Tech Skills

Cybersecurity

Ethical hacking, penetration testing, network security, CTFs and defensive security

3584
lessons
Skills in this topic
View full skill map →
Security Basics
beginner
Fix OWASP top 10 vulnerabilities
AI Security
intermediate
Identify and patch prompt injection vulnerabilities
Network Security
intermediate
Configure a firewall with proper inbound/outbound rules
Ethical Hacking & Pen Testing
intermediate
Conduct a full pen test with Kali Linux
Cloud Security
intermediate
Implement IAM least-privilege policies on AWS/GCP
Incident Response
intermediate
Build an incident response playbook
Security Compliance
intermediate
Map controls for SOC 2 Type II compliance
Defensive AI
advanced
Build an AI-powered log anomaly detector
Malware Analysis Bootcamp - Setting Up Our Environment
Cybersecurity
Malware Analysis Bootcamp - Setting Up Our Environment
HackerSploit Beginner 6y ago
Malware Analysis Bootcamp - Introduction To Malware Analysis
Cybersecurity
Malware Analysis Bootcamp - Introduction To Malware Analysis
HackerSploit Beginner 6y ago
Pentesting for n00bs: Episode 2 - Lame
Cybersecurity
Pentesting for n00bs: Episode 2 - Lame
The Cyber Mentor Beginner 6y ago
Pentesting for n00bs: Episode 1 - Legacy (hackthebox)
Cybersecurity
Pentesting for n00bs: Episode 1 - Legacy (hackthebox)
The Cyber Mentor Beginner 6y ago
Windows Game Hacking with Ghidra and Cheat Engine
Cybersecurity
Windows Game Hacking with Ghidra and Cheat Engine
LiveOverflow Beginner 6y ago
Network Flow Data: A Cornucopia of Value - SANS Blue Team Summit
Cybersecurity
Network Flow Data: A Cornucopia of Value - SANS Blue Team Summit
SANS Institute Beginner 6y ago
HACKER CULT Stream Intro - Programmable Camera Rig
Cybersecurity
HACKER CULT Stream Intro - Programmable Camera Rig
LiveUnderflow Beginner 6y ago
HackTheBox - LaCasaDePapel
Cybersecurity
HackTheBox - LaCasaDePapel
IppSec Beginner 6y ago
Starting with the Arduino EEPROM Programmer
Cybersecurity
Starting with the Arduino EEPROM Programmer
LiveUnderflow Beginner 6y ago
tshark and Termshark tutorial: Capture and view wireshark captures in a console
Cybersecurity
tshark and Termshark tutorial: Capture and view wireshark captures in a console
David Bombal Beginner 6y ago
Speedrun Hacking Buffer Overflow - speedrun-001 DC27
Cybersecurity
Speedrun Hacking Buffer Overflow - speedrun-001 DC27
LiveOverflow Beginner 6y ago
Python, Genie and CSV Files = Easy Network Automation (DevNet)
Cybersecurity
Python, Genie and CSV Files = Easy Network Automation (DevNet)
David Bombal Beginner 6y ago
TCP Tunneling Applications Pros and Cons (Explained by Example)
Cybersecurity
TCP Tunneling Applications Pros and Cons (Explained by Example)
Hussein Nasser Beginner 6y ago
Transport Layer Security, TLS 1.2 and 1.3 (Explained by Example)
Cybersecurity
Transport Layer Security, TLS 1.2 and 1.3 (Explained by Example)
Hussein Nasser Beginner 6y ago
The Calligraphy and Nature of the Five Elements: Water
Cybersecurity
The Calligraphy and Nature of the Five Elements: Water
TCM Academy Beginner 6y ago
Intro to Extraordinary Channels in Chinese Medicine with Rany Ayal
Cybersecurity
Intro to Extraordinary Channels in Chinese Medicine with Rany Ayal
TCM Academy Beginner 6y ago
Why You Should Take SEC560: Network Penetration Testing and Ethical Hacking
Cybersecurity
Why You Should Take SEC560: Network Penetration Testing and Ethical Hacking
SANS Institute Beginner 6y ago
RESET Your MINDSET - Motivational Speech For Finding Success Garret J. White
Cybersecurity
RESET Your MINDSET - Motivational Speech For Finding Success Garret J. White
