Tech Skills

Cybersecurity

Ethical hacking, penetration testing, network security, CTFs and defensive security

2561
lessons
AT&T Charged Him $900 So He Took Down Their Network | Darknet Diaries Ep. 20: mobman
Cybersecurity
AT&T Charged Him $900 So He Took Down Their Network | Darknet Diaries Ep. 20: mobman
Jack Rhysider Intermediate 3y ago
I published an Internet app, waitโ€”how do I protect it? - AWS Online Tech Talks
Cybersecurity
I published an Internet app, waitโ€”how do I protect it? - AWS Online Tech Talks
AWS Developers Intermediate 3y ago
Hiring and Mentoring in 2022 | Seat at the Table
Cybersecurity
Hiring and Mentoring in 2022 | Seat at the Table
SANS Institute Intermediate 3y ago
Dirty Pipe - CVE-2022-0847 - Linux Privilege Escalation
Cybersecurity
Dirty Pipe - CVE-2022-0847 - Linux Privilege Escalation
HackerSploit Intermediate 4y ago
Cloud Wars; Episode I - The IAM Menace
Cybersecurity
Cloud Wars; Episode I - The IAM Menace
SANS Institute Intermediate 4y ago
16 secs to break it! ๐Ÿ˜ฑ 70% of real world WiFi networks owned!
Cybersecurity
16 secs to break it! ๐Ÿ˜ฑ 70% of real world WiFi networks owned!
David Bombal Intermediate 4y ago
Exploiting Java Tomcat With a Crazy JSP Web Shell - Real World CTF 2022
Cybersecurity
Exploiting Java Tomcat With a Crazy JSP Web Shell - Real World CTF 2022
LiveOverflow Intermediate 4y ago
Windows Privilege Escalation - Token Impersonation With RoguePotato & PrintSpoofer
Cybersecurity
Windows Privilege Escalation - Token Impersonation With RoguePotato & PrintSpoofer
HackerSploit Intermediate 4y ago
Strong Tools for the Effective Treatment of Endometriosis-related Pain with Nora Giese, MSc
Cybersecurity
Strong Tools for the Effective Treatment of Endometriosis-related Pain with Nora Giese, MSc
TCM Academy Intermediate 4y ago
This lets you create complex applications on the web๐Ÿ‘ฉโ€๐Ÿ’ป #technology #programming #webdev #software
Cybersecurity
This lets you create complex applications on the web๐Ÿ‘ฉโ€๐Ÿ’ป #technology #programming #webdev #software
Coding with Lewis Intermediate 4y ago
What happens if you hack 4.5 billion BTC? // The Code Report
Cybersecurity
What happens if you hack 4.5 billion BTC? // The Code Report
Fireship Intermediate 4y ago
how to NOT be a hacking noob in 2022 // ft. John Hammond
Cybersecurity
how to NOT be a hacking noob in 2022 // ft. John Hammond
NetworkChuck (2) Intermediate 4y ago
noobs // a NetworkChuck Podcast Live Stream
Cybersecurity
noobs // a NetworkChuck Podcast Live Stream
NetworkChuck (2) Intermediate 4y ago
how to NOT be a hacking noob in 2022 // ft. John Hammond
Cybersecurity
how to NOT be a hacking noob in 2022 // ft. John Hammond
NetworkChuck Intermediate 4y ago
How to get a Million YouTube Subscribers in 100 Seconds
Cybersecurity
How to get a Million YouTube Subscribers in 100 Seconds
Fireship Intermediate 4y ago
Don't Use innerHTML Unless You Want To Be Hacked
Cybersecurity
Don't Use innerHTML Unless You Want To Be Hacked
Web Dev Simplified Intermediate 4y ago
Join us for the Free SANS New2Cyber Summit 2022!
Cybersecurity
Join us for the Free SANS New2Cyber Summit 2022!
SANS Institute Intermediate 4y ago
Black Girls Hack Too
Cybersecurity
Black Girls Hack Too
SANS Institute Intermediate 4y ago
Linux Defense Evasion - Apache2 Rootkit
Cybersecurity
Linux Defense Evasion - Apache2 Rootkit
HackerSploit Intermediate 4y ago
How To Crack ZIP & RAR Files With Hashcat
Cybersecurity
How To Crack ZIP & RAR Files With Hashcat
HackerSploit Intermediate 4y ago
Web App Pentesting - Setting Up OWASP bWAPP With Docker
Cybersecurity
Web App Pentesting - Setting Up OWASP bWAPP With Docker
HackerSploit Intermediate 4y ago
Windows Privilege Escalation - Exploiting Insecure GUI Apps
Cybersecurity
Windows Privilege Escalation - Exploiting Insecure GUI Apps
HackerSploit Intermediate 4y ago
Windows Privilege Escalation - Exploiting Scheduled Tasks
Cybersecurity
Windows Privilege Escalation - Exploiting Scheduled Tasks
HackerSploit Intermediate 4y ago
Hacker Simulator Walkthrough - Episode 5 - Almost Getting Jailed
Cybersecurity
Hacker Simulator Walkthrough - Episode 5 - Almost Getting Jailed
HackerSploit Intermediate 4y ago
HEK.SI 2022 - Bypassing UAC With UACMe
Cybersecurity
HEK.SI 2022 - Bypassing UAC With UACMe
HackerSploit Intermediate 4y ago
SOC 2 TSCs
Cybersecurity
SOC 2 TSCs
SANS Institute Intermediate 4y ago
