Tech Skills

Cybersecurity

Ethical hacking, penetration testing, network security, CTFs and defensive security

7,045
lessons
Skills in this topic
View full skill map →
Security Basics
beginner
Fix OWASP top 10 vulnerabilities
AI Security
intermediate
Identify and patch prompt injection vulnerabilities
Network Security
intermediate
Configure a firewall with proper inbound/outbound rules
Ethical Hacking & Pen Testing
intermediate
Conduct a full pen test with Kali Linux
Cloud Security
intermediate
Implement IAM least-privilege policies on AWS/GCP
Incident Response
intermediate
Build an incident response playbook
Security Compliance
intermediate
Map controls for SOC 2 Type II compliance
Defensive AI
advanced
Build an AI-powered log anomaly detector
Nmap - HTTP Enumeration - Detecting HTTP Methods
Cybersecurity ⚡ AI Lesson
Nmap - HTTP Enumeration - Detecting HTTP Methods
HackerSploit Intermediate 5y ago
Nmap - SMTP Enumeration
Cybersecurity ⚡ AI Lesson
Nmap - SMTP Enumeration
HackerSploit Intermediate 5y ago
Remote Forensic Investigations in the Context of COVID-19 | SANS@MIC Talk
Cybersecurity ⚡ AI Lesson
Remote Forensic Investigations in the Context of COVID-19 | SANS@MIC Talk
SANS Institute Intermediate 5y ago
A Machine Learning Primer for the Blue Team
Cybersecurity
A Machine Learning Primer for the Blue Team
SANS Institute Intermediate 5y ago
HackTheBox - Fatty
Cybersecurity
HackTheBox - Fatty
IppSec Intermediate 5y ago
Your Backend is Also a Frontend (Backend vs Frontend Engineering)
Cybersecurity
Your Backend is Also a Frontend (Backend vs Frontend Engineering)
Hussein Nasser Intermediate 5y ago
HackTheBox - Oouch
Cybersecurity
HackTheBox - Oouch
IppSec Intermediate 5y ago
MongoDB and ElasticSearch Clusters WIPED! The Meow attack and how Backend Engineers can prevent it
Cybersecurity ⚡ AI Lesson
MongoDB and ElasticSearch Clusters WIPED! The Meow attack and how Backend Engineers can prevent it
Hussein Nasser Intermediate 5y ago
NetworkChuck Coffee
Cybersecurity ⚡ AI Lesson
NetworkChuck Coffee
NetworkChuck Intermediate 5y ago
VLC Kill Bill: Easter Egg Reverse Engineering
Cybersecurity
VLC Kill Bill: Easter Egg Reverse Engineering
LiveOverflow Intermediate 5y ago
Capture the Flag? Change Your Life
Cybersecurity
Capture the Flag? Change Your Life
John Hammond Intermediate 5y ago
what am i doing?? (aws...security+.....ccna?)
Cybersecurity ⚡ AI Lesson
what am i doing?? (aws...security+.....ccna?)
NetworkChuck Intermediate 5y ago
Nmap - DNS Enumeration
Cybersecurity ⚡ AI Lesson
Nmap - DNS Enumeration
HackerSploit Intermediate 5y ago
Nmap - FTP Enumeration
Cybersecurity ⚡ AI Lesson
Nmap - FTP Enumeration
HackerSploit Intermediate 5y ago
Nmap - Banner Grabbing
Cybersecurity ⚡ AI Lesson
Nmap - Banner Grabbing
HackerSploit Intermediate 5y ago
Nmap - NSE Syntax
Cybersecurity ⚡ AI Lesson
Nmap - NSE Syntax
HackerSploit Intermediate 5y ago
Nmap - Scan Timing And Performance
Cybersecurity ⚡ AI Lesson
Nmap - Scan Timing And Performance
HackerSploit Intermediate 5y ago
Nmap - Firewall Evasion (Decoys, MTU & Fragmentation)
Cybersecurity ⚡ AI Lesson
Nmap - Firewall Evasion (Decoys, MTU & Fragmentation)
HackerSploit Intermediate 5y ago
Wiresharking Server-Sent Events
Cybersecurity
Wiresharking Server-Sent Events
Hussein Nasser Intermediate 5y ago
Remote Code Execution bug found in Popular Node.js changelog library (I go through the code)
Cybersecurity ⚡ AI Lesson
Remote Code Execution bug found in Popular Node.js changelog library (I go through the code)
Hussein Nasser Intermediate 5y ago
My Thoughts on the Massive VPN Leak of 1.2 TB User logs
Cybersecurity ⚡ AI Lesson
My Thoughts on the Massive VPN Leak of 1.2 TB User logs
Hussein Nasser Intermediate 5y ago
Digicert revokes 50,000 EV Certificates
Cybersecurity
Digicert revokes 50,000 EV Certificates
Hussein Nasser Intermediate 5y ago
The Cloudflare Outage - What Happened? And my Thoughts
Cybersecurity
The Cloudflare Outage - What Happened? And my Thoughts
Hussein Nasser Intermediate 5y ago
Introduction To Pentesting - Enumeration
Cybersecurity ⚡ AI Lesson
Introduction To Pentesting - Enumeration
HackerSploit Intermediate 5y ago
My Thoughts on The Twitter “Hack”
Cybersecurity ⚡ AI Lesson
My Thoughts on The Twitter “Hack”
Hussein Nasser Intermediate 5y ago
How To Reset Linux Root Password
Cybersecurity ⚡ AI Lesson
How To Reset Linux Root Password
