to the all-star instructors who released new #OST2 classes in 2022! Thanks to Xeno Kovah @XenoKovah and Kc Udonsi @glitchnsec for Vulnerabilities 1001: C-Family Software Implementation Vulnerabilities
0
4
16
@OpenSecTraining
OpenSecurityTraining2
3 months
🥳Today is OST2's 3rd anniversary!🎉 Buuut...we'll save most of the celebratory noise until next week, since @XenoKovah just had an appendectomy and isn't in much of a "managing social media" mood ;)
3
0
16
@OpenSecTraining
OpenSecurityTraining2
3 years
(For example, "Intro x86" and "Intermediate x86" which @XenoKovah will take down in favor of his updated "Architecture 1001: x86-64 Assembly" and "Architecture 2001: x86-64 OS Internals" classes which are higher quality and more effective teaching instruments)
0
3
15
@OpenSecTraining
OpenSecurityTraining2
3 months
Enough looking backwards at year 3 of #OST2 , let's look to year 4! Starting with the beta mini-class for Intro IDA which is starting later this week! Sign up below, especially if you want to learn IDA at the same time as you learn x86-64 asm!
@OpenSecTraining
OpenSecurityTraining2
3 months
📢Call for beta testers!📢 "Debuggers 1101: Introductory IDA" by Christina Johns @bitmaize will start July 26th, and run for 4 weeks. It is a mini-class and will take only ~3 hours to complete If you're interested in participating, please sign up below:
Tweet media one
2
7
35
0
1
16
@OpenSecTraining
OpenSecurityTraining2
2 months
One last call for beta testers post-hacker-summer-camp! If you want to hop in and learn about TPMs, you can sign up at
@OpenSecTraining
OpenSecurityTraining2
3 months
Deep dive into interacting with TPMs by taking the beta of the new "Intermediate TPM usage" class. In this class you'll use the Enhanced System API (ESAPI) to do things like remote attestation. Also how to protect against physical bus MitM attacks
Tweet media one
0
3
13
0
4
15
@OpenSecTraining
OpenSecurityTraining2
10 years
Day 1 & 2 videos for Veronica Kovah's Malware Dynamic Analysis class are now posted! http://t.co/XwpMzDspX4
0
24
13
@OpenSecTraining
OpenSecurityTraining2
10 years
We've posted two new one-day classes on secure coding & secure code review: http://t.co/98iIceGGFw
0
13
14
@OpenSecTraining
OpenSecurityTraining2
3 months
In Aug. Sina Karvandi @Intel80x86 released "Debuggers 3301: HyperDbg", with an average completion time of 16h11m. This class about his custom hypervisor-based debugger, gives REs an opportunity to go even deeper with their Windows Internals skills!
Tweet media one
1
5
14
@OpenSecTraining
OpenSecurityTraining2
3 months
🧵Far be it from us to compete with #CrowdStrike on its big day but...Like "Debuggers 1102: Introductory Ghidra" this class was intentionally requested to be taught in an atypical way - teaching you how to use @HexRaysSA 's IDA Free as a wrapper around debuggers like WinDbg or GDB
@OpenSecTraining
OpenSecurityTraining2
3 months
📢Call for beta testers!📢 "Debuggers 1101: Introductory IDA" by Christina Johns @bitmaize will start July 26th, and run for 4 weeks. It is a mini-class and will take only ~3 hours to complete If you're interested in participating, please sign up below:
Tweet media one
2
7
35
1
2
14
@OpenSecTraining
OpenSecurityTraining2
17 days
We've posted an updated version of "Introductory TPM usage" which contains an added 26m video discussing different types of TPMs and contrasting them with technologies like Secure Elements and TrustZone. Because you're now able to see into all #OST2
0
4
14
@OpenSecTraining
OpenSecurityTraining2
3 years
Coreboot training is coming to OST2 from the 3mdeb folks. If you're interested in learning about the leading alternative to UEFI for x86 firmware, please go answer these questions
@3mdeb_com
3mdeb
3 years
What's the ideal platform for coreboot training? Please share your thoughts in this opensource survey of just 7 questions. Thank you very much in advance!
Tweet media one
0
2
4
0
5
14
@OpenSecTraining
OpenSecurityTraining2
7 months
Recently NIST posted a grant for cybersecurity education. It requires partnering with an academic institution or nonprofit. OpenSecurityTraining2 is a 501(c)(3) nonprofit, and is open to partnering with companies on grant applications like this.
0
5
13
@OpenSecTraining
OpenSecurityTraining2
3 months
Deep dive into interacting with TPMs by taking the beta of the new "Intermediate TPM usage" class. In this class you'll use the Enhanced System API (ESAPI) to do things like remote attestation. Also how to protect against physical bus MitM attacks
Tweet media one
0
3
13
@OpenSecTraining
OpenSecurityTraining2
4 years
B
1
0
13
@OpenSecTraining
OpenSecurityTraining2
1 year
The class builds upon existing OST2 classes like (Intro WinDbg) and (Intermediate WinDbg) and assumes a level of OS knowledge that's given in (x86-64 OS Internals).
1
1
13
@OpenSecTraining
OpenSecurityTraining2
2 years
#OST2 is a member of @NonprofitCyber . Check it out for other nonprofits providing help in the cybersecurity area
@NonprofitCyber
Nonprofit Cyber
2 years
Nonprofit Cyber today announced that it had published an index of cybersecurity solutions offered by its members: the Nonprofit Cyber Solutions Index. This is the first comprehensive index of actual cybersecurity capabilities provided by the NGO community.
