π Become a guardian of the digital realm with our Security Sentinel repository! Offering a comprehensive collection of free cybersecurity resources and hands-on learning opportunities, this is your training ground for mastering digital defense techniques and staying ahead of cyber threats.
Index | Name | Category | Description |
---|---|---|---|
1 | Foundations of Cryptography | University Courses | Explore the complexity-theory foundations of modern cryptography and the latest advancements, including Fully Homomorphic Encryption, Indistinguishability Obfuscation, and MPC. |
2 | Linux for Hackers and Pentesters | Video Courses | Comprehensive Linux-based hacking and penetration testing course, covering ethical hacking techniques and cybersecurity skills. |
3 | Ethical Hacking From Scratch | Video Courses | Learn ethical hacking and cybersecurity from scratch. Understand hacking techniques, prevent cyber attacks, and secure computer systems like a security expert. |
4 | Ethical Hacking | Video Courses | Comprehensive course on SQL injection attacks and ethical hacking practices, covering cybersecurity, database security, and Kali Linux tools. |
5 | Secure Programming HOWTO - Creating Secure Software | Technical Tutorials | Comprehensive guide on creating secure software, covering best practices for C, C++, Java, Perl, Python, and more. Highly recommended for software developers. |
6 | Kali Linux 2018: Assuring Security by Penetration Testing, Fourth Edition | Technical Tutorials | Comprehensive guide to Kali Linux, the most popular open-source penetration testing distribution. Master the latest version and the most useful tools for penetration testing. |
7 | The Joy of Cryptography (2021) | Technical Tutorials | Comprehensive guide to modern cryptography, covering fundamentals of provable security, secure composition of cryptographic building blocks, and a solid theoretical foundation. |
8 | Programming Differential Privacy | Technical Tutorials | Comprehensive guide to programming differential privacy, using Python examples and interactive chapters. Suitable for computer science undergraduates. |
9 | Practical Cryptography for Developer | Technical Tutorials | Comprehensive guide to cryptography, blockchain, and security for developers. Learn practical techniques, algorithms, and best practices for implementing secure applications. |
10 | Gray Hat Hacking: The Ethical Hackers Handbook | Technical Tutorials | Comprehensive guide covering ethical hacking, cybersecurity, and gray hat hacking techniques. Suitable for beginners and experienced professionals. |
11 | Cryptography: Secure Communication & Data Protection | Technical Tutorials | Comprehensive guide to cryptographic principles, encryption techniques, and information security. Explore the history, evolution, and practical applications of cryptography. |
12 | Cryptography | University Courses | Comprehensive introduction to cryptography principles, techniques, and applications. Hands-on exercises, programming assignments, and expert instruction. |
13 | Network Security and Cryptography | University Courses | Explore secure infrastructures and gain hands-on experience in network security and cryptography. Covers Intrusion Detection, Ciphers, Public Key, Blockchain, and more. |
14 | Security Testing and Network Forensics | University Courses | Comprehensive course covering security testing, network forensics, SIEM, malware analysis, and more. Hands-on labs and cloud-based resources for practical learning. |
15 | Advanced Cloud and Network Forensics | University Courses | Comprehensive course on advanced cloud and network forensics, covering malware analysis, SIEM, and data loss prevention. Taught by experienced instructor Bill Buchanan from Edinburgh Napier University. |
16 | Cryptography | University Courses | Comprehensive course covering cryptography, symmetric and asymmetric key cryptography, hashing, key exchange, cryptocurrencies, and blockchain. Ideal for students and professionals interested in cybersecurity and secure communication. |
17 | Telecommunications | University Courses | Comprehensive course covering fundamental topics in data communications, real-time signals, wireless networks, and more. Suitable for students, engineers, and professionals interested in understanding the core principles of telecommunications. |
18 | Incident Response and Malware Analysis | University Courses | Develop expertise in incident response and malware analysis with a focus on virtualized environments. Comprehensive and practical approach to security incident response and threat analysis. |
19 | Internet Security for Beginners | University Courses | Comprehensive introduction to internet security, covering threats, vulnerabilities, and defense mechanisms. Taught by leading expert Dr. Christoph Meinel. |
20 | Cryptography and Network Security | University Courses | Comprehensive overview of cryptography and network security, covering fundamental concepts, algorithms, and protocols. Explore secure communication, authentication, and data protection in modern digital networks. |
21 | Introduction to Information Security I | University Courses | Comprehensive coverage of information security principles and techniques, with hands-on labs and expert faculty from IIT Madras. |
