Tech Skills

Cybersecurity

Ethical hacking, penetration testing, network security, CTFs and defensive security

7,085
lessons
Skills in this topic
View full skill map →
Security Basics
beginner
Fix OWASP top 10 vulnerabilities
AI Security
intermediate
Identify and patch prompt injection vulnerabilities
Network Security
intermediate
Configure a firewall with proper inbound/outbound rules
Ethical Hacking & Pen Testing
intermediate
Conduct a full pen test with Kali Linux
Cloud Security
intermediate
Implement IAM least-privilege policies on AWS/GCP
Incident Response
intermediate
Build an incident response playbook
Security Compliance
intermediate
Map controls for SOC 2 Type II compliance
Defensive AI
advanced
Build an AI-powered log anomaly detector
YANG, NETCONF, RESTCONF Demos. Which Cisco devices are supported? (Part 1)
Cybersecurity
YANG, NETCONF, RESTCONF Demos. Which Cisco devices are supported? (Part 1)
David Bombal Beginner 7y ago
"Introduction to Linux" [04] Shell Source Code
Cybersecurity
"Introduction to Linux" [04] Shell Source Code
John Hammond Beginner 7y ago
HackTheBox - Stratosphere
Cybersecurity ⚡ AI Lesson
HackTheBox - Stratosphere
IppSec Beginner 7y ago
You’re Probably Not Red Teaming (And Usually I’m Not, Either) Webcast by Deviant Ollam
Cybersecurity ⚡ AI Lesson
You’re Probably Not Red Teaming (And Usually I’m Not, Either) Webcast by Deviant Ollam
SANS Institute Beginner 7y ago
Introduction to Linux [03] BASH Training Wheels Shell
Cybersecurity
Introduction to Linux [03] BASH Training Wheels Shell
John Hammond Beginner 7y ago
Service Website Hacks for Fast, Lasting Success
Cybersecurity
Service Website Hacks for Fast, Lasting Success
Wes McDowell Beginner 7y ago
Introduction to Malware Analysis
Cybersecurity
Introduction to Malware Analysis
SANS Institute Beginner 7y ago
The FUTURE of Information Security Engineers - Cisco Security Automation (DNA CENTER)
Cybersecurity ⚡ AI Lesson
The FUTURE of Information Security Engineers - Cisco Security Automation (DNA CENTER)
NetworkChuck Beginner 7y ago
Reversing Input Validation (Keygen part 1) - Pwn Adventure 3
Cybersecurity ⚡ AI Lesson
Reversing Input Validation (Keygen part 1) - Pwn Adventure 3
LiveOverflow Beginner 7y ago
HackTheBox - Valentine
Cybersecurity
HackTheBox - Valentine
IppSec Beginner 7y ago
Analyzing the Blocky Logic Puzzle  - Pwn Adventure 3
Cybersecurity
Analyzing the Blocky Logic Puzzle - Pwn Adventure 3
LiveOverflow Beginner 7y ago
Moving my HOME NETWORK to a DATA CENTER w/ DMVPN - CCNA | CCNP
Cybersecurity ⚡ AI Lesson
Moving my HOME NETWORK to a DATA CENTER w/ DMVPN - CCNA | CCNP
NetworkChuck Beginner 7y ago
My career crashed! My story.
Cybersecurity
My career crashed! My story.
David Bombal Beginner 7y ago
How To Stay Focused - From Poorhouse To Penthouse
Cybersecurity
How To Stay Focused - From Poorhouse To Penthouse
Dan Lok Beginner 7y ago
How To Become a Product Strategist
Cybersecurity
How To Become a Product Strategist
Flux Academy Beginner 8y ago
Niche Analysis - Proving You Can Actually Help People Solve Their Problems & Achieve Their Goals!
Cybersecurity
Niche Analysis - Proving You Can Actually Help People Solve Their Problems & Achieve Their Goals!