HackerSploit Intermediate 5y ago
Understanding and Applying Threat Intelligence
Cybersecurity
Understanding and Applying Threat Intelligence
SANS Institute Intermediate 5y ago
A Database User for each REST Route - Best Practices for Backend Application with Postgres
Cybersecurity
A Database User for each REST Route - Best Practices for Backend Application with Postgres
Hussein Nasser Intermediate 5y ago
Building a Deno HTTPS Web Server with Self-Signed Certificate
Cybersecurity ⚡ AI Lesson
Building a Deno HTTPS Web Server with Self-Signed Certificate
Hussein Nasser Intermediate 5y ago
How To Convert Linux Packages With Alien
Cybersecurity ⚡ AI Lesson
How To Convert Linux Packages With Alien
HackerSploit Intermediate 5y ago
How much can you learn about the Backend from its API?
Cybersecurity
How much can you learn about the Backend from its API?
Hussein Nasser Intermediate 5y ago
What are SSL/TLS Certificates? Why do we Need them? and How do they Work?
Cybersecurity
What are SSL/TLS Certificates? Why do we Need them? and How do they Work?
Hussein Nasser Intermediate 5y ago
What Really Happens During a WebSockets Connection - Wiresharking WebSockets
Cybersecurity
What Really Happens During a WebSockets Connection - Wiresharking WebSockets
Hussein Nasser Intermediate 5y ago
What Recruiters really look for in a Backend Engineer? (Unpopular opinion)
Cybersecurity
What Recruiters really look for in a Backend Engineer? (Unpopular opinion)
Hussein Nasser Intermediate 5y ago
Maldocs: A Bit of Blue, A Bit of Red | SANS@MIC Talk
Cybersecurity
Maldocs: A Bit of Blue, A Bit of Red | SANS@MIC Talk
SANS Institute Intermediate 5y ago
Catch and Release: Phishing Techniques for the Good Guys | SANS@MIC Talk
Cybersecurity ⚡ AI Lesson
Catch and Release: Phishing Techniques for the Good Guys | SANS@MIC Talk
SANS Institute Intermediate 5y ago
HackTheBox Walkthrough - Tenten
Cybersecurity ⚡ AI Lesson
HackTheBox Walkthrough - Tenten
HackerSploit Intermediate 5y ago
HackTheBox Walkthrough - Optimum
Cybersecurity ⚡ AI Lesson
HackTheBox Walkthrough - Optimum
HackerSploit Intermediate 5y ago
Shock to the System: Re-Evaluating Your Security Operations
Cybersecurity
Shock to the System: Re-Evaluating Your Security Operations
SANS Institute Intermediate 5y ago
The Art of Blue Teaming
Cybersecurity
The Art of Blue Teaming
SANS Institute Intermediate 5y ago
CYA by Using CIA -- Correctly For a Change | SANS@MIC Talk
Cybersecurity
CYA by Using CIA -- Correctly For a Change | SANS@MIC Talk
SANS Institute Intermediate 5y ago
Remote Forensic Investigations in the Context of COVID-19 | SANS@MIC Talk
Cybersecurity
Remote Forensic Investigations in the Context of COVID-19 | SANS@MIC Talk
SANS Institute Intermediate 5y ago
Cybertalk - EP6 - Don't Dual Boot
Cybersecurity ⚡ AI Lesson
Cybertalk - EP6 - Don't Dual Boot
HackerSploit Intermediate 5y ago
HackTheBox - Resolute
Cybersecurity ⚡ AI Lesson
HackTheBox - Resolute
IppSec Intermediate 5y ago
Nmap - Firewall Detection (ACK Probing)
Cybersecurity ⚡ AI Lesson
Nmap - Firewall Detection (ACK Probing)
HackerSploit Intermediate 5y ago
Nmap - Inverse TCP Flag Scanning (FIN, XMAS & NULL)
Cybersecurity ⚡ AI Lesson
Nmap - Inverse TCP Flag Scanning (FIN, XMAS & NULL)
HackerSploit Intermediate 5y ago
Nmap - Output And Verbosity
Cybersecurity ⚡ AI Lesson
Nmap - Output And Verbosity
HackerSploit Intermediate 5y ago
Nmap - UDP Scanning
Cybersecurity ⚡ AI Lesson
Nmap - UDP Scanning
HackerSploit Intermediate 5y ago
📚 Coursera Courses Opens on Coursera · Free to audit
1 / 3 View all →
 System Hacking, Malware Threats, and Network Attacks
📚 Coursera Course ↗
Self-paced
System Hacking, Malware Threats, and Network Attacks
Opens on Coursera ↗
Introduction to AWS Pentesting
📚 Coursera Course ↗
Self-paced
Introduction to AWS Pentesting
Opens on Coursera ↗
Encryption and Cryptography Essentials
📚 Coursera Course ↗
Self-paced
Encryption and Cryptography Essentials
Opens on Coursera ↗
Communication Strategies for a Virtual Age
📚 Coursera Course ↗
Self-paced
Communication Strategies for a Virtual Age
Opens on Coursera ↗
CompTIA Cybersecurity Analyst (CySA+) CS0-003: Unit 1
📚 Coursera Course ↗
Self-paced
CompTIA Cybersecurity Analyst (CySA+) CS0-003: Unit 1
Opens on Coursera ↗
Understanding Cyber Risk Reporting with FAIR™
📚 Coursera Course ↗
Self-paced
Understanding Cyber Risk Reporting with FAIR™
Opens on Coursera ↗