Tech Skills

Cybersecurity

Ethical hacking, penetration testing, network security, CTFs and defensive security

3580
lessons
Skills in this topic
View full skill map →
Security Basics
beginner
Fix OWASP top 10 vulnerabilities
AI Security
intermediate
Identify and patch prompt injection vulnerabilities
Network Security
intermediate
Configure a firewall with proper inbound/outbound rules
Ethical Hacking & Pen Testing
intermediate
Conduct a full pen test with Kali Linux
Cloud Security
intermediate
Implement IAM least-privilege policies on AWS/GCP
Incident Response
intermediate
Build an incident response playbook
Security Compliance
intermediate
Map controls for SOC 2 Type II compliance
Defensive AI
advanced
Build an AI-powered log anomaly detector
【ASMR】 Fauna's first ASMR stream! 🌿 comfy whispers and assorted ASMR triggers  #holoCouncil
Cybersecurity
【ASMR】 Fauna's first ASMR stream! 🌿 comfy whispers and assorted ASMR triggers #holoCouncil
Ceres Fauna Ch. hololive-EN Beginner 4y ago
【DON'T STARVE TOGETHER】 Surviving in the wilderness with Mumei! #hololiveEnglish #holoCouncil
Cybersecurity
【DON'T STARVE TOGETHER】 Surviving in the wilderness with Mumei! #hololiveEnglish #holoCouncil
Ceres Fauna Ch. hololive-EN Beginner 4y ago
Destroy a network using a simple Python script // Hack routers with this Scapy DoS Attack
Cybersecurity
Destroy a network using a simple Python script // Hack routers with this Scapy DoS Attack
David Bombal Beginner 4y ago
The Truth About Password Length
Cybersecurity
The Truth About Password Length
The Cyber Mentor Beginner 4y ago
can you hack this screenshot service?? - CSCG 2021
Cybersecurity
can you hack this screenshot service?? - CSCG 2021
LiveOverflow Beginner 4y ago
Create fake Routers with python and scapy
Cybersecurity
Create fake Routers with python and scapy
David Bombal Beginner 4y ago
Black Leaders in Cyber with Darold Kelly, Jr. | SANS+HBCU
Cybersecurity
Black Leaders in Cyber with Darold Kelly, Jr. | SANS+HBCU
SANS Institute Beginner 4y ago
Your "Secret" Folders Aren't Secret
Cybersecurity
Your "Secret" Folders Aren't Secret
The Cyber Mentor Beginner 4y ago
HackTheBox - Crossfit2
Cybersecurity
HackTheBox - Crossfit2
IppSec Beginner 4y ago
SANS+HBCU | Black Leaders in Cyber with Dr. Kimberly Young-McLear, Fellow at CISA
Cybersecurity
SANS+HBCU | Black Leaders in Cyber with Dr. Kimberly Young-McLear, Fellow at CISA
SANS Institute Beginner 4y ago
Learning Binary Exploitation in 2021?
Cybersecurity
Learning Binary Exploitation in 2021?
LiveUnderflow Beginner 4y ago
AES-CFB Cryptography Mistakes - HackTheBox Business CTF "Domain Controller"
Cybersecurity
AES-CFB Cryptography Mistakes - HackTheBox Business CTF "Domain Controller"
John Hammond Beginner 4y ago
Changing the Brain’s Pain Perception as First-Line Treatment for Pain: Acupuncture Class
Cybersecurity
Changing the Brain’s Pain Perception as First-Line Treatment for Pain: Acupuncture Class
TCM Academy Beginner 4y ago
Beginner Issues when Debugging with gdb + gef or pwndbg, ...
Cybersecurity
Beginner Issues when Debugging with gdb + gef or pwndbg, ...
LiveUnderflow Beginner 4y ago
HackTheBox - TheNotebook
Cybersecurity
HackTheBox - TheNotebook
IppSec Beginner 4y ago
GraphQL Introspection - HackTheBox "Business CTF" - NoteQL
Cybersecurity
GraphQL Introspection - HackTheBox "Business CTF" - NoteQL
John Hammond Beginner 4y ago
How To Secure & Harden Docker Containers
Cybersecurity
How To Secure & Harden Docker Containers
HackerSploit Beginner 4y ago
Auditing Docker Security
Cybersecurity
Auditing Docker Security
HackerSploit Beginner 4y ago
Roger Reaves: Smuggling Drugs for Pablo Escobar and the Medellin Cartel | Lex Fridman Podcast #199
Cybersecurity
Roger Reaves: Smuggling Drugs for Pablo Escobar and the Medellin Cartel | Lex Fridman Podcast #199
Lex Fridman Beginner 4y ago
Yuan Qi: Origin and Source. Reading in Ancient Texts with Elisabeth Rochat de la Vallée
Cybersecurity
Yuan Qi: Origin and Source. Reading in Ancient Texts with Elisabeth Rochat de la Vallée
TCM Academy Beginner 4y ago
how to get remote access to your hacking targets // reverse shells with netcat (Windows and Linux!!)
Cybersecurity
how to get remote access to your hacking targets // reverse shells with netcat (Windows and Linux!!)
NetworkChuck Beginner 4y ago
Machine Learning in Cybersecurity // Monika Venčkauskaitė // MLOps Meetup #70
Cybersecurity
Machine Learning in Cybersecurity // Monika Venčkauskaitė // MLOps Meetup #70
MLOps.community Beginner 4y ago
