Tech Skills

Cybersecurity

Ethical hacking, penetration testing, network security, CTFs and defensive security

7,052
lessons
Skills in this topic
View full skill map →
Security Basics
beginner
Fix OWASP top 10 vulnerabilities
AI Security
intermediate
Identify and patch prompt injection vulnerabilities
Network Security
intermediate
Configure a firewall with proper inbound/outbound rules
Ethical Hacking & Pen Testing
intermediate
Conduct a full pen test with Kali Linux
Cloud Security
intermediate
Implement IAM least-privilege policies on AWS/GCP
Incident Response
intermediate
Build an incident response playbook
Security Compliance
intermediate
Map controls for SOC 2 Type II compliance
Defensive AI
advanced
Build an AI-powered log anomaly detector
Hacking Without Being a Hack (Polymer Summit 2016)
Cybersecurity
Hacking Without Being a Hack (Polymer Summit 2016)
Chrome for Developers Intermediate 9y ago
CS50 VR 2016 - Week 6 - HTTP
Cybersecurity
CS50 VR 2016 - Week 6 - HTTP
CS50 Intermediate 9y ago
Live Hacking - Internetwache CTF 2016 - exp50, exp70, exp80
Cybersecurity ⚡ AI Lesson
Live Hacking - Internetwache CTF 2016 - exp50, exp70, exp80
LiveOverflow Intermediate 9y ago
Scripting radare2 with python for dynamic analysis - TUMCTF 2016 Zwiebel part 2
Cybersecurity
Scripting radare2 with python for dynamic analysis - TUMCTF 2016 Zwiebel part 2
LiveOverflow Intermediate 9y ago
Homemade CTF Challenge: 06 "I lost my password!"
Cybersecurity
Homemade CTF Challenge: 06 "I lost my password!"
John Hammond Intermediate 9y ago
Homemade CTF Challenge: 06 "A Brisk Stroll"
Cybersecurity
Homemade CTF Challenge: 06 "A Brisk Stroll"
John Hammond Intermediate 9y ago
How To Install Kali Linux 2.0 On Virtual Box
Cybersecurity ⚡ AI Lesson
How To Install Kali Linux 2.0 On Virtual Box
HackerSploit Intermediate 10y ago
SANS VetSuccess Academy: Hands-on Skills
Cybersecurity
SANS VetSuccess Academy: Hands-on Skills
SANS Institute Intermediate 10y ago
Privacy, Security, Society - Computer Science for Business Leaders 2016
Cybersecurity
Privacy, Security, Society - Computer Science for Business Leaders 2016
CS50 Intermediate 10y ago
Running a Buffer Overflow Attack - Computerphile
Cybersecurity ⚡ AI Lesson
Running a Buffer Overflow Attack - Computerphile
Computerphile Intermediate 10y ago
Brain Scanner - Computerphile
Cybersecurity ⚡ AI Lesson
Brain Scanner - Computerphile
Computerphile Intermediate 10y ago
The 2015 SANS Holiday Hack Challenge
Cybersecurity ⚡ AI Lesson
The 2015 SANS Holiday Hack Challenge
SANS Institute Intermediate 10y ago
How to Read Your Textbooks More Efficiently - College Info Geek
Cybersecurity
How to Read Your Textbooks More Efficiently - College Info Geek
Thomas Frank Intermediate 11y ago
Do You Actually Need to Read Your Textbooks? - College Info Geek
Cybersecurity
Do You Actually Need to Read Your Textbooks? - College Info Geek
Thomas Frank Intermediate 11y ago
Reverse Engineering with Binary Ninja and gdb a key checking algorithm - TUMCTF 2016 Zwiebel part 1
Cybersecurity
Reverse Engineering with Binary Ninja and gdb a key checking algorithm - TUMCTF 2016 Zwiebel part 1
LiveOverflow Intermediate 9y ago
New Sandbox Bypass in 1.4.7 - XSS with AngularJS 0x3
Cybersecurity
New Sandbox Bypass in 1.4.7 - XSS with AngularJS 0x3
LiveOverflow Intermediate 9y ago
Previous Bypass is now fixed in version 1.4.7 - XSS with AngularJS 0x2
Cybersecurity ⚡ AI Lesson
Previous Bypass is now fixed in version 1.4.7 - XSS with AngularJS 0x2
LiveOverflow Intermediate 9y ago
XSS Contexts and some Chrome XSS Auditor tricks - web 0x03
Cybersecurity
XSS Contexts and some Chrome XSS Auditor tricks - web 0x03
LiveOverflow Intermediate 9y ago
Capturing & Analyzing Packets with Saleae Logic Pro 8 - Reverse Engineering A/C Remote part 2
Cybersecurity ⚡ AI Lesson
Capturing & Analyzing Packets with Saleae Logic Pro 8 - Reverse Engineering A/C Remote part 2
LiveOverflow Intermediate 9y ago
Sandbox Bypass in Version 1.0.8 - XSS with AngularJS 0x1
Cybersecurity
Sandbox Bypass in Version 1.0.8 - XSS with AngularJS 0x1
LiveOverflow Intermediate 9y ago
Homemade CTF Challenge: 05 "The Assumption Song"
Cybersecurity
Homemade CTF Challenge: 05 "The Assumption Song"
John Hammond Intermediate 9y ago
Homemade CTF Challenge: 04 "UPX"
Cybersecurity
Homemade CTF Challenge: 04 "UPX"
John Hammond Intermediate 9y ago
Homemade CTF Challenge: 03 "Web Hunt"
Cybersecurity
Homemade CTF Challenge: 03 "Web Hunt"
John Hammond Intermediate 9y ago
Homemade CTF Challenge: 02 "Bae's Base"
Cybersecurity
Homemade CTF Challenge: 02 "Bae's Base"
John Hammond Intermediate 9y ago
Homemade CTF Challenge: 01 "Orchestra"
Cybersecurity
Homemade CTF Challenge: 01 "Orchestra"
John Hammond Intermediate 9y ago
Building Poor Man's Logic Analyzer with an Arduino - Reverse Engineering A/C Remote part 1
Cybersecurity
Building Poor Man's Logic Analyzer with an Arduino - Reverse Engineering A/C Remote part 1
LiveOverflow Intermediate 9y ago
Internet Technologies - Computer Science for Business Leaders 2016
Cybersecurity
Internet Technologies - Computer Science for Business Leaders 2016
CS50 Intermediate 10y ago
Live Hacking - Internetwache CTF 2016 - crypto60, crypto70, crypto90
Cybersecurity
Live Hacking - Internetwache CTF 2016 - crypto60, crypto70, crypto90
LiveOverflow Intermediate 10y ago
Python Challenge! 17 COