Tech Skills

Cybersecurity

Ethical hacking, penetration testing, network security, CTFs and defensive security

7,049
lessons
Skills in this topic
View full skill map →
Security Basics
beginner
Fix OWASP top 10 vulnerabilities
AI Security
intermediate
Identify and patch prompt injection vulnerabilities
Network Security
intermediate
Configure a firewall with proper inbound/outbound rules
Ethical Hacking & Pen Testing
intermediate
Conduct a full pen test with Kali Linux
Cloud Security
intermediate
Implement IAM least-privilege policies on AWS/GCP
Incident Response
intermediate
Build an incident response playbook
Security Compliance
intermediate
Map controls for SOC 2 Type II compliance
Defensive AI
advanced
Build an AI-powered log anomaly detector
[Live] Making-of a LiveOverflow CTF video write-up 2019 (35c3ctf)
Cybersecurity
[Live] Making-of a LiveOverflow CTF video write-up 2019 (35c3ctf)
LiveOverflow Intermediate 7y ago
Python3 For Pentesting - Developing An Nmap Scanner
Cybersecurity ⚡ AI Lesson
Python3 For Pentesting - Developing An Nmap Scanner
HackerSploit Intermediate 7y ago
HackTheBox Discord - HackerSploit AMA
Cybersecurity ⚡ AI Lesson
HackTheBox Discord - HackerSploit AMA
HackerSploit Intermediate 7y ago
HackTheBox - SecNotes
Cybersecurity ⚡ AI Lesson
HackTheBox - SecNotes
IppSec Intermediate 7y ago
HackTheBox - Mischief
Cybersecurity
HackTheBox - Mischief
IppSec Intermediate 7y ago
a16z Podcast | Changing the Conversation about Cybersecurity
Cybersecurity ⚡ AI Lesson
a16z Podcast | Changing the Conversation about Cybersecurity
a16z Intermediate 7y ago
XMAS CTF HIGHLIGHTS
Cybersecurity
XMAS CTF HIGHLIGHTS
John Hammond Intermediate 7y ago
Jump Oriented Programming: Ethereum Smart Contract #2 - Real World CTF 2018
Cybersecurity
Jump Oriented Programming: Ethereum Smart Contract #2 - Real World CTF 2018
LiveOverflow Intermediate 7y ago
Server-Side Template Injection w/ Flask | Flaskcards [34] picoCTF 2018
Cybersecurity
Server-Side Template Injection w/ Flask | Flaskcards [34] picoCTF 2018
John Hammond Intermediate 7y ago
Part 1 – SANS Institute and Tenable talk about cloud security
Cybersecurity
Part 1 – SANS Institute and Tenable talk about cloud security
SANS Institute Intermediate 7y ago
Chat to your switches using Slack/Webex and Docker containers plus other Docker use cases.
Cybersecurity
Chat to your switches using Slack/Webex and Docker containers plus other Docker use cases.
David Bombal Intermediate 7y ago
Node.js Rest API With Restify, Mongoose, JWT - Part 2
Cybersecurity ⚡ AI Lesson
Node.js Rest API With Restify, Mongoose, JWT - Part 2
Traversy Media Intermediate 7y ago
Hardware Hacking - Computerphile
Cybersecurity ⚡ AI Lesson
Hardware Hacking - Computerphile
Computerphile Intermediate 7y ago
Unicornscan - Port Scanning
Cybersecurity ⚡ AI Lesson
Unicornscan - Port Scanning
HackerSploit Intermediate 7y ago
HackTheBox - Arctic - Walkthrough
Cybersecurity ⚡ AI Lesson
HackTheBox - Arctic - Walkthrough
HackerSploit Intermediate 7y ago
How To Install Xfce4 & MATE Desktop Environments On Kali Linux
Cybersecurity ⚡ AI Lesson
How To Install Xfce4 & MATE Desktop Environments On Kali Linux
HackerSploit Intermediate 7y ago
C Programming Fundamentals - Variable Scope
Cybersecurity ⚡ AI Lesson
C Programming Fundamentals - Variable Scope
HackerSploit Intermediate 7y ago
C Programming Fundamentals - Loops
Cybersecurity ⚡ AI Lesson
C Programming Fundamentals - Loops
HackerSploit Intermediate 7y ago
C Programming Fundamentals - If Statements
Cybersecurity ⚡ AI Lesson
C Programming Fundamentals - If Statements
HackerSploit Intermediate 7y ago
C Programming Fundamentals - Input
Cybersecurity ⚡ AI Lesson
C Programming Fundamentals - Input
HackerSploit Intermediate 7y ago
C Programming Fundamentals - Functions And Variables
Cybersecurity ⚡ AI Lesson
C Programming Fundamentals - Functions And Variables
HackerSploit Intermediate 7y ago
Kali Linux Quick Tips - How To Setup SSH On Kali
Cybersecurity ⚡ AI Lesson
Kali Linux Quick Tips - How To Setup SSH On Kali
HackerSploit Intermediate 7y ago
DotDotPwn - Directory Traversal Fuzzing
Cybersecurity ⚡ AI Lesson
DotDotPwn - Directory Traversal Fuzzing
HackerSploit Intermediate 7y ago
Going to Chinese Hacking Competition - Real World CTF Finals
Cybersecurity
Going to Chinese Hacking Competition - Real World CTF Finals
LiveOverflow Intermediate 7y ago
Leaking the Stack / Printf Format Vulnerability | echooo [32] picoCTF 2018
Cybersecurity
Leaking the Stack / Printf Format Vulnerability | echooo [32] picoCTF 2018
John Hammond Intermediate 7y ago
Setting Up An Exploit Development Lab
Cybersecurity ⚡ AI Lesson
Setting Up An Exploit Development Lab
HackerSploit Intermediate 7y ago
HackTheBox - Lame - Walkthrough
Cybersecurity ⚡ AI Lesson
HackTheBox - Lame - Walkthrough
HackerSploit Intermediate 7y ago
tcpdump - Traffic Capture & Analysis
Cybersecurity ⚡ AI Lesson
tcpdump - Traffic Capture & Analysis
HackerSploit Intermediate 7y ago
Maltego - Automated Information Gathering
Cybersecurity ⚡ AI Lesson
Maltego - Automated Information Gathering
HackerSploit Intermediate 7y ago
Pros vs. Joes CTF at BsidesDC 2018
Cybersecurity
Pros vs. Joes CTF at BsidesDC 2018
John Hammond Intermediate 7y ago
Raven1 VulnHub CTF Walkthrough - Boot-To-Root
Cybersecurity ⚡ AI Lesson
Raven1 VulnHub CTF Walkthrough - Boot-To-Root
HackerSploit Intermediate 7y ago
WebMap - A Dashboard For Nmap Scans
Cybersecurity ⚡ AI Lesson
WebMap - A Dashboard For Nmap Scans
HackerSploit Intermediate 7y ago
Multi-Exponent RSA Cryptography | Square CTF "Flipped Bits"
Cybersecurity
Multi-Exponent RSA Cryptography | Square CTF "Flipped Bits"
John Hammond Intermediate 7y ago
Wireshark - Display Filters
Cybersecurity ⚡ AI Lesson
Wireshark - Display Filters
HackerSploit Intermediate 7y ago
Wireshark - Capture Filters
Cybersecurity ⚡ AI Lesson
Wireshark - Capture Filters
HackerSploit Intermediate 7y ago
Wireshark - Interface & OSI Model
Cybersecurity ⚡ AI Lesson
Wireshark - Interface & OSI Model
HackerSploit Intermediate 7y ago
MORSE CODE Steganography (2/2) BsidesCT CTF 2018
Cybersecurity
MORSE CODE Steganography (2/2) BsidesCT CTF 2018
John Hammond Intermediate 7y ago
Steganography (1/2) BsidesCT CTF 2018
Cybersecurity
Steganography (1/2) BsidesCT CTF 2018
John Hammond Intermediate 7y ago
Basic Windows Reversing and Attacking Weak Crypto - FLARE-On 2018
Cybersecurity
Basic Windows Reversing and Attacking Weak Crypto - FLARE-On 2018
LiveOverflow Intermediate 7y ago
OWASP Juice Shop - SQL Injection
Cybersecurity ⚡ AI Lesson
OWASP Juice Shop - SQL Injection
HackerSploit Intermediate 7y ago
picoCTF 2018 [03]  Cryptography Warmups, grep & netcat
Cybersecurity
picoCTF 2018 [03] Cryptography Warmups, grep & netcat
John Hammond Intermediate 7y ago
HackTheBox - Olympus
Cybersecurity
HackTheBox - Olympus
IppSec Intermediate 7y ago
Solving Equations with Sympy | CSAW CTF "Algebra"
Cybersecurity
Solving Equations with Sympy | CSAW CTF "Algebra"
John Hammond Intermediate 7y ago
Single-Byte XOR | CSAW CTF "babycrypto"
Cybersecurity
Single-Byte XOR | CSAW CTF "babycrypto"
John Hammond Intermediate 7y ago
LDAP Injection | CSAW CTF "ldab"
Cybersecurity
LDAP Injection | CSAW CTF "ldab"
John Hammond Intermediate 7y ago
x86 Assembly | CSAW CTF "A Tour of x86"
Cybersecurity
x86 Assembly | CSAW CTF "A Tour of x86"
John Hammond Intermediate 7y ago
PWN Overflow | CSAW CTF "BigBoy"
Cybersecurity
PWN Overflow | CSAW CTF "BigBoy"
John Hammond Intermediate 7y ago
GIF Split & Stack | IceCTF [05] "Modern Picasso"
Cybersecurity
GIF Split & Stack | IceCTF [05] "Modern Picasso"
John Hammond Intermediate 7y ago
📚 Coursera Courses Opens on Coursera · Free to audit
1 / 3 View all →
ChatGPT for Cybersecurity: AI Tools for Threat Defense
📚 Coursera Course ↗
Self-paced
ChatGPT for Cybersecurity: AI Tools for Threat Defense
Opens on Coursera ↗
Introduction to Data Protection and Privacy
📚 Coursera Course ↗
Self-paced
Introduction to Data Protection and Privacy
Opens on Coursera ↗
Digital Marketing Trends
📚 Coursera Course ↗
Self-paced
Digital Marketing Trends
Opens on Coursera ↗
CompTIA Cybersecurity Analyst (CySA+) CS0-003: Unit 2
📚 Coursera Course ↗
Self-paced
CompTIA Cybersecurity Analyst (CySA+) CS0-003: Unit 2
Opens on Coursera ↗
Secure Networked System with Firewall and IDS
📚 Coursera Course ↗
Self-paced
Secure Networked System with Firewall and IDS
Opens on Coursera ↗
System & Network Security Essentials
📚 Coursera Course ↗
Self-paced
System & Network Security Essentials
Opens on Coursera ↗