Tech Skills

Cybersecurity

Ethical hacking, penetration testing, network security, CTFs and defensive security

7,046
lessons
Skills in this topic
View full skill map →
Security Basics
beginner
Fix OWASP top 10 vulnerabilities
AI Security
intermediate
Identify and patch prompt injection vulnerabilities
Network Security
intermediate
Configure a firewall with proper inbound/outbound rules
Ethical Hacking & Pen Testing
intermediate
Conduct a full pen test with Kali Linux
Cloud Security
intermediate
Implement IAM least-privilege policies on AWS/GCP
Incident Response
intermediate
Build an incident response playbook
Security Compliance
intermediate
Map controls for SOC 2 Type II compliance
Defensive AI
advanced
Build an AI-powered log anomaly detector
Recon-ng V5 - Working With The Database
Cybersecurity ⚡ AI Lesson
Recon-ng V5 - Working With The Database
HackerSploit Intermediate 6y ago
Recon-ng V5 - Adding API Keys (Shodan & BuiltWith)
Cybersecurity ⚡ AI Lesson
Recon-ng V5 - Adding API Keys (Shodan & BuiltWith)
HackerSploit Intermediate 6y ago
A Poor Man's Pentest: Automating the Manual - BsidesDE 2019
Cybersecurity
A Poor Man's Pentest: Automating the Manual - BsidesDE 2019
John Hammond Intermediate 6y ago
Do you REALLY need a VPN?
Cybersecurity ⚡ AI Lesson
Do you REALLY need a VPN?
Hussein Nasser Intermediate 6y ago
HackTheBox - Safe
Cybersecurity ⚡ AI Lesson
HackTheBox - Safe
IppSec Intermediate 6y ago
HackTheBox - Ellingson
Cybersecurity
HackTheBox - Ellingson
IppSec Intermediate 6y ago
PicoCTF 2019 [02] Inspector (HTML, CSS, JavaScript)
Cybersecurity
PicoCTF 2019 [02] Inspector (HTML, CSS, JavaScript)
John Hammond Intermediate 6y ago
How The Cult of The Dead Cow Helped Shape Modern Cybersecurity | Joseph Menn | Talks at Google
Cybersecurity
How The Cult of The Dead Cow Helped Shape Modern Cybersecurity | Joseph Menn | Talks at Google
Talks at Google Intermediate 6y ago
10x Engineer: What? You can do this on Cisco IOS?
Cybersecurity
10x Engineer: What? You can do this on Cisco IOS?
David Bombal Intermediate 6y ago
GNS3: Docker containers vs Virtual Machines
Cybersecurity
GNS3: Docker containers vs Virtual Machines
David Bombal Intermediate 6y ago
Web App Testing: Episode 3 - XSS, SQL Injection, and Broken Access Control
Cybersecurity ⚡ AI Lesson
Web App Testing: Episode 3 - XSS, SQL Injection, and Broken Access Control
The Cyber Mentor Intermediate 6y ago
How Speedrunners Use Game Hacking Tools
Cybersecurity ⚡ AI Lesson
How Speedrunners Use Game Hacking Tools
LiveOverflow Intermediate 6y ago
The TOP 3 uses for a Raspberry Pi!!
Cybersecurity ⚡ AI Lesson
The TOP 3 uses for a Raspberry Pi!!
