OpenSecurityTraining2
banner
opensectraining.bsky.social
OpenSecurityTraining2
@opensectraining.bsky.social
501(c)(3) Nonprofit providing Open Source and Open Access computer security training material. #OST2 re-launched July 2021!
Pinned
📣"Trusted Computing 2202: TPM 2.0 Programming using Python and the tpm2-pytss libraries" by Bill Roberts is now released!📣
ost2.fyi/TC2202

This course provides a comprehensive introduction to Trusted Platform Module (TPM) 2.0 programming using the Python-based tpm2-pytss library.
This year @binarly.bsky.social has also expanded their sponsorship to the creation of a new #OST2 Firmware Security Learning Path!

ost2.fyi/OST2_LP_FWSE...
November 3, 2025 at 11:45 AM
We are happy to announce that @binarly.bsky.social has renewed their 🥇Gold-level sponsorship of #OST2!

Learn more about what they do in firmware & supply chain security here: ost2.fyi/Sponsor_Bina...
November 3, 2025 at 11:43 AM
Periodic call for volunteers: We're looking for someone to teach classes on stealth malware, such as rootkits, bootkits, and other security-evading software.
October 27, 2025 at 11:23 AM
We've officially had our 31337th student join at OST2! We're waiting to hear back to see if the lucky registrant wants to be publicly lauded for their random achievement or not ;)
October 27, 2025 at 11:21 AM
Reposted by OpenSecurityTraining2
🧵For those who are curious about the completion time distribution during the beta of my #OST2 BT2222 class, here it is. The average completion time was 8h25m, the median was 8h10m, the min was 3h50m, and the max was 15h22m
October 20, 2025 at 10:41 AM
🙌We're happy to announce OST2 now has over 31k students registered! 🥳 By the time we noticed we crossed the 30k mark, we were already at 30.5, so we figured we'd wait for 31k, which is now!🎉

👏Kudos to all the students taking and finishing classes!👏
October 10, 2025 at 11:56 AM
We have made Francesco Pollicino's "Fuzzing 1001: Introductory Fuzzing" class playlist public here: www.youtube.com/playlist?lis... for those who'd like to download the videos for offline consumption.
Fuzzing 1001: Introductory Fuzzing - YouTube
View the full free MOOC at https://ost2.fyi/Fuzz1001. This hands-on fuzzing course introduces a software-testing technique for finding security vulnerabiliti...
www.youtube.com
October 10, 2025 at 11:53 AM
Reposted by OpenSecurityTraining2
🧵I made a structural update to the Blue2thprinting #OST2 class today: The previous class was structured like "A:B:[C:D:E]:F:G" where F & G were collecting your own data, and [C-E] were understanding what Tell_Me_Everything.py was trying to tell you about the analyzed data…
September 29, 2025 at 12:11 AM
With the release of ost2.fyi/BT2222, we have posted a brand new OST2 Bluetooth Learning Path which shows future classes that are planned, as well as classes which we need volunteers for. Freshly updated today: ost2.fyi/OST2_LP_Blue...
September 29, 2025 at 10:44 AM
The "Trusted Computing 1102: Intermediate Trusted Platform Module (TPM) usage" ost2.fyi/TC2202 class release has updated 3 #OST2 learning paths

Secure Software Design & Implementation - ost2.fyi/OST2_LP_SecD...

System Security - ost2.fyi/OST2_LP_SysS...

Windows Security - ost2.fyi/OST2_LP_Wind...
September 22, 2025 at 11:19 AM
📣"Trusted Computing 2202: TPM 2.0 Programming using Python and the tpm2-pytss libraries" by Bill Roberts is now released!📣
ost2.fyi/TC2202

This course provides a comprehensive introduction to Trusted Platform Module (TPM) 2.0 programming using the Python-based tpm2-pytss library.
September 15, 2025 at 10:14 AM
Periodic call for volunteers: we've got a deep slate of Bluetooth classes on the horizon, but we need classes on other wireless protocols. If you'd be interested in teaching a class on satellite, cell, WiFi, Zigbee, LoRa, Thread, etc, let us know at teach🌀ost2.fyi
September 9, 2025 at 11:07 AM
If anyone from the EU would be interested in helping get #OST2 classes added to digital-skills-jobs.europa.eu/en/cyber-ski..., please reach out
Cyber Skills Academy - Knowledge and training
The Cyber Skills Academy will foster knowledge generation through education and training by establishing a common EU approach to cybersecurity training
digital-skills-jobs.europa.eu
September 9, 2025 at 11:06 AM
Reposted by OpenSecurityTraining2
🧵I originally started working on Blue2thprinting to try and figure out where @veronicakovah.bsky.social's over-the-air exploits against Texas Instruments & Silicon Labs (darkmentor.com/publication/...) applied...
September 8, 2025 at 10:05 AM
📣"Bluetooth 2222: Bluetooth reconnaissance with Blue2thprinting" is now released!📣
ost2.fyi/BT2222

