OpenSecurityTraining2's Avatar

OpenSecurityTraining2

@opensectraining

501(c)(3) Nonprofit providing Open Source and Open Access computer security training material. #OST2 re-launched July 2021!

167
Followers
6
Following
111
Posts
14.11.2024
Joined
Posts Following

Latest posts by OpenSecurityTraining2 @opensectraining

Reverse Engineering 3201 Short URL Redirect

Tired of guessing inputs? Let the computer do the work! Learn about symbolic execution from @barbieauglend.bsky.social in "Reverse Engineering 3201" ost2.fyi/RE3201 and use SMT solvers to find the exact inputs to reach vulnerable code. Stop guessing, start solving!

09.03.2026 11:09 πŸ‘ 2 πŸ” 2 πŸ’¬ 0 πŸ“Œ 0

We're happy to say that we're now over 34k students at OST2! πŸ™ŒπŸ₯³πŸš€

09.03.2026 11:08 πŸ‘ 4 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0

But any topic is welcomed and encouraged! HMU at that email below if you're interested in getting funded to create a class and make it freely available to the world!

06.03.2026 14:13 πŸ‘ 1 πŸ” 1 πŸ’¬ 0 πŸ“Œ 0

We're in discussion to form a partnership with the UEFI Forum. But as part of that we need to propose classes that can be taught on the topics they're involved with. Things like UEFI Measured Boot in particular would make a lot of sense now that we have robust TPM classes at OST2.

06.03.2026 14:13 πŸ‘ 2 πŸ” 1 πŸ’¬ 1 πŸ“Œ 0
OpenSecurityTraining2 - Training RFPs

OST2 is putting out a request for proposals for an opportunity to be funded to create classes on UEFI and/or ACPI. If you are interested, please reach out to teachπŸŒ€ost2.fyi with a proposed class syllabus.
ost2.fyi/Training-RFP...

06.03.2026 14:13 πŸ‘ 3 πŸ” 4 πŸ’¬ 0 πŸ“Œ 2

Final call for beta testers! The class will begin later today!

16.01.2026 13:47 πŸ‘ 2 πŸ” 1 πŸ’¬ 0 πŸ“Œ 0
Post image

We are happy to announce that AMI has become a πŸ₯‡Gold-level sponsor of #OST2!

Learn about their work creating firmware across the industry here: ost2.fyi/Sponsor_AMI_SM

12.01.2026 11:59 πŸ‘ 2 πŸ” 1 πŸ’¬ 0 πŸ“Œ 1

Our Trusted Computing "Advanced TPM usage" class will begin this week. Sign up below.

12.01.2026 11:54 πŸ‘ 3 πŸ” 1 πŸ’¬ 0 πŸ“Œ 0

-Β Advanced TPM Policy usage using tpm2-tools and tpm2-tss
-Β Policy using locality
-Β Policy using the TPM clock and reset
- Policy using the TPM's internal NVRAM
- Handling external keys using a TPM

06.01.2026 11:52 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0

The topics for TC1103 are:
-Β Introduction to the Feature API (FAPI)
-Β Creating keys using FAPI
- Policy using FAPI
-Β Full-disk encryption primitive (FDE) using a TPM
-Β TPM operations for FDE
...

06.01.2026 11:52 πŸ‘ 0 πŸ” 0 πŸ’¬ 1 πŸ“Œ 0

🧡Like TC1101 & TC1102, TC1103 has the goal of helping developers get bootstrapped on using TPMs more quickly than if they were to just rely on reading the spec or API documents alone.

06.01.2026 11:52 πŸ‘ 1 πŸ” 1 πŸ’¬ 1 πŸ“Œ 0
Preview
TC1103: Advanced TPM Usage Beta Testing Pre-Class Survey TC1103 will take approximately 7 hours to complete, and will begin January 16th, and end February 13th. TC1103 is the follow up to TC1101 Intro TPM usage (https://ost2.fyi/TC1101) & TC1102 Intermedia...

πŸ“’Call for beta testers!πŸ“’
forms.gle/9QgwVSstXi7n...

The beta for Trusted Computing 1103: Advanced TPM Usage will start Jan 16th. It will take ~7 hours to complete. Sign up above if you're interested in participating. (Note: ost2.fyi/TC1101 & ost2.fyi/TC1102 are strongly recommended prerequisites.)

06.01.2026 11:52 πŸ‘ 2 πŸ” 1 πŸ’¬ 0 πŸ“Œ 3

In 2026 we will be fundraising to add a gamification plugin to our Open edX servers. This will add a leaderboard for learners, and provide a new way to track your sub-class-granularity skills that you're picking up on the site. To help early, donate here: www.every.org/ost2/f/lets-...

29.12.2025 12:56 πŸ‘ 3 πŸ” 1 πŸ’¬ 0 πŸ“Œ 0

We're always looking for more sponsors for #OST2! If your company wants to support creating better security engineers everywhere in the world, get in touch!

29.12.2025 12:55 πŸ‘ 1 πŸ” 1 πŸ’¬ 0 πŸ“Œ 0

We've got a decent number of instructors in the queue to create new classes in 2026 too, but we can always use more! Classes are a significant investment of time, but they also pay off in a significant way for the number of people you will help over many years!

