Tech Skills

Cybersecurity

Ethical hacking, penetration testing, network security, CTFs and defensive security

7,061
lessons
Skills in this topic
View full skill map →
Security Basics
beginner
Fix OWASP top 10 vulnerabilities
AI Security
intermediate
Identify and patch prompt injection vulnerabilities
Network Security
intermediate
Configure a firewall with proper inbound/outbound rules
Ethical Hacking & Pen Testing
intermediate
Conduct a full pen test with Kali Linux
Cloud Security
intermediate
Implement IAM least-privilege policies on AWS/GCP
Incident Response
intermediate
Build an incident response playbook
Security Compliance
intermediate
Map controls for SOC 2 Type II compliance
Defensive AI
advanced
Build an AI-powered log anomaly detector
【Sucker for Love: First Date】 Please Let Me Date the Eldritch Catgirl
Cybersecurity
【Sucker for Love: First Date】 Please Let Me Date the Eldritch Catgirl
Ceres Fauna Ch. hololive-EN Beginner 3y ago
Docker Container Forensics - CSAW CTF 2022
Cybersecurity
Docker Container Forensics - CSAW CTF 2022
John Hammond Beginner 3y ago
Phase 1: On Your Marks
Cybersecurity ⚡ AI Lesson
Phase 1: On Your Marks
SANS Institute Beginner 3y ago
【MINECRAFT】 World is Mine
Cybersecurity
【MINECRAFT】 World is Mine
Ceres Fauna Ch. hololive-EN Beginner 3y ago
Avoid PowerShell Invoke-Expression with DNS Records
Cybersecurity
Avoid PowerShell Invoke-Expression with DNS Records
John Hammond Beginner 3y ago
How to Protect Your Crypto Assets From Thieves
Cybersecurity
How to Protect Your Crypto Assets From Thieves
Jack Rhysider Beginner 3y ago
Monitoring Sensitive Windows Commands via CanaryTokens - Deploying Registry Entries via Group Policy
Cybersecurity
Monitoring Sensitive Windows Commands via CanaryTokens - Deploying Registry Entries via Group Policy
IppSec Beginner 3y ago
DEFCON Hacking AI CTF Solution on Kaggle - Data Science Uncut Sep 11, 2022
Cybersecurity
DEFCON Hacking AI CTF Solution on Kaggle - Data Science Uncut Sep 11, 2022
Rob Mulla Beginner 3y ago
Best WiFi Hacking tools: Airgeddon, Kismet, Raspberry Pi and Kody's favourite wifi tools
Cybersecurity
Best WiFi Hacking tools: Airgeddon, Kismet, Raspberry Pi and Kody's favourite wifi tools
David Bombal Beginner 3y ago
HackTheBox - Scanned - Escaping and Exploiting Chroot Based Jails via Unprotected File Descriptor
Cybersecurity ⚡ AI Lesson
HackTheBox - Scanned - Escaping and Exploiting Chroot Based Jails via Unprotected File Descriptor
IppSec Beginner 3y ago
How To Manage Affiliate Links Effectively
Cybersecurity
How To Manage Affiliate Links Effectively
Rank Math SEO Beginner 3y ago
Hacker hunting with Wireshark (even if SSL encrypted!)
Cybersecurity
Hacker hunting with Wireshark (even if SSL encrypted!)
