OpenSecurityTraining2
banner
opensectraining.bsky.social
OpenSecurityTraining2
@opensectraining.bsky.social
501(c)(3) Nonprofit providing Open Source and Open Access computer security training material. #OST2 re-launched July 2021!
Pinned
📢Call for beta testers!📢
forms.gle/9QgwVSstXi7n...

The beta for Trusted Computing 1103: Advanced TPM Usage will start Jan 16th. It will take ~7 hours to complete. Sign up above if you're interested in participating. (Note: ost2.fyi/TC1101 & ost2.fyi/TC1102 are strongly recommended prerequisites.)
TC1103: Advanced TPM Usage Beta Testing Pre-Class Survey
TC1103 will take approximately 7 hours to complete, and will begin January 16th, and end February 13th. TC1103 is the follow up to TC1101 Intro TPM usage (https://ost2.fyi/TC1101) & TC1102 Intermedia...
forms.gle
Final call for beta testers! The class will begin later today!
📢Call for beta testers!📢
forms.gle/9QgwVSstXi7n...

The beta for Trusted Computing 1103: Advanced TPM Usage will start Jan 16th. It will take ~7 hours to complete. Sign up above if you're interested in participating. (Note: ost2.fyi/TC1101 & ost2.fyi/TC1102 are strongly recommended prerequisites.)
TC1103: Advanced TPM Usage Beta Testing Pre-Class Survey
TC1103 will take approximately 7 hours to complete, and will begin January 16th, and end February 13th. TC1103 is the follow up to TC1101 Intro TPM usage (https://ost2.fyi/TC1101) & TC1102 Intermedia...
forms.gle
January 16, 2026 at 1:47 PM
We are happy to announce that AMI has become a 🥇Gold-level sponsor of #OST2!

Learn about their work creating firmware across the industry here: ost2.fyi/Sponsor_AMI_SM
January 12, 2026 at 11:59 AM
Our Trusted Computing "Advanced TPM usage" class will begin this week. Sign up below.
📢Call for beta testers!📢
forms.gle/9QgwVSstXi7n...

The beta for Trusted Computing 1103: Advanced TPM Usage will start Jan 16th. It will take ~7 hours to complete. Sign up above if you're interested in participating. (Note: ost2.fyi/TC1101 & ost2.fyi/TC1102 are strongly recommended prerequisites.)
TC1103: Advanced TPM Usage Beta Testing Pre-Class Survey
TC1103 will take approximately 7 hours to complete, and will begin January 16th, and end February 13th. TC1103 is the follow up to TC1101 Intro TPM usage (https://ost2.fyi/TC1101) & TC1102 Intermedia...
forms.gle
January 12, 2026 at 11:54 AM
🧵Like TC1101 & TC1102, TC1103 has the goal of helping developers get bootstrapped on using TPMs more quickly than if they were to just rely on reading the spec or API documents alone.
January 6, 2026 at 11:52 AM
📢Call for beta testers!📢
forms.gle/9QgwVSstXi7n...

The beta for Trusted Computing 1103: Advanced TPM Usage will start Jan 16th. It will take ~7 hours to complete. Sign up above if you're interested in participating. (Note: ost2.fyi/TC1101 & ost2.fyi/TC1102 are strongly recommended prerequisites.)
TC1103: Advanced TPM Usage Beta Testing Pre-Class Survey
TC1103 will take approximately 7 hours to complete, and will begin January 16th, and end February 13th. TC1103 is the follow up to TC1101 Intro TPM usage (https://ost2.fyi/TC1101) & TC1102 Intermedia...
forms.gle
January 6, 2026 at 11:52 AM
Reposted by OpenSecurityTraining2
In 2026 we will be fundraising to add a gamification plugin to our Open edX servers. This will add a leaderboard for learners, and provide a new way to track your sub-class-granularity skills that you're picking up on the site. To help early, donate here: www.every.org/ost2/f/lets-...
A sincere thank you to everyone who donated to #OST2 as an individual in 2025(especially those who used corporate non-profit donation matching)! Your donations go directly to instructors as an honorarium, and show them that you value what they do for OST2 and you want them to keep helping the world!
December 29, 2025 at 12:56 PM
Reposted by OpenSecurityTraining2
We're always looking for more sponsors for #OST2! If your company wants to support creating better security engineers everywhere in the world, get in touch!
And also thanks to our Gold Sponsors, 3mdeb, Binarly @binarly.bsky.social, Dark Mentor @darkmentor.com, Hex-Rays @hex-rays.bsky.social, NCCGroup @nccgroupinfosec.bsky.social ...
December 29, 2025 at 12:55 PM
Reposted by OpenSecurityTraining2
We've got a decent number of instructors in the queue to create new classes in 2026 too, but we can always use more! Classes are a significant investment of time, but they also pay off in a significant way for the number of people you will help over many years!
🧵A special thanks to the instructors who stepped up in 2025 to release new classes:

* Francesco Pollicino - Fuzzing 1001: Introductory white-box fuzzing with AFL++ - ost2.fyi/Fuzz1001

...
Fuzzing 1001 Short URL Redirect
ost2.fyi
December 29, 2025 at 12:54 PM
Reposted by OpenSecurityTraining2
#OST2 has a ton of material that's relevant to RE. And our ost2.fyi/Dbg1101 introduction to IDA as a debugger class instructor, Christina Johns, is working on the "Reverse Engineering 2001: Introductory Static Analysis of C-based programs" class, which will unlock opportunities for many new classes!
We are happy to announce that Hex-Rays @hex-rays.bsky.social, makers of IDA, have become a 🥇Gold-level sponsor of #OST2!