Russell Brunson Beginner 6y ago
HSCTF - Python Remote Code Execution (A Simple Conversation)
Cybersecurity
HSCTF - Python Remote Code Execution (A Simple Conversation)
John Hammond Beginner 6y ago
HackTheBox - Chaos
Cybersecurity
HackTheBox - Chaos
IppSec Beginner 6y ago
Malware Analysis Bootcamp - Introduction To The Course
Cybersecurity
Malware Analysis Bootcamp - Introduction To The Course
HackerSploit Beginner 6y ago
Popping a Shell with SMB Relay and Empire
Cybersecurity
Popping a Shell with SMB Relay and Empire
The Cyber Mentor Beginner 6y ago
Full Ethical Hacking Course - Beginner Network Penetration Testing (2019)
Cybersecurity
Full Ethical Hacking Course - Beginner Network Penetration Testing (2019)
The Cyber Mentor Beginner 6y ago
Discussing Hacking Videos - Community Guidelines YouTube
Cybersecurity
Discussing Hacking Videos - Community Guidelines YouTube
LiveUnderflow Beginner 6y ago
YouTube BANNING Hacking Videos - Hot Take
Cybersecurity
YouTube BANNING Hacking Videos - Hot Take
LiveOverflow Beginner 6y ago
Introduction to Electronics - Pride Charity Stream for @EqualityVA via TheBlindHacker
Cybersecurity
Introduction to Electronics - Pride Charity Stream for @EqualityVA via TheBlindHacker
LiveUnderflow Beginner 6y ago
The Complete Linux for Ethical Hackers Course for 2019
Cybersecurity
The Complete Linux for Ethical Hackers Course for 2019
The Cyber Mentor Beginner 6y ago
Unboxing Tools and Start With RAM
Cybersecurity
Unboxing Tools and Start With RAM
LiveUnderflow Beginner 6y ago
Paste-Tastic! - Post Google CTF 2019 Stream
Cybersecurity
Paste-Tastic! - Post Google CTF 2019 Stream
LiveOverflow Beginner 6y ago
PowerShell Empire Complete Tutorial For Beginners - Mimikatz & Privilege Escalation
Cybersecurity
PowerShell Empire Complete Tutorial For Beginners - Mimikatz & Privilege Escalation
HackerSploit Beginner 6y ago
Rany Ayal on Bl 1 and Yin Qiao Mai
Cybersecurity
Rany Ayal on Bl 1 and Yin Qiao Mai
TCM Academy Beginner 6y ago
Elisabeth Rochat de la Vallée: Jing: A Study of the Meridians in the Ancient Texts - Mai vs Jing
Cybersecurity
Elisabeth Rochat de la Vallée: Jing: A Study of the Meridians in the Ancient Texts - Mai vs Jing
TCM Academy Beginner 6y ago
Dr Yair Maimon: Chemotherapy and Toxins in Oncology Acupncuture
Cybersecurity
Dr Yair Maimon: Chemotherapy and Toxins in Oncology Acupncuture
TCM Academy Beginner 6y ago
Intro to Precaution & Contraindication in Oncology Acupuncture
Cybersecurity
Intro to Precaution & Contraindication in Oncology Acupuncture
TCM Academy Beginner 6y ago
Treatment Strategies for Constipation in Oncology
Cybersecurity
Treatment Strategies for Constipation in Oncology
TCM Academy Beginner 6y ago
Dr. Bartosz Chmielnicki MD: Treat the Shen and Transform Emotions
Cybersecurity
Dr. Bartosz Chmielnicki MD: Treat the Shen and Transform Emotions
TCM Academy Beginner 6y ago
Dr. Yair Maimon: Kid 1 - When and How to Use It
Cybersecurity
Dr. Yair Maimon: Kid 1 - When and How to Use It
TCM Academy Beginner 6y ago
Key Take-Aways from SEC401: Security Essentials Bootcamp Style
Cybersecurity
Key Take-Aways from SEC401: Security Essentials Bootcamp Style
SANS Institute Beginner 6y ago
Key Take-Aways from SEC503: Intrusion Detection In-Depth
Cybersecurity
Key Take-Aways from SEC503: Intrusion Detection In-Depth
SANS Institute Beginner 6y ago
You can also code! Network Engineer programs Cisco Viptela SD-WAN using Python! DevNet demo
Cybersecurity
You can also code! Network Engineer programs Cisco Viptela SD-WAN using Python! DevNet demo
David Bombal Beginner 6y ago
Don't bury your head in the sand! Start Now! DevNet to the rescue.