David Bombal Beginner 3y ago
It Shouldn't Be THIS Easy to Break Into a Utility Company🎙Darknet Diaries Ep. 40: No Parking
Cybersecurity
It Shouldn't Be THIS Easy to Break Into a Utility Company🎙Darknet Diaries Ep. 40: No Parking
Jack Rhysider Beginner 3y ago
SANS Cyber Solutions Fest 2022
Cybersecurity ⚡ AI Lesson
SANS Cyber Solutions Fest 2022
SANS Institute Beginner 3y ago
The Three JavaScript Hacking Legends
Cybersecurity ⚡ AI Lesson
The Three JavaScript Hacking Legends
LiveOverflow Beginner 3y ago
Don't Use a VPN with Tor
Cybersecurity ⚡ AI Lesson
Don't Use a VPN with Tor
The Cyber Mentor Beginner 3y ago
RSA Private & Public Key Encryption in Python
Cybersecurity ⚡ AI Lesson
RSA Private & Public Key Encryption in Python
NeuralNine Beginner 3y ago
Babuk RANSOMWARE Leak Site (Dark Web Documentary #09)
Cybersecurity ⚡ AI Lesson
Babuk RANSOMWARE Leak Site (Dark Web Documentary #09)
John Hammond Beginner 3y ago
【Super Auto Pets】 🐖 Cute & Addictive Auto Battler That I Don't Know How to Play 🐢
Cybersecurity ⚡ AI Lesson
【Super Auto Pets】 🐖 Cute & Addictive Auto Battler That I Don't Know How to Play 🐢
Ceres Fauna Ch. hololive-EN Beginner 3y ago
DANGEROUS Python Flask Debug Mode Vulnerabilities
Cybersecurity
DANGEROUS Python Flask Debug Mode Vulnerabilities
John Hammond Beginner 3y ago
【MINECRAFT】 Building a Raid Farm to Gain Infinite Emeralds and Destroy the Economy (Part 3)
Cybersecurity
【MINECRAFT】 Building a Raid Farm to Gain Infinite Emeralds and Destroy the Economy (Part 3)
Ceres Fauna Ch. hololive-EN Beginner 3y ago
Navigating Tor Hidden Services (Dark Web Documentary #08)
Cybersecurity
Navigating Tor Hidden Services (Dark Web Documentary #08)
John Hammond Beginner 3y ago
【MINECRAFT】 Building a Raid Farm to Gain Infinite Emeralds and Destroy the Economy (Part 2)
Cybersecurity ⚡ AI Lesson
【MINECRAFT】 Building a Raid Farm to Gain Infinite Emeralds and Destroy the Economy (Part 2)
Ceres Fauna Ch. hololive-EN Beginner 3y ago
Industrial Spy - Ransomware Leak Market (Dark Web Documentary #07)
Cybersecurity
Industrial Spy - Ransomware Leak Market (Dark Web Documentary #07)
John Hammond Beginner 3y ago
PHP 8.1.0-dev BACKDOOR Hack (Easy RCE)
Cybersecurity
PHP 8.1.0-dev BACKDOOR Hack (Easy RCE)
John Hammond Beginner 3y ago
【HITMAN 2】 Return of the Slap King
Cybersecurity
【HITMAN 2】 Return of the Slap King
Ceres Fauna Ch. hololive-EN Beginner 3y ago
HackTheBox - Noter - Cracking Flask Cookies and performing MySQL Raptor Exploit on Modern Distro RCE
Cybersecurity
HackTheBox - Noter - Cracking Flask Cookies and performing MySQL Raptor Exploit on Modern Distro RCE
IppSec Beginner 3y ago
Warning! Android phone remote control // Hackers can hack your phone
Cybersecurity ⚡ AI Lesson
Warning! Android phone remote control // Hackers can hack your phone
David Bombal Beginner 3y ago
【MINECRAFT】 Building a Raid Farm to Gain Infinite Emeralds and Destroy the Economy (Part 1)
Cybersecurity
【MINECRAFT】 Building a Raid Farm to Gain Infinite Emeralds and Destroy the Economy (Part 1)
Ceres Fauna Ch. hololive-EN Beginner 3y ago
Cybersecurity for the Blockchain? HALBORN+SANS Security Summit
Cybersecurity
Cybersecurity for the Blockchain? HALBORN+SANS Security Summit
John Hammond Beginner 3y ago
【TWILIGHT WATCHALONG】 hold on tight, spider monkey with MUMEI
Cybersecurity
【TWILIGHT WATCHALONG】 hold on tight, spider monkey with MUMEI
Ceres Fauna Ch. hololive-EN Beginner 3y ago
Compromising WINDOWS Hosts w/ Impacket (Active Directory #09)
Cybersecurity
Compromising WINDOWS Hosts w/ Impacket (Active Directory #09)
John Hammond Beginner 3y ago
He tried to hack me...
Cybersecurity
He tried to hack me...
John Hammond Beginner 3y ago
Rob Lee: Training and Reskilling in Cyber Security
Cybersecurity ⚡ AI Lesson
Rob Lee: Training and Reskilling in Cyber Security
SANS Institute Beginner 3y ago
【superchat time!】 sleepily reading many superchats !
