Tech Skills

Cybersecurity

Ethical hacking, penetration testing, network security, CTFs and defensive security

2563
lessons
Part 2 – SANS Institute and Tenable talk about cloud security
Cybersecurity
Part 2 – SANS Institute and Tenable talk about cloud security
SANS Institute Intermediate 7y ago
Part 3 – SANS Institute and Tenable talk about cloud security
Cybersecurity
Part 3 – SANS Institute and Tenable talk about cloud security
SANS Institute Intermediate 7y ago
HackTheBox - Lame - Walkthrough
Cybersecurity
HackTheBox - Lame - Walkthrough
HackerSploit Intermediate 7y ago
tcpdump - Traffic Capture & Analysis
Cybersecurity
tcpdump - Traffic Capture & Analysis
HackerSploit Intermediate 7y ago
STOP Wasting Your Time, Watch This Video To Get Motivated...
Cybersecurity
STOP Wasting Your Time, Watch This Video To Get Motivated...
David Bombal Intermediate 7y ago
Dr. Yair Maimon: Ht 9 – Unfolding the Mystery of Universe and Man
Cybersecurity
Dr. Yair Maimon: Ht 9 – Unfolding the Mystery of Universe and Man
TCM Academy Intermediate 7y ago
picoCTF 2018 [28] RSA Madlibs
Cybersecurity
picoCTF 2018 [28] RSA Madlibs
John Hammond Intermediate 7y ago
Pros vs. Joes CTF at BsidesDC 2018
Cybersecurity
Pros vs. Joes CTF at BsidesDC 2018
John Hammond Intermediate 7y ago
Chat to your switches using Slack/Webex and Docker containers plus other Docker use cases.
Cybersecurity
Chat to your switches using Slack/Webex and Docker containers plus other Docker use cases.
David Bombal Intermediate 7y ago
International Certificate in Oncology Acupuncture - Testimonials
Cybersecurity
International Certificate in Oncology Acupuncture - Testimonials
TCM Academy Intermediate 7y ago
Node.js Rest API With Restify, Mongoose, JWT - Part 2
Cybersecurity
Node.js Rest API With Restify, Mongoose, JWT - Part 2
Traversy Media Intermediate 7y ago
Basic Windows Reversing and Attacking Weak Crypto - FLARE-On 2018
Cybersecurity
Basic Windows Reversing and Attacking Weak Crypto - FLARE-On 2018
LiveOverflow Intermediate 7y ago
Hardware Hacking - Computerphile
Cybersecurity
Hardware Hacking - Computerphile
Computerphile Intermediate 7y ago
Part 1 – SANS Institute and Tenable talk about OT/IT convergence and security
Cybersecurity
Part 1 – SANS Institute and Tenable talk about OT/IT convergence and security
SANS Institute Intermediate 7y ago
Part 2 – SANS Institute and Tenable talk about OT/IT convergence and security
Cybersecurity
Part 2 – SANS Institute and Tenable talk about OT/IT convergence and security
SANS Institute Intermediate 7y ago
Maltego - Automated Information Gathering
Cybersecurity
Maltego - Automated Information Gathering
HackerSploit Intermediate 7y ago
Raven1 VulnHub CTF Walkthrough - Boot-To-Root
Cybersecurity
Raven1 VulnHub CTF Walkthrough - Boot-To-Root
HackerSploit Intermediate 7y ago
WebMap - A Dashboard For Nmap Scans
Cybersecurity
WebMap - A Dashboard For Nmap Scans
HackerSploit Intermediate 7y ago
picoCTF 2018 [26] Caesar Cipher 2
Cybersecurity
picoCTF 2018 [26] Caesar Cipher 2
John Hammond Intermediate 7y ago
picoCTF 2018 [25] Controlling Function Arguments | Buffer Overflow 2
Cybersecurity
picoCTF 2018 [25] Controlling Function Arguments | Buffer Overflow 2
John Hammond Intermediate 7y ago
Multi-Exponent RSA Cryptography | Square CTF "Flipped Bits"
Cybersecurity
Multi-Exponent RSA Cryptography | Square CTF "Flipped Bits"
John Hammond Intermediate 7y ago
picoCTF 2018 [24] Assembly 2
Cybersecurity
picoCTF 2018 [24] Assembly 2
John Hammond Intermediate 7y ago
Wireshark - Display Filters
Cybersecurity
Wireshark - Display Filters
HackerSploit Intermediate 7y ago
Wireshark - Capture Filters
Cybersecurity
Wireshark - Capture Filters
HackerSploit Intermediate 7y ago
Wireshark - Interface & OSI Model
Cybersecurity
Wireshark - Interface & OSI Model
HackerSploit Intermediate 7y ago
MORSE CODE Steganography (2/2) BsidesCT CTF 2018
Cybersecurity
MORSE CODE Steganography (2/2) BsidesCT CTF 2018
