Tech Skills

Cybersecurity

Ethical hacking, penetration testing, network security, CTFs and defensive security

2561
lessons
Application Security: Web Apps, APIs & Microservices | #Replay
Cybersecurity
Application Security: Web Apps, APIs & Microservices | #Replay
SANS Institute Intermediate 4y ago
Windows Red Team Credential Access Techniques | Mimikatz & WCE
Cybersecurity
Windows Red Team Credential Access Techniques | Mimikatz & WCE
HackerSploit Intermediate 4y ago
Cleaning Up Our Cyber Hygiene
Cybersecurity
Cleaning Up Our Cyber Hygiene
SANS Institute Intermediate 4y ago
Linux Red Team Exploitation Techniques | Exploiting WordPress & MySQL
Cybersecurity
Linux Red Team Exploitation Techniques | Exploiting WordPress & MySQL
HackerSploit Intermediate 4y ago
How I Deepfaked VTuber Gawr Gura with AI
Cybersecurity
How I Deepfaked VTuber Gawr Gura with AI
bycloud Intermediate 4y ago
Implementing Security Best Practices for Amazon WorkSpaces and Amazon AppStream 2.0
Cybersecurity
Implementing Security Best Practices for Amazon WorkSpaces and Amazon AppStream 2.0
AWS Developers Intermediate 4y ago
UHC - Spooktrol
Cybersecurity
UHC - Spooktrol
IppSec Intermediate 4y ago
The Treatment of Diarrhea in Cancer Patients & the General Public
Cybersecurity
The Treatment of Diarrhea in Cancer Patients & the General Public
TCM Academy Intermediate 4y ago
Alaine Duncan: Discharging Arousal (from Integrating Chinese Medicine with Neurobiology)
Cybersecurity
Alaine Duncan: Discharging Arousal (from Integrating Chinese Medicine with Neurobiology)
TCM Academy Intermediate 4y ago
Running Applications Across Elastic Beanstalk and AWS App Runner - AWS Online Tech Talk
Cybersecurity
Running Applications Across Elastic Beanstalk and AWS App Runner - AWS Online Tech Talk
AWS Developers Intermediate 4y ago
Security in Software Development Process / PART 2: Hints for developers
Cybersecurity
Security in Software Development Process / PART 2: Hints for developers
Stepwise Intermediate 4y ago
SnykCon CTF - "Random Flag Generator" Weak PRNG Seed
Cybersecurity
SnykCon CTF - "Random Flag Generator" Weak PRNG Seed
John Hammond Intermediate 4y ago
SnykCon CTF - "Invisible Ink" Prototype Pollution
Cybersecurity
SnykCon CTF - "Invisible Ink" Prototype Pollution
John Hammond Intermediate 4y ago
Hidden keylogger // Bypass Linux & macOS logon screens! Rubber Ducky scripts for Hak5 OMG cable
Cybersecurity
Hidden keylogger // Bypass Linux & macOS logon screens! Rubber Ducky scripts for Hak5 OMG cable
David Bombal Intermediate 4y ago
UHC - Jarmis
Cybersecurity
UHC - Jarmis
IppSec Intermediate 4y ago
Thumbnail A/B Test Experiment for CTR
Cybersecurity
Thumbnail A/B Test Experiment for CTR
LiveUnderflow Intermediate 4y ago
Talking about File Formats with Ange "Corkami" Albertini
Cybersecurity
Talking about File Formats with Ange "Corkami" Albertini
LiveUnderflow Intermediate 4y ago
So you think your phone or iPad are safe? Rubber Ducky script for mobile targets and Hak5 OMG cables
Cybersecurity
So you think your phone or iPad are safe? Rubber Ducky script for mobile targets and Hak5 OMG cables
David Bombal Intermediate 4y ago
"Controversial Security" // BSides Berlin 2021
Cybersecurity
"Controversial Security" // BSides Berlin 2021
LiveOverflow Intermediate 4y ago
Hacking Out of a Network - Computerphile
Cybersecurity
Hacking Out of a Network - Computerphile
Computerphile Intermediate 4y ago
What Keeps You Up At Night?
Cybersecurity
What Keeps You Up At Night?
SANS Institute Intermediate 4y ago
Windows Red Team Exploitation Techniques | Luckystrike & PowerShell Empire
Cybersecurity
Windows Red Team Exploitation Techniques | Luckystrike & PowerShell Empire
HackerSploit Intermediate 4y ago
Red Team Reconnaissance Techniques
Cybersecurity
Red Team Reconnaissance Techniques
HackerSploit Intermediate 4y ago
Red Team Adversary Emulation With Caldera
Cybersecurity
Red Team Adversary Emulation With Caldera
HackerSploit Intermediate 4y ago
Windows Post Exploitation - Dumping Hashes With Mimikatz
Cybersecurity
Windows Post Exploitation - Dumping Hashes With Mimikatz
HackerSploit Intermediate 4y ago
Active Directory Enumeration With BloodHound
Cybersecurity
Active Directory Enumeration With BloodHound
