Tech Skills

Cybersecurity

Ethical hacking, penetration testing, network security, CTFs and defensive security

3584
lessons
Skills in this topic
View full skill map →
Security Basics
beginner
Fix OWASP top 10 vulnerabilities
AI Security
intermediate
Identify and patch prompt injection vulnerabilities
Network Security
intermediate
Configure a firewall with proper inbound/outbound rules
Ethical Hacking & Pen Testing
intermediate
Conduct a full pen test with Kali Linux
Cloud Security
intermediate
Implement IAM least-privilege policies on AWS/GCP
Incident Response
intermediate
Build an incident response playbook
Security Compliance
intermediate
Map controls for SOC 2 Type II compliance
Defensive AI
advanced
Build an AI-powered log anomaly detector
Cracking Linux Password Hashes with Hashcat
Cybersecurity
Cracking Linux Password Hashes with Hashcat
The Cyber Mentor Beginner 7y ago
HackTheBox - Giddy
Cybersecurity
HackTheBox - Giddy
IppSec Beginner 7y ago
Beginner Linux for Ethical Hackers - Installing and Updating Tools
Cybersecurity
Beginner Linux for Ethical Hackers - Installing and Updating Tools
The Cyber Mentor Beginner 7y ago
Are certs worth it in 2019? What is SD-WAN? The Network Therapist (Bryan Byrne) explains!
Cybersecurity
Are certs worth it in 2019? What is SD-WAN? The Network Therapist (Bryan Byrne) explains!
David Bombal Beginner 7y ago
What's the future? Do I have to learn network automation today? Which language? @bigevilbeard shares
Cybersecurity
What's the future? Do I have to learn network automation today? Which language? @bigevilbeard shares
David Bombal Beginner 7y ago
Netstat Commands - Network Administration Tutorial
Cybersecurity
Netstat Commands - Network Administration Tutorial
HackerSploit Beginner 7y ago
Everything New is Old Again - SANS Secure DevOps Summit 2018
Cybersecurity
Everything New is Old Again - SANS Secure DevOps Summit 2018
SANS Institute Beginner 7y ago
Growth Design Workshop (Hacking Growth + Design Sprint)
Cybersecurity
Growth Design Workshop (Hacking Growth + Design Sprint)
AJ&Smart Beginner 7y ago
Website Photos 101: The Photos You SHOULD Be Using & Where to Get Them
Cybersecurity
Website Photos 101: The Photos You SHOULD Be Using & Where to Get Them
Wes McDowell Beginner 7y ago
Big Brother: China Edition!
Cybersecurity
Big Brother: China Edition!
ColdFusion Beginner 7y ago
KRINGLECON: 2018 SANS Holiday Hack Challenge | Getting Started
Cybersecurity
KRINGLECON: 2018 SANS Holiday Hack Challenge | Getting Started
John Hammond Beginner 7y ago
HackTheBox - Oz
Cybersecurity
HackTheBox - Oz
IppSec Beginner 7y ago
a16z Podcast | The Law (and Tech) of Warfare
Cybersecurity
a16z Podcast | The Law (and Tech) of Warfare
a16z Beginner 7y ago
a16z Podcast | On Wearables, Quantified Self, and Biohacking
Cybersecurity
a16z Podcast | On Wearables, Quantified Self, and Biohacking
a16z Beginner 7y ago
Ethereum Smart Contract Hacking - Real World CTF 2018
Cybersecurity
Ethereum Smart Contract Hacking - Real World CTF 2018
LiveOverflow Beginner 7y ago
Examining Variables in GDB | learn gdb [33] picoCTF 2018
Cybersecurity
Examining Variables in GDB | learn gdb [33] picoCTF 2018
John Hammond Beginner 7y ago
Fast Forward: Reflecting on a Life of Watching Movies and a Career in Cybersecurity
Cybersecurity
Fast Forward: Reflecting on a Life of Watching Movies and a Career in Cybersecurity
SANS Institute Beginner 7y ago
Hamid Montakab MD: Introduction to Management of Physical & Psychological Trauma with Acupuncture
Cybersecurity
Hamid Montakab MD: Introduction to Management of Physical & Psychological Trauma with Acupuncture
TCM Academy Beginner 7y ago
Beginner Linux for Ethical Hackers - Scripting with Bash
Cybersecurity
Beginner Linux for Ethical Hackers - Scripting with Bash
The Cyber Mentor Beginner 7y ago
