Tech Skills

Cybersecurity

Ethical hacking, penetration testing, network security, CTFs and defensive security

7,052
lessons
Skills in this topic
View full skill map →
Security Basics
beginner
Fix OWASP top 10 vulnerabilities
AI Security
intermediate
Identify and patch prompt injection vulnerabilities
Network Security
intermediate
Configure a firewall with proper inbound/outbound rules
Ethical Hacking & Pen Testing
intermediate
Conduct a full pen test with Kali Linux
Cloud Security
intermediate
Implement IAM least-privilege policies on AWS/GCP
Incident Response
intermediate
Build an incident response playbook
Security Compliance
intermediate
Map controls for SOC 2 Type II compliance
Defensive AI
advanced
Build an AI-powered log anomaly detector
Aruba HPE Networking (Part 14): ProCurve / ProVision / Aruba Multiple Spanning Tree Part 2
Cybersecurity
Aruba HPE Networking (Part 14): ProCurve / ProVision / Aruba Multiple Spanning Tree Part 2
David Bombal Intermediate 8y ago
Aruba HPE Networking (Part 13): ProCurve / ProVision / Aruba Multiple Spanning Tree Part 1
Cybersecurity
Aruba HPE Networking (Part 13): ProCurve / ProVision / Aruba Multiple Spanning Tree Part 1
David Bombal Intermediate 8y ago
HackTheBox - Bank
Cybersecurity ⚡ AI Lesson
HackTheBox - Bank
IppSec Intermediate 8y ago
HackCon CTF 2017 "Bacche" Challenges
Cybersecurity
HackCon CTF 2017 "Bacche" Challenges
John Hammond Intermediate 8y ago
HackCon CTF 2017 TRIVIA and BONUS Challenges
Cybersecurity
HackCon CTF 2017 TRIVIA and BONUS Challenges
John Hammond Intermediate 8y ago
Best Linux Distributions For Penetration Testing
Cybersecurity ⚡ AI Lesson
Best Linux Distributions For Penetration Testing
HackerSploit Intermediate 8y ago
SANS Webcast – Continuous Opportunity: DevOps & Security
Cybersecurity
SANS Webcast – Continuous Opportunity: DevOps & Security
SANS Institute Intermediate 8y ago
Reverse Engineering Obfuscated JavaScript
Cybersecurity ⚡ AI Lesson
Reverse Engineering Obfuscated JavaScript
LiveOverflow Intermediate 8y ago
The Lazy Script - Kali Linux 2017.1 - Automate Penetration Testing!
Cybersecurity ⚡ AI Lesson
The Lazy Script - Kali Linux 2017.1 - Automate Penetration Testing!
HackerSploit Intermediate 8y ago
Identifying another exploit mitigation and find bypass. stack0: part 2 - bin 0x22
Cybersecurity
Identifying another exploit mitigation and find bypass. stack0: part 2 - bin 0x22
LiveOverflow Intermediate 8y ago
How TOR Works- Computerphile
Cybersecurity ⚡ AI Lesson
How TOR Works- Computerphile
Computerphile Intermediate 8y ago
Dealing With Depression & Anxiety In Programming
Cybersecurity ⚡ AI Lesson
Dealing With Depression & Anxiety In Programming
Traversy Media Intermediate 9y ago
Insecurity - CS50 Live - S3E2
Cybersecurity
Insecurity - CS50 Live - S3E2
CS50 Intermediate 9y ago
GNS3 Talks: Cisco NX-OSv 9000 import and configuration (Part 2)
Cybersecurity
GNS3 Talks: Cisco NX-OSv 9000 import and configuration (Part 2)
David Bombal Intermediate 8y ago
GNS3 Talks: Cisco NX-OSv 9000 import and configuration (Part 1)
Cybersecurity
GNS3 Talks: Cisco NX-OSv 9000 import and configuration (Part 1)
David Bombal Intermediate 8y ago
Python Netmiko threading: Demo of sequential vs threading vs threading pool. What a difference!
Cybersecurity
Python Netmiko threading: Demo of sequential vs threading vs threading pool. What a difference!
David Bombal Intermediate 8y ago
Python network automation, BGP and IOS regular expressions (Part 4). Live Internet BGP.
Cybersecurity
Python network automation, BGP and IOS regular expressions (Part 4). Live Internet BGP.
David Bombal Intermediate 8y ago
Python network automation, BGP and IOS regular expressions (Part 3). Live Internet BGP.
Cybersecurity
Python network automation, BGP and IOS regular expressions (Part 3). Live Internet BGP.
David Bombal Intermediate 8y ago
Python network automation, BGP and IOS regular expressions (regex). Search output (Part 2).
