Accredited Universities
- List of Centers of Academic Excellence for Cyber Operations
- National Centers of Academic Excellence in Information Assurance (IA)/Cyber Defense (CD)
- /r/netsec's Q3 2013 Academic Program Thread
- /r/netsec's Q1 2013 Academic Program Thread
Full Online Courses
- NYU Polytechnic School of Engineering ISIS Lab's Hack Night Source Code Auditing, Web Security, Reverse Engineering, Exploitation, Post-Exploitation, Application Security
- OpenSecurityTraining Reverse Engineering, Exploitation, Forensics, Malware Analysis
- Florida State University's Offensive Security Source Code Auditing, Application Security, Exploitation, Network Security, Web Security, Post-Exploitation
- Syracuse University's SEED: Developing Instructional Laboratories for Computer SEcurity EDucation Exploitation, Network Security, Web Security
- Stanford University's Computer Security Exploitation, Network Security, Mobile Security, Application Security, Web Security, Malware Analysis
- Metasploit Unleashed Network Security, Application Security, Exploitation, Post-Exploitation
- Stanford University's Cryptography I
- Stanford University's Cryptography II
- University of Maryland's Usable Security
- University of Maryland's Software Security
- University of Maryland's Cryptography
- University of Maryland's Hardware Security
- University of Washington's The Hardware/Software Interface Reverse Engineering
- University of London's Malicious Software and its Underground Economy: Two Sides to Every Story
- Corelan Team Articles Reverse Engineering, Exploitation
- Dr. Thorsten Schneider's Binary Auditing
- Lena Tutorials Malware Analysis
- mammon_'s tales to his grandson Reverse Engineering
- Static Program Analysis from RWTH Aachen University
- MIT SAT/SMT Summer School 2011
- PentesterLab
- OWASP Appsec Tutorial Series
Books
- The Art of Software Security Assessment by Mark Dowd, John McDonald, and Justin Schuh
- A Bug Hunter's Diary by Tobias Klein
- Fuzzing: Brute Force Vulnerability Discovery by Michael Sutton, Adam Greene, and Pedram Amini
- Hacking: The Art of Exploitation, 2nd Edition by Jon Erickson
- The Shellcoder's Handbook: Discovering and Exploiting Security Holes by Chris Anley, John Heasman, Felix Lindner, and Gerardo Richarte
- Hacking Exposed 7: Network Security Secrets & Solutions, Seventh Edition by Stuart McClure, Joel Scambray, and George Kurtz
- The IDA Pro Book: The Unofficial Guide to the World's Most Popular Disassembler by Chris Eagle
- Reversing: Secrets of Reverse Engineering by Eldad Eilam
- The Web Application Hacker's Handbook: Finding and Exploiting Security Flaws by Dafydd Stuttard and Marcus Pinto
- The Tangled Web: A Guide to Securing Modern Web Applications by Michal Zalewski
Conference Training