Tech Skills

Cybersecurity

Ethical hacking, penetration testing, network security, CTFs and defensive security

2561
lessons
How They Hacked the Prime Minister From 1 Instagram Post๐ŸŽ™Darknet Diaries Ep. 84: Jet-setters
Cybersecurity
How They Hacked the Prime Minister From 1 Instagram Post๐ŸŽ™Darknet Diaries Ep. 84: Jet-setters
Jack Rhysider Intermediate 2y ago
He made millions (illegally) hacking online poker
Cybersecurity
He made millions (illegally) hacking online poker
Jack Rhysider Intermediate 2y ago
Strategy 10: Measure Performance to Improve Performance
Cybersecurity
Strategy 10: Measure Performance to Improve Performance
SANS Institute Intermediate 2y ago
The Evolution of Windows.    #windows #evolution #windowsos #windowsevolution
Cybersecurity
The Evolution of Windows. #windows #evolution #windowsos #windowsevolution
CydexCode Intermediate 2y ago
Strategy 9: Communicate Clearly, Collaborate Often, Share Generously
Cybersecurity
Strategy 9: Communicate Clearly, Collaborate Often, Share Generously
SANS Institute Intermediate 2y ago
Web App Hacking with Caido.io
Cybersecurity
Web App Hacking with Caido.io
The Cyber Mentor Intermediate 2y ago
The Most Important Thing I Learned About Core Values!
Cybersecurity
The Most Important Thing I Learned About Core Values!
Evan Carmichael Intermediate 2y ago
How Hackers Use netsh.exe For Persistence & Code Execution (Sliver C2)
Cybersecurity
How Hackers Use netsh.exe For Persistence & Code Execution (Sliver C2)
John Hammond Intermediate 2y ago
Scale Your Cloud Infrastructure (Hosting CTFs)
Cybersecurity
Scale Your Cloud Infrastructure (Hosting CTFs)
John Hammond Intermediate 2y ago
How does the PNPT compare to other Pentest Certifications?  #PNPT #pentester #pentesting
Cybersecurity
How does the PNPT compare to other Pentest Certifications? #PNPT #pentester #pentesting
The Cyber Mentor Intermediate 2y ago
Take Charge of Your Indexability: How to Optimize Your Technical Work [MozCon 2021] โ€” Areej AbuAli
Cybersecurity
Take Charge of Your Indexability: How to Optimize Your Technical Work [MozCon 2021] โ€” Areej AbuAli
Moz Intermediate 2y ago
Cybersecurity Live - CS50 #Reels
Cybersecurity
Cybersecurity Live - CS50 #Reels
CS50 Intermediate 2y ago
I got Pwned ... and so did you! (you're likely in the 12 Billion)
Cybersecurity
I got Pwned ... and so did you! (you're likely in the 12 Billion)
David Bombal Intermediate 2y ago
Fatherhoodโ€™s Power: How Men Protect, Provide, and PRESIDE!
Cybersecurity
Fatherhoodโ€™s Power: How Men Protect, Provide, and PRESIDE!
Evan Carmichael Intermediate 2y ago
Even Governments Are No Match for a Hack This Big๐ŸŽ™Darknet Diaries Ep. 135 The D.R. Incident
Cybersecurity
Even Governments Are No Match for a Hack This Big๐ŸŽ™Darknet Diaries Ep. 135 The D.R. Incident
Jack Rhysider Intermediate 2y ago
This boring website is actually a top secret CIA comms channel
Cybersecurity
This boring website is actually a top secret CIA comms channel
Jack Rhysider Intermediate 2y ago
Keynote | Demonstrating CISO ROI with the C-Suite
Cybersecurity
Keynote | Demonstrating CISO ROI with the C-Suite
SANS Institute Intermediate 2y ago
Panel | The Intersection of Cybersecurity and Law
Cybersecurity
Panel | The Intersection of Cybersecurity and Law
SANS Institute Intermediate 2y ago
Leading High Performing Teams During Lean Times
Cybersecurity
Leading High Performing Teams During Lean Times
SANS Institute Intermediate 2y ago
How Super Hackers Take Total Control With One Click๐ŸŽ™Darknet Diaries Ep. 82: Master of Pwn
Cybersecurity
How Super Hackers Take Total Control With One Click๐ŸŽ™Darknet Diaries Ep. 82: Master of Pwn
Jack Rhysider Intermediate 2y ago
Strategy 8: Leverage Tools and Support Analyst Workflow
Cybersecurity
Strategy 8: Leverage Tools and Support Analyst Workflow
SANS Institute Intermediate 2y ago
$540 million of crypto was stolen through an unlikely loophole: LinkedIn
Cybersecurity
$540 million of crypto was stolen through an unlikely loophole: LinkedIn
Jack Rhysider Intermediate 2y ago
Blueprint Live at the SANS Blue Team Summit 2023
Cybersecurity
Blueprint Live at the SANS Blue Team Summit 2023
SANS Institute Intermediate 2y ago
They Laundered Dirty Bitcoin at a Supermarket Cafรฉ๐ŸŽ™Darknet Diaries Ep. 81: The Vendor
Cybersecurity
They Laundered Dirty Bitcoin at a Supermarket Cafรฉ๐ŸŽ™Darknet Diaries Ep. 81: The Vendor
Jack Rhysider Intermediate 2y ago
One click gives hackers all the holes on your PC
Cybersecurity
One click gives hackers all the holes on your PC
Jack Rhysider Intermediate 2y ago
Strategy 7: Select and Collect the Right Data
Cybersecurity
Strategy 7: Select and Collect the Right Data
SANS Institute Intermediate 2y ago
Don't fall for this fake FBI malware
Cybersecurity
Don't fall for this fake FBI malware
