Topics in Defensive Security

SecKnitKit

Bash

Includes modules on:

  • VirtualBox setup and utilization
  • Network security (TCP/IP, traffic analysis)
  • Operating systems (access control, authentication)
  • Database (permissions, integrity, database views)

EDURange

C/Bash/Python

Includes modules on:

  • SSH, Linux
  • Networking
  • Malware analysis
  • Network tracing/analysis

Security Injections: Secure Coding

No programming

Includes modules on:

  • Security trade-offs
  • Beware of input buffer misbehavior
  • Industrial control systems
  • Mobile risk management

SEED Labs

C/Bash/SQL/JS

Includes modules on:

  • Network security (firewall, VPN, IPsec)
  • System security (Linux capability exploration, RBAC, encrypted file system)
  • Cryptography (MD5 collision)
  • Mobile security (Android, Ubuntu)

NICE Challenge

Hands-on labs

Includes modules on:

  • Customer service and technical support
  • Cybersecurity defense analysis
  • Cybersecurity defense infrastructure support
  • Data administration
  • Digital forensics
  • Incident response
  • Network services
  • System administration
  • System analysis

Malware Unicorn's Reverse Engineering Workshops

C/X86 Assembly

Includes modules on:

  • Triage Analysis
  • Static Analysis
  • Dynamic Analysis
  • Identifying Encryption and Decrytion Algorithms
  • Writing a Decryptor
  • Evasion Techniques
  • Debugging Around Evasion
  • Packing and Unpacking

Azeria Labs

Hands-on labs

Includes modules on:

  • ARM Assembly Basics
  • Binary Exploitation
  • ARM Lab (VM)
  • Emulate Raspberry Pi with QEMU
  • Debugging with GDB and GEF