Replies: 3 comments 4 replies
-
|
We should combine B & C |
Beta Was this translation helpful? Give feedback.
0 replies
-
|
I think B should go with the BLT-Bacon repo / project |
Beta Was this translation helpful? Give feedback.
4 replies
-
|
This could be extended with all the technical resources we use across multiple projects.
|
Beta Was this translation helpful? Give feedback.
0 replies
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Uh oh!
There was an error while loading. Please reload this page.
Uh oh!
There was an error while loading. Please reload this page.
-
Blt-education & Knowledge Sharing: Hands-On Code-Centric Security Labs & Community Intelligence (350 hr)
This idea transforms BLT's existing theory-heavy labs into hands-on, code-centric security exercises while establishing a community-driven knowledge sharing pipeline.
Learners analyze real vulnerable code and configurations, identify security flaws, reason about how they could be exploited, and then apply secure fixes. Anonymized vulnerability patterns are aggregated into public dashboards, monthly reports, and remediation playbooks—creating a feedback loop where learning informs intelligence sharing and vice versa.
The focus is on security thinking, inspired by OWASP Top 10, ethical hacking workflows, and CTF-style reasoning, but scoped for maintainability and learning depth.
Each lab follows a three-step workflow:
Identify the vulnerability
(What is wrong? Where is it?)
Explain the exploitation scenario
(How could this be abused? What is the impact?)
Apply or select the secure fix
(Correct remediation pattern + explanation)
Goals
Core Features (brief)
Unified Architecture
graph LR A[BLT Vulnerability Data] --> B[Data Anonymization Pipeline] B --> C[Security Intelligence DB] C --> D[Public Dashboards] C --> E[Automated Reports] C --> F[Remediation Playbooks] F --> G[Interactive Security Labs] G --> H[Skill Tracking System] H --> I[Learning Dashboard] D --> I E --> IProposed Timeline
Phase 1 (Weeks 1–4 | ~100 hours):
Multi-step validation framework, content schema, data anonymization pipeline, and UI foundations
Phase 2 (Weeks 5–8 | ~120 hours):
Core hands-on labs covering SQL Injection, XSS, and Configuration Security using the identify → explain → fix workflow
Phase 3 (Weeks 9–11 | ~110 hours):
Phase 4 (Week 12 | ~20 hours):
Benefits
Next-Steps
Last Updated: February 2026
Beta Was this translation helpful? Give feedback.
All reactions