2
22
37
0
6
13
@OpenSecTraining
OpenSecurityTraining2
6 months
Recently NIST posted a grant for cybersecurity education. It requires partnering with an academic institution or nonprofit. OpenSecurityTraining2 is a 501(c)(3) nonprofit, and is seeking companies to partner with
0
3
12
@OpenSecTraining
OpenSecurityTraining2
3 years
If you use to have Amazon donate .5% of your purchase price towards charities (at no cost to you), you can now set OST as your preferred charity by going here:
0
5
12
@OpenSecTraining
OpenSecurityTraining2
11 years
2 day class from Emre Tinaztepe: The Adventures of a Keystroke: more than 30 places keys can be captured by malware http://t.co/2d9KcYCCR9
0
13
11
@OpenSecTraining
OpenSecurityTraining2
4 years
C
1
0
11
@OpenSecTraining
OpenSecurityTraining2
2 years
Call for instructors: We're looking for more non-TCG trusted computing track material to help designers build more secure systems. If you'd be interested in making a class about Secure Elements / Smart Cards let us know in DM or at teach @ost2 .fyi
0
6
11
@OpenSecTraining
OpenSecurityTraining2
1 year
Because of its use of virtualization, it can also go beyond the limits of the x86 architecture, for instance by providing unlimited "hardware" breakpoints, so you can set as many "break on write" or "break on read" breakpoints as you want.
2
1
12
@OpenSecTraining
OpenSecurityTraining2
3 months
And also we mentioned that we had hit 20k students a while back, and we're currently at well over 21k on our way to 22k! Let the mad skillz wash over you!
1
1
12
@OpenSecTraining
OpenSecurityTraining2
8 months
We are pleased to announce that the Trusted Computing Group (TCG) @TrustedComputin have become a Partner of #OST2 , to support the development of free and open classes on Trusted Computing technologies like the Trusted Platform Module (TPM).
0
3
12
@OpenSecTraining
OpenSecurityTraining2
3 years
Donation thread! If you get corporate matching for your donations to 501c3 charities, e.g. through platforms like Benevity (), please consider giving to OST2 this year. So far we've been putting funds towards improved AV equipment for instructors.
1
4
10
@OpenSecTraining
OpenSecurityTraining2
11 years
2013 edition of Intro RE with some new content now uploaded: http://t.co/SbV99XOuze Now you can watch both this & RE Malware from Frank Poz
0
15
11
@OpenSecTraining
OpenSecurityTraining2
3 years
The next #OST2 class is ready for beta testers! @3mdeb_com is presenting Arch4031: x86-64 Reset Vector Implementation: coreboot. Go check out what they're looking for from beta testers here:
0
2
10
@OpenSecTraining
OpenSecurityTraining2
9 months
There is currently an error where Google Drive embedded images used on #OST2 (for the past 2+ years) are returning HTTP error 403 and not showing up on OST2 class pages. We are in contact with Google support about this. If something seems like it's missing images, this is why
0
1
11
@OpenSecTraining
OpenSecurityTraining2
4 months
is now also incorporated into #OST2 assembly classes like x86-64 asm, and RISC-V asm, so that students can do the final binary bomb lab reverse engineering exercise without, or with, decompilation support
0
3
10
@OpenSecTraining
OpenSecurityTraining2
3 months
Thanks @DfirDiva !
@DfirDiva
DFIR Diva
3 months
Today's Training Tuesday Highlight is @OpenSecTraining ! Want to learn Malware Analysis & Reverse Engineering? Check out their FREE courses! Link: Happy 3rd Anniversary OpenSecurityTraining2! #MalwareAnalysis #ReverseEngineering #DFIRDivaTTH
Tweet media one
0
27
78
0
2
10
@OpenSecTraining
OpenSecurityTraining2
2 years
We recently created invite-only "Alumni" Slack channels for students who complete #OST2 classes. They're a place to more easily connect with instructors (after you've shown you're willing to put in the work ;)), as well as other students who are interested in the same topics
1
3
10
@OpenSecTraining
OpenSecurityTraining2
4 months
The production #OST2 server was upgraded yesterday, and we will soon be able to make use of some features which were broken in the previous version of Open edX, such as making classes *public* so there is no need for registration to get to the content
2
1
10
@OpenSecTraining
OpenSecurityTraining2
3 months
In Aug. Cedric Halbronn @saidelike released 3 classes which combined are "Exploitation 4011: Windows Kernel Exploitation: Race Condition + UAF in KTM" and have an average completion time of 39h33m! - "Debuggers 3011: Advanced WinDbg" - 5h57m avg
Tweet media one
1
3
10
@OpenSecTraining
OpenSecurityTraining2
4 years
Different orgs have experimented with different video styles. Of the styles shown in the attached image, which would you prefer OST2 use? (Twitter only allows 4-response polls, so to vote just like the below threaded reply which corresponds to your answer.)
Tweet media one
6
4
9
@OpenSecTraining
OpenSecurityTraining2
6 months
Last chance to sign up for the beta which starts tomorrow!
@OpenSecTraining
OpenSecurityTraining2
6 months
📢Call for beta testers!📢 The "Debuggers 1102: Introductory Ghidra" mini-class by @e_er1n will begin May 10th. This class can standalone but will be integrated with #OST2 Assembly classes after beta testing too. Sign up here:
1
6
23
0
1
10
@OpenSecTraining
OpenSecurityTraining2
7 months
Thanks to @NCCGroupplc for Sponsoring #OST2 at the Gold🥇 level! More about them here: NCC Group instructor @saidelike also brings you the "Windows Kernel Exploitation: Race Condition + UAF in KTM" class
0
1
10
@OpenSecTraining
OpenSecurityTraining2
2 years
Massive thanks to the all-star instructors who released new #OST2 classes in 2022! Thanks to Piotr Król @pietrushnic for Architecture 4021: Introductory UEFI
0
4
10