This class teaches you about the 30+ data types that the Blue2thprinting software can collect for when you're trying to determine what a device is, and whether it has any known vulnerabilities.
September 8, 2025 at 9:23 AM
Are you making your own luck, by taking (and finishing) OST2 classes?
ost2.fyi/Learning-Pat...
August 25, 2025 at 11:21 AM
Reposted by OpenSecurityTraining2
If you, like me, are curious about the thousands of BT devices that are secretly making noise around us every day (and whether they’re vulnerable to exploitation), then this is the class for you. You can register here: forms.gle/MncQkVAL8Laq...
August 2, 2025 at 1:46 PM
Reposted by OpenSecurityTraining2
The videos came back early so the class has begun early! As a reminder, betas are perhaps the best time to participate, because it’s the only time I’m actively checking the forums multiple times per day and quickly fixing material if needed
July 28, 2025 at 10:34 AM
📢Call for beta testers!📢
The beta for "Bluetooth 2222: Bluetooth reconnaissance with Blue2thprinting" by @xenokovah.bsky.social will start Aug. 4th and run for 1 month.
forms.gle/KytM2Sxaez1x...
Bluetooth 2222: Bluetooth reconnaissance with Blue2thprinting
Enter the email you have used / will use when registering for beta.ost2.fyi. This will be used to enroll you in the beta class if you are selected. If your account does not exist at the time enrollmen...
forms.gle
July 21, 2025 at 12:15 PM
It's time to celebrate #OST2's 4th anniversary!
So what happened this last year at #OST2? Let's take a walk down memory hierarchy lane!
👇
July 21, 2025 at 12:14 PM
What if instead of taking Microsoft or an anti-DRM advocate's word for what TPMs can and can't do, you went and learned about it yourself? The beta class teaching you how to talk to TPMs in Python starts today! Register here by EoD to join: forms.gle/YydoqnG34qZM...
"Trusted Computing 2202: TPM 2.0 Programming using Python and the tpm2-pytss libraries" Pre-Class Survey
TC2202 builds on top of TC1101 (https://ost2.fyi/TC1101) & TC1102 (https://ost2.fyi/TC1101), but involves interacting with TPMs via Python instead of e.g. C/C++. It will cover the following material i...
forms.gle
July 14, 2025 at 10:31 AM
📣"Debuggers 1103: Introductory Binary Ninja" is released!📣
ost2.fyi/Dbg1103

This class by Xusheng Li of Vector 35 @binary.ninja provides students with a hands-on introduction to the free version of Binja as a debugger, thus providing decompilation support!
July 14, 2025 at 10:24 AM
Got any other examples of companies adding references to OST2 in their hiring? Let us know!
July 11, 2025 at 12:07 PM
The job posts here are a good example of how companies are starting to recognize the value of students learning from OST2 and seek self-starter employees who are using our classes to skill up! www.linkedin.com/posts/piment...
🔥 We're hiring Senior and Lead Offensive Security Engineers at Humana's Cyber Threat Simulation Program! | Robert Pimentel
🔥 We're hiring Senior and Lead Offensive Security Engineers at Humana's Cyber Threat Simulation Program! 🔥 You'll be: 💥 Running high-fidelity threat simulations 💥 Working side-by-side with our Red Team on covert campaigns 💥 Partnering on Purple Team ops to emulate real threat actors 💥 Targeting and testing specific countermeasure stacks You'll have full access to HTB Pro Labs, role-based certification paths, conference and training budgets, and Fridays set aside for R&D (LLMs, malware development, AI, and more). 👊 What we're looking for: - Python-fluent operators who can turn threat intel into test cases. - Folks who don't just ask "can we test this?" - You already did. - People who thrive in remote, high-autonomy roles. - Engineers and leaders who want to influence detection and defense at scale 🔗 Links: 👉 Senior Offensive Security Engineer: https://lnkd.in/d7SH9BFC 👉 Lead Offensive Security Engineer: https://lnkd.in/d_dtjGmr Feel free to message me if you have any questions, and repost for others who might be interested! #RedTeam #OffensiveSecurity #BugBounty #PenetrationTesting #AdversarySimulation
www.linkedin.com
July 11, 2025 at 12:06 PM