Cybersecurity
Python network automation, BGP and IOS regular expressions (regex). Search output (Part 2).
David Bombal Intermediate 8y ago
Python network automation, BGP and IOS regular expressions (regex). Search output (Part 1).
Cybersecurity
Python network automation, BGP and IOS regular expressions (regex). Search output (Part 1).
David Bombal Intermediate 8y ago
CCNA v3.0 200-125 GNS3 Labs: Troubleshoot PPP Mulitlink. Be careful of debugs!
Cybersecurity
CCNA v3.0 200-125 GNS3 Labs: Troubleshoot PPP Mulitlink. Be careful of debugs!
David Bombal Intermediate 8y ago
GNS3 Talks: Ansible installation. Network Automation using Ansible.
Cybersecurity
GNS3 Talks: Ansible installation. Network Automation using Ansible.
David Bombal Intermediate 8y ago
CCNA v3.0 200-125 GNS3 Labs: PPP Mulitlink (Part 2). PPP Multilink Wireshark Captures
Cybersecurity
CCNA v3.0 200-125 GNS3 Labs: PPP Mulitlink (Part 2). PPP Multilink Wireshark Captures
David Bombal Intermediate 8y ago
CCNA v3.0 200-125 GNS3 Labs: PPP Mulitlink (Part 1). PPP One-Way PAP, CHAP, Multilink
Cybersecurity
CCNA v3.0 200-125 GNS3 Labs: PPP Mulitlink (Part 1). PPP One-Way PAP, CHAP, Multilink
David Bombal Intermediate 8y ago
GNS3 Talks: Docker container upgrades: Network Automation container: Ansible, Python3, NAPALM & more
Cybersecurity
GNS3 Talks: Docker container upgrades: Network Automation container: Ansible, Python3, NAPALM & more
David Bombal Intermediate 8y ago
CCNA v3.0 200-125 GNS3 Labs: PPP troubleshooting (Part 4): EIGRP & Wireshark captures
Cybersecurity
CCNA v3.0 200-125 GNS3 Labs: PPP troubleshooting (Part 4): EIGRP & Wireshark captures
David Bombal Intermediate 8y ago
CCNA v3.0 200-125 GNS3 Labs:: PPP troubleshooting (Part 3): PAP and CHAP Wireshark captures
Cybersecurity
CCNA v3.0 200-125 GNS3 Labs:: PPP troubleshooting (Part 3): PAP and CHAP Wireshark captures
David Bombal Intermediate 8y ago
CCNA v3.0 200-125 GNS3 Labs: PPP troubleshooting (Part 2): PPP and CHAP authentication (plus debugs)
Cybersecurity
CCNA v3.0 200-125 GNS3 Labs: PPP troubleshooting (Part 2): PPP and CHAP authentication (plus debugs)
David Bombal Intermediate 8y ago
GNS3 Talks: The CLI is dead! What are you going to do about it?
Cybersecurity
GNS3 Talks: The CLI is dead! What are you going to do about it?
David Bombal Intermediate 8y ago
CCNA v3.0 200-125 GNS3 Labs: PPP troubleshooting (Part 1): PPP and PAP authentication (plus debugs)
Cybersecurity
CCNA v3.0 200-125 GNS3 Labs: PPP troubleshooting (Part 1): PPP and PAP authentication (plus debugs)
David Bombal Intermediate 8y ago
Buffer overflow on a modern system impossible? stack0: part 1 - bin 0x21
Cybersecurity
Buffer overflow on a modern system impossible? stack0: part 1 - bin 0x21
LiveOverflow Intermediate 8y ago
GNS3 Talks: Packet.net and GNS3 (Part 5): Integrate the GNS3 GUI with Packet.net server
Cybersecurity
GNS3 Talks: Packet.net and GNS3 (Part 5): Integrate the GNS3 GUI with Packet.net server
David Bombal Intermediate 8y ago
GNS3 Talks: Packet.net and GNS3 (Part 4): Deploy Server and setup VPN
Cybersecurity
GNS3 Talks: Packet.net and GNS3 (Part 4): Deploy Server and setup VPN
David Bombal Intermediate 8y ago
GNS3 Talks: Packet.net and GNS3 (Part 3): SSH Keys (Generate with PuttyGen)
Cybersecurity
GNS3 Talks: Packet.net and GNS3 (Part 3): SSH Keys (Generate with PuttyGen)
David Bombal Intermediate 8y ago
GNS3 Talks: Packet.net and GNS3 (Part 2): Documentation, Discounts and signup
Cybersecurity
GNS3 Talks: Packet.net and GNS3 (Part 2): Documentation, Discounts and signup
David Bombal Intermediate 8y ago
Hardware Power Glitch Attack (Fault Injection) - rhme2 Fiesta (FI 100)
Cybersecurity ⚡ AI Lesson