【SPORE】not cursed life-simulation #hololiveEnglish #holoCouncil
Cybersecurity
【SPORE】not cursed life-simulation #hololiveEnglish #holoCouncil
Ceres Fauna Ch. hololive-EN Beginner 4y ago
【Zatsudan Q&A】Let's chat! 🍵 #hololiveEnglish #holoCouncil
Cybersecurity
【Zatsudan Q&A】Let's chat! 🍵 #hololiveEnglish #holoCouncil
Ceres Fauna Ch. hololive-EN Beginner 4y ago
【DEBUT STREAM】Mama Nature 🌿 #hololiveEnglish #holoCouncil
Cybersecurity
【DEBUT STREAM】Mama Nature 🌿 #hololiveEnglish #holoCouncil
Ceres Fauna Ch. hololive-EN Beginner 4y ago
Hacking Routers with Python // Fake route injection to BLACK HOLE networks
Cybersecurity
Hacking Routers with Python // Fake route injection to BLACK HOLE networks
David Bombal Beginner 4y ago
Hiring a Hacker to Hack My Facebook
Cybersecurity
Hiring a Hacker to Hack My Facebook
The Cyber Mentor Beginner 4y ago
Hack your LinkedIn PROFILE to get a job
Cybersecurity
Hack your LinkedIn PROFILE to get a job
David Bombal Beginner 4y ago
Vulnerability Management Water Cooler Chat
Cybersecurity
Vulnerability Management Water Cooler Chat
SANS Institute Beginner 4y ago
Hacking LinkedIn to get the JOB you want
Cybersecurity
Hacking LinkedIn to get the JOB you want
David Bombal Beginner 4y ago
DHCP Starvation (DoS) Attack // Python Scapy Red Team Script
Cybersecurity
DHCP Starvation (DoS) Attack // Python Scapy Red Team Script
David Bombal Beginner 4y ago
Domain Controller Domination
Cybersecurity
Domain Controller Domination
The Cyber Mentor Beginner 4y ago
VLANs: Am I a joke to you? // Python VLAN hacking.
Cybersecurity
VLANs: Am I a joke to you? // Python VLAN hacking.
David Bombal Beginner 4y ago
Hacking Spanning Tree with Python, Scapy and Kali Linux  (Ep 2)  // STP Root Bridge attack! 😀
Cybersecurity
Hacking Spanning Tree with Python, Scapy and Kali Linux (Ep 2) // STP Root Bridge attack! 😀
David Bombal Beginner 4y ago
The Creepiest OSINT Tool to Date
Cybersecurity
The Creepiest OSINT Tool to Date
The Cyber Mentor Beginner 4y ago
Python Network Hacking with Kali Linux and Scapy = attack one! 😀
Cybersecurity
Python Network Hacking with Kali Linux and Scapy = attack one! 😀
David Bombal Beginner 4y ago
Stealing Hashes with SeriousSam (CVE-2021–36934)
Cybersecurity
Stealing Hashes with SeriousSam (CVE-2021–36934)
The Cyber Mentor Beginner 4y ago
Why Being a Destructive Architect is the Way Forward for Black in Tech
Cybersecurity
Why Being a Destructive Architect is the Way Forward for Black in Tech
SANS Institute Beginner 4y ago
HackTheBox - Breadcrumbs
Cybersecurity
HackTheBox - Breadcrumbs
IppSec Beginner 4y ago
You must fight! Lessons from Kaseya hack
Cybersecurity
You must fight! Lessons from Kaseya hack
David Bombal Beginner 4y ago
HackTheBox - Ophiuchi
Cybersecurity
HackTheBox - Ophiuchi
IppSec Beginner 4y ago
Own a WiFi network with Python! WiFi DoS and ownership attack 😀 😂
Cybersecurity
Own a WiFi network with Python! WiFi DoS and ownership attack 😀 😂
David Bombal Beginner 4y ago
HackTheBox - Spectra
Cybersecurity
HackTheBox - Spectra
IppSec Beginner 4y ago
Dealing with Burnout
Cybersecurity
Dealing with Burnout
The Cyber Mentor Beginner 4y ago
Problem while debugging a simple buffer overflow
Cybersecurity
Problem while debugging a simple buffer overflow
LiveUnderflow Beginner 4y ago
HackTheBox - Tentacle
Cybersecurity
HackTheBox - Tentacle
IppSec Beginner 4y ago
burp suite
Cybersecurity
burp suite
David Bombal Beginner 4y ago
Charles Buck: Cell Biology & Qi Mechanism from Thunderfire Miraculous Needling. Using Moxa Sticks
Cybersecurity
Charles Buck: Cell Biology & Qi Mechanism from Thunderfire Miraculous Needling. Using Moxa Sticks
TCM Academy Beginner 4y ago
📚 Coursera Courses Opens on Coursera · Free to audit
1 / 3 View all →
AWS: Content Delivery and Networking
📚 Coursera Course ↗
Self-paced
AWS: Content Delivery and Networking
Opens on Coursera ↗
Harden Workspace Security
📚 Coursera Course ↗
Self-paced
Harden Workspace Security
Opens on Coursera ↗
Segurança de TI: defesa contra as artes negras digitais
📚 Coursera Course ↗
Self-paced
Segurança de TI: defesa contra as artes negras digitais
Opens on Coursera ↗
Connect and Protect: Networks and Network Security
📚 Coursera Course ↗
Self-paced
Connect and Protect: Networks and Network Security
Opens on Coursera ↗
Intro to IoT Pentesting
📚 Coursera Course ↗
Self-paced
Intro to IoT Pentesting
Opens on Coursera ↗
Cybersecurity Strategies for AI-Driven Organizations
📚 Coursera Course ↗
Self-paced
Cybersecurity Strategies for AI-Driven Organizations
Opens on Coursera ↗