29.12.2025 12:54 πŸ‘ 3 πŸ” 1 πŸ’¬ 0 πŸ“Œ 0

#OST2 has a ton of material that's relevant to RE. And our ost2.fyi/Dbg1101 introduction to IDA as a debugger class instructor, Christina Johns, is working on the "Reverse Engineering 2001: Introductory Static Analysis of C-based programs" class, which will unlock opportunities for many new classes!

15.12.2025 11:38 πŸ‘ 3 πŸ” 1 πŸ’¬ 1 πŸ“Œ 0
Bluetooth 2222: Bluetooth reconnaissance with Blue2thprinting Short URL Redirect

* Xeno Kovah - Bluetooth 2222: Bluetooth reconnaissance with Blue2thprinting - ost2.fyi/BT2222

If you've got an idea for a class that you want to share with 33k friends, reach out at teach πŸŒ€ ost2.fyi!

29.12.2025 12:28 πŸ‘ 2 πŸ” 1 πŸ’¬ 0 πŸ“Œ 0
"Trusted Computing 2202: TPM 2.0 Programming using Python and the tpm2-pytss libraries" Short URL Redirect

* Bill Roberts - Trusted Computing 2202: TPM 2.0 Programming using Python and the tpm2-pytss libraries - ost2.fyi/TC2202

...

29.12.2025 12:28 πŸ‘ 2 πŸ” 1 πŸ’¬ 1 πŸ“Œ 0
Debuggers 1103 Introductory Binary Ninja Short URL Redirect

* Xusheng Li - Debuggers 1103: Introductory Binary Ninja - ost2.fyi/Dbg1103
...

29.12.2025 12:28 πŸ‘ 3 πŸ” 1 πŸ’¬ 1 πŸ“Œ 0
Fuzzing 1001 Short URL Redirect

🧡A special thanks to the instructors who stepped up in 2025 to release new classes:

* Francesco Pollicino - Fuzzing 1001: Introductory white-box fuzzing with AFL++ - ost2.fyi/Fuzz1001

...

29.12.2025 12:28 πŸ‘ 3 πŸ” 1 πŸ’¬ 1 πŸ“Œ 1

and Bronze Sponsor Cyber5W @cyber5w.bsky.social, all of whom help keep the servers running, and contribute towards instructor honorariums.

29.12.2025 12:25 πŸ‘ 1 πŸ” 1 πŸ’¬ 0 πŸ“Œ 0

And also thanks to our Gold Sponsors, 3mdeb, Binarly @binarly.bsky.social, Dark Mentor @darkmentor.com, Hex-Rays @hex-rays.bsky.social, NCCGroup @nccgroupinfosec.bsky.social ...

29.12.2025 12:25 πŸ‘ 2 πŸ” 3 πŸ’¬ 1 πŸ“Œ 1

We also want to give another shout-out to our Partner, Trusted Computing Group for helping to fund classes about how to build secure systems.

29.12.2025 12:23 πŸ‘ 1 πŸ” 1 πŸ’¬ 0 πŸ“Œ 0

A sincere thank you to everyone who donated to #OST2 as an individual in 2025(especially those who used corporate non-profit donation matching)! Your donations go directly to instructors as an honorarium, and show them that you value what they do for OST2 and you want them to keep helping the world!

29.12.2025 12:21 πŸ‘ 4 πŸ” 1 πŸ’¬ 0 πŸ“Œ 1
Post image

We are happy to announce that Hex-Rays @hex-rays.bsky.social, makers of IDA, have become a πŸ₯‡Gold-level sponsor of #OST2!

Learn all the latest about their software reverse engineering tools here: ost2.fyi/Sponsor_HexR...

15.12.2025 11:19 πŸ‘ 4 πŸ” 0 πŸ’¬ 0 πŸ“Œ 1

While we've had an overwhelming turn out in registration for this class, we still wanted to remind people that there's still time to sign up; since our beta classes are when the instructor is actively watching the forums and responding to feedback.

24.11.2025 01:33 πŸ‘ 2 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0

Periodic call for volunteers: We're looking for classes on Apple ecosystem security. E.g. OS internals, binary formats, malware analysis, vulnerability hunting, etc. If you're interested in sharing what you know, reach out at teachπŸŒ€ost2.fyi

14.11.2025 13:37 πŸ‘ 3 πŸ” 2 πŸ’¬ 0 πŸ“Œ 0

By the end, you’ll not only understand how emulators workβ€”you’ll be able to build, modify, and analyze them for research, debugging, and vulnerability discovery.

14.11.2025 12:10 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0

The course combines hands-on labs, in-browser exercises, and conceptual lectures to bridge theory and practice, preparing students to tackle topics such as system emulation, hardware-assisted execution, and fuzzing of embedded targets.

14.11.2025 12:10 πŸ‘ 0 πŸ” 0 πŸ’¬ 1 πŸ“Œ 0

You will start by understanding what emulation truly meansβ€”how software can imitate hardwareβ€”and progressively build your own 8-bit CPU emulator in Python (SimpleProc-8), extend it with interrupts, I/O, and MMIO, and finally instrument real-world emulators like QEMU.

14.11.2025 12:10 πŸ‘ 0 πŸ” 0 πŸ’¬ 1 πŸ“Œ 0