Cybersecurity
Don't bury your head in the sand! Start Now! DevNet to the rescue.
David Bombal Beginner 6y ago
Will Network Engineers still have jobs? Or will Software Developers replace Network Engineers?
Cybersecurity
Will Network Engineers still have jobs? Or will Software Developers replace Network Engineers?
David Bombal Beginner 6y ago
Zero to Hero: Week 11 - File Transfers, Pivoting, and Reporting Writing
Cybersecurity
Zero to Hero: Week 11 - File Transfers, Pivoting, and Reporting Writing
The Cyber Mentor Beginner 6y ago
Not Giving Credit Where Credit is Due - Common Cybersecurity Writing Mistakes
Cybersecurity
Not Giving Credit Where Credit is Due - Common Cybersecurity Writing Mistakes
SANS Institute Beginner 6y ago
Writing a Pentest Report
Cybersecurity
Writing a Pentest Report
The Cyber Mentor Beginner 6y ago
Including Details Most Readers Don’t Read - Common Cybersecurity Writing Mistakes
Cybersecurity
Including Details Most Readers Don’t Read - Common Cybersecurity Writing Mistakes
SANS Institute Beginner 6y ago
What is Wi-Fi 6? Fundamentals of 802.11ax / wifi 6
Cybersecurity
What is Wi-Fi 6? Fundamentals of 802.11ax / wifi 6
David Bombal Beginner 6y ago
Escalating Tensions in Difficult Situations - Common Cybersecurity Writing Mistakes
Cybersecurity
Escalating Tensions in Difficult Situations - Common Cybersecurity Writing Mistakes
SANS Institute Beginner 6y ago
📚 Coursera Courses Opens on Coursera · Free to audit
1 / 3 View all →
Advanced Linux Networking and Security
📚 Coursera Course ↗
Self-paced
Advanced Linux Networking and Security
Opens on Coursera ↗
Risk Management and Incident Response
📚 Coursera Course ↗
Self-paced
Risk Management and Incident Response
Opens on Coursera ↗
Negotiation, Mediation, and Conflict Resolution - Capstone Project
📚 Coursera Course ↗
Self-paced
Negotiation, Mediation, and Conflict Resolution - Capstone Project
Opens on Coursera ↗
Effective Management: Essential Manager Skills
📚 Coursera Course ↗
Self-paced
Effective Management: Essential Manager Skills
Opens on Coursera ↗
The Cybersecurity Culture Blueprint: A Proactive Approach
📚 Coursera Course ↗
Self-paced
The Cybersecurity Culture Blueprint: A Proactive Approach
Opens on Coursera ↗
Cybersecurity Assessment: CompTIA Security+ & CYSA+
📚 Coursera Course ↗
Self-paced
Cybersecurity Assessment: CompTIA Security+ & CYSA+
Opens on Coursera ↗