EternalBlue - MS17-010 - Manual Exploitation
Cybersecurity
EternalBlue - MS17-010 - Manual Exploitation
HackerSploit Intermediate 4y ago
Windows Post Exploitation - Dumping & Cracking NTLM Hashes
Cybersecurity
Windows Post Exploitation - Dumping & Cracking NTLM Hashes
HackerSploit Intermediate 4y ago
Windows Privilege Escalation - Using Stored Credentials
Cybersecurity
Windows Privilege Escalation - Using Stored Credentials
HackerSploit Intermediate 4y ago
Hacker Simulator Walkthrough - Episode 4 - Joining CloudSec!
Cybersecurity
Hacker Simulator Walkthrough - Episode 4 - Joining CloudSec!
HackerSploit Intermediate 4y ago
Windows Privilege Escalation - Searching For Passwords In Windows Registry
Cybersecurity
Windows Privilege Escalation - Searching For Passwords In Windows Registry
HackerSploit Intermediate 4y ago
Windows Privilege Escalation - Exploiting AlwaysInstallElevated
Cybersecurity
Windows Privilege Escalation - Exploiting AlwaysInstallElevated
HackerSploit Intermediate 4y ago
Windows Privilege Escalation - Exploiting AutoRun Programs
Cybersecurity
Windows Privilege Escalation - Exploiting AutoRun Programs
HackerSploit Intermediate 4y ago
Retrospectiva Cyber 2021 - Painel Principal como Presidente do Painel Rob T. Lee
Cybersecurity
Retrospectiva Cyber 2021 - Painel Principal como Presidente do Painel Rob T. Lee
SANS Institute Intermediate 4y ago
Revisiting Parrot OS
Cybersecurity
Revisiting Parrot OS
HackerSploit Intermediate 4y ago
Hacker Simulator Walkthrough - Episode 3 - Phi$hing Frenzy!
Cybersecurity
Hacker Simulator Walkthrough - Episode 3 - Phi$hing Frenzy!
HackerSploit Intermediate 4y ago
Windows Privilege Escalation - Insecure Service Executables
Cybersecurity
Windows Privilege Escalation - Insecure Service Executables
HackerSploit Intermediate 4y ago
Hacker Simulator Walkthrough - Episode 2 - Leveling Up
Cybersecurity
Hacker Simulator Walkthrough - Episode 2 - Leveling Up
HackerSploit Intermediate 4y ago
Hacker Simulator Walkthrough - Episode 1 - The Journey Begins
Cybersecurity
Hacker Simulator Walkthrough - Episode 1 - The Journey Begins
HackerSploit Intermediate 4y ago
Windows Privilege Escalation - Weak Registry Permissions
Cybersecurity
Windows Privilege Escalation - Weak Registry Permissions
HackerSploit Intermediate 4y ago
Windows Privilege Escalation - Unquoted Service Paths
Cybersecurity
Windows Privilege Escalation - Unquoted Service Paths
HackerSploit Intermediate 4y ago
Windows Privilege Escalation - Exploiting Insecure Service Permissions
Cybersecurity
Windows Privilege Escalation - Exploiting Insecure Service Permissions
HackerSploit Intermediate 4y ago
Windows Enumeration With winPEAS
Cybersecurity
Windows Enumeration With winPEAS
HackerSploit Intermediate 4y ago
What do you need to know about the log4j (Log4Shell) vulnerability?
Cybersecurity
What do you need to know about the log4j (Log4Shell) vulnerability?
SANS Institute Intermediate 4y ago
What Keeps You Up At Night?
Cybersecurity
What Keeps You Up At Night?
SANS Institute Intermediate 4y ago
Windows Post Exploitation - Persistence With Metasploit
Cybersecurity
Windows Post Exploitation - Persistence With Metasploit
HackerSploit Intermediate 4y ago
Active Directory Enumeration With Server Manager
Cybersecurity
Active Directory Enumeration With Server Manager
HackerSploit Intermediate 4y ago
Cybersecurity Career Roadmap
Cybersecurity
Cybersecurity Career Roadmap
HackerSploit Intermediate 4y ago
๐Ÿ“š Coursera Courses Opens on Coursera ยท Free to audit
1 / 3 View all โ†’
CFR: Security Assessment, Data Collection, and Log Analysis
๐Ÿ“š Coursera Course โ†—
Self-paced
CFR: Security Assessment, Data Collection, and Log Analysis
Opens on Coursera โ†—
Threat Response
๐Ÿ“š Coursera Course โ†—
Self-paced
Threat Response
Opens on Coursera โ†—
Data Visualization & Advanced App Logic
๐Ÿ“š Coursera Course โ†—
Self-paced
Data Visualization & Advanced App Logic
Opens on Coursera โ†—
Introduction to Software-Defined (SD) Branch
๐Ÿ“š Coursera Course โ†—
Self-paced
Introduction to Software-Defined (SD) Branch
Opens on Coursera โ†—
Cybersecurity Tools and Technologies
๐Ÿ“š Coursera Course โ†—
Self-paced
Cybersecurity Tools and Technologies
Opens on Coursera โ†—
Computer Networks and Network Security
๐Ÿ“š Coursera Course โ†—
Self-paced
Computer Networks and Network Security
Opens on Coursera โ†—