Tech Skills

Cybersecurity

Ethical hacking, penetration testing, network security, CTFs and defensive security

7,039
lessons
Skills in this topic
View full skill map →
Security Basics
beginner
Fix OWASP top 10 vulnerabilities
AI Security
intermediate
Identify and patch prompt injection vulnerabilities
Network Security
intermediate
Configure a firewall with proper inbound/outbound rules
Ethical Hacking & Pen Testing
intermediate
Conduct a full pen test with Kali Linux
Cloud Security
intermediate
Implement IAM least-privilege policies on AWS/GCP
Incident Response
intermediate
Build an incident response playbook
Security Compliance
intermediate
Map controls for SOC 2 Type II compliance
Defensive AI
advanced
Build an AI-powered log anomaly detector

Showing 1,657 reads from curated sources

Blue Team Diaries #1 — My First Steps into SOC Operations
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 2w ago
Blue Team Diaries #1 — My First Steps into SOC Operations
As I continue building my cyber security skills, I’ve recently been spending more time exploring SOC operations, threat detection, and… Continue reading on Medi
The Gap Nobody Talks About in Cybersecurity Training
Dev.to · Hannah Adam 🔐 Cybersecurity ⚡ AI Lesson 2w ago
The Gap Nobody Talks About in Cybersecurity Training
The Gap: Why Finding the Right Challenge Is Harder Than It Should Be Article 2 of 3 — From Library...
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 2w ago
Why Your Business Needs a Next-Generation Firewall Before the Next Attack Happens
Cybersecurity has changed a lot over the last few years, but one thing has stayed the same: attackers are always looking for the easiest… Continue reading on Me
CVSS 10 Gemini CLI Vulnerability: AI Tools Shake CI/CD Security
Medium · DevOps 🔐 Cybersecurity ⚡ AI Lesson 2w ago
CVSS 10 Gemini CLI Vulnerability: AI Tools Shake CI/CD Security
If you use AI tools for coding or DevOps, this is not something you should ignore. A critical vulnerability (CVSS 10) was recently… Continue reading on Medium »
CVSS 10 Gemini CLI Vulnerability: AI Tools Shake CI/CD Security
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 2w ago
CVSS 10 Gemini CLI Vulnerability: AI Tools Shake CI/CD Security
If you use AI tools for coding or DevOps, this is not something you should ignore. A critical vulnerability (CVSS 10) was recently… Continue reading on Medium »
Dev.to AI 🔐 Cybersecurity ⚡ AI Lesson 2w ago
Your Phone Unlocked. That Doesn't Prove Who Used It.
The hardware reality of facial comparison thresholds For developers building verification workflows, the "black box" of device-level biometrics is getting small
April 2026: The Month Web3 Lost $600M+ in 18 Days
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 2w ago
April 2026: The Month Web3 Lost $600M+ in 18 Days
TL;DR. April 2026 was the worst month for web3 security since the Bybit heist. 18 disclosed incidents, over $606M lost, 18 days. The… Continue reading on Medium
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 2w ago
OverTheWire Bandit 10–15 Writeup
OverTheWire Bandit 10–15. seviye çözümleri. Continue reading on Medium »
Extract | TryHackMe
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 2w ago
Extract | TryHackMe
Can you extract the secrets from the library? Continue reading on Medium »
Chaining Vulnerabilities | TryHackMe
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 2w ago
Chaining Vulnerabilities | TryHackMe
Learn how to chain vulnerabilities! From Low to High! Continue reading on Medium »
AI is pushed to development. Governance isn’t. That’s our work now.
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 2w ago
AI is pushed to development. Governance isn’t. That’s our work now.
