Tech Skills

Cybersecurity

Ethical hacking, penetration testing, network security, CTFs and defensive security

2561
lessons
Hacking WiFi with a Hak5 Pineapple
Cybersecurity
Hacking WiFi with a Hak5 Pineapple
David Bombal Intermediate 3y ago
Brandon Evans: Cloud Security - Threats and Opportunities
Cybersecurity
Brandon Evans: Cloud Security - Threats and Opportunities
SANS Institute Intermediate 3y ago
Joe Lykowski: Building a Transparent, Data-Driven SOC
Cybersecurity
Joe Lykowski: Building a Transparent, Data-Driven SOC
SANS Institute Intermediate 3y ago
Why Was This Bitcoin Millionaire Digging Tunnels Under His House?๐ŸŽ™Darknet Diaries Ep. 39
Cybersecurity
Why Was This Bitcoin Millionaire Digging Tunnels Under His House?๐ŸŽ™Darknet Diaries Ep. 39
Jack Rhysider Intermediate 3y ago
LinkedIn is a Bigger Security Threat Than You Think๐ŸŽ™Darknet Diaries Ep. 122: Lisa
Cybersecurity
LinkedIn is a Bigger Security Threat Than You Think๐ŸŽ™Darknet Diaries Ep. 122: Lisa
Jack Rhysider Intermediate 3y ago
Is this the future of the Internet? UDP Deep Dive.
Cybersecurity
Is this the future of the Internet? UDP Deep Dive.
David Bombal Intermediate 3y ago
A group of Minecraft hackers tried to shoot me into space
Cybersecurity
A group of Minecraft hackers tried to shoot me into space
LiveUnderflow Intermediate 3y ago
Reverse Engineering - Computerphile
Cybersecurity
Reverse Engineering - Computerphile
Computerphile Intermediate 3y ago
3 ways the web can be INSECURE๐Ÿ‘ฉโ€๐Ÿ’ป #ad #cybersecurity #trendmicro #PremiumSecuritySuite #technology
Cybersecurity
3 ways the web can be INSECURE๐Ÿ‘ฉโ€๐Ÿ’ป #ad #cybersecurity #trendmicro #PremiumSecuritySuite #technology
Coding with Lewis Intermediate 3y ago
Put your hacking skills to the test with Capture The Flag competition #Shorts
Cybersecurity
Put your hacking skills to the test with Capture The Flag competition #Shorts
Google for Developers Intermediate 3y ago
How to Prioritize Your Work: Effort Impact Scale
Cybersecurity
How to Prioritize Your Work: Effort Impact Scale
AJ&Smart Intermediate 3y ago
Activating ACM Private Certificate Authority - AWS Virtual Workshop
Cybersecurity
Activating ACM Private Certificate Authority - AWS Virtual Workshop
AWS Developers Intermediate 3y ago
Hacking JavaScript: ELECTRON Applications w/ 7ASecurity
Cybersecurity
Hacking JavaScript: ELECTRON Applications w/ 7ASecurity
John Hammond Intermediate 3y ago
HackTheBox - Fingerprint
Cybersecurity
HackTheBox - Fingerprint
IppSec Intermediate 3y ago
The Mystery of the Middle East's Cyber Mercenaries๐ŸŽ™Darknet Diaries Ep. 38: Dark Caracal
Cybersecurity
The Mystery of the Middle East's Cyber Mercenaries๐ŸŽ™Darknet Diaries Ep. 38: Dark Caracal
Jack Rhysider Intermediate 3y ago
The Wiper Virus That Nearly "Erased" the World's Biggest Casino๐ŸŽ™Darknet Diaries Ep. 37: LVS
Cybersecurity
The Wiper Virus That Nearly "Erased" the World's Biggest Casino๐ŸŽ™Darknet Diaries Ep. 37: LVS
Jack Rhysider Intermediate 3y ago
Multifaceted Extortion: Analysis of Data Exfiltration TTPs Used by Ransomware Threat Actors
Cybersecurity
Multifaceted Extortion: Analysis of Data Exfiltration TTPs Used by Ransomware Threat Actors
SANS Institute Intermediate 3y ago
Alexia Crumpton: MITRE ATT&CK for Defenders
Cybersecurity
Alexia Crumpton: MITRE ATT&CK for Defenders
SANS Institute Intermediate 3y ago