Hardware Power Glitch Attack (Fault Injection) - rhme2 Fiesta (FI 100)
LiveOverflow Intermediate 8y ago
Breaking ECDSA (Elliptic Curve Cryptography) - rhme2 Secure Filesystem v1.92r1 (crypto 150)
Cybersecurity ⚡ AI Lesson
Breaking ECDSA (Elliptic Curve Cryptography) - rhme2 Secure Filesystem v1.92r1 (crypto 150)
LiveOverflow Intermediate 9y ago
Reversing an unkown digital protocol with an Arduino - rhme2 Whac the mole (misc 200)
Cybersecurity
Reversing an unkown digital protocol with an Arduino - rhme2 Whac the mole (misc 200)
LiveOverflow Intermediate 9y ago
Blind Buffer Overflow exploitation to leak secret data - rhme2 Animals (pwn 200)
Cybersecurity ⚡ AI Lesson
Blind Buffer Overflow exploitation to leak secret data - rhme2 Animals (pwn 200)
LiveOverflow Intermediate 9y ago
Format string exploit on an arduino - rhme2 Casino (pwn 150)
Cybersecurity ⚡ AI Lesson
Format string exploit on an arduino - rhme2 Casino (pwn 150)
LiveOverflow Intermediate 9y ago
GNS3 Talks: Ostinato Wireshark Captures Part 5: Capture and generate GNS3 switch CDP messages
Cybersecurity
GNS3 Talks: Ostinato Wireshark Captures Part 5: Capture and generate GNS3 switch CDP messages
David Bombal Intermediate 9y ago
GNS3 Talks: Ostinato Wireshark Captures Part 4: Generate packets with COS and DSCP settings
Cybersecurity
GNS3 Talks: Ostinato Wireshark Captures Part 4: Generate packets with COS and DSCP settings
David Bombal Intermediate 9y ago
GNS3 Talks: Ostinato Wireshark Captures Part 3: Capture IP Phone CDP messages & craft your own
Cybersecurity
GNS3 Talks: Ostinato Wireshark Captures Part 3: Capture IP Phone CDP messages & craft your own
David Bombal Intermediate 9y ago
GNS3 Talks: Ostinato Wireshark Captures Part 2: Capture IP Phone CDP messages & craft your own
Cybersecurity
GNS3 Talks: Ostinato Wireshark Captures Part 2: Capture IP Phone CDP messages & craft your own
David Bombal Intermediate 9y ago
GNS3 Talks: Ostinato Wireshark Captures Part 1: Capture STP BPDUs & craft own (Ostinato Part 10)
Cybersecurity
GNS3 Talks: Ostinato Wireshark Captures Part 1: Capture STP BPDUs & craft own (Ostinato Part 10)
David Bombal Intermediate 9y ago
Recover RSA private key from public keys - rhme2 Key Server (crypto 200)
Cybersecurity
Recover RSA private key from public keys - rhme2 Key Server (crypto 200)
LiveOverflow Intermediate 9y ago
Defeat a stack cookie with bruteforce - rhme2 Photo manager (pwn 100)
Cybersecurity
Defeat a stack cookie with bruteforce - rhme2 Photo manager (pwn 100)
LiveOverflow Intermediate 9y ago
GNS3 Talks: Stop BPDUs from Ostinato breaking STP using STP Root Guard (Ostinato Part 9)
Cybersecurity
GNS3 Talks: Stop BPDUs from Ostinato breaking STP using STP Root Guard (Ostinato Part 9)
David Bombal Intermediate 9y ago
📚 Coursera Courses Opens on Coursera · Free to audit
1 / 3 View all →
Execution, persistence, privilege escalation and evasion
📚 Coursera Course ↗
Self-paced
Execution, persistence, privilege escalation and evasion
Opens on Coursera ↗
Offensive Hacking Unfolded - Become a Pro Pentester
📚 Coursera Course ↗
Self-paced
Offensive Hacking Unfolded - Become a Pro Pentester
Opens on Coursera ↗
AWS: Threat Detection, Logging and Monitoring
📚 Coursera Course ↗
Self-paced
AWS: Threat Detection, Logging and Monitoring
Opens on Coursera ↗
Network Architecture
📚 Coursera Course ↗
Self-paced
Network Architecture
Opens on Coursera ↗
Cloud Next Generation Firewall: avaliação de requisitos
📚 Coursera Course ↗
Self-paced
Cloud Next Generation Firewall: avaliação de requisitos
Opens on Coursera ↗
Managing Cybersecurity Incidents and Disasters
📚 Coursera Course ↗
Self-paced
Managing Cybersecurity Incidents and Disasters
Opens on Coursera ↗