John Hammond Intermediate 7y ago
Steganography (1/2) BsidesCT CTF 2018
Cybersecurity
Steganography (1/2) BsidesCT CTF 2018
John Hammond Intermediate 7y ago
BsidesCT 2018 TRIVIA Challenges
Cybersecurity
BsidesCT 2018 TRIVIA Challenges
John Hammond Intermediate 7y ago
OWASP Juice Shop - SQL Injection
Cybersecurity
OWASP Juice Shop - SQL Injection
HackerSploit Intermediate 7y ago
The Dark Arts of Social Engineering – SANS Security Awareness Summit 2018
Cybersecurity
The Dark Arts of Social Engineering – SANS Security Awareness Summit 2018
SANS Institute Intermediate 7y ago
REPLICATING THE FACEBOOK HACK
Cybersecurity
REPLICATING THE FACEBOOK HACK
John Hammond Intermediate 7y ago
Securing Windows with DISA STIGs
Cybersecurity
Securing Windows with DISA STIGs
John Hammond Intermediate 7y ago
SANS Webcast - YARA - Effectively using and generating rules
Cybersecurity
SANS Webcast - YARA - Effectively using and generating rules
SANS Institute Intermediate 7y ago
picoCTF 2018 [23] Absolutely Relative
Cybersecurity
picoCTF 2018 [23] Absolutely Relative
John Hammond Intermediate 7y ago
picoCTF 2018 [22] The Vault & What's My Name
Cybersecurity
picoCTF 2018 [22] The Vault & What's My Name
John Hammond Intermediate 7y ago
picoCTF 2018 [20] You Cant See Me & Buttons
Cybersecurity
picoCTF 2018 [20] You Cant See Me & Buttons
John Hammond Intermediate 7y ago
picoCTF 2018 [19] What Base Is This?
Cybersecurity
picoCTF 2018 [19] What Base Is This?
John Hammond Intermediate 7y ago
picoCTF 2018 [18] Shellcode
Cybersecurity
picoCTF 2018 [18] Shellcode
John Hammond Intermediate 7y ago
Reversing Engineering XOR | picoCTF [17] quackme
Cybersecurity
Reversing Engineering XOR | picoCTF [17] quackme
John Hammond Intermediate 7y ago
picoCTF 2018 [16] leak me & Now You See Me
Cybersecurity
picoCTF 2018 [16] leak me & Now You See Me
John Hammond Intermediate 7y ago
picoCTF 2018 [15] Buffer Overflow 1 & Hertz 2
Cybersecurity
picoCTF 2018 [15] Buffer Overflow 1 & Hertz 2
John Hammond Intermediate 7y ago
picoCTF 2018 [14] be-quick-or-be-dead 1 & blaise's cipher
Cybersecurity
picoCTF 2018 [14] be-quick-or-be-dead 1 & blaise's cipher
John Hammond Intermediate 7y ago
picoCTF 2018 [13] Truly an Artist & Assembly 1
Cybersecurity
picoCTF 2018 [13] Truly an Artist & Assembly 1
John Hammond Intermediate 7y ago
picoCTF 2018 [11] Hex Editor, SSH, Irish Name Repo
Cybersecurity
picoCTF 2018 [11] Hex Editor, SSH, Irish Name Repo
John Hammond Intermediate 7y ago
picoCTF 2018 [10] Caesar Cipher 1, ENV, & Hertz
Cybersecurity
picoCTF 2018 [10] Caesar Cipher 1, ENV, & Hertz
John Hammond Intermediate 7y ago
picoCTF 2018 [09] Assembly 0 & Buffer Overflow 0
Cybersecurity
picoCTF 2018 [09] Assembly 0 & Buffer Overflow 0
John Hammond Intermediate 7y ago
picoCTF 2018 [08] Recovering From The Snap & Admin Panel
Cybersecurity
picoCTF 2018 [08] Recovering From The Snap & Admin Panel
John Hammond Intermediate 7y ago
picoCTF 2018 [07] Logon & Reading Between The Eyes
Cybersecurity
picoCTF 2018 [07] Logon & Reading Between The Eyes
John Hammond Intermediate 7y ago
📚 Coursera Courses Opens on Coursera · Free to audit
1 / 3 View all →
Web Hacking Expert - Full-Stack Exploitation Mastery
📚 Coursera Course ↗
Self-paced
Web Hacking Expert - Full-Stack Exploitation Mastery
Opens on Coursera ↗
Advanced Networking Services and Routing
📚 Coursera Course ↗
Self-paced
Advanced Networking Services and Routing
Opens on Coursera ↗
Network Traffic Analysis for Incident Response
📚 Coursera Course ↗
Self-paced
Network Traffic Analysis for Incident Response
Opens on Coursera ↗
Writing Secure Code in ASP.NET
📚 Coursera Course ↗
Self-paced
Writing Secure Code in ASP.NET
Opens on Coursera ↗
Introduction to Cybersecurity Tools & Cyberattacks
📚 Coursera Course ↗
Self-paced
Introduction to Cybersecurity Tools & Cyberattacks
Opens on Coursera ↗
Threat Hunting Techniques
📚 Coursera Course ↗
Self-paced
Threat Hunting Techniques
Opens on Coursera ↗