Beginner Linux for Ethical Hackers - Controlling Kali Services
Cybersecurity
Beginner Linux for Ethical Hackers - Controlling Kali Services
The Cyber Mentor Beginner 7y ago
Beginner Linux for Ethical Hackers - Viewing, Creating, and Editing Files
Cybersecurity
Beginner Linux for Ethical Hackers - Viewing, Creating, and Editing Files
The Cyber Mentor Beginner 7y ago
Beginner Linux for Ethical Hackers - Common Network Commands
Cybersecurity
Beginner Linux for Ethical Hackers - Common Network Commands
The Cyber Mentor Beginner 7y ago
Beginner Linux for Ethical Hackers - Users and Privileges
Cybersecurity
Beginner Linux for Ethical Hackers - Users and Privileges
The Cyber Mentor Beginner 7y ago
Beginner Linux for Ethical Hackers - Navigating the File System
Cybersecurity
Beginner Linux for Ethical Hackers - Navigating the File System
The Cyber Mentor Beginner 7y ago
HackTheBox - Fighter Walkthrough (Re-Up)
Cybersecurity
HackTheBox - Fighter Walkthrough (Re-Up)
The Cyber Mentor Beginner 7y ago
Networking for Ethical Hackers - Building A Basic Network with Cisco Packet Tracer (Re-Up)
Cybersecurity
Networking for Ethical Hackers - Building A Basic Network with Cisco Packet Tracer (Re-Up)
The Cyber Mentor Beginner 7y ago
Networking for Ethical Hackers - Network Subnetting Part 2: The Challenge (Re-Up)
Cybersecurity
Networking for Ethical Hackers - Network Subnetting Part 2: The Challenge (Re-Up)
The Cyber Mentor Beginner 7y ago
Networking for Ethical Hackers - Network Subnetting (Re-Up)
Cybersecurity
Networking for Ethical Hackers - Network Subnetting (Re-Up)
The Cyber Mentor Beginner 7y ago
Networking for Ethical Hackers - TCP, UDP, and the Three-Way Handshake (Re-Up)
Cybersecurity
Networking for Ethical Hackers - TCP, UDP, and the Three-Way Handshake (Re-Up)
The Cyber Mentor Beginner 7y ago
HackTheBox - Sunday Walkthrough (Re-Up)
Cybersecurity
HackTheBox - Sunday Walkthrough (Re-Up)
The Cyber Mentor Beginner 7y ago
Buffer Overflows Made Easy - Part 8: Generating Shellcode and Gaining Shells
Cybersecurity
Buffer Overflows Made Easy - Part 8: Generating Shellcode and Gaining Shells
The Cyber Mentor Beginner 7y ago
Buffer Overflows Made Easy - Part 7: Finding the Right Module
Cybersecurity
Buffer Overflows Made Easy - Part 7: Finding the Right Module
The Cyber Mentor Beginner 7y ago
Buffer Overflows Made Easy - Part 6: Finding Bad Characters
Cybersecurity
Buffer Overflows Made Easy - Part 6: Finding Bad Characters
The Cyber Mentor Beginner 7y ago
Buffer Overflows Made Easy - Part 5: Overwriting the EIP
Cybersecurity
Buffer Overflows Made Easy - Part 5: Overwriting the EIP
The Cyber Mentor Beginner 7y ago
Buffer Overflows Made Easy - Part 4: Finding the Offset
Cybersecurity
Buffer Overflows Made Easy - Part 4: Finding the Offset
The Cyber Mentor Beginner 7y ago
Buffer Overflows Made Easy - Part 3: Fuzzing
Cybersecurity
Buffer Overflows Made Easy - Part 3: Fuzzing
The Cyber Mentor Beginner 7y ago
Buffer Overflows Made Easy - Part 2: Spiking
Cybersecurity
Buffer Overflows Made Easy - Part 2: Spiking
The Cyber Mentor Beginner 7y ago
Buffer Overflows Made Easy - Part 1: Introduction
Cybersecurity
Buffer Overflows Made Easy - Part 1: Introduction
The Cyber Mentor Beginner 7y ago
GNS3 Custom Symbols: Modern, clean, crisp network topologies! CCNA | Python | Networking
Cybersecurity
GNS3 Custom Symbols: Modern, clean, crisp network topologies! CCNA | Python | Networking
David Bombal Beginner 7y ago
GNS3, VirtualBox and Cisco IOS: Download, install and configure Cisco IOS with GNS3 and Virtualbox
Cybersecurity
GNS3, VirtualBox and Cisco IOS: Download, install and configure Cisco IOS with GNS3 and Virtualbox
David Bombal Beginner 7y ago
VirtualBox nested virtualization: Now supported with version 6.0 on AMD processors! Great for GNS3!
