mirror of
https://github.com/vitalysim/Awesome-Hacking-Resources.git
synced 2024-12-18 02:46:24 +00:00
Update README.md
This commit is contained in:
parent
ae304b4ee6
commit
a3c2c74386
@ -43,7 +43,7 @@ Name | Description
|
|||||||
[Free cyber security training](https://www.samsclass.info/) | Academic content, 8 full courses with videos from a quirky instructor sam, links to research, defcon materials and other recommended training/learning
|
[Free cyber security training](https://www.samsclass.info/) | Academic content, 8 full courses with videos from a quirky instructor sam, links to research, defcon materials and other recommended training/learning
|
||||||
[Interactive labs with White Hat Academy](https://ex.whitehat.academy) | 32 labs, easy account sign in with github credentials; this is no longer free content
|
[Interactive labs with White Hat Academy](https://ex.whitehat.academy) | 32 labs, easy account sign in with github credentials; this is no longer free content
|
||||||
[Hak5](https://www.hak5.org/) | podcast-style videos covering various topics, has a forum, "metasploit-minute" video series could be useful
|
[Hak5](https://www.hak5.org/) | podcast-style videos covering various topics, has a forum, "metasploit-minute" video series could be useful
|
||||||
[Hopper's Roppers Security Training](https://hoppersroppers.org/training.html) | Four free self-paced courses on [Computing Fundamentals](https://www.hoppersroppers.org/course.html), [Security](https://www.hoppersroppers.org/courseSecurity.html), [Capture the Flags](https://www.hoppersroppers.org/courseCTF.html), and a [Practical Skills Bootcamp](https://www.hoppersroppers.org/bootcamp.html) that help beginners build a strong base of foundational knowledge. Designed to prepare for students for whatever they need to learn next.
|
[Hopper's Roppers Security Training](https://hoppersroppers.org/training.html) | Four free self-paced courses on Computing Fundamentals, Security, Capture the Flags, and a Practical Skills Bootcamp that help beginners build a strong base of foundational knowledge. Designed to prepare for students for whatever they need to learn next.
|
||||||
[Learning Exploitation with Offensive Computer Security 2.0](http://howto.hackallthethings.com/2016/07/learning-exploitation-with-offensive.html) | blog-style instruction, includes: slides, videos, homework, discussion. No login required.
|
[Learning Exploitation with Offensive Computer Security 2.0](http://howto.hackallthethings.com/2016/07/learning-exploitation-with-offensive.html) | blog-style instruction, includes: slides, videos, homework, discussion. No login required.
|
||||||
[Mind Maps](http://www.amanhardikar.com/mindmaps.html) | Information Security related Mind Maps
|
[Mind Maps](http://www.amanhardikar.com/mindmaps.html) | Information Security related Mind Maps
|
||||||
[MIT OCW 6.858 Computer Systems Security](https://ocw.mit.edu/courses/electrical-engineering-and-computer-science/6-858-computer-systems-security-fall-2014/) | academic content, well organized, full-semester course, includes assigned readings, lectures, videos, required lab files.
|
[MIT OCW 6.858 Computer Systems Security](https://ocw.mit.edu/courses/electrical-engineering-and-computer-science/6-858-computer-systems-security-fall-2014/) | academic content, well organized, full-semester course, includes assigned readings, lectures, videos, required lab files.
|
||||||
|
Loading…
Reference in New Issue
Block a user