The New Guy at the Office Is a Secret Super Hacker๐ŸŽ™Darknet Diaries Ep. 36: Jeremy From Marketing
Cybersecurity
The New Guy at the Office Is a Secret Super Hacker๐ŸŽ™Darknet Diaries Ep. 36: Jeremy From Marketing
Jack Rhysider Intermediate 3y ago
Cat Self: macOS and Linux Security
Cybersecurity
Cat Self: macOS and Linux Security
SANS Institute Intermediate 3y ago
The Cybergang That Stole $1 Billion From ATMs๐ŸŽ™Darknet Diaries Ep. 35: Carbanak
Cybersecurity
The Cybergang That Stole $1 Billion From ATMs๐ŸŽ™Darknet Diaries Ep. 35: Carbanak
Jack Rhysider Intermediate 3y ago
Hacking Is Life-or-Death When You Target a Hospital๐ŸŽ™Darknet Diaries Ep. 121: Ed
Cybersecurity
Hacking Is Life-or-Death When You Target a Hospital๐ŸŽ™Darknet Diaries Ep. 121: Ed
Jack Rhysider Intermediate 3y ago
The Most Hated Man on the Internet๐ŸŽ™Darknet Diaries Ep. 34: For Your Eyes Only
Cybersecurity
The Most Hated Man on the Internet๐ŸŽ™Darknet Diaries Ep. 34: For Your Eyes Only
Jack Rhysider Intermediate 3y ago
Security Conversations That Matter | Seat At The Table
Cybersecurity
Security Conversations That Matter | Seat At The Table
SANS Institute Intermediate 3y ago
Tony Turner: Securing the Cyber Supply Chain
Cybersecurity
Tony Turner: Securing the Cyber Supply Chain
SANS Institute Intermediate 3y ago
The Internet just changed.
Cybersecurity
The Internet just changed.
David Bombal Intermediate 3y ago
Never Use These 10 Passwords on the Internet๐ŸŽ™Darknet Diaries Ep. 33: RockYou
Cybersecurity
Never Use These 10 Passwords on the Internet๐ŸŽ™Darknet Diaries Ep. 33: RockYou
Jack Rhysider Intermediate 3y ago
Blueprint Live at SANSFIRE 2022: A panel with Heather Mahalik, Katie Nickels and Jeff McJunkin
Cybersecurity
Blueprint Live at SANSFIRE 2022: A panel with Heather Mahalik, Katie Nickels and Jeff McJunkin
SANS Institute Intermediate 3y ago
Inside the Underground Markets For Your Stolen Credit Cards๐ŸŽ™Darknet Diaries Ep. 32: The Carder
Cybersecurity
Inside the Underground Markets For Your Stolen Credit Cards๐ŸŽ™Darknet Diaries Ep. 32: The Carder
Jack Rhysider Intermediate 3y ago
James Rowley: Creating and Running an Insider Threat Program
Cybersecurity
James Rowley: Creating and Running an Insider Threat Program
SANS Institute Intermediate 3y ago
Panel | Self-Management Strategies for Avoiding Burnout, Staying Healthy, and Getting Stuff Done
Cybersecurity
Panel | Self-Management Strategies for Avoiding Burnout, Staying Healthy, and Getting Stuff Done
SANS Institute Intermediate 3y ago
He Took Control of 50,000 Printers With 3 Lines of Code๐ŸŽ™Darknet Diaries Ep. 31: Hacker Giraffe
Cybersecurity
He Took Control of 50,000 Printers With 3 Lines of Code๐ŸŽ™Darknet Diaries Ep. 31: Hacker Giraffe
Jack Rhysider Intermediate 3y ago
The Real STEM Sadie: Owning Your Story
Cybersecurity
The Real STEM Sadie: Owning Your Story
SANS Institute Intermediate 3y ago
Recruiting, Training, and Retaining Neurodivergent Talent
Cybersecurity
Recruiting, Training, and Retaining Neurodivergent Talent
SANS Institute Intermediate 3y ago
The Kuwaiti Banking Malware Mystery๐ŸŽ™Darknet Diaries Ep. 120: Voulnet
Cybersecurity
The Kuwaiti Banking Malware Mystery๐ŸŽ™Darknet Diaries Ep. 120: Voulnet
Jack Rhysider Intermediate 3y ago
The Logic Bomb That Took Down the World's Richest Oil Company๐ŸŽ™Darknet Diaries Ep. 30: Shamoon
