OpenSecurityTraining2

@OpenSecurityTraining2@infosec.exchange
366 Followers
5 Following
141 Posts
501(c)(3) Non-Profit providing Open Source and Open Access computer security training material. #OST2 re-launched July 2021!
Websitehttps://ost2.fyi
LinkedInhttps://www.linkedin.com/company/ost2
Reddithttps://reddit.com/r/OST2
Twitterhttps://twitter.com/OpenSecTraining
BlueSkyhttps://bsky.app/profile/opensectraining.bsky.social
Threadshttps://www.threads.net/@opensecuritytraining

We are happy to announce that Hex-Rays @HexRaysSA makers of IDA, have become a 🥇Gold-level sponsor of #OST2!

Learn all the latest about their software reverse engineering tools here: https://ost2.fyi/Sponsor_HexRays_SM

This year Binarly has also expanded their sponsorship to the creation of a new Firmware Security Learning Path! https://ost2.fyi/OST2_LP_FWSEC.pdf

This captures current and future plans for classes involving security in the deep-dark of firmware! But Binarly is starting to give visibility into what's going on there with their binary analysis platform.

We are happy to announce that Binarly has renewed their 🥇Gold-level sponsorship of #OST2!

Learn more about what they do in firmware & supply chain security here: https://ost2.fyi/Sponsor_Binarly_SM

With the release of https://ost2.fyi/BT2222, we have posted a brand new OST2 Bluetooth Learning Path which shows future classes that are planned, as well as classes which we need volunteers for. Freshly updated today: https://ost2.fyi/OST2_LP_Bluetooth.pdf

The release of the "Trusted Computing 1102: Intermediate Trusted Platform Module (TPM) usage" class (https://ost2.fyi/TC2202) has updated 3 #OST2 learning paths.

"Secure Software Design & Implementation" - https://ost2.fyi/OST2_LP_SecDev.pdf

"System Security" - https://ost2.fyi/OST2_LP_SysSec.pdf

"Windows Security" - https://ost2.fyi/OST2_LP_Windows.pdf

PDFs are vector-based for full quality when zooming, and have click-to-go-to-class links

📣"Trusted Computing 2202: TPM 2.0 Programming using Python and the tpm2-pytss libraries" by Bill Roberts is now released!📣
https://ost2.fyi/TC2202

This course provides a comprehensive introduction to Trusted Platform Module (TPM) 2.0 programming using the Python-based tpm2-pytss library. Designed for developers, security engineers, and researchers, the course covers both foundational TPM 2.0 concepts and practical hands-on development techniques for interacting with TPM hardware and simulators. This class has a median completion time of 13 hours.

📣"Bluetooth 2222: Bluetooth reconnaissance with Blue2thprinting" is now released!📣
https://ost2.fyi/BT2222

This class teaches you about the 30+ data types that the Blue2thprinting software can collect and surface for when you're trying to determine what a device is, and whether it has any known vulnerabilities. New in v2.0+ is the BTIDALPOOL crowdsourcing server for researchers to push & pull data about devices they've discovered.

Are you making your own luck, by taking (and finishing) OST2 classes?
https://ost2.fyi/Learning-Paths.html

It's time to celebrate #OST2's 4th anniversary!
So what happened this last year at #OST2? Let's take a walk down memory hierarchy lane!

Our most recent class was released just last week by Xusheng Li of @binaryninja https://ost2.fyi/Dbg1103 - Debuggers 1103: Introductory Binary Ninja - (1h53m average, 1h19m median, 0h20m to 11h45m range) is a mini-class that is integrated into the Arch1001: x86-64 assembly class https://ost2.fyi/Arch1001 but can also be taken as a standalone class for those who already know other tools like gdb, windbg, IDA, or Ghidra, and want to learn Binja's interface.