HackerSploit Intermediate 4y ago
Active Directory Enumeration With PowerView
Cybersecurity
Active Directory Enumeration With PowerView
HackerSploit Intermediate 4y ago
Windows Post Exploitation - Local Enumeration
Cybersecurity
Windows Post Exploitation - Local Enumeration
HackerSploit Intermediate 4y ago
TryHackMe - Steel Mountain Walkthrough - Manual Windows Exploitation
Cybersecurity
TryHackMe - Steel Mountain Walkthrough - Manual Windows Exploitation
HackerSploit Intermediate 4y ago
Host Discovery & Vulnerability Scanning With Nessus
Cybersecurity
Host Discovery & Vulnerability Scanning With Nessus
HackerSploit Intermediate 4y ago
What Keeps You Up At Night? with James Beeson
Cybersecurity
What Keeps You Up At Night? with James Beeson
SANS Institute Intermediate 4y ago
How To Install & Configure Nessus
Cybersecurity
How To Install & Configure Nessus
HackerSploit Intermediate 4y ago
Fuzzing & Directory Brute-Force With ffuf
Cybersecurity
Fuzzing & Directory Brute-Force With ffuf
HackerSploit Intermediate 4y ago
Identifying & Countering Cognitive Bias
Cybersecurity
Identifying & Countering Cognitive Bias
SANS Institute Intermediate 4y ago
Migrate mainframe applications to AWS using automated code refactoring - AWS Virtual Workshop
Cybersecurity
Migrate mainframe applications to AWS using automated code refactoring - AWS Virtual Workshop
AWS Developers Intermediate 4y ago
Why Do We Have Neck Pains? The Classical Acupuncture Approach of Rani Ayal
Cybersecurity
Why Do We Have Neck Pains? The Classical Acupuncture Approach of Rani Ayal
TCM Academy Intermediate 4y ago
HackTheBox Mirai - Raspberry Pi Pentesting
Cybersecurity
HackTheBox Mirai - Raspberry Pi Pentesting
HackerSploit Intermediate 4y ago
Creating a secure foundation for SAP on AWS - AWS Virtual Workshop
Cybersecurity
Creating a secure foundation for SAP on AWS - AWS Virtual Workshop
AWS Developers Intermediate 4y ago
HackTheBox Nibbles - Exploiting Arbitrary File Upload
Cybersecurity
HackTheBox Nibbles - Exploiting Arbitrary File Upload
HackerSploit Intermediate 4y ago
VOD - TryHackMe! Attacking Kerberos
Cybersecurity
VOD - TryHackMe! Attacking Kerberos
John Hammond Intermediate 4y ago
Not in Cyber Security? No Problem! Creative Ways to Gain Experience With No Experience
Cybersecurity
Not in Cyber Security? No Problem! Creative Ways to Gain Experience With No Experience
SANS Institute Intermediate 4y ago
VOD - TryHackMe! Game Zone - Recreating a Metasploit Exploit in Python
Cybersecurity
VOD - TryHackMe! Game Zone - Recreating a Metasploit Exploit in Python
John Hammond Intermediate 4y ago
VOD - TryHackMe! Steel Mountain with Metasploit
Cybersecurity
VOD - TryHackMe! Steel Mountain with Metasploit
John Hammond Intermediate 4y ago
SSRF without impact is NOT a vulnerability
Cybersecurity
SSRF without impact is NOT a vulnerability
LiveUnderflow Intermediate 4y ago
Why White-box Security Tests are Better!
Cybersecurity
Why White-box Security Tests are Better!
LiveUnderflow Intermediate 4y ago
Making-of a LiveOverflow YouTube Thumbnail
Cybersecurity
Making-of a LiveOverflow YouTube Thumbnail
LiveUnderflow Intermediate 4y ago
Better than Stack Overflow for Development
Cybersecurity
Better than Stack Overflow for Development
LiveUnderflow Intermediate 4y ago
HackTheBox Knife - Linux Privilege Escalation With GTFOBins
Cybersecurity
HackTheBox Knife - Linux Privilege Escalation With GTFOBins
HackerSploit Intermediate 4y ago
📚 Coursera Courses Opens on Coursera · Free to audit
1 / 3 View all →
Securing Hosts, Network, and Edge in AWS
📚 Coursera Course ↗
Self-paced
Securing Hosts, Network, and Edge in AWS
Opens on Coursera ↗
Master the Fundamentals of Branding Training
📚 Coursera Course ↗
Self-paced
Master the Fundamentals of Branding Training
Opens on Coursera ↗
Linux Security Techniques
📚 Coursera Course ↗
Self-paced
Linux Security Techniques
Opens on Coursera ↗
AWS Developer: Unit 2
📚 Coursera Course ↗
Self-paced
AWS Developer: Unit 2
Opens on Coursera ↗
Ethical Hacking with Kali Linux
📚 Coursera Course ↗
Self-paced
Ethical Hacking with Kali Linux
Opens on Coursera ↗
AI for Cybersecurity
📚 Coursera Course ↗
Self-paced
AI for Cybersecurity
Opens on Coursera ↗