Cybersecurity ⚡ AI Lesson
【superchat time!】 sleepily reading many superchats !
Ceres Fauna Ch. hololive-EN Beginner 3y ago
PHP Data Exfiltration - Leaking Sensitive Filenames
Cybersecurity ⚡ AI Lesson
PHP Data Exfiltration - Leaking Sensitive Filenames
John Hammond Beginner 3y ago
【MINECRAFT】 sleepy building 🌙
Cybersecurity
【MINECRAFT】 sleepy building 🌙
Ceres Fauna Ch. hololive-EN Beginner 3y ago
Uber, Rockstar fell for this attack. Will you?
Cybersecurity
Uber, Rockstar fell for this attack. Will you?
David Bombal Beginner 3y ago
【1 YEAR ANNIVERSARY】 12 HOUR MARATHON STREAM with collabs, batsus, & more! #faunaversary
Cybersecurity
【1 YEAR ANNIVERSARY】 12 HOUR MARATHON STREAM with collabs, batsus, & more! #faunaversary
Ceres Fauna Ch. hololive-EN Beginner 3y ago
Active Directory PowerShell #08 Generating Local Admins across Hosts
Cybersecurity ⚡ AI Lesson
Active Directory PowerShell #08 Generating Local Admins across Hosts
John Hammond Beginner 3y ago
【Nintendo Switch Sports】 IRyS VS FAUNA SWITCH SPORTS BATTLE OF THE CENTURY
Cybersecurity
【Nintendo Switch Sports】 IRyS VS FAUNA SWITCH SPORTS BATTLE OF THE CENTURY
Ceres Fauna Ch. hololive-EN Beginner 3y ago
Changing the Paradigm of Cyber Risk Oversight
Cybersecurity ⚡ AI Lesson
Changing the Paradigm of Cyber Risk Oversight
SANS Institute Beginner 3y ago
Setting Up Whonix for ANONYMOUS Tor Browsing (Dark Web Documentary #06)
Cybersecurity
Setting Up Whonix for ANONYMOUS Tor Browsing (Dark Web Documentary #06)
John Hammond Beginner 3y ago
WHO IS REAL?!?
Cybersecurity
WHO IS REAL?!?
John Hammond Beginner 3y ago
In The Trenches of Cybersecurity (with Todd!)
Cybersecurity
In The Trenches of Cybersecurity (with Todd!)
John Hammond Beginner 3y ago
【MINECRAFT】 ID Server Tour with Kaela!! Is this Disney World?!?
Cybersecurity
【MINECRAFT】 ID Server Tour with Kaela!! Is this Disney World?!?
Ceres Fauna Ch. hololive-EN Beginner 3y ago
【Spooky's Jump Scare Mansion】 Just 500 more rooms...
Cybersecurity
【Spooky's Jump Scare Mansion】 Just 500 more rooms...
Ceres Fauna Ch. hololive-EN Beginner 3y ago
HackTheBox - Timelapse
Cybersecurity
HackTheBox - Timelapse
IppSec Beginner 3y ago
📚 Coursera Courses Opens on Coursera · Free to audit
1 / 3 View all →
Cybersecurity Strategies for AI-Driven Organizations
📚 Coursera Course ↗
Self-paced
Cybersecurity Strategies for AI-Driven Organizations
Opens on Coursera ↗
Critical Infrastructure Security
📚 Coursera Course ↗
Self-paced
Critical Infrastructure Security
Opens on Coursera ↗
Advanced Penetration Techniques
📚 Coursera Course ↗
Self-paced
Advanced Penetration Techniques
Opens on Coursera ↗
Introduction to Contemporary Operating Systems and Hardware 1b
📚 Coursera Course ↗
Self-paced
Introduction to Contemporary Operating Systems and Hardware 1b
Opens on Coursera ↗
Secure Healthcare Data: Encrypt, Audit, Protect
📚 Coursera Course ↗
Self-paced
Secure Healthcare Data: Encrypt, Audit, Protect
Opens on Coursera ↗
Microsoft 365 Security: Identity, Compliance & Trust
📚 Coursera Course ↗
Self-paced
Microsoft 365 Security: Identity, Compliance & Trust
Opens on Coursera ↗