In every team we’ve worked with this quarter, AI tooling is sitting inside the development stack as a daily default. The non-technical… Continue reading on Medi
Black Trace Analytics Prepares to Enter the Healthcare Arena
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 3w ago
Black Trace Analytics Prepares to Enter the Healthcare Arena
A potential healthcare acquisition signals a larger vision for security, resilience, and the future of patient-centered operations Continue reading on Medium »
Week 6:From Signals to Security: Understanding and Inspecting Wireless Networks
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 3w ago
Week 6:From Signals to Security: Understanding and Inspecting Wireless Networks
Welcome to Week 6. This week, we stop looking at wires and start looking at the invisible: Wi-Fi and Bluetooth. By the end of this article… Continue reading on
Linux File & Folder Protection + History Control (Practice Guide Only)
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 3w ago
Linux File & Folder Protection + History Control (Practice Guide Only)
⚠️ For learning/practice only — DO NOT use direct in Dev/SIT/UAT/Prod environments Continue reading on DevOps.dev »
Copy Fail is 732 bytes. Your foothold problem is the bigger one.
Dev.to · Christopher Karatzinis 🔐 Cybersecurity ⚡ AI Lesson 3w ago
Copy Fail is 732 bytes. Your foothold problem is the bigger one.
CVE-2026-31431 dropped this week. The disclosure site is at copy.fail and the writeup is short enough...
Four Releases in One Day: How the claude-code-slack-channel Security Sprint Actually Shipped
Dev.to · Jeremy Longshore 🔐 Cybersecurity ⚡ AI Lesson 3w ago
Four Releases in One Day: How the claude-code-slack-channel Security Sprint Actually Shipped
Epic 29-A, 30-A, 30-B, 32-B land in a single calendar day across v0.5.0 → v0.5.1 → v0.6.0 → v0.7.0 — a supervisor, a hash-chained audit journal, and a policy en
Phishing Campaigns Using LinkedIn Short Links: A Hidden Threat
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 3w ago
Phishing Campaigns Using LinkedIn Short Links: A Hidden Threat
Cyber attackers are increasingly exploiting trusted platforms like LinkedIn to distribute malicious or deceptive links through its URL… Continue reading on Medi
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 3w ago
How to Control Third-Party Access in Salesforce Using Apigee (Without Risk)
A while back, I was reviewing a Salesforce setup for a growing business. Continue reading on Medium »
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 3w ago
Cisco Ethical Hacker notes — part 7
Module 6:Exploiting Application-Based vulnerabilities — part 2 Continue reading on Medium »
Can a simulated phishing campaign be too good?
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 3w ago
Can a simulated phishing campaign be too good?
Is there a risk of overengineering cyber awareness and create a simulated phishing email which does harm instead? Continue reading on Medium »
The NIST Cybersecurity Framework Explained So Simply Anyone Can Understand It (Without…
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 3w ago
The NIST Cybersecurity Framework Explained So Simply Anyone Can Understand It (Without…
Most people hear “NIST Cybersecurity Framework” and picture a 200‑page government document written in a language only auditors understand. Continue reading on M
Malicious PowerShell Analysis — BTLO Lab Writeup
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 3w ago
Malicious PowerShell Analysis — BTLO Lab Writeup
Platform: Blue Team Labs Online (BTLO) | Difficulty: Medium | Category: Security Operations (SO) Continue reading on Medium »
Undiscovered (THM) Tryhackme Writeup Answer
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 3w ago
Undiscovered (THM) Tryhackme Writeup Answer
Description : Discovery consists not in seeking new landscapes, but in having new eyes. Continue reading on Medium »
Dev.to AI 🔐 Cybersecurity ⚡ AI Lesson 3w ago
Asaaju Peter Raises Alarm Over Poor Cybersecurity Culture in Nigerian Tech Companies as Data Breaches Continue to Rise
Nigerian technology entrepreneur and digital media publisher Asaaju Peter has spoken out on one of the most overlooked threats facing the country’s growing tech
45% of Hostile Bot Traffic Passes Your WAF. Here's Why. What behavioral detection reveals when you cross-reference hostile actors against AbuseIPDB
Dev.to · BotConductStandard 🔐 Cybersecurity ⚡ AI Lesson 3w ago
45% of Hostile Bot Traffic Passes Your WAF. Here's Why. What behavioral detection reveals when you cross-reference hostile actors against AbuseIPDB
Most enterprise WAFs are configured to block IPs above a certain abuse confidence threshold....