Miles Beckler Beginner 8y ago
The Complete Meterpreter Guide | Privilege Escalation & Clearing Tracks
Cybersecurity ⚡ AI Lesson
The Complete Meterpreter Guide | Privilege Escalation & Clearing Tracks
HackerSploit Beginner 8y ago
"Introduction To Linux" [02] Raspberry Pi & Git
Cybersecurity
"Introduction To Linux" [02] Raspberry Pi & Git
John Hammond Beginner 7y ago
Simple Strings | "Hoaxes & Hexes" (Hackcon2018 CTF)
Cybersecurity
Simple Strings | "Hoaxes & Hexes" (Hackcon2018 CTF)
John Hammond Beginner 7y ago
Introduction to Linux
Cybersecurity ⚡ AI Lesson
Introduction to Linux
SANS Institute Beginner 7y ago
Simple MD5 Hash Cracking | Ryan's CTF [03] Crack That Hash
Cybersecurity
Simple MD5 Hash Cracking | Ryan's CTF [03] Crack That Hash
John Hammond Beginner 7y ago
Learning Cryptography: PicoCTF 2017 [16] Substitution
Cybersecurity
Learning Cryptography: PicoCTF 2017 [16] Substitution
John Hammond Beginner 7y ago
PicoCTF 2017 [13] What is Web (HTML, CSS, & JS)
Cybersecurity
PicoCTF 2017 [13] What is Web (HTML, CSS, & JS)
John Hammond Beginner 7y ago
Python Flask WebDev [01] Installing & Introduction
Cybersecurity
Python Flask WebDev [01] Installing & Introduction
John Hammond Beginner 7y ago
Getting Started in CTF: PicoCTF 2017 [09] keyz (SSH)
Cybersecurity
Getting Started in CTF: PicoCTF 2017 [09] keyz (SSH)
John Hammond Beginner 7y ago
Learning CTF: PicoCTF 2017 [08] Loooong (Python Strings)
Cybersecurity
Learning CTF: PicoCTF 2017 [08] Loooong (Python Strings)
John Hammond Beginner 7y ago
CTF for Beginners: PicoCTF [05] Piazza (IRC & Help)
Cybersecurity
CTF for Beginners: PicoCTF [05] Piazza (IRC & Help)
John Hammond Beginner 7y ago
Beginner's Guide to CTF: PicoCTF [04] | Internet Kitties (Netcat)
Cybersecurity
Beginner's Guide to CTF: PicoCTF [04] | Internet Kitties (Netcat)
John Hammond Beginner 7y ago
HackTheBox - Bart
Cybersecurity ⚡ AI Lesson
HackTheBox - Bart
IppSec Beginner 7y ago
HackTheBox - Nightmarev2  - Speed Run/Unintended Solutions
Cybersecurity
HackTheBox - Nightmarev2 - Speed Run/Unintended Solutions
IppSec Beginner 7y ago
Google CTF: Beginner Quest: MEDIA-DB (SQL Injection)
Cybersecurity
Google CTF: Beginner Quest: MEDIA-DB (SQL Injection)
John Hammond Beginner 7y ago
Google CTF: Beginner Quest: GATEKEEPER (Reverse Engineering)
Cybersecurity
Google CTF: Beginner Quest: GATEKEEPER (Reverse Engineering)
John Hammond Beginner 7y ago
Google CTF: Beginner Quest: LETTER (Hacking PDF Files!)
Cybersecurity
Google CTF: Beginner Quest: LETTER (Hacking PDF Files!)
