Topic outline
General
This is a construction area, all visitors are reminded to wear hard hats, steel-toed boots and appropriate eye and ear protection ...
No seriously, I've rearranged this whole course and rewritten about 5000 lines in the last month, there are things wrong with the course right now.
If you see anything wrong, dumb, misspelled, or clearly out of place, let me know so I can fix it!
- Dennis
You are currently viewing the free version of our flagship course.
This course is free, and will always be free. I designed it so that novices can work through it by themselves with a minimal amount of direction.
However, when you pay for the guided version of this course you are paying for accountability and access to the instructor, not for the course material. When you and I have skin in the game, things go better for all of us. The instructor led class guarantees I am able to get to know you and work with you personally, which I just can't do with everyone in the free course.
P.S. For now you get 75% off the one time price of $1000 dollars with the code "accountability".
If you are considering giving this as a gift, click here to learn more!
Visit https://www.hoppersroppers.org/help.html to learn how to donate to support the site, as well as information on sponsorships and how to partner with us.
Improving You
Click here to register for our Slack where you can ask questions and meet other students! Say hi to everyone in #helloworld!
https://join.slack.com/t/hoppersroppers/shared_invite/zt-d66799ci-tZStzuZ5Nb0Coz5O6huKTA
Your Next Steps
If you have come this far, we believe you are ready for the next step in your journey.
One option is to jump into the Intro to Capture the Flags course, where you will learn about data manipulation, cryptography, file formats, and some basic forensics.
If you want to focus on networking you can skip the Introduction to CTF course and head straight for Learning Networking with CTFs. That course is in progress, but should be pretty decent.
Another option is to jump into Learn Web Exploitation with CTFs which is a bit light on details right now but still will get you pointed in the right direction for CTFs or bug bounty.
There will be a course to learn Operating Systems and Host Forensics with CTFs eventually, but that course is still a long ways off and I don't want you looking at it yet.
Don't stop your journey here, keep on moving!