Tech Skills

Cybersecurity

Ethical hacking, penetration testing, network security, CTFs and defensive security

2563
lessons
Preventing Your Physical Access Control System from Being Used Against You - SANS ICS Summit 2019
Cybersecurity
Preventing Your Physical Access Control System from Being Used Against You - SANS ICS Summit 2019
SANS Institute Intermediate 6y ago
HACKERS REACT: Bad Hollywood Hacking Scenes
Cybersecurity
HACKERS REACT: Bad Hollywood Hacking Scenes
John Hammond Intermediate 6y ago
Practical Solutions to Supply Chain Attacks - SANS ICS Security Summit 2019
Cybersecurity
Practical Solutions to Supply Chain Attacks - SANS ICS Security Summit 2019
SANS Institute Intermediate 6y ago
How To Install VMware Tools On BlackArch Linux
Cybersecurity
How To Install VMware Tools On BlackArch Linux
HackerSploit Intermediate 6y ago
How To Install Desktop Environments And Change Screen Resolution With xrandr
Cybersecurity
How To Install Desktop Environments And Change Screen Resolution With xrandr
HackerSploit Intermediate 6y ago
Secret Hacker Society - Meeting #1
Cybersecurity
Secret Hacker Society - Meeting #1
LiveUnderflow Intermediate 6y ago
Talking about Number Bases (Binary, Ternary, Decimal, Hex, ...)
Cybersecurity
Talking about Number Bases (Binary, Ternary, Decimal, Hex, ...)
LiveUnderflow Intermediate 6y ago
MITRE CTF 2019 HIGHLIGHTS
Cybersecurity
MITRE CTF 2019 HIGHLIGHTS
John Hammond Intermediate 6y ago
How public WIFI can be sniffed?
Cybersecurity
How public WIFI can be sniffed?
Hussein Nasser Intermediate 6y ago
GNS3 IOS Images: Build a Cisco VIRL gns3 network
Cybersecurity
GNS3 IOS Images: Build a Cisco VIRL gns3 network
David Bombal Intermediate 6y ago
GNS3 VM: How to integrate with GNS3 2.2
Cybersecurity
GNS3 VM: How to integrate with GNS3 2.2
David Bombal Intermediate 6y ago
Elisabeth Rochat de la Vallée: Vital Circulation
Cybersecurity
Elisabeth Rochat de la Vallée: Vital Circulation
TCM Academy Intermediate 6y ago
Keren Sela:  Overworked, Empty and Hot Liver
Cybersecurity
Keren Sela: Overworked, Empty and Hot Liver
TCM Academy Intermediate 6y ago
How To Install BlackArch Linux
Cybersecurity
How To Install BlackArch Linux
HackerSploit Intermediate 6y ago
Zero-Trust Networks: The Future Is Here - SANS Blue Team Summit 2019
Cybersecurity
Zero-Trust Networks: The Future Is Here - SANS Blue Team Summit 2019
SANS Institute Intermediate 6y ago
How To Setup A Virtualization Server With Proxmox
Cybersecurity
How To Setup A Virtualization Server With Proxmox
HackerSploit Intermediate 6y ago
Pivoting And Persistence With Armitage
Cybersecurity
Pivoting And Persistence With Armitage
HackerSploit Intermediate 6y ago
Program Counter Build - 8-bit Computer
Cybersecurity
Program Counter Build - 8-bit Computer
LiveUnderflow Intermediate 6y ago
Intel ME and Fearmongering in IT Security
Cybersecurity
Intel ME and Fearmongering in IT Security
LiveUnderflow Intermediate 6y ago
Chatting about Cryptography and Exploit Regulations
Cybersecurity
Chatting about Cryptography and Exploit Regulations
LiveUnderflow Intermediate 6y ago
JK Flip-Flop and Binary Counter
Cybersecurity
JK Flip-Flop and Binary Counter
LiveUnderflow Intermediate 6y ago
It's Mindblowing how Logic Gates can Execute Code
Cybersecurity
It's Mindblowing how Logic Gates can Execute Code
LiveUnderflow Intermediate 6y ago
To Blue with ATT&CK-Flavored Love - SANS Blue Team Summit
Cybersecurity
To Blue with ATT&CK-Flavored Love - SANS Blue Team Summit
SANS Institute Intermediate 6y ago
Instruction Register Build - 8-bit Computer
Cybersecurity
Instruction Register Build - 8-bit Computer
LiveUnderflow Intermediate 6y ago
Is "Amount of Vulnerability" a good Metric?
Cybersecurity
Is "Amount of Vulnerability" a good Metric?
LiveUnderflow Intermediate 6y ago
Why I Bought Open Backed Headphones
Cybersecurity