22 | Information Security - II | University Courses | Comprehensive course on information security principles, cryptography, network security, and secure software development. Taught by experienced faculty from IIT Madras. |
23 | Privacy and Security in Online Social Networks | University Courses | Explore the privacy and security challenges in online social networks with this comprehensive course from IIT Madras. Learn techniques to protect user privacy and secure social media platforms. |
24 | Introduction to Cryptology | University Courses | Explore the fundamentals of cryptology and secure communication with this comprehensive course from IIT Roorkee. Gain hands-on experience and insights into real-world applications. |
25 | Cryptography | University Courses | Explore the fundamentals of cryptography, including symmetric-key, public-key, and cryptographic hash functions, taught by renowned experts at MIT. |
26 | Computer Systems Security | University Courses | Comprehensive graduate-level course covering the latest techniques and tools for securing computer systems, including control hijacking attacks, software security, network security, and web security. |
27 | Malware Dynamic Analysis | University Courses | Dive into dynamic malware analysis, learn techniques for safe malware execution, and gain essential skills for effective malware investigation and mitigation. |
28 | Introduction to Cryptography | University Courses | Comprehensive course covering classical and modern cryptographic algorithms, with hands-on exercises and insights from an experienced professor in the field of cryptography. |
29 | Web Security | University Courses | Comprehensive web security course from Stanford University, covering vulnerabilities, browser security, and secure development practices. |
30 | IT Security | University Courses | Comprehensive IT security course covering network security, access control, and cryptography. Practical exercises and case studies for hands-on learning. |
31 | Security and Cryptography | University Courses | Comprehensive course on security and cryptography concepts, covering encryption, authentication, and secure communication. Taught by experienced instructor Steven Gordon. |
32 | Computer Security | University Courses | Comprehensive computer security course at UC Berkeley covering topics like memory safety, cryptography, and web security. Hands-on projects and experienced instructors. |
33 | Foundations of Computer & Information Security | University Courses | Comprehensive overview of computer and information security principles, threats, cryptography, access control, and network security. Ideal for students and professionals in computer science and cybersecurity. |
34 | Intro to Information Security | University Courses | Gain a foundational understanding of information security and cybersecurity best practices. Explore cyber threats, risk assessment, and hands-on activities. |
35 | Computer Security | University Courses | Develop the skills to build and manage secure systems with this comprehensive computer security course from the University of Illinois Urbana-Champaign. |
36 | Practical Aspects of Modern Cryptography | University Courses | Explore the latest developments in cryptography with hands-on assignments and a final project, taught by experts from Microsoft Research. |
37 | Computer & Network Security | University Courses | Comprehensive course on computer and network security, covering cryptography, access control, security protocols, and ethical hacking. Hands-on experience with security tools and real-world case studies. |
38 | Offensive Security | University Courses | Comprehensive course on offensive security and reverse engineering techniques, taught by experienced security professional Ali Hadi. Develop practical skills for a career in cybersecurity, penetration testing, or software security analysis. |
- Free JavaScript Resources
- Free HTML Resources
- Free R Resources
- Free Java Resources
- Free Neural Networks Resources
- Free Natural Language Processing Resources
- Free Computer Science Resources
- Free React Resources
- Free Node.js Resources
- Free PyTorch Resources
- Free Computer Architecture Resources
- Free Functional Programming Resources
- Free Operating System Resources
- Free Cryptography Resources
- Free Compiler Resources
- Free Blockchain Resources
- Free SQL Resources
- Free Python Resources
- Free Unix Resources
- Free Programming Resources
- Free Object-Oriented Programming Resources
- Free CSS Resources
- Free Machine Learning Resources
- Free Web Development Resources
- Free Shell Scripting Resources
- Free Rust Resources
- Free Haskell Resources
- Free Software Development Resources
- Free Data Science Resources
- Free Git Resources
- Free Networking Resources
- Free Game Development Resources
- Free TensorFlow Resources
- Free Distributed Systems Resources
- Free Embedded Systems Resources
- Free DevOps Resources
- Free Docker Resources
- Free Robotics Resources
- Free Computer Vision Resources
- Free Deep Learning Resources
- Free Cloud Computing Resources
- Free Go Resources
- Free Data Structures Resources
- Free Control Systems Resources
- Free Artificial Intelligence Resources
- Free Data Analysis Resources
- Free Ruby Resources
- Free C++ Resources
- Free Bash Resources
- Free Cybersecurity Resources
- Free Algorithm Resources
- Free Database Resources
- Free C Resources
- Free Version Control Resources
- Free Linux Resources
- Free Computer Graphics Resources