OpenSecurityTraining2

@OpenSecurityTraining2@infosec.exchange
366 Followers
5 Following
141 Posts
501(c)(3) Non-Profit providing Open Source and Open Access computer security training material. #OST2 re-launched July 2021!
Websitehttps://ost2.fyi
LinkedInhttps://www.linkedin.com/company/ost2
Reddithttps://reddit.com/r/OST2
Twitterhttps://twitter.com/OpenSecTraining
BlueSkyhttps://bsky.app/profile/opensectraining.bsky.social
Threadshttps://www.threads.net/@opensecuritytraining

We are happy to announce that Hex-Rays @HexRaysSA makers of IDA, have become a 🥇Gold-level sponsor of #OST2!

Learn all the latest about their software reverse engineering tools here: https://ost2.fyi/Sponsor_HexRays_SM

While we've had an overwhelming turn out in registration for this class, we still wanted to remind people that there's still time to sign up; since our beta classes are when the instructor is actively watching the forums and responding to feedback.
From: @OpenSecurityTraining2
https://infosec.exchange/@OpenSecurityTraining2/115548123002765591
OpenSecurityTraining2 (@OpenSecurityTraining2@infosec.exchange)

📢Call for beta testers!📢 The "Architecture 1901: From zero to QEMU - A Gentle introduction to emulators from the ground up!" course by Antonio Nappa @jeppojeps will begin November 28th. Sign up here: https://forms.gle/LUXaThn4YSYSvk5D7 This course explores the fascinating world of emulation, guiding learners from the fundamentals of CPU design to the internals of QEMU and advanced instrumentation techniques.
 You will start by understanding what emulation truly means—how software can imitate hardware—and progressively build your own 8-bit CPU emulator in Python (SimpleProc-8), extend it with interrupts, I/O, and MMIO, and finally instrument real-world emulators like QEMU.
 The course combines hands-on labs, in-browser exercises, and conceptual lectures to bridge theory and practice, preparing students to tackle topics such as system emulation, hardware-assisted execution, and fuzzing of embedded targets. By the end, you’ll not only understand how emulators work—you’ll be able to build, modify, and analyze them for research, debugging, and vulnerability discovery.

Infosec Exchange
Periodic call for volunteers: We're looking for classes on Apple ecosystem security. E.g. OS internals, binary formats, malware analysis, vulnerability hunting, etc. If you're interested in sharing what you know, reach out at teach🌀ost2.fyi

📢Call for beta testers!📢
The "Architecture 1901: From zero to QEMU - A Gentle introduction to emulators from the ground up!" course by Antonio Nappa @jeppojeps will begin November 28th. Sign up here: https://forms.gle/LUXaThn4YSYSvk5D7

This course explores the fascinating world of emulation, guiding learners from the fundamentals of CPU design to the internals of QEMU and advanced instrumentation techniques.
 You will start by understanding what emulation truly means—how software can imitate hardware—and progressively build your own 8-bit CPU emulator in Python (SimpleProc-8), extend it with interrupts, I/O, and MMIO, and finally instrument real-world emulators like QEMU.
 The course combines hands-on labs, in-browser exercises, and conceptual lectures to bridge theory and practice, preparing students to tackle topics such as system emulation, hardware-assisted execution, and fuzzing of embedded targets.
By the end, you’ll not only understand how emulators work—you’ll be able to build, modify, and analyze them for research, debugging, and vulnerability discovery.

Architecture 1901: From zero to QEMU - A Gentle introduction to emulators from the ground up!

Enter the email you have used / will use when registering for beta.ost2.fyi. This will be used to enroll you in the beta class if you are selected. If your account does not exist at the time enrollment is processed, you will not be admitted to the class.

Google Docs

This year Binarly has also expanded their sponsorship to the creation of a new Firmware Security Learning Path! https://ost2.fyi/OST2_LP_FWSEC.pdf

This captures current and future plans for classes involving security in the deep-dark of firmware! But Binarly is starting to give visibility into what's going on there with their binary analysis platform.

We are happy to announce that Binarly has renewed their 🥇Gold-level sponsorship of #OST2!

Learn more about what they do in firmware & supply chain security here: https://ost2.fyi/Sponsor_Binarly_SM

Periodic call for volunteers: We're looking for someone to teach classes on stealth malware, such as rootkits, bootkits, and other security-evading software. You could use the OST1 Rootkits class (https://opensecuritytraining.info/Rootkits.html) as a starting template, since that's the whole point of making the materials under CC licenses. Xeno Kovah isn't planning on updating it as he's off in Bluetooth world now.
Rootkits

We've officially had our 31337th student join at OST2! We're waiting to hear back to see if the lucky registrant wants to be publicly lauded for their random achievement or not ;)
This is a periodic reminder about #OST2's open Requests for Proposals (RFPs). We have a few of areas where we can potentially fund the creation of open classes. You can find the calls here: https://ost2.fyi/Training-RFPs.html

For those who are curious about the completion time distribution during the beta of my #OST2 BT2222 class, here it is. The average completion time was 8h25m, the median was 8h10m, the min was 3h50m, and the max was 15h22m

Also according to my calendar it took me about 98.5h to create the class and run the beta. 98.5/8.5 is about a 11.5x overhead (11.5h to create 1 education-hour). This is probably the lowest overhead I’ve ever had for class creation. Probably because it explicitly excludes the 500+ hours I’ve spent working on the Blue2thprinting project itself. I.e. if I ran into something that needed fixing during class development, I marked it up on my calendar as Blue2thprinting time rather than BT2222 time.

Anyway, if you want to get started in Bluetooth with something more tool-using than spec-reading, I recommend taking this class! As the graph shows, it could take between 4-15h but it’ll probably be around 8h https://ost2.fyi/BT2222