Tech Skills

Cybersecurity

Ethical hacking, penetration testing, network security, CTFs and defensive security

2562
lessons
HackTheBox Walkthrough - Optimum
Cybersecurity
HackTheBox Walkthrough - Optimum
HackerSploit Intermediate 5y ago
Shock to the System: Re-Evaluating Your Security Operations
Cybersecurity
Shock to the System: Re-Evaluating Your Security Operations
SANS Institute Intermediate 5y ago
The Art of Blue Teaming
Cybersecurity
The Art of Blue Teaming
SANS Institute Intermediate 5y ago
what am i doing?? (aws...security+.....ccna?)
Cybersecurity
what am i doing?? (aws...security+.....ccna?)
NetworkChuck Intermediate 5y ago
Cybertalk - EP6 - Don't Dual Boot
Cybersecurity
Cybertalk - EP6 - Don't Dual Boot
HackerSploit Intermediate 5y ago
HackTheBox - Resolute
Cybersecurity
HackTheBox - Resolute
IppSec Intermediate 5y ago
Free CCNP 350-401 ENCOR Complete Course: 6.4: REST APIs Part 6
Cybersecurity
Free CCNP 350-401 ENCOR Complete Course: 6.4: REST APIs Part 6
David Bombal Intermediate 5y ago
Free CCNP 350-401 ENCOR Complete Course: 6.4: REST APIs Part 5
Cybersecurity
Free CCNP 350-401 ENCOR Complete Course: 6.4: REST APIs Part 5
David Bombal Intermediate 5y ago
Running CTFs with Docker (VirSecCon CTF Recap)
Cybersecurity
Running CTFs with Docker (VirSecCon CTF Recap)
John Hammond Intermediate 5y ago
TryHackMe! Buffer Overflow & Penetration Testing
Cybersecurity
TryHackMe! Buffer Overflow & Penetration Testing
John Hammond Intermediate 5y ago
Oncology Acupuncture Student Testimonials from Vermont
Cybersecurity
Oncology Acupuncture Student Testimonials from Vermont
TCM Academy Intermediate 5y ago
Why MissingNo Multiplies Items!
Cybersecurity
Why MissingNo Multiplies Items!
LiveOverflow Intermediate 5y ago
Oncology Acupuncture Testimonials from Vermont
Cybersecurity
Oncology Acupuncture Testimonials from Vermont
TCM Academy Intermediate 5y ago
BUILDING AN 8-BIT COMPUTER FROM SCRATCH #4 (Full Stream)
Cybersecurity
BUILDING AN 8-BIT COMPUTER FROM SCRATCH #4 (Full Stream)
LiveUnderflow Intermediate 5y ago
BUILDING AN 8-BIT COMPUTER FROM SCRATCH #3 (Full Stream)
Cybersecurity
BUILDING AN 8-BIT COMPUTER FROM SCRATCH #3 (Full Stream)
LiveUnderflow Intermediate 5y ago
run Linux on Windows Docker containers!!
Cybersecurity
run Linux on Windows Docker containers!!
NetworkChuck Intermediate 6y ago
CYA by Using CIA -- Correctly For a Change | SANS@MIC Talk
Cybersecurity
CYA by Using CIA -- Correctly For a Change | SANS@MIC Talk
SANS Institute Intermediate 5y ago
Remote Forensic Investigations in the Context of COVID-19 | SANS@MIC Talk
Cybersecurity
Remote Forensic Investigations in the Context of COVID-19 | SANS@MIC Talk
SANS Institute Intermediate 5y ago
Nmap - Firewall Detection (ACK Probing)
Cybersecurity
Nmap - Firewall Detection (ACK Probing)
HackerSploit Intermediate 5y ago
Nmap - Inverse TCP Flag Scanning (FIN, XMAS & NULL)
Cybersecurity
Nmap - Inverse TCP Flag Scanning (FIN, XMAS & NULL)
HackerSploit Intermediate 5y ago
Nmap - Output And Verbosity
Cybersecurity
Nmap - Output And Verbosity
HackerSploit Intermediate 5y ago
Nmap - UDP Scanning
Cybersecurity
Nmap - UDP Scanning
HackerSploit Intermediate 5y ago
Nmap - TCP Connect & Stealth (SYN) Scanning
Cybersecurity
Nmap - TCP Connect & Stealth (SYN) Scanning
HackerSploit Intermediate 5y ago
Nmap - OS And Service Version Scanning
Cybersecurity
Nmap - OS And Service Version Scanning
HackerSploit Intermediate 5y ago
Nmap - Host Discovery With Ping Sweep
Cybersecurity
Nmap - Host Discovery With Ping Sweep
HackerSploit Intermediate 5y ago
Network Scanning - TCP Flags & TCP 3-Way Handshake
Cybersecurity
Network Scanning - TCP Flags & TCP 3-Way Handshake
HackerSploit Intermediate 5y ago
Moving Past Just Googling It: Harvesting and Using OSINT | SANS@MIC Talk
Cybersecurity
Moving Past Just Googling It: Harvesting and Using OSINT | SANS@MIC Talk
SANS Institute Intermediate 5y ago
