Tech Skills

Cybersecurity

Ethical hacking, penetration testing, network security, CTFs and defensive security

3584
lessons
Skills in this topic
View full skill map →
Security Basics
beginner
Fix OWASP top 10 vulnerabilities
AI Security
intermediate
Identify and patch prompt injection vulnerabilities
Network Security
intermediate
Configure a firewall with proper inbound/outbound rules
Ethical Hacking & Pen Testing
intermediate
Conduct a full pen test with Kali Linux
Cloud Security
intermediate
Implement IAM least-privilege policies on AWS/GCP
Incident Response
intermediate
Build an incident response playbook
Security Compliance
intermediate
Map controls for SOC 2 Type II compliance
Defensive AI
advanced
Build an AI-powered log anomaly detector
Using FUD to Cause Anxiety - Common Cybersecurity Writing Mistakes
Cybersecurity
Using FUD to Cause Anxiety - Common Cybersecurity Writing Mistakes
SANS Institute Beginner 6y ago
Wi-Fi 6 Augmented Reality Demo: 802.11ax wifi 6 changes the game!
Cybersecurity
Wi-Fi 6 Augmented Reality Demo: 802.11ax wifi 6 changes the game!
David Bombal Beginner 6y ago
Zero to Hero: Episode 10 - MS17-010/EternalBlue, GPP/cPasswords, and Kerberoasting
Cybersecurity
Zero to Hero: Episode 10 - MS17-010/EternalBlue, GPP/cPasswords, and Kerberoasting
The Cyber Mentor Beginner 6y ago
Not Using Parallel Structure - Common Cybersecurity Writing Mistakes
Cybersecurity
Not Using Parallel Structure - Common Cybersecurity Writing Mistakes
SANS Institute Beginner 6y ago
Wi-Fi 6 Demo: Samsung S10 and Cisco AP: 802.11ax / wifi 6 smashes it!
Cybersecurity
Wi-Fi 6 Demo: Samsung S10 and Cisco AP: 802.11ax / wifi 6 smashes it!
David Bombal Beginner 6y ago
HackTheBox - Conceal
Cybersecurity
HackTheBox - Conceal
IppSec Beginner 6y ago
Zero to Hero: Week 9 - NTLM Relay, Token Impersonation, Pass the Hash, PsExec, and more
Cybersecurity
Zero to Hero: Week 9 - NTLM Relay, Token Impersonation, Pass the Hash, PsExec, and more
The Cyber Mentor Beginner 6y ago
HackTheBox - Irked
Cybersecurity
HackTheBox - Irked
IppSec Beginner 6y ago
Bug Bounty Hunting - Wfuzz - Web Content Discovery & Form Manipulation
Cybersecurity
Bug Bounty Hunting - Wfuzz - Web Content Discovery & Form Manipulation
HackerSploit Beginner 6y ago
Bug Bounty Hunting - Tools I Use
Cybersecurity
Bug Bounty Hunting - Tools I Use
HackerSploit Beginner 6y ago
b00t2root19 CTF: EasyPHP [PHP Web Exploits]
Cybersecurity
b00t2root19 CTF: EasyPHP [PHP Web Exploits]
John Hammond Beginner 7y ago
LIVE CTF, PART 2! - CS50 Live, EP. 50
Cybersecurity
LIVE CTF, PART 2! - CS50 Live, EP. 50
CS50 Beginner 7y ago
Treating the 5 Types of Menopause: course excerpt
Cybersecurity
Treating the 5 Types of Menopause: course excerpt
TCM Academy Beginner 7y ago
24 Hour Coding Livestream - Creating an Online Chess Game With Python
Cybersecurity
24 Hour Coding Livestream - Creating an Online Chess Game With Python
Tech With Tim Beginner 7y ago
Video Content – 3-steps to Present Your Ideas Clearly
Cybersecurity
Video Content – 3-steps to Present Your Ideas Clearly
The Futur Beginner 7y ago
Using More Words Than Necessary - Common Cybersecurity Writing Mistakes
Cybersecurity
Using More Words Than Necessary - Common Cybersecurity Writing Mistakes
SANS Institute Beginner 6y ago
Applying Inconsistent Formatting - Common Cybersecurity Writing Mistakes
Cybersecurity
Applying Inconsistent Formatting - Common Cybersecurity Writing Mistakes
SANS Institute Beginner 6y ago
