{"id":15076076,"url":"https://github.com/getvmio/free-security-resources","last_synced_at":"2025-02-26T17:41:52.497Z","repository":{"id":251137180,"uuid":"822445602","full_name":"getvmio/free-security-resources","owner":"getvmio","description":"Security Free Resources | This repo collects 38 of free resources for Security. 🔐 Become a guardian of the digital realm with our Security Sentinel repository! Offering a comprehensive collection of free cybersecurity resources and hands-on learning opportunities, this is your training ground for...","archived":false,"fork":false,"pushed_at":"2025-02-01T02:17:29.000Z","size":16,"stargazers_count":0,"open_issues_count":0,"forks_count":0,"subscribers_count":1,"default_branch":"main","last_synced_at":"2025-02-11T05:01:51.576Z","etag":null,"topics":["awesome-list","free-resources","getvm","playground","programming","security"],"latest_commit_sha":null,"homepage":"https://getvm.io/tutorials/category/security","language":null,"has_issues":false,"has_wiki":null,"has_pages":null,"mirror_url":null,"source_name":null,"license":null,"status":null,"scm":"git","pull_requests_enabled":true,"icon_url":"https://github.com/getvmio.png","metadata":{"files":{"readme":"README.md","changelog":null,"contributing":null,"funding":null,"license":null,"code_of_conduct":null,"threat_model":null,"audit":null,"citation":null,"codeowners":null,"security":null,"support":null,"governance":null,"roadmap":null,"authors":null,"dei":null,"publiccode":null,"codemeta":null}},"created_at":"2024-07-01T07:05:51.000Z","updated_at":"2025-02-01T02:17:33.000Z","dependencies_parsed_at":"2024-11-11T10:48:01.902Z","dependency_job_id":"8b4532ef-3d89-448e-814f-b4c133be6891","html_url":"https://github.com/getvmio/free-security-resources","commit_stats":null,"previous_names":["getvmio/free-security-resources"],"tags_count":0,"template":false,"template_full_name":null,"repository_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/getvmio%2Ffree-security-resources","tags_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/getvmio%2Ffree-security-resources/tags","releases_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/getvmio%2Ffree-security-resources/releases","manifests_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/getvmio%2Ffree-security-resources/manifests","owner_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners/getvmio","download_url":"https://codeload.github.com/getvmio/free-security-resources/tar.gz/refs/heads/main","host":{"name":"GitHub","url":"https://github.com","kind":"github","repositories_count":240317407,"owners_count":19782388,"icon_url":"https://github.com/github.png","version":null,"created_at":"2022-05-30T11:31:42.601Z","updated_at":"2022-07-04T15:15:14.044Z","host_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub","repositories_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories","repository_names_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repository_names","owners_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners"}},"keywords":["awesome-list","free-resources","getvm","playground","programming","security"],"created_at":"2024-09-25T03:57:52.218Z","updated_at":"2025-02-26T17:41:52.473Z","avatar_url":"https://github.com/getvmio.png","language":null,"readme":"# Security Free Resources\n\n🔐 Become a guardian of the digital realm with our Security Sentinel repository! Offering a comprehensive collection of free cybersecurity resources and hands-on learning opportunities, this is your training ground for mastering digital defense techniques and staying ahead of cyber threats.\n\n## Resources\n\n|   Index | Name                                                                                                                                                                            | Category            | Description                                                                                                                                                                                                                                         |\n|---------|---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|---------------------|-----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|\n|       1 | [Foundations of Cryptography](https://getvm.io/tutorials/cs-276-foundations-of-cryptography-uc-berkeley)                                                                        | University Courses  | Explore the complexity-theory foundations of modern cryptography and the latest advancements, including Fully Homomorphic Encryption, Indistinguishability Obfuscation, and MPC.                                                                    |\n|       2 | [Linux for Hackers and Pentesters](https://getvm.io/tutorials/linux-for-hackers-and-pentesters)                                                                                 | Video Courses       | Comprehensive Linux-based hacking and penetration testing course, covering ethical hacking techniques and cybersecurity skills.                                                                                                                     |\n|       3 | [Ethical Hacking From Scratch](https://getvm.io/tutorials/ethical-hacking-from-scratch-the-complete-course)                                                                     | Video Courses       | Learn ethical hacking and cybersecurity from scratch. Understand hacking techniques, prevent cyber attacks, and secure computer systems like a security expert.                                                                                     |\n|       4 | [Ethical Hacking](https://getvm.io/tutorials/ethical-hacking-sql-injection-attack)                                                                                              | Video Courses       | Comprehensive course on SQL injection attacks and ethical hacking practices, covering cybersecurity, database security, and Kali Linux tools.                                                                                                       |\n|       5 | [Secure Programming HOWTO - Creating Secure Software](https://getvm.io/tutorials/secure-programming-howto-creating-secure-software)                                             | Technical Tutorials | Comprehensive guide on creating secure software, covering best practices for C, C++, Java, Perl, Python, and more. Highly recommended for software developers.                                                                                      |\n|       6 | [Kali Linux 2018: Assuring Security by Penetration Testing, Fourth Edition](https://getvm.io/tutorials/kali-linux-2018-assuring-security-by-penetration-testing-fourth-edition) | Technical Tutorials | Comprehensive guide to Kali Linux, the most popular open-source penetration testing distribution. Master the latest version and the most useful tools for penetration testing.                                                                      |\n|       7 | [The Joy of Cryptography (2021)](https://getvm.io/tutorials/the-joy-of-cryptography-2021)                                                                                       | Technical Tutorials | Comprehensive guide to modern cryptography, covering fundamentals of provable security, secure composition of cryptographic building blocks, and a solid theoretical foundation.                                                                    |\n|       8 | [Programming Differential Privacy](https://getvm.io/tutorials/programming-differential-privacy)                                                                                 | Technical Tutorials | Comprehensive guide to programming differential privacy, using Python examples and interactive chapters. Suitable for computer science undergraduates.                                                                                              |\n|       9 | [Practical Cryptography for Developer](https://getvm.io/tutorials/practical-cryptography-for-developer)                                                                         | Technical Tutorials | Comprehensive guide to cryptography, blockchain, and security for developers. Learn practical techniques, algorithms, and best practices for implementing secure applications.                                                                      |\n|      10 | [Gray Hat Hacking: The Ethical Hackers Handbook](https://getvm.io/tutorials/gray-hat-hacking-the-ethical-hackers-handbook)                                                      | Technical Tutorials | Comprehensive guide covering ethical hacking, cybersecurity, and gray hat hacking techniques. Suitable for beginners and experienced professionals.                                                                                                 |\n|      11 | [Cryptography: Secure Communication \u0026 Data Protection](https://getvm.io/tutorials/cryptography)                                                                                 | Technical Tutorials | Comprehensive guide to cryptographic principles, encryption techniques, and information security. Explore the history, evolution, and practical applications of cryptography.                                                                       |\n|      12 | [Cryptography](https://getvm.io/tutorials/mooc-cryptography-coursera)                                                                                                           | University Courses  | Comprehensive introduction to cryptography principles, techniques, and applications. Hands-on exercises, programming assignments, and expert instruction.                                                                                           |\n|      13 | [Network Security and Cryptography](https://getvm.io/tutorials/csn09112-network-security-and-cryptography-bill-buchanan-edinburgh-napier)                                       | University Courses  | Explore secure infrastructures and gain hands-on experience in network security and cryptography. Covers Intrusion Detection, Ciphers, Public Key, Blockchain, and more.                                                                            |\n|      14 | [Security Testing and Network Forensics](https://getvm.io/tutorials/csn10107-security-testing-and-network-forensics-bill-buchanan-edinburgh-napier)                             | University Courses  | Comprehensive course covering security testing, network forensics, SIEM, malware analysis, and more. Hands-on labs and cloud-based resources for practical learning.                                                                                |\n|      15 | [Advanced Cloud and Network Forensics](https://getvm.io/tutorials/csn11123-advanced-cloud-and-network-forensics-bill-buchanan-edinburgh-napier)                                 | University Courses  | Comprehensive course on advanced cloud and network forensics, covering malware analysis, SIEM, and data loss prevention. Taught by experienced instructor Bill Buchanan from Edinburgh Napier University.                                           |\n|      16 | [Cryptography](https://getvm.io/tutorials/csn11117-e-security-bill-buchanan-edinburgh-napier)                                                                                   | University Courses  | Comprehensive course covering cryptography, symmetric and asymmetric key cryptography, hashing, key exchange, cryptocurrencies, and blockchain. Ideal for students and professionals interested in cybersecurity and secure communication.          |\n|      17 | [Telecommunications](https://getvm.io/tutorials/csn08704-telecommunications-bill-buchanan-edinburgh-napier)                                                                     | University Courses  | Comprehensive course covering fundamental topics in data communications, real-time signals, wireless networks, and more. Suitable for students, engineers, and professionals interested in understanding the core principles of telecommunications. |\n|      18 | [Incident Response and Malware Analysis](https://getvm.io/tutorials/csn11128-incident-response-and-malware-analysis-bill-buchanan-edinburgh-napier)                             | University Courses  | Develop expertise in incident response and malware analysis with a focus on virtualized environments. Comprehensive and practical approach to security incident response and threat analysis.                                                       |\n|      19 | [Internet Security for Beginners](https://getvm.io/tutorials/internet-security-for-beginners-by-dr-christoph-meinel-hpi)                                                        | University Courses  | Comprehensive introduction to internet security, covering threats, vulnerabilities, and defense mechanisms. Taught by leading expert Dr. Christoph Meinel.                                                                                          |\n|      20 | [Cryptography and Network Security](https://getvm.io/tutorials/cryptography-and-network-security-iit-kharagpur)                                                                 | University Courses  | Comprehensive overview of cryptography and network security, covering fundamental concepts, algorithms, and protocols. Explore secure communication, authentication, and data protection in modern digital networks.                                |\n|      21 | [Introduction to Information Security I](https://getvm.io/tutorials/introduction-to-information-security-i-iit-madras)                                                          | University Courses  | Comprehensive coverage of information security principles and techniques, with hands-on labs and expert faculty from IIT Madras.                                                                                                                    |\n|      22 | [Information Security - II](https://getvm.io/tutorials/information-security-ii-iit-madras)                                                                                      | University Courses  | Comprehensive course on information security principles, cryptography, network security, and secure software development. Taught by experienced faculty from IIT Madras.                                                                            |\n|      23 | [Privacy and Security in Online Social Networks](https://getvm.io/tutorials/privacy-and-security-in-online-social-networks-iit-madras)                                          | University Courses  | Explore the privacy and security challenges in online social networks with this comprehensive course from IIT Madras. Learn techniques to protect user privacy and secure social media platforms.                                                   |\n|      24 | [Introduction to Cryptology](https://getvm.io/tutorials/introduction-to-cryptology-iit-roorkee)                                                                                 | University Courses  | Explore the fundamentals of cryptology and secure communication with this comprehensive course from IIT Roorkee. Gain hands-on experience and insights into real-world applications.                                                                |\n|      25 | [Cryptography](https://getvm.io/tutorials/6875-cryptography-spring-2018-mit)                                                                                                    | University Courses  | Explore the fundamentals of cryptography, including symmetric-key, public-key, and cryptographic hash functions, taught by renowned experts at MIT.                                                                                                 |\n|      26 | [Computer Systems Security](https://getvm.io/tutorials/6858-computer-systems-security-mit-ocw)                                                                                  | University Courses  | Comprehensive graduate-level course covering the latest techniques and tools for securing computer systems, including control hijacking attacks, software security, network security, and web security.                                             |\n|      27 | [Malware Dynamic Analysis](https://getvm.io/tutorials/malware-dynamic-analysis-open-securitytraining)                                                                           | University Courses  | Dive into dynamic malware analysis, learn techniques for safe malware execution, and gain essential skills for effective malware investigation and mitigation.                                                                                      |\n|      28 | [Introduction to Cryptography](https://getvm.io/tutorials/introduction-to-cryptography-christof-paar-ruhr-university-bochum-germany)                                            | University Courses  | Comprehensive course covering classical and modern cryptographic algorithms, with hands-on exercises and insights from an experienced professor in the field of cryptography.                                                                       |\n|      29 | [Web Security](https://getvm.io/tutorials/cs-253-web-security-stanford-university)                                                                                              | University Courses  | Comprehensive web security course from Stanford University, covering vulnerabilities, browser security, and secure development practices.                                                                                                           |\n|      30 | [IT Security](https://getvm.io/tutorials/it-security-steven-gordon-thammasat-university-thailand)                                                                               | University Courses  | Comprehensive IT security course covering network security, access control, and cryptography. Practical exercises and case studies for hands-on learning.                                                                                           |\n|      31 | [Security and Cryptography](https://getvm.io/tutorials/security-and-cryptography-steven-gordon-thammasat-university-thailand)                                                   | University Courses  | Comprehensive course on security and cryptography concepts, covering encryption, authentication, and secure communication. Taught by experienced instructor Steven Gordon.                                                                          |\n|      32 | [Computer Security](https://getvm.io/tutorials/cs-161-computer-security-uc-berkeley)                                                                                            | University Courses  | Comprehensive computer security course at UC Berkeley covering topics like memory safety, cryptography, and web security. Hands-on projects and experienced instructors.                                                                            |\n|      33 | [Foundations of Computer \u0026 Information Security](https://getvm.io/tutorials/ecs235b-foundations-of-computer-and-information-security-uc-davis)                                  | University Courses  | Comprehensive overview of computer and information security principles, threats, cryptography, access control, and network security. Ideal for students and professionals in computer science and cybersecurity.                                    |\n|      34 | [Intro to Information Security](https://getvm.io/tutorials/mooc-intro-to-information-security-udacity)                                                                          | University Courses  | Gain a foundational understanding of information security and cybersecurity best practices. Explore cyber threats, risk assessment, and hands-on activities.                                                                                        |\n|      35 | [Computer Security](https://getvm.io/tutorials/cs461ece422-computer-security-university-of-illinois-at-urbana-champaign)                                                        | University Courses  | Develop the skills to build and manage secure systems with this comprehensive computer security course from the University of Illinois Urbana-Champaign.                                                                                            |\n|      36 | [Practical Aspects of Modern Cryptography](https://getvm.io/tutorials/csep590a-practical-aspects-of-modern-cryptography-winter-2011-university-of-washington)                   | University Courses  | Explore the latest developments in cryptography with hands-on assignments and a final project, taught by experts from Microsoft Research.                                                                                                           |\n|      37 | [Computer \u0026 Network Security](https://getvm.io/tutorials/ics-444-computer-network-security)                                                                                     | University Courses  | Comprehensive course on computer and network security, covering cryptography, access control, security protocols, and ethical hacking. Hands-on experience with security tools and real-world case studies.                                         |\n|      38 | [Offensive Security](https://getvm.io/tutorials/offensive-security-and-reverse-engineering-chaplain-university-by-ali-hadi)                                                     | University Courses  | Comprehensive course on offensive security and reverse engineering techniques, taught by experienced security professional Ali Hadi. Develop practical skills for a career in cybersecurity, penetration testing, or software security analysis.    |\n\n## More\n\n- [Free JavaScript Resources](https://github.com/getvmio/free-javascript-resources)\n- [Free HTML Resources](https://github.com/getvmio/free-html-resources)\n- [Free R Resources](https://github.com/getvmio/free-r-resources)\n- [Free Java Resources](https://github.com/getvmio/free-java-resources)\n- [Free Neural Networks Resources](https://github.com/getvmio/free-neural-networks-resources)\n- [Free Natural Language Processing Resources](https://github.com/getvmio/free-natural-language-processing-resources)\n- [Free Computer Science Resources](https://github.com/getvmio/free-computer-science-resources)\n- [Free React Resources](https://github.com/getvmio/free-react-resources)\n- [Free Node.js Resources](https://github.com/getvmio/free-node-js-resources)\n- [Free PyTorch Resources](https://github.com/getvmio/free-pytorch-resources)\n- [Free Computer Architecture Resources](https://github.com/getvmio/free-computer-architecture-resources)\n- [Free Functional Programming Resources](https://github.com/getvmio/free-functional-programming-resources)\n- [Free Operating System Resources](https://github.com/getvmio/free-operating-system-resources)\n- [Free Cryptography Resources](https://github.com/getvmio/free-cryptography-resources)\n- [Free Compiler Resources](https://github.com/getvmio/free-compiler-resources)\n- [Free Blockchain Resources](https://github.com/getvmio/free-blockchain-resources)\n- [Free SQL Resources](https://github.com/getvmio/free-sql-resources)\n- [Free Python Resources](https://github.com/getvmio/free-python-resources)\n- [Free Unix Resources](https://github.com/getvmio/free-unix-resources)\n- [Free Programming Resources](https://github.com/getvmio/free-programming-resources)\n- [Free Object-Oriented Programming Resources](https://github.com/getvmio/free-object-oriented-programming-resources)\n- [Free CSS Resources](https://github.com/getvmio/free-css-resources)\n- [Free Machine Learning Resources](https://github.com/getvmio/free-machine-learning-resources)\n- [Free Web Development Resources](https://github.com/getvmio/free-web-development-resources)\n- [Free Shell Scripting Resources](https://github.com/getvmio/free-shell-scripting-resources)\n- [Free Rust Resources](https://github.com/getvmio/free-rust-resources)\n- [Free Haskell Resources](https://github.com/getvmio/free-haskell-resources)\n- [Free Software Development Resources](https://github.com/getvmio/free-software-development-resources)\n- [Free Data Science Resources](https://github.com/getvmio/free-data-science-resources)\n- [Free Git Resources](https://github.com/getvmio/free-git-resources)\n- [Free Networking Resources](https://github.com/getvmio/free-networking-resources)\n- [Free Game Development Resources](https://github.com/getvmio/free-game-development-resources)\n- [Free TensorFlow Resources](https://github.com/getvmio/free-tensorflow-resources)\n- [Free Distributed Systems Resources](https://github.com/getvmio/free-distributed-systems-resources)\n- [Free Embedded Systems Resources](https://github.com/getvmio/free-embedded-systems-resources)\n- [Free DevOps Resources](https://github.com/getvmio/free-devops-resources)\n- [Free Docker Resources](https://github.com/getvmio/free-docker-resources)\n- [Free Robotics Resources](https://github.com/getvmio/free-robotics-resources)\n- [Free Computer Vision Resources](https://github.com/getvmio/free-computer-vision-resources)\n- [Free Deep Learning Resources](https://github.com/getvmio/free-deep-learning-resources)\n- [Free Cloud Computing Resources](https://github.com/getvmio/free-cloud-computing-resources)\n- [Free Go Resources](https://github.com/getvmio/free-go-resources)\n- [Free Data Structures Resources](https://github.com/getvmio/free-data-structures-resources)\n- [Free Control Systems Resources](https://github.com/getvmio/free-control-systems-resources)\n- [Free Artificial Intelligence Resources](https://github.com/getvmio/free-artificial-intelligence-resources)\n- [Free Data Analysis Resources](https://github.com/getvmio/free-data-analysis-resources)\n- [Free Ruby Resources](https://github.com/getvmio/free-ruby-resources)\n- [Free C++ Resources](https://github.com/getvmio/free-cpp-resources)\n- [Free Bash Resources](https://github.com/getvmio/free-bash-resources)\n- [Free Cybersecurity Resources](https://github.com/getvmio/free-cybersecurity-resources)\n- [Free Algorithm Resources](https://github.com/getvmio/free-algorithm-resources)\n- [Free Database Resources](https://github.com/getvmio/free-database-resources)\n- [Free C Resources](https://github.com/getvmio/free-c-resources)\n- [Free Version Control Resources](https://github.com/getvmio/free-version-control-resources)\n- [Free Linux Resources](https://github.com/getvmio/free-linux-resources)\n- [Free Computer Graphics Resources](https://github.com/getvmio/free-computer-graphics-resources)\n","funding_links":[],"categories":["More","Other Lists"],"sub_categories":["TeX Lists"],"project_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fgetvmio%2Ffree-security-resources","html_url":"https://awesome.ecosyste.ms/projects/github.com%2Fgetvmio%2Ffree-security-resources","lists_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fgetvmio%2Ffree-security-resources/lists"}