Free CCNP 350-401 ENCOR Complete Course: 6.4: REST APIs Part 4
Cybersecurity
Free CCNP 350-401 ENCOR Complete Course: 6.4: REST APIs Part 4
David Bombal Intermediate 5y ago
TryHackMe! Wget for Privilege Escalation
Cybersecurity
TryHackMe! Wget for Privilege Escalation
John Hammond Intermediate 5y ago
Incident Response in ICS in times of Lockdown | SANS@MIC Talk
Cybersecurity
Incident Response in ICS in times of Lockdown | SANS@MIC Talk
SANS Institute Intermediate 5y ago
Discovering Vulnerabilities Using IDA Scripting - SANS Pen Test HackFest Summit 2019
Cybersecurity
Discovering Vulnerabilities Using IDA Scripting - SANS Pen Test HackFest Summit 2019
SANS Institute Intermediate 5y ago
Free CCNP 350-401 ENCOR Complete Course: 6.4: REST APIs Part 3
Cybersecurity
Free CCNP 350-401 ENCOR Complete Course: 6.4: REST APIs Part 3
David Bombal Intermediate 5y ago
DNS Bruteforcing And Subdomain Enumeration With Fierce & Nmap
Cybersecurity
DNS Bruteforcing And Subdomain Enumeration With Fierce & Nmap
HackerSploit Intermediate 5y ago
DNS Enumeration And Zone Transfers
Cybersecurity
DNS Enumeration And Zone Transfers
HackerSploit Intermediate 5y ago
Free CCNP 350-401 ENCOR Complete Course: 6.4: REST APIs Part 1
Cybersecurity
Free CCNP 350-401 ENCOR Complete Course: 6.4: REST APIs Part 1
David Bombal Intermediate 5y ago
Information Security Misconceptions 2020 | SANS@MIC Talk
Cybersecurity
Information Security Misconceptions 2020 | SANS@MIC Talk
SANS Institute Intermediate 5y ago
HackPack CTF - Forging Python Flask Session Cookies
Cybersecurity
HackPack CTF - Forging Python Flask Session Cookies
John Hammond Intermediate 5y ago
Free CCNP 350-401 ENCOR Complete Course: 6.2 JSON
Cybersecurity
Free CCNP 350-401 ENCOR Complete Course: 6.2 JSON
David Bombal Intermediate 5y ago
BUILDING AN 8-BIT COMPUTER FROM SCRATCH #1 (Full Stream)
Cybersecurity
BUILDING AN 8-BIT COMPUTER FROM SCRATCH #1 (Full Stream)
LiveUnderflow Intermediate 5y ago
TryHackMe! KENOBI - Linux Pentest: Samba Shares
Cybersecurity
TryHackMe! KENOBI - Linux Pentest: Samba Shares
John Hammond Intermediate 5y ago
Self-Compiling Malware | SANS@MIC Talk
Cybersecurity
Self-Compiling Malware | SANS@MIC Talk
SANS Institute Intermediate 5y ago
Passive Reconnaissance - OSINT With Maltego
Cybersecurity
Passive Reconnaissance - OSINT With Maltego
HackerSploit Intermediate 5y ago
Passive Reconnaissance - Email Harvesting With theHarvester
Cybersecurity
Passive Reconnaissance - Email Harvesting With theHarvester
HackerSploit Intermediate 5y ago
C2 Matrix | SANS@MIC Talk
Cybersecurity
C2 Matrix | SANS@MIC Talk
SANS Institute Intermediate 5y ago
Are You Certifiable? | SANS@MIC Talk
Cybersecurity
Are You Certifiable? | SANS@MIC Talk
SANS Institute Intermediate 6y ago
Stealth persistence strategies | SANS@MIC Talk
Cybersecurity
Stealth persistence strategies | SANS@MIC Talk
SANS Institute Intermediate 6y ago
"Primefac" in Python - TAMUCTF 2020
Cybersecurity
"Primefac" in Python - TAMUCTF 2020
John Hammond Intermediate 6y ago
Leaking a Flag with Bash - TAMUCTF 2020
Cybersecurity
Leaking a Flag with Bash - TAMUCTF 2020
John Hammond Intermediate 6y ago
📚 Coursera Courses Opens on Coursera · Free to audit
1 / 3 View all →
Software Security Testing
📚 Coursera Course ↗
Self-paced
Software Security Testing
Opens on Coursera ↗
Linux Security Techniques
📚 Coursera Course ↗
Self-paced
Linux Security Techniques
Opens on Coursera ↗
Exploiting and Securing Vulnerabilities in Java Applications
📚 Coursera Course ↗
Self-paced
Exploiting and Securing Vulnerabilities in Java Applications
Opens on Coursera ↗
Introduction to reCAPTCHA
📚 Coursera Course ↗
Self-paced
Introduction to reCAPTCHA
Opens on Coursera ↗
Practical Blockchain and Cryptocurrency
📚 Coursera Course ↗
Self-paced
Practical Blockchain and Cryptocurrency
Opens on Coursera ↗
Application Security Testing and Debugging
📚 Coursera Course ↗
Self-paced
Application Security Testing and Debugging
Opens on Coursera ↗