Including Indecipherable Graphics - Common Cybersecurity Writing Mistakes
Cybersecurity
Including Indecipherable Graphics - Common Cybersecurity Writing Mistakes
SANS Institute Beginner 6y ago
Overstuffing the Paragraphs - Common Cybersecurity Writing Mistakes
Cybersecurity
Overstuffing the Paragraphs - Common Cybersecurity Writing Mistakes
SANS Institute Beginner 6y ago
Burying the Main Point - Common Cybersecurity Writing Mistakes
Cybersecurity
Burying the Main Point - Common Cybersecurity Writing Mistakes
SANS Institute Beginner 6y ago
Active Directory Exploitation - LLMNR/NBT-NS Poisoning
Cybersecurity
Active Directory Exploitation - LLMNR/NBT-NS Poisoning
The Cyber Mentor Beginner 6y ago
A Day in the Life of an Ethical Hacker / Penetration Tester
Cybersecurity
A Day in the Life of an Ethical Hacker / Penetration Tester
The Cyber Mentor Beginner 6y ago
Zero to Hero: Week 8 - Building an AD Lab, LLMNR Poisoning, and NTLMv2 Cracking with Hashcat
Cybersecurity
Zero to Hero: Week 8 - Building an AD Lab, LLMNR Poisoning, and NTLMv2 Cracking with Hashcat
The Cyber Mentor Beginner 6y ago
Installing Windows Server 2016 on VMWare in 5 Minutes
Cybersecurity
Installing Windows Server 2016 on VMWare in 5 Minutes
The Cyber Mentor Beginner 6y ago
Zero to Hero Pentesting: Episode 7 - Exploitation, Shells, and Some Credential Stuffing
Cybersecurity
Zero to Hero Pentesting: Episode 7 - Exploitation, Shells, and Some Credential Stuffing
The Cyber Mentor Beginner 6y ago
Zero to Hero Pentesting: Episode 6 - Enumeration (Kioptrix & Hack The Box)
Cybersecurity
Zero to Hero Pentesting: Episode 6 - Enumeration (Kioptrix & Hack The Box)
The Cyber Mentor Beginner 6y ago
Zero to Hero Pentesting: Episode 5 - Scanning Tools (Nmap, Nessus, BurpSuite, etc.) & Tactics
Cybersecurity
Zero to Hero Pentesting: Episode 5 - Scanning Tools (Nmap, Nessus, BurpSuite, etc.) & Tactics
The Cyber Mentor Beginner 6y ago
HackTheBox - Redcross
Cybersecurity
HackTheBox - Redcross
IppSec Beginner 6y ago
Zero to Hero Pentesting: Episode 4 - Five Phases of Hacking + Passive OSINT
Cybersecurity
Zero to Hero Pentesting: Episode 4 - Five Phases of Hacking + Passive OSINT
The Cyber Mentor Beginner 7y ago
HackTheBox - Vault
Cybersecurity
HackTheBox - Vault
IppSec Beginner 7y ago
Zero to Hero Pentesting: Episode 3 - Python 102, Building a Terrible Port Scanner, and a Giveaway
Cybersecurity
Zero to Hero Pentesting: Episode 3 - Python 102, Building a Terrible Port Scanner, and a Giveaway
The Cyber Mentor Beginner 7y ago
Zero to Hero Pentesting: Episode 2 - Python 101
Cybersecurity
Zero to Hero Pentesting: Episode 2 - Python 101
The Cyber Mentor Beginner 7y ago
Manually Embedding Msfvenom Payloads In APK's - Proof Of Concept
Cybersecurity
Manually Embedding Msfvenom Payloads In APK's - Proof Of Concept
HackerSploit Beginner 7y ago
Git, GitHub and source control: Is this even for network engineers? Hank Preston Explains: Part 1
Cybersecurity
Git, GitHub and source control: Is this even for network engineers? Hank Preston Explains: Part 1
David Bombal Beginner 7y ago
Zero to Hero Pentesting: Episode 1 - Course Introduction, Notekeeping, Introductory Linux, and AMA
Cybersecurity
Zero to Hero Pentesting: Episode 1 - Course Introduction, Notekeeping, Introductory Linux, and AMA
The Cyber Mentor Beginner 7y ago
DNS Enumeration Tutorial - Dig, Nslookup & Host
Cybersecurity
DNS Enumeration Tutorial - Dig, Nslookup & Host
HackerSploit Beginner 7y ago
New Zero to Hero Pentest Course, New Website, and 2K Subs?!