On June 29th Francesco Pollicino released "Fuzzing 1001: Introductory white-box fuzzing with AFL++" https://ost2.fyi/Fuzz1001 (7h57m average, 6h57m median, 2h22m to 40h0m range)
This class is great for both vulnerability hunters who've already taken https://ost2.fyi/Vulns1001 & https://ost2.fyi/Vulns1002, or developers who've taken the equivalent secure development classes https://ost2.fyi/SecDev1001 & https://ost2.fyi/SecDev1002.

On Oct 14th Christina Johns @bitmaize released "Debuggers 1101: Introductory IDA" https://ost2.fyi/Dbg1101 (1h37m average, 1h26m median, 0h34m to 3h45m range).
This mini-class is integrated into the Arch1001: x86-64 assembly class https://ost2.fyi/Arch1001 so students can learn a tool like IDA at the same time they're learning assembly and reverse engineering in the final binary bomb lab. It also provides necessary background about IDA UI usage for the https://ost2.fyi/RE3011 Reversing C++ Binaries class.

On Oct 4th Dimi Tomov of https://tpm.dev provided https://ost2.fyi/TC1102 "Intermediate Trusted Platform Module (TPM) usage" (10h5m median, 12h0m average, 4h13m to 50h4m range)
This class built on the earlier Introductory TPM class https://ost2.fyi/TC1101, and deepens students' capability to program and interact with the TPM in C, covering things like the Endorsement Hierarchy and the Endorsement Key, and machine identity and TPM based identification.

And on Oct 1st. we also posted an updated version of Dimi's https://ost2.fyi/TC1101 "Introductory Trusted Platform Module (TPM) usage" class (8h34m median, 9h55.5m average, 2h54m to 44h36m range), with an additional 27m video requested by students, comparing and contrasting TPMs to other trusted computing technologies like smart cards: https://www.youtube.com/watch?v=51I9VpkOrNU

We want to of course thank all of our instructors who delivered class this past year, or in previous years. Because without them OST2 wouldn't be possible!

We're happy to say that we were able to pay our first honorariums to instructors last year, funded by your donations (https://ost2.fyi/Donate-Money.html), and Partners & Sponsors contributions.

We also want to thank our partners like the Trusted Computing Group, who help us directly fund the creation of new classes like TC2202 (currently in beta) and TC1103 (targeting early 2026.)

Sponsors like Winsider https://ost2.fyi/Sponsor_Winsider_web, Binarly https://ost2.fyi/Sponsor_Binarly, and Cyber5W https://ost2.fyi/Sponsor_Cyber5W provide us with funds to help with overhead costs such as running the site, paying video editors, etc.

Other sponsors like NCC Group, 3mdeb, and @DarkMentor are "donors in kind" who fund their employees making classes for OST2

But we need more sponsors to keep growing! https://ost2.fyi/Sponsorship.html If you want your company to sponsor #OST2, reach out via email at "sponsor at ost2.fyi". It's much more cost effective than sponsoring conferences, and reaches far more people!

Thanks to everyone who's donated individually to OST2 this past year! Whether with corporate matching through work (we are an actual charity registered in the US after all) or individually through the YouTube page, donations shows us that you truly value what we do!

We're committed to using individual donors' funds to always directly pass through to instructors (never for overhead costs), and we'll once again be passing through your thanks to the current instructors as an honorarium this coming year.
https://ost2.fyi/Donate-Money.html

And finally, thanks to all 29k+ folks who are taking classes at OST2! Being able to teach thousands of people at a time how to become better hackers, better engineers, better toolsmiths, and better explorers is why we do what we do! Spread the word and let's make more awesome people!

📣"Debuggers 1103: Introductory Binary Ninja" is released!📣
https://ost2.fyi/Dbg1103

This class by Xusheng Li of Vector 35 @binaryninja provides students with a hands-on introduction to the free version of Binja as a debugger, thus providing decompilation support!

Like all current #OST2 classes, the core content is made fully public, and you only need to register if you want to post to the discussion board or track your class progress. This mini-class takes approximately 2 hours to complete, and can be used as standalone cross-training for people who know other reverse engineering tools, or by students learning assembly for the first time in the https://ost2.fyi/Arch1001 x86-64 Assembly class.