John Hammond Beginner 7y ago
Developing a TCP Network Proxy - Pwn Adventure 3
Cybersecurity
Developing a TCP Network Proxy - Pwn Adventure 3
LiveOverflow Beginner 7y ago
HackTheBox - Chatterbox
Cybersecurity ⚡ AI Lesson
HackTheBox - Chatterbox
IppSec Beginner 7y ago
Find the hidden Golden Eggs - Pwn Adventure 3
Cybersecurity ⚡ AI Lesson
Find the hidden Golden Eggs - Pwn Adventure 3
LiveOverflow Beginner 7y ago
Teleporting and Hovering (Unbearable Revenge) - Pwn Adventure 3
Cybersecurity
Teleporting and Hovering (Unbearable Revenge) - Pwn Adventure 3
LiveOverflow Beginner 7y ago
You’re Probably Not Red Teaming (And Usually I’m Not, Either) – SANS ICS Summit 2018
Cybersecurity
You’re Probably Not Red Teaming (And Usually I’m Not, Either) – SANS ICS Summit 2018
SANS Institute Beginner 7y ago
HackTheBox - Tally
Cybersecurity
HackTheBox - Tally
IppSec Beginner 7y ago
Recover Game Classes with gdb - Pwn Adventure 3
Cybersecurity
Recover Game Classes with gdb - Pwn Adventure 3
LiveOverflow Beginner 8y ago
GNS3 Talks: Linux Whitebox FRRouting Appliance import; and Cisco IOS OSPF demo (Part 2)
Cybersecurity
GNS3 Talks: Linux Whitebox FRRouting Appliance import; and Cisco IOS OSPF demo (Part 2)
David Bombal Beginner 8y ago
GNS3 Talks: Linux Whitebox FRRouting Appliance import; and Cisco IOS OSPF demo (Part 1)
Cybersecurity
GNS3 Talks: Linux Whitebox FRRouting Appliance import; and Cisco IOS OSPF demo (Part 1)
David Bombal Beginner 8y ago
Information Gathering / Recon - Pwn Adventure 3
Cybersecurity
Information Gathering / Recon - Pwn Adventure 3
LiveOverflow Beginner 8y ago
GNS3 Talks: AAA Docker Appliance: Easy TACACS & RADIUS GNS3 servers! Part 3
Cybersecurity
GNS3 Talks: AAA Docker Appliance: Easy TACACS & RADIUS GNS3 servers! Part 3
David Bombal Beginner 8y ago
GNS3 Talks: AAA Docker Appliance: Easy TACACS & RADIUS GNS3 servers! Part 2
Cybersecurity
GNS3 Talks: AAA Docker Appliance: Easy TACACS & RADIUS GNS3 servers! Part 2
David Bombal Beginner 8y ago
GNS3 Talks: Easy DNS Server for GNS3 Topologies: Dnsmasq Docker Appliance Part 2
Cybersecurity
GNS3 Talks: Easy DNS Server for GNS3 Topologies: Dnsmasq Docker Appliance Part 2
David Bombal Beginner 8y ago
GNS3 Talks: Easy DNS Server for GNS3 Topologies: Dnsmasq Docker Appliance Part 1
Cybersecurity
GNS3 Talks: Easy DNS Server for GNS3 Topologies: Dnsmasq Docker Appliance Part 1
David Bombal Beginner 8y ago
Introduction to Reverse Engineering for Penetration Testers – SANS Pen Test HackFest Summit 2017
Cybersecurity
Introduction to Reverse Engineering for Penetration Testers – SANS Pen Test HackFest Summit 2017
SANS Institute Beginner 8y ago
📚 Coursera Courses Opens on Coursera · Free to audit
1 / 3 View all →
Analyze Network Traffic with TCPDump: Build a Logging Tool
📚 Coursera Course ↗
Self-paced
Analyze Network Traffic with TCPDump: Build a Logging Tool
Opens on Coursera ↗
Network Security
📚 Coursera Course ↗
Self-paced
Network Security
Opens on Coursera ↗
CCNA Expert – Network Automation, Cloud, and Emerging Technologies
📚 Coursera Course ↗
Self-paced
CCNA Expert – Network Automation, Cloud, and Emerging Technologies
Opens on Coursera ↗
CCNA Advanced – WAN, Security, and Network Services
📚 Coursera Course ↗
Self-paced
CCNA Advanced – WAN, Security, and Network Services
Opens on Coursera ↗
AWS: Threat Detection, Logging and Monitoring
📚 Coursera Course ↗
Self-paced
AWS: Threat Detection, Logging and Monitoring
Opens on Coursera ↗
Cybersecurity Threats and Security Program Development
📚 Coursera Course ↗
Self-paced
Cybersecurity Threats and Security Program Development
Opens on Coursera ↗