Tech Skills

Cybersecurity

Ethical hacking, penetration testing, network security, CTFs and defensive security

2563
lessons
Burning Down the Haystack - SANS Security Operations Summit 2018
Cybersecurity
Burning Down the Haystack - SANS Security Operations Summit 2018
SANS Institute Intermediate 7y ago
BSIDES LONG ISLAND 2019 CTF
Cybersecurity
BSIDES LONG ISLAND 2019 CTF
John Hammond Intermediate 7y ago
Vim Editor Fundamentals
Cybersecurity
Vim Editor Fundamentals
HackerSploit Intermediate 7y ago
Build it Once, Build it Right: Architecting for Detection - SANS Tactical Detection Summit 2018
Cybersecurity
Build it Once, Build it Right: Architecting for Detection - SANS Tactical Detection Summit 2018
SANS Institute Intermediate 7y ago
Reality Check: Is Network Automation hype? Is this stuff actually real?
Cybersecurity
Reality Check: Is Network Automation hype? Is this stuff actually real?
David Bombal Intermediate 7y ago
Nano Editor Fundamentals
Cybersecurity
Nano Editor Fundamentals
HackerSploit Intermediate 7y ago
XS-Search abusing the Chrome XSS Auditor - filemanager 35c3ctf
Cybersecurity
XS-Search abusing the Chrome XSS Auditor - filemanager 35c3ctf
LiveOverflow Intermediate 7y ago
[Live] Making-of a LiveOverflow CTF video write-up 2019 (35c3ctf)
Cybersecurity
[Live] Making-of a LiveOverflow CTF video write-up 2019 (35c3ctf)
LiveOverflow Intermediate 7y ago
HackTheBox - SecNotes
Cybersecurity
HackTheBox - SecNotes
IppSec Intermediate 7y ago
ACTIVE DIRECTORY PRIVILEGES [05] Kringlecon: SANS Holiday Hack Challenge
Cybersecurity
ACTIVE DIRECTORY PRIVILEGES [05] Kringlecon: SANS Holiday Hack Challenge
John Hammond Intermediate 7y ago
CCNA Quiz Questions: Life of a packet: Can you answer the questions?
Cybersecurity
CCNA Quiz Questions: Life of a packet: Can you answer the questions?
David Bombal Intermediate 7y ago
HackTheBox - Mischief
Cybersecurity
HackTheBox - Mischief
IppSec Intermediate 7y ago
a16z Podcast | Changing the Conversation about Cybersecurity
Cybersecurity
a16z Podcast | Changing the Conversation about Cybersecurity
a16z Intermediate 7y ago
The Top Ten Reasons It’s GREAT to Be a Pen Tester - SANS Pen Test HackFest Summit 2018
Cybersecurity
The Top Ten Reasons It’s GREAT to Be a Pen Tester - SANS Pen Test HackFest Summit 2018
SANS Institute Intermediate 7y ago
The Clouds Are Out to Get Me! - SANS Pen Test HackFest Summit 2018
Cybersecurity
The Clouds Are Out to Get Me! - SANS Pen Test HackFest Summit 2018
SANS Institute Intermediate 7y ago
Python3 For Pentesting - Developing An Nmap Scanner
Cybersecurity
Python3 For Pentesting - Developing An Nmap Scanner
HackerSploit Intermediate 7y ago
HackTheBox Discord - HackerSploit AMA
Cybersecurity
HackTheBox Discord - HackerSploit AMA
HackerSploit Intermediate 7y ago
GIT REPOSITORY ANALYSIS [05] Kringlecon: SANS Holiday Hack Challenge
Cybersecurity
GIT REPOSITORY ANALYSIS [05] Kringlecon: SANS Holiday Hack Challenge
John Hammond Intermediate 7y ago
DE BRUJIN SEQUENCE [04] Kringlecon: SANS Holiday Hack Challenge
Cybersecurity
DE BRUJIN SEQUENCE [04] Kringlecon: SANS Holiday Hack Challenge
John Hammond Intermediate 7y ago
Unicornscan - Port Scanning
Cybersecurity
Unicornscan - Port Scanning
HackerSploit Intermediate 7y ago
DIRECTORY TRAVERSAL [03] Kringlecon: SANS Holiday Hack Challenge
Cybersecurity
DIRECTORY TRAVERSAL [03] Kringlecon: SANS Holiday Hack Challenge
John Hammond Intermediate 7y ago
ORIENTATION CHALLENGE [02] Kringlecon: SANS Holiday Hack Challenge
Cybersecurity
ORIENTATION CHALLENGE [02] Kringlecon: SANS Holiday Hack Challenge
John Hammond Intermediate 7y ago
HackTheBox - Arctic - Walkthrough
Cybersecurity
HackTheBox - Arctic - Walkthrough
HackerSploit Intermediate 7y ago
CCNA Quiz Questions: Can you answers these CCNA Questions?
Cybersecurity
CCNA Quiz Questions: Can you answers these CCNA Questions?
David Bombal Intermediate 7y ago
How To Install Xfce4 & MATE Desktop Environments On Kali Linux
Cybersecurity
How To Install Xfce4 & MATE Desktop Environments On Kali Linux
HackerSploit Intermediate 7y ago
C Programming Fundamentals - Variable Scope
Cybersecurity
C Programming Fundamentals - Variable Scope
HackerSploit Intermediate 7y ago
GNS3 Custom 3D Symbols and Templates like Cisco icons: CCNA | Python | Networking
Cybersecurity
GNS3 Custom 3D Symbols and Templates like Cisco icons: CCNA | Python | Networking