Learn all the latest about their software reverse engineering tools here: ost2.fyi/Sponsor_HexR...
December 15, 2025 at 11:38 AM
🧵A special thanks to the instructors who stepped up in 2025 to release new classes:

* Francesco Pollicino - Fuzzing 1001: Introductory white-box fuzzing with AFL++ - ost2.fyi/Fuzz1001

...
Fuzzing 1001 Short URL Redirect
ost2.fyi
December 29, 2025 at 12:29 PM
And also thanks to our Gold Sponsors, 3mdeb, Binarly @binarly.bsky.social, Dark Mentor @darkmentor.com, Hex-Rays @hex-rays.bsky.social, NCCGroup @nccgroupinfosec.bsky.social ...
December 29, 2025 at 12:25 PM
We also want to give another shout-out to our Partner, Trusted Computing Group for helping to fund classes about how to build secure systems.
December 29, 2025 at 12:23 PM
A sincere thank you to everyone who donated to #OST2 as an individual in 2025(especially those who used corporate non-profit donation matching)! Your donations go directly to instructors as an honorarium, and show them that you value what they do for OST2 and you want them to keep helping the world!
December 29, 2025 at 12:21 PM
We are happy to announce that Hex-Rays @hex-rays.bsky.social, makers of IDA, have become a 🥇Gold-level sponsor of #OST2!

Learn all the latest about their software reverse engineering tools here: ost2.fyi/Sponsor_HexR...
December 15, 2025 at 11:19 AM
While we've had an overwhelming turn out in registration for this class, we still wanted to remind people that there's still time to sign up; since our beta classes are when the instructor is actively watching the forums and responding to feedback.
November 24, 2025 at 1:33 AM
Periodic call for volunteers: We're looking for classes on Apple ecosystem security. E.g. OS internals, binary formats, malware analysis, vulnerability hunting, etc. If you're interested in sharing what you know, reach out at teach🌀ost2.fyi
November 14, 2025 at 1:37 PM
📢Call for beta testers!📢
The "Architecture 1901: From zero to QEMU - A Gentle introduction to emulators from the ground up!" course by Antonio Nappa @jeppojeps.bsky.social will begin November 28th. Sign up here: forms.gle/LUXaThn4YSYS...
Architecture 1901: From zero to QEMU - A Gentle introduction to emulators from the ground up!
Enter the email you have used / will use when registering for beta.ost2.fyi. This will be used to enroll you in the beta class if you are selected. If your account does not exist at the time enrollmen...
forms.gle
November 14, 2025 at 12:10 PM
This year @binarly.bsky.social has also expanded their sponsorship to the creation of a new #OST2 Firmware Security Learning Path!

ost2.fyi/OST2_LP_FWSE...
November 3, 2025 at 11:45 AM
We are happy to announce that @binarly.bsky.social has renewed their 🥇Gold-level sponsorship of #OST2!

Learn more about what they do in firmware & supply chain security here: ost2.fyi/Sponsor_Bina...
November 3, 2025 at 11:43 AM
Periodic call for volunteers: We're looking for someone to teach classes on stealth malware, such as rootkits, bootkits, and other security-evading software.
October 27, 2025 at 11:23 AM
We've officially had our 31337th student join at OST2! We're waiting to hear back to see if the lucky registrant wants to be publicly lauded for their random achievement or not ;)
October 27, 2025 at 11:21 AM
Reposted by OpenSecurityTraining2
🧵For those who are curious about the completion time distribution during the beta of my #OST2 BT2222 class, here it is. The average completion time was 8h25m, the median was 8h10m, the min was 3h50m, and the max was 15h22m
October 20, 2025 at 10:41 AM
🙌We're happy to announce OST2 now has over 31k students registered! 🥳 By the time we noticed we crossed the 30k mark, we were already at 30.5, so we figured we'd wait for 31k, which is now!🎉

👏Kudos to all the students taking and finishing classes!👏
October 10, 2025 at 11:56 AM
We have made Francesco Pollicino's "Fuzzing 1001: Introductory Fuzzing" class playlist public here: www.youtube.com/playlist?lis... for those who'd like to download the videos for offline consumption.
Fuzzing 1001: Introductory Fuzzing - YouTube
View the full free MOOC at https://ost2.fyi/Fuzz1001. This hands-on fuzzing course introduces a software-testing technique for finding security vulnerabiliti...
www.youtube.com
October 10, 2025 at 11:53 AM
Reposted by OpenSecurityTraining2
🧵I made a structural update to the Blue2thprinting #OST2 class today: The previous class was structured like "A:B:[C:D:E]:F:G" where F & G were collecting your own data, and [C-E] were understanding what Tell_Me_Everything.py was trying to tell you about the analyzed data…
September 29, 2025 at 12:11 AM