Cybersecurity
VirtualBox nested virtualization: Now supported with version 6.0 on AMD processors! Great for GNS3!
David Bombal Beginner 7y ago
Experience is overrated! Learn the new technologies and change your life in 2019! Career Advice
Cybersecurity
Experience is overrated! Learn the new technologies and change your life in 2019! Career Advice
David Bombal Beginner 7y ago
2019 career advice for IT professionals: Ride waves and 80/20 rule. Christmas Giveaway! Amazon!
Cybersecurity
2019 career advice for IT professionals: Ride waves and 80/20 rule. Christmas Giveaway! Amazon!
David Bombal Beginner 7y ago
The ONE Skill you need in IT - Information Technology. You need this to succeed!
Cybersecurity
The ONE Skill you need in IT - Information Technology. You need this to succeed!
David Bombal Beginner 7y ago
HackTheBox - Waldo
Cybersecurity
HackTheBox - Waldo
IppSec Beginner 7y ago
Best Python books for Network Engineers! Learn Python and Network Automation: CCNA | Python
Cybersecurity
Best Python books for Network Engineers! Learn Python and Network Automation: CCNA | Python
David Bombal Beginner 7y ago
Kolide & OSQuery: How to Build Solid Queries and Packs for Detection and Threat Hunting
Cybersecurity
Kolide & OSQuery: How to Build Solid Queries and Packs for Detection and Threat Hunting
SANS Institute Beginner 7y ago
SANS Webcast - Consuming OSINT: Watching You Eat, Drink, and Sleep
Cybersecurity
SANS Webcast - Consuming OSINT: Watching You Eat, Drink, and Sleep
SANS Institute Beginner 7y ago
📚 Coursera Courses Opens on Coursera · Free to audit
1 / 3 View all →
Annual Campaigns: Building a Case for Support
📚 Coursera Course ↗
Self-paced
Annual Campaigns: Building a Case for Support
Opens on Coursera ↗
Endpoint Detection and Response Essentials
📚 Coursera Course ↗
Self-paced
Endpoint Detection and Response Essentials
Opens on Coursera ↗
(SSCP) Systems Security Certified Practitioner: Unit 5
📚 Coursera Course ↗
Self-paced
(SSCP) Systems Security Certified Practitioner: Unit 5
Opens on Coursera ↗
Hands-on Hacking
📚 Coursera Course ↗
Self-paced
Hands-on Hacking
Opens on Coursera ↗
Microsoft Unified XDR and SIEM Solution Handbook
📚 Coursera Course ↗
Self-paced
Microsoft Unified XDR and SIEM Solution Handbook
Opens on Coursera ↗
Systems and Cybersecurity Fundamentals Part 1
📚 Coursera Course ↗
Self-paced
Systems and Cybersecurity Fundamentals Part 1
Opens on Coursera ↗