Cybersecurity
The Logic Bomb That Took Down the World's Richest Oil Company๐ŸŽ™Darknet Diaries Ep. 30: Shamoon
Jack Rhysider Intermediate 3y ago
The Most Sophisticated Malware Ever Made (That We Know Of)๐ŸŽ™Darknet Diaries Ep. 29: Stuxnet
Cybersecurity
The Most Sophisticated Malware Ever Made (That We Know Of)๐ŸŽ™Darknet Diaries Ep. 29: Stuxnet
Jack Rhysider Intermediate 3y ago
How Scammers Stole $40 Million in Tax Refunds From IRS.gov๐ŸŽ™Darknet Diaries Ep. 26: IRS
Cybersecurity
How Scammers Stole $40 Million in Tax Refunds From IRS.gov๐ŸŽ™Darknet Diaries Ep. 26: IRS
Jack Rhysider Intermediate 3y ago
Why an Innocent Man Confessed to Medical Extortion Hacking๐ŸŽ™Darknet Diaries Ep. 25: Alberto
Cybersecurity
Why an Innocent Man Confessed to Medical Extortion Hacking๐ŸŽ™Darknet Diaries Ep. 25: Alberto
Jack Rhysider Intermediate 3y ago
The Dark Web's Richest Drug Lord Made 1 Fatal Mistake๐ŸŽ™Darknet Diaries Ep. 24: Operation Bayonet
Cybersecurity
The Dark Web's Richest Drug Lord Made 1 Fatal Mistake๐ŸŽ™Darknet Diaries Ep. 24: Operation Bayonet
Jack Rhysider Intermediate 3y ago
New Shell in Town: Adventures in using PowerShell on Linux
Cybersecurity
New Shell in Town: Adventures in using PowerShell on Linux
SANS Institute Intermediate 3y ago
Risky Business: Careers in GRC
Cybersecurity
Risky Business: Careers in GRC
SANS Institute Intermediate 3y ago
Taking the Plunge:  Advice from People Who Literally Wrote the Book on Cybersecurity Careers Panel
Cybersecurity
Taking the Plunge: Advice from People Who Literally Wrote the Book on Cybersecurity Careers Panel
SANS Institute Intermediate 3y ago
New2Cyber Catch-22: Getting Experience When You Have No Experience
Cybersecurity
New2Cyber Catch-22: Getting Experience When You Have No Experience
SANS Institute Intermediate 3y ago
Why SecDevOps is the New Way in Cybersecurity
Cybersecurity
Why SecDevOps is the New Way in Cybersecurity
SANS Institute Intermediate 3y ago
Promoted from CISO to CIO
Cybersecurity
Promoted from CISO to CIO
SANS Institute Intermediate 3y ago
Amp Up Your Career:  Careers in Energy and Critical Infrastructure Cybersecurity
Cybersecurity
Amp Up Your Career: Careers in Energy and Critical Infrastructure Cybersecurity
SANS Institute Intermediate 3y ago
Hacking Your Mind: Como comeรงar e continuar a evoluir
Cybersecurity
Hacking Your Mind: Como comeรงar e continuar a evoluir
SANS Institute Intermediate 3y ago
๐Ÿ“š Coursera Courses Opens on Coursera ยท Free to audit
1 / 3 View all โ†’
AWS Security, Logging & DevOps for Data Engineers
๐Ÿ“š Coursera Course โ†—
Self-paced
AWS Security, Logging & DevOps for Data Engineers
Opens on Coursera โ†—
Threat Response
๐Ÿ“š Coursera Course โ†—
Self-paced
Threat Response
Opens on Coursera โ†—
Cyber Security: Applied Cryptography
๐Ÿ“š Coursera Course โ†—
Self-paced
Cyber Security: Applied Cryptography
Opens on Coursera โ†—
Data Center Security Management with Microsoft System Center
๐Ÿ“š Coursera Course โ†—
Self-paced
Data Center Security Management with Microsoft System Center
Opens on Coursera โ†—
Data Privacy, Security, Governance, Risk and Compliance
๐Ÿ“š Coursera Course โ†—
Self-paced
Data Privacy, Security, Governance, Risk and Compliance
Opens on Coursera โ†—
The Art of Storytelling
๐Ÿ“š Coursera Course โ†—
Self-paced
The Art of Storytelling
Opens on Coursera โ†—