David Bombal Intermediate 7y ago
C Programming Fundamentals - Loops
Cybersecurity
C Programming Fundamentals - Loops
HackerSploit Intermediate 7y ago
C Programming Fundamentals - If Statements
Cybersecurity
C Programming Fundamentals - If Statements
HackerSploit Intermediate 7y ago
C Programming Fundamentals - Input
Cybersecurity
C Programming Fundamentals - Input
HackerSploit Intermediate 7y ago
C Programming Fundamentals - Functions And Variables
Cybersecurity
C Programming Fundamentals - Functions And Variables
HackerSploit Intermediate 7y ago
XMAS CTF HIGHLIGHTS
Cybersecurity
XMAS CTF HIGHLIGHTS
John Hammond Intermediate 7y ago
Kali Linux Quick Tips - How To Setup SSH On Kali
Cybersecurity
Kali Linux Quick Tips - How To Setup SSH On Kali
HackerSploit Intermediate 7y ago
DotDotPwn - Directory Traversal Fuzzing
Cybersecurity
DotDotPwn - Directory Traversal Fuzzing
HackerSploit Intermediate 7y ago
Coordinates to IMAGE & Back w/ PYTHON PIL
Cybersecurity
Coordinates to IMAGE & Back w/ PYTHON PIL
John Hammond Intermediate 7y ago
Jump Oriented Programming: Ethereum Smart Contract #2 - Real World CTF 2018
Cybersecurity
Jump Oriented Programming: Ethereum Smart Contract #2 - Real World CTF 2018
LiveOverflow Intermediate 7y ago
Server-Side Template Injection w/ Flask | Flaskcards [34] picoCTF 2018
Cybersecurity
Server-Side Template Injection w/ Flask | Flaskcards [34] picoCTF 2018
John Hammond Intermediate 7y ago
Going to Chinese Hacking Competition - Real World CTF Finals
Cybersecurity
Going to Chinese Hacking Competition - Real World CTF Finals
LiveOverflow Intermediate 7y ago
Free Python Course! David Bombal's Christmas giveway! CCNA | Python | Cisco
Cybersecurity
Free Python Course! David Bombal's Christmas giveway! CCNA | Python | Cisco
David Bombal Intermediate 7y ago
Leaking the Stack / Printf Format Vulnerability | echooo [32] picoCTF 2018
Cybersecurity
Leaking the Stack / Printf Format Vulnerability | echooo [32] picoCTF 2018
John Hammond Intermediate 7y ago
Registry Carving & Network Connections w/ Volatility [02] OtterCTF
Cybersecurity
Registry Carving & Network Connections w/ Volatility [02] OtterCTF
John Hammond Intermediate 7y ago
Manual HTTP Requests | Artisinal Handcrafted HTTP 3 [31] picoCTF 2018
Cybersecurity
Manual HTTP Requests | Artisinal Handcrafted HTTP 3 [31] picoCTF 2018
John Hammond Intermediate 7y ago
LSADump: Dumping Passwords w/ Volatility [01] OtterCTF
Cybersecurity
LSADump: Dumping Passwords w/ Volatility [01] OtterCTF
John Hammond Intermediate 7y ago
Setting Up An Exploit Development Lab
Cybersecurity
Setting Up An Exploit Development Lab
HackerSploit Intermediate 7y ago
Piping Stdin & Redirecting Stderr | in out error [30] picoCTF 2018
Cybersecurity
Piping Stdin & Redirecting Stderr | in out error [30] picoCTF 2018
John Hammond Intermediate 7y ago
Patching Binaries with Pwntools | BE QUICK OR BE DEAD 2 [29] picoCTF 2018
Cybersecurity
Patching Binaries with Pwntools | BE QUICK OR BE DEAD 2 [29] picoCTF 2018
John Hammond Intermediate 7y ago
Part 3 – SANS Institute and Tenable talk about OT/IT convergence and security
Cybersecurity
Part 3 – SANS Institute and Tenable talk about OT/IT convergence and security
SANS Institute Intermediate 7y ago
Part 1 – SANS Institute and Tenable talk about cloud security
Cybersecurity
Part 1 – SANS Institute and Tenable talk about cloud security
SANS Institute Intermediate 7y ago
📚 Coursera Courses Opens on Coursera · Free to audit
1 / 3 View all →
The Embedded Linux Security Handbook
📚 Coursera Course ↗
Self-paced
The Embedded Linux Security Handbook
Opens on Coursera ↗
CFR: Incident Analysis, Response, and Forensics
📚 Coursera Course ↗
Self-paced
CFR: Incident Analysis, Response, and Forensics
Opens on Coursera ↗
GenAI for Cybersecurity: Blue Team
📚 Coursera Course ↗
Self-paced
GenAI for Cybersecurity: Blue Team
Opens on Coursera ↗
CISSP Domain 5: Identity and Access Management (IAM)
📚 Coursera Course ↗
Self-paced
CISSP Domain 5: Identity and Access Management (IAM)
Opens on Coursera ↗
Exploitation and Penetration Testing with Metasploit
📚 Coursera Course ↗
Self-paced
Exploitation and Penetration Testing with Metasploit
Opens on Coursera ↗
Metasploit para Principiantes: Básicos de explotación
📚 Coursera Course ↗
Self-paced
Metasploit para Principiantes: Básicos de explotación
Opens on Coursera ↗