NetworkChuck Intermediate 6y ago
ATT&CKing Your Enterprise: Adversary Detection Pipelines & Adversary Simulation
Cybersecurity
ATT&CKing Your Enterprise: Adversary Detection Pipelines & Adversary Simulation
SANS Institute Intermediate 6y ago
Almost All Web Encryption Works Like This (SP Networks) - Computerphile
Cybersecurity ⚡ AI Lesson
Almost All Web Encryption Works Like This (SP Networks) - Computerphile
Computerphile Intermediate 6y ago
Preventing Your Physical Access Control System from Being Used Against You - SANS ICS Summit 2019
Cybersecurity
Preventing Your Physical Access Control System from Being Used Against You - SANS ICS Summit 2019
SANS Institute Intermediate 6y ago
Recon-ng V5 - Marketplace & Installing Recon Modules (whois, subdomain enumeration)
Cybersecurity ⚡ AI Lesson
Recon-ng V5 - Marketplace & Installing Recon Modules (whois, subdomain enumeration)
HackerSploit Intermediate 6y ago
Recon-ng V5 - Syntax & Workspace Management
Cybersecurity ⚡ AI Lesson
Recon-ng V5 - Syntax & Workspace Management
HackerSploit Intermediate 6y ago
SSH Brute Force Protection With Fail2Ban
Cybersecurity ⚡ AI Lesson
SSH Brute Force Protection With Fail2Ban
HackerSploit Intermediate 6y ago
Linux Essentials For Hackers - #17 - SSH And SSH Security
Cybersecurity ⚡ AI Lesson
Linux Essentials For Hackers - #17 - SSH And SSH Security
HackerSploit Intermediate 6y ago
Linux Essentials For Hackers - #16 - Service And Process Management (HTOP & systemctl)
Cybersecurity ⚡ AI Lesson
Linux Essentials For Hackers - #16 - Service And Process Management (HTOP & systemctl)
HackerSploit Intermediate 6y ago
Linux Essentials For Hackers - #15 - TOR & Proxychains
Cybersecurity ⚡ AI Lesson
Linux Essentials For Hackers - #15 - TOR & Proxychains
HackerSploit Intermediate 6y ago
Linux Essentials For Hackers - #13 - Users And Groups & Permissions With Visudo
Cybersecurity ⚡ AI Lesson
Linux Essentials For Hackers - #13 - Users And Groups & Permissions With Visudo
HackerSploit Intermediate 6y ago
Linux Essentials For Hackers - #12 - File Compression & Archiving With tar
Cybersecurity ⚡ AI Lesson
Linux Essentials For Hackers - #12 - File Compression & Archiving With tar
HackerSploit Intermediate 6y ago
Linux Essentials For Hackers - #11 - Disk Usage
Cybersecurity ⚡ AI Lesson
Linux Essentials For Hackers - #11 - Disk Usage
HackerSploit Intermediate 6y ago
Linux Essentials For Hackers - #10 - Shells & Bash Configuration
Cybersecurity ⚡ AI Lesson
Linux Essentials For Hackers - #10 - Shells & Bash Configuration
HackerSploit Intermediate 6y ago
Linux Essentials For Hackers - #9 - Find + OverTheWire Bandit Challenge
Cybersecurity ⚡ AI Lesson
Linux Essentials For Hackers - #9 - Find + OverTheWire Bandit Challenge
HackerSploit Intermediate 6y ago
Cybertalk Clips | How To Improve Your CTF Skills
Cybersecurity ⚡ AI Lesson
Cybertalk Clips | How To Improve Your CTF Skills
HackerSploit Intermediate 6y ago
Linux Essentials For Hackers - #8 - Enumerating Distribution & Kernel Information
Cybersecurity ⚡ AI Lesson
Linux Essentials For Hackers - #8 - Enumerating Distribution & Kernel Information
HackerSploit Intermediate 6y ago
Linux Essentials For Hackers - #7 - Finding Files With Locate
Cybersecurity ⚡ AI Lesson
Linux Essentials For Hackers - #7 - Finding Files With Locate
HackerSploit Intermediate 6y ago
Linux Essentials For Hackers - #6 - grep & piping
Cybersecurity ⚡ AI Lesson
Linux Essentials For Hackers - #6 - grep & piping
HackerSploit Intermediate 6y ago
Cybertalk - EP2 -  CEH vs CISSP, Cybersecurity Degrees & CTFs vs Penetration Tests
Cybersecurity ⚡ AI Lesson
Cybertalk - EP2 - CEH vs CISSP, Cybersecurity Degrees & CTFs vs Penetration Tests
HackerSploit Intermediate 6y ago
Cybertalk Clips | Importance Of Secure Coding For Developers
Cybersecurity ⚡ AI Lesson
Cybertalk Clips | Importance Of Secure Coding For Developers
HackerSploit Intermediate 6y ago
Linux Essentials For Hackers - #5 - File & Directory Ownership
Cybersecurity ⚡ AI Lesson
Linux Essentials For Hackers - #5 - File & Directory Ownership
HackerSploit Intermediate 6y ago
Linux Essentials For Hackers - #4 - File & Directory Permissions
Cybersecurity ⚡ AI Lesson
Linux Essentials For Hackers - #4 - File & Directory Permissions
HackerSploit Intermediate 6y ago
Linux Essentials For Hackers - #3 - File Management & Manipulation
Cybersecurity ⚡ AI Lesson
Linux Essentials For Hackers - #3 - File Management & Manipulation
HackerSploit Intermediate 6y ago
Linux Essentials For Hackers - #2 - Useful keyboard Shortcuts
Cybersecurity ⚡ AI Lesson
Linux Essentials For Hackers - #2 - Useful keyboard Shortcuts
HackerSploit Intermediate 6y ago
FristiLeaks1.3 - CTF Walkthrough - Boot-To-Root
Cybersecurity ⚡ AI Lesson
FristiLeaks1.3 - CTF Walkthrough - Boot-To-Root
HackerSploit Intermediate 6y ago
Cybertalk - EP1 -  Secure Coding, HackTheBox & Web App Penetration Testing
Cybersecurity ⚡ AI Lesson
Cybertalk - EP1 - Secure Coding, HackTheBox & Web App Penetration Testing
HackerSploit Intermediate 6y ago
SUDO Security Policy Bypass Vulnerability - CVE-2019-14287
Cybersecurity ⚡ AI Lesson
SUDO Security Policy Bypass Vulnerability - CVE-2019-14287
HackerSploit Intermediate 6y ago
OSCP - Taking Notes & Resources
Cybersecurity ⚡ AI Lesson
OSCP - Taking Notes & Resources
John Hammond Intermediate 6y ago
Python3 For Pentesting - Developing A Banner Grabbing Script
Cybersecurity ⚡ AI Lesson
Python3 For Pentesting - Developing A Banner Grabbing Script
HackerSploit Intermediate 6y ago
How To Upgrade Linux Kernel On Ubuntu
Cybersecurity ⚡ AI Lesson
How To Upgrade Linux Kernel On Ubuntu
HackerSploit Intermediate 6y ago
BCACTF "For the NIght is Dark" (with SInisterMatrix!)
Cybersecurity
BCACTF "For the NIght is Dark" (with SInisterMatrix!)
John Hammond Intermediate 6y ago
100% OSCP: Offensive Security Certified Professional
Cybersecurity
100% OSCP: Offensive Security Certified Professional
John Hammond Intermediate 6y ago
BCACTF - Bruteforcing "Basic Pass" (with SinisterMatrix!)
Cybersecurity
BCACTF - Bruteforcing "Basic Pass" (with SinisterMatrix!)
John Hammond Intermediate 6y ago
BCACTF - LISP "Thspeaking" (with SinisterMatrix!)
Cybersecurity
BCACTF - LISP "Thspeaking" (with SinisterMatrix!)
John Hammond Intermediate 6y ago
Kioptrix 1.1 Walkthrough - Boot-To-Root
Cybersecurity ⚡ AI Lesson
Kioptrix 1.1 Walkthrough - Boot-To-Root
HackerSploit Intermediate 6y ago
📚 Coursera Courses Opens on Coursera · Free to audit
1 / 3 View all →
pfSense 2.4.4: Open Source Firewall
📚 Coursera Course ↗
Self-paced
pfSense 2.4.4: Open Source Firewall
Opens on Coursera ↗
Implementing a Risk Management Framework
📚 Coursera Course ↗
Self-paced
Implementing a Risk Management Framework
Opens on Coursera ↗
AI & Cybersecurity Threats, Global Actors, and Trends
📚 Coursera Course ↗
Self-paced
AI & Cybersecurity Threats, Global Actors, and Trends
Opens on Coursera ↗
Securing Hosts, Network, and Edge in AWS
📚 Coursera Course ↗
Self-paced
Securing Hosts, Network, and Edge in AWS
Opens on Coursera ↗
Introduction to Computer Security
📚 Coursera Course ↗
Self-paced
Introduction to Computer Security
Opens on Coursera ↗
AI for Cybersecurity
📚 Coursera Course ↗
Self-paced
AI for Cybersecurity
Opens on Coursera ↗