Building a Silent Keylogger Into a USB-C Hub (For My Own Laptop, Obviously…)
Dev.to · v. Splicer 🔐 Cybersecurity ⚡ AI Lesson 3w ago
Building a Silent Keylogger Into a USB-C Hub (For My Own Laptop, Obviously…)
The hub sits there like it belongs. Aluminum shell, faintly warm, a short braided cable that kinks...
TryHackMe: Decryptify (CTF)
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 3w ago
TryHackMe: Decryptify (CTF)
Why This Lab Stands Out Continue reading on Medium »
TryHackMe Walkthrough: Windows Fundamentals Part 2
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 3w ago
TryHackMe Walkthrough: Windows Fundamentals Part 2
A hands-on walkthrough of the Windows Fundamentals Part 2 room on TryHackMe. Continue reading on Medium »
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 3w ago
✍️ STT #3 — Comment and Control
Series: ✍️ Sip the Threat by TheGr8Val Week: April 27 — May 3, 2026 | Estimated read time: ~7 minutes Continue reading on Medium »
[Updated] January 2026 Crypto Scam Scam Warning List: How to Spot and Avoid Fake Platforms.
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 3w ago
[Updated] January 2026 Crypto Scam Scam Warning List: How to Spot and Avoid Fake Platforms.
AI-powered and fake crypto investment schemes are draining billions from unsuspecting investors. Stay ahead of high-tech scams with this… Continue reading on Me
Warning: Bifrost from Maxim AI Is a Real API Key Harvesting Service Targeting American Web Devs (My Exact Experience)
Dev.to · Bradley Matera 🔐 Cybersecurity ⚡ AI Lesson 3w ago
Warning: Bifrost from Maxim AI Is a Real API Key Harvesting Service Targeting American Web Devs (My Exact Experience)
I’ve been deep in AI coding tools for months. Recently I started getting DMs from new “AI gateway”...
Medium · DevOps 🔐 Cybersecurity ⚡ AI Lesson 3w ago
How I Built a Real-Time DDoS Detection Engine from Scratch
When I got the Stage 3 task for the HNG DevOps internship, I honestly stared at it for a while. Build an anomaly detection engine that… Continue reading on Medi
The 2026 Cybersecurity Roadmap (Part 2): L1 — Where You Stop Learning and Start Working
Medium · Programming 🔐 Cybersecurity ⚡ AI Lesson 3w ago
The 2026 Cybersecurity Roadmap (Part 2): L1 — Where You Stop Learning and Start Working
Breaking into IT with your first real role: Computer Support Specialist — the job that teaches you more than any course ever will Continue reading on Medium »
The 2026 Cybersecurity Roadmap (Part 2): L1 — Where You Stop Learning and Start Working
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 3w ago
The 2026 Cybersecurity Roadmap (Part 2): L1 — Where You Stop Learning and Start Working
Breaking into IT with your first real role: Computer Support Specialist — the job that teaches you more than any course ever will Continue reading on Medium »
How I Built a Real-Time DDoS Detection System with Python, Docker, and Nginx (Beginner-Friendly Guide)
Dev.to · George-Adaba 🔐 Cybersecurity ⚡ AI Lesson 3w ago
How I Built a Real-Time DDoS Detection System with Python, Docker, and Nginx (Beginner-Friendly Guide)
👋 Introduction As a beginner stepping into DevOps and cybersecurity, I wanted to build something...