Cybersecurity
New Zero to Hero Pentest Course, New Website, and 2K Subs?!
The Cyber Mentor Beginner 7y ago
Hacking Live Stream: Episode 3 - Hack The Box Blue, Devel, and Career Q&A / AMA
Cybersecurity
Hacking Live Stream: Episode 3 - Hack The Box Blue, Devel, and Career Q&A / AMA
The Cyber Mentor Beginner 7y ago
The Complete VeraCrypt Encryption Tutorial
Cybersecurity
The Complete VeraCrypt Encryption Tutorial
HackerSploit Beginner 7y ago
Free CCNA VIRL Labs! Free VIRL Server from DevNet! Labs for CCNA | CCNP | Python | Ansible
Cybersecurity
Free CCNA VIRL Labs! Free VIRL Server from DevNet! Labs for CCNA | CCNP | Python | Ansible
David Bombal Beginner 7y ago
Top 10 Writing Mistakes in Cybersecurity and How You Can Avoid Them
Cybersecurity
Top 10 Writing Mistakes in Cybersecurity and How You Can Avoid Them
SANS Institute Beginner 7y ago
Hacking Live Stream: Episode 2 - HackTheBox Active, Vulnserver Buffer Overflow, and Career Q&A / AMA
Cybersecurity
Hacking Live Stream: Episode 2 - HackTheBox Active, Vulnserver Buffer Overflow, and Career Q&A / AMA
The Cyber Mentor Beginner 7y ago
The Complete PGP Encryption Tutorial | Gpg4win & GnuPG
Cybersecurity
The Complete PGP Encryption Tutorial | Gpg4win & GnuPG
HackerSploit Beginner 7y ago
The Hitchhiker’s Guide to Evidence Sources - SANS Webcast
Cybersecurity
The Hitchhiker’s Guide to Evidence Sources - SANS Webcast
SANS Institute Beginner 7y ago
CCNA multicast quiz question: How will multicast traffic flow in the network? CCNA | CCNP
Cybersecurity
CCNA multicast quiz question: How will multicast traffic flow in the network? CCNA | CCNP
David Bombal Beginner 7y ago
Hacking Live Stream: Episode 1 - Kioptrix Level 1, HackTheBox Jerry, and Career Q&A / AMA
Cybersecurity
Hacking Live Stream: Episode 1 - Kioptrix Level 1, HackTheBox Jerry, and Career Q&A / AMA
The Cyber Mentor Beginner 7y ago
Reminder: Twitch Hacking Live Stream Tonight! 2/26/19 at 8PM EST
Cybersecurity
Reminder: Twitch Hacking Live Stream Tonight! 2/26/19 at 8PM EST
The Cyber Mentor Beginner 7y ago
UFW Firewall (Uncomplicated Firewall) - Complete Tutorial
Cybersecurity
UFW Firewall (Uncomplicated Firewall) - Complete Tutorial
HackerSploit Beginner 7y ago
📚 Coursera Courses Opens on Coursera · Free to audit
1 / 3 View all →
Networking, Mobile Devices, Virtualization & Security
📚 Coursera Course ↗
Self-paced
Networking, Mobile Devices, Virtualization & Security
Opens on Coursera ↗
Basics of Cyber Threat Intelligence
📚 Coursera Course ↗
Self-paced
Basics of Cyber Threat Intelligence
Opens on Coursera ↗
Decryption with Python
📚 Coursera Course ↗
Self-paced
Decryption with Python
Opens on Coursera ↗
Metasploit para Principiantes: Básicos de explotación
📚 Coursera Course ↗
Self-paced
Metasploit para Principiantes: Básicos de explotación
Opens on Coursera ↗
AI for Cybersecurity
📚 Coursera Course ↗
Self-paced
AI for Cybersecurity
Opens on Coursera ↗
Dell Technologies Networking & Security Technical Support
📚 Coursera Course ↗
Self-paced
Dell Technologies Networking & Security Technical Support
Opens on Coursera ↗