Jack Rhysider Intermediate 2y ago
Locking It Down: Best Practices for Strong Passwords and Authentication Tools.
Cybersecurity
Locking It Down: Best Practices for Strong Passwords and Authentication Tools.
SANS Institute Intermediate 2y ago
How Hackers Evade Program Allowlists with DLLs
Cybersecurity
How Hackers Evade Program Allowlists with DLLs
John Hammond Intermediate 2y ago
There's 2 ways the U.S. military fights a war
Cybersecurity
There's 2 ways the U.S. military fights a war
Jack Rhysider Intermediate 2y ago
Strategy 6: Illuminate Adversaries with Cyber Threat Intelligence
Cybersecurity
Strategy 6: Illuminate Adversaries with Cyber Threat Intelligence
SANS Institute Intermediate 2y ago
Your credit card isn't really safe online
Cybersecurity
Your credit card isn't really safe online
Jack Rhysider Intermediate 2y ago
When You Lie for a Living, Everyone & Everything Is Hackable๐ŸŽ™Darknet Diaries Ep. 134: Deviant
Cybersecurity
When You Lie for a Living, Everyone & Everything Is Hackable๐ŸŽ™Darknet Diaries Ep. 134: Deviant
Jack Rhysider Intermediate 2y ago
Banks are impossible to hack, unless...
Cybersecurity
Banks are impossible to hack, unless...
Jack Rhysider Intermediate 2y ago
Strategy 5: Prioritize Incident Response
Cybersecurity
Strategy 5: Prioritize Incident Response
SANS Institute Intermediate 2y ago
Three ways to level up your Windows Privilege Escalation skills #windows  #privesc #techtok #infosec
Cybersecurity
Three ways to level up your Windows Privilege Escalation skills #windows #privesc #techtok #infosec
The Cyber Mentor Intermediate 2y ago
Rapid Windows Memory Analysis with Volatility 3
Cybersecurity
Rapid Windows Memory Analysis with Volatility 3
John Hammond Intermediate 2y ago
Exploring the Latest Dark Web Onion Sites
Cybersecurity
Exploring the Latest Dark Web Onion Sites
John Hammond Intermediate 2y ago
Strategy 4: Hire AND Grow Quality Staff
Cybersecurity
Strategy 4: Hire AND Grow Quality Staff
SANS Institute Intermediate 2y ago
Experience a Real Pentest with the PNPT Exam #pentesting  #ethicalhacking   #pnpt
Cybersecurity
Experience a Real Pentest with the PNPT Exam #pentesting #ethicalhacking #pnpt
The Cyber Mentor Intermediate 2y ago
The Worm That Crashed the Winter Games Was Full of False Flags๐ŸŽ™Ep. 77: Olympics Destroyer
Cybersecurity
The Worm That Crashed the Winter Games Was Full of False Flags๐ŸŽ™Ep. 77: Olympics Destroyer
Jack Rhysider Intermediate 2y ago
Keynote | Neurodivergent Associates are an Asset: A CISOโ€™s Perspective on Retention and Inclusion
Cybersecurity
Keynote | Neurodivergent Associates are an Asset: A CISOโ€™s Perspective on Retention and Inclusion
SANS Institute Intermediate 2y ago
Opening Keynote | Investing in Neurodiversity
Cybersecurity
Opening Keynote | Investing in Neurodiversity
SANS Institute Intermediate 2y ago
Who Tapped These 106 Govt Cell Phones?
Cybersecurity
Who Tapped These 106 Govt Cell Phones?
Jack Rhysider Intermediate 2y ago
Strategy 3: Build a SOC Structure to Match Your Organizational Needs
Cybersecurity
Strategy 3: Build a SOC Structure to Match Your Organizational Needs
SANS Institute Intermediate 2y ago
Who Would Hack the Largest U.S. Bank, But Not Steal a Penny?๐ŸŽ™Darknet Diaries Ep. 76: Knaves Out
Cybersecurity
Who Would Hack the Largest U.S. Bank, But Not Steal a Penny?๐ŸŽ™Darknet Diaries Ep. 76: Knaves Out
Jack Rhysider Intermediate 2y ago
Here's a quick look at a path to becoming a webapp pentester! #webapp #pentesting #cybersecurity
Cybersecurity
Here's a quick look at a path to becoming a webapp pentester! #webapp #pentesting #cybersecurity
The Cyber Mentor Intermediate 2y ago
Strategy 2: Give the SOC the Authority to Do Its Job
Cybersecurity
Strategy 2: Give the SOC the Authority to Do Its Job
SANS Institute Intermediate 2y ago
๐Ÿ“š Coursera Courses Opens on Coursera ยท Free to audit
1 / 3 View all โ†’
Cross-Cultural Communication in the Hospitality Sector
๐Ÿ“š Coursera Course โ†—
Self-paced
Cross-Cultural Communication in the Hospitality Sector
Opens on Coursera โ†—
IoT Security: Interface and Data Security
๐Ÿ“š Coursera Course โ†—
Self-paced
IoT Security: Interface and Data Security
Opens on Coursera โ†—
Advanced Network Services, Security, and Programmability
๐Ÿ“š Coursera Course โ†—
Self-paced
Advanced Network Services, Security, and Programmability
Opens on Coursera โ†—
TCP/IP, Routing, and Wireless Networking
๐Ÿ“š Coursera Course โ†—
Self-paced
TCP/IP, Routing, and Wireless Networking
Opens on Coursera โ†—
Block Cipher Modes of Operation Training
๐Ÿ“š Coursera Course โ†—
Self-paced
Block Cipher Modes of Operation Training
Opens on Coursera โ†—
Azure Network Troubleshooting and Governance
๐Ÿ“š Coursera Course โ†—
Self-paced
Azure Network Troubleshooting and Governance
Opens on Coursera โ†—