How I Built a Real-Time DDoS Detection Engine from Scratch
Dev.to · Damilola Ejalonibu 🔐 Cybersecurity ⚡ AI Lesson 3w ago
How I Built a Real-Time DDoS Detection Engine from Scratch
**Section 1 — Introduction What Is This Project and Why Does It Matter? Imagine you run a website...
Build Secure Systems While Coding (A Practical Dev Story You Shouldn’t Ignore)
Dev.to · Sohanuzzaman Soad 🔐 Cybersecurity ⚡ AI Lesson 3w ago
Build Secure Systems While Coding (A Practical Dev Story You Shouldn’t Ignore)
“We’ll fix security later.” — Every developer, right before a critical production failure. Let’s...
The Config Rule Audit Your IR Playbook Is Missing
Dev.to · Gabriel Pavel 🔐 Cybersecurity ⚡ AI Lesson 3w ago
The Config Rule Audit Your IR Playbook Is Missing
Your AWS compliance infrastructure can become a self-sustaining backdoor. Here's how the mechanic...
Processing Client Documents Securely: A Field Guide for Technical Agencies
Dev.to · Iteration Layer 🔐 Cybersecurity ⚡ AI Lesson 3w ago
Processing Client Documents Securely: A Field Guide for Technical Agencies
The Security Questionnaire That Started This You land a new enterprise client. The SOW is...
SOC VS GRC Analyst: Which Career is Better in 2026?
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 3w ago
SOC VS GRC Analyst: Which Career is Better in 2026?
As we all know, cybersecurity is one of the fastest-growing fields in 2026, and roles like SOC Analyst and GRC Analyst are in high demand. Continue reading on M
Investigation: Network Activity Analysis Across Multiple PCAPs
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 3w ago
Investigation: Network Activity Analysis Across Multiple PCAPs
This investigation is based on a Blue Team Labs Online (BTLO) scenario involving analysis of multiple packet captures. Continue reading on Medium »
The Digital Labyrinth: How Technical Deception Becomes a Trap
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 3w ago
The Digital Labyrinth: How Technical Deception Becomes a Trap
The Illusion of the Perfect Alibi Continue reading on Medium »
ZDNet 🔐 Cybersecurity ⚡ AI Lesson 3w ago
The best VPN for small businesses in 2026: Expert tested and reviewed
Looking for the best VPN for your small business? I tested Surfshark, Proton VPN, and more to find the top picks.
Website Security Configuration Audit from Android in 15 Minutes: curl, openssl, dig — No Hacking, No Root
Dev.to · AbbatFariDi 🔐 Cybersecurity ⚡ AI Lesson 3w ago
Website Security Configuration Audit from Android in 15 Minutes: curl, openssl, dig — No Hacking, No Root
What You Can Find From the Outside Without Server Access 1. What Is a...
Multi-Layered Defense: Building an Intelligent, Dual-Trigger Firewall
Dev.to · Okeoghene Akwerigbe 🔐 Cybersecurity ⚡ AI Lesson 3w ago
Multi-Layered Defense: Building an Intelligent, Dual-Trigger Firewall
In modern DevOps, a simple rate-limiter isn't enough. If you set a hard limit of "10 requests per...
Building a Self-Learning DDoS Guard
Dev.to · Adewumi Victor 🔐 Cybersecurity ⚡ AI Lesson 3w ago
Building a Self-Learning DDoS Guard
Real-Time Anomaly Detection with Python By Victor • HNG DevSecOps Project Case Study In the modern...
Building Scalable Single Sign-On (SSO) for Large-Scale Portals: Lessons in Security and UX
Dev.to · idme 🔐 Cybersecurity ⚡ AI Lesson 3w ago
Building Scalable Single Sign-On (SSO) for Large-Scale Portals: Lessons in Security and UX
When building large-scale web applications, especially those serving the public or educational...
How I Built a Real-Time DDoS Detection Engine from Scratch (No Libraries Cheat Sheet!)
Dev.to · Boluwaji Dare 🔐 Cybersecurity ⚡ AI Lesson 3w ago
How I Built a Real-Time DDoS Detection Engine from Scratch (No Libraries Cheat Sheet!)
Imagine you run a website. Everything is working fine, users are logging in, uploading files, and...