Why I Bought Open Backed Headphones
LiveUnderflow Intermediate 6y ago
TECHNICOLOR QR CODE (Prism) InnoCTF 2019
Cybersecurity
TECHNICOLOR QR CODE (Prism) InnoCTF 2019
John Hammond Intermediate 6y ago
Eating Burger and RAM Module
Cybersecurity
Eating Burger and RAM Module
LiveUnderflow Intermediate 6y ago
Hacking Skills Perspective
Cybersecurity
Hacking Skills Perspective
LiveUnderflow Intermediate 6y ago
Post Exploitation With Windows Credentials Editor (WCE) - Dump Windows Password Hashes
Cybersecurity
Post Exploitation With Windows Credentials Editor (WCE) - Dump Windows Password Hashes
HackerSploit Intermediate 6y ago
Shopping Haul at the Electronics Store!!!
Cybersecurity
Shopping Haul at the Electronics Store!!!
LiveUnderflow Intermediate 6y ago
Information Gathering With Shodan
Cybersecurity
Information Gathering With Shodan
HackerSploit Intermediate 6y ago
STREAM HACKED by SelloutHacker
Cybersecurity
STREAM HACKED by SelloutHacker
LiveUnderflow Intermediate 6y ago
Select Memory Content for RAM Module - 8-bit Computer
Cybersecurity
Select Memory Content for RAM Module - 8-bit Computer
LiveUnderflow Intermediate 6y ago
Creator Tips - Don't Announce Your Projects!
Cybersecurity
Creator Tips - Don't Announce Your Projects!
LiveUnderflow Intermediate 6y ago
Address Selector for RAM Module - 8-bit Computer
Cybersecurity
Address Selector for RAM Module - 8-bit Computer
LiveUnderflow Intermediate 6y ago
Defeating Attackers with Preventative Security
Cybersecurity
Defeating Attackers with Preventative Security
SANS Institute Intermediate 6y ago
Exposing the Pizza Industry
Cybersecurity
Exposing the Pizza Industry
LiveUnderflow Intermediate 6y ago
Building the RAM Module - 8-bit Computer
Cybersecurity
Building the RAM Module - 8-bit Computer
LiveUnderflow Intermediate 6y ago
New LEDs Look Better - 8-bit Computer Build
Cybersecurity
New LEDs Look Better - 8-bit Computer Build
LiveUnderflow Intermediate 6y ago
ASMR - Electronics Wire Cutting
Cybersecurity
ASMR - Electronics Wire Cutting
LiveUnderflow Intermediate 6y ago
Building the ALU - 8-bit Computer
Cybersecurity
Building the ALU - 8-bit Computer
LiveUnderflow Intermediate 6y ago
Wireshark: Packet Analysis and Ethical Hacking Course
Cybersecurity
Wireshark: Packet Analysis and Ethical Hacking Course
David Bombal Intermediate 6y ago
Connecting Register A to the ALU
Cybersecurity
Connecting Register A to the ALU
LiveUnderflow Intermediate 6y ago
Dr. Yair Maimon: Treatment of Diarrhea, the Use Yang Ming Trios
Cybersecurity
Dr. Yair Maimon: Treatment of Diarrhea, the Use Yang Ming Trios
TCM Academy Intermediate 6y ago
Aromatherapy for CM Practitioners
Cybersecurity
Aromatherapy for CM Practitioners
TCM Academy Intermediate 6y ago
LiveOverflow on Meltdown and Spectre
Cybersecurity
LiveOverflow on Meltdown and Spectre
LiveUnderflow Intermediate 6y ago
Building a second 8-bit register - register B
Cybersecurity
Building a second 8-bit register - register B
LiveUnderflow Intermediate 6y ago
📚 Coursera Courses Opens on Coursera · Free to audit
1 / 3 View all →
Ethical Hacking with Kali Linux: Analyze & Defend
📚 Coursera Course ↗
Self-paced
Ethical Hacking with Kali Linux: Analyze & Defend
Opens on Coursera ↗
CFR: Security Assessment, Data Collection, and Log Analysis
📚 Coursera Course ↗
Self-paced
CFR: Security Assessment, Data Collection, and Log Analysis
Opens on Coursera ↗
Cisco CyberOps Associate (200-201)
📚 Coursera Course ↗
Self-paced
Cisco CyberOps Associate (200-201)
Opens on Coursera ↗
Mathematical Foundations for Cryptography
📚 Coursera Course ↗
Self-paced
Mathematical Foundations for Cryptography
Opens on Coursera ↗
Cryptography
📚 Coursera Course ↗
Self-paced
Cryptography
Opens on Coursera ↗
Protection of Information Assets
📚 Coursera Course ↗
Self-paced
Protection of Information Assets
Opens on Coursera ↗