From a3c2c7438632e037d58b223cbeea1ab1412ef01a Mon Sep 17 00:00:00 2001 From: Dennis Devey Date: Mon, 20 Apr 2020 20:04:58 -0700 Subject: [PATCH] Update README.md --- README.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/README.md b/README.md index e742744..4953e41 100644 --- a/README.md +++ b/README.md @@ -43,7 +43,7 @@ Name | Description [Free cyber security training](https://www.samsclass.info/) | Academic content, 8 full courses with videos from a quirky instructor sam, links to research, defcon materials and other recommended training/learning [Interactive labs with White Hat Academy](https://ex.whitehat.academy) | 32 labs, easy account sign in with github credentials; this is no longer free content [Hak5](https://www.hak5.org/) | podcast-style videos covering various topics, has a forum, "metasploit-minute" video series could be useful -[Hopper's Roppers Security Training](https://hoppersroppers.org/training.html) | Four free self-paced courses on [Computing Fundamentals](https://www.hoppersroppers.org/course.html), [Security](https://www.hoppersroppers.org/courseSecurity.html), [Capture the Flags](https://www.hoppersroppers.org/courseCTF.html), and a [Practical Skills Bootcamp](https://www.hoppersroppers.org/bootcamp.html) that help beginners build a strong base of foundational knowledge. Designed to prepare for students for whatever they need to learn next. +[Hopper's Roppers Security Training](https://hoppersroppers.org/training.html) | Four free self-paced courses on Computing Fundamentals, Security, Capture the Flags, and a Practical Skills Bootcamp that help beginners build a strong base of foundational knowledge. Designed to prepare for students for whatever they need to learn next. [Learning Exploitation with Offensive Computer Security 2.0](http://howto.hackallthethings.com/2016/07/learning-exploitation-with-offensive.html) | blog-style instruction, includes: slides, videos, homework, discussion. No login required. [Mind Maps](http://www.amanhardikar.com/mindmaps.html) | Information Security related Mind Maps [MIT OCW 6.858 Computer Systems Security](https://ocw.mit.edu/courses/electrical-engineering-and-computer-science/6-858-computer-systems-security-fall-2014/) | academic content, well organized, full-semester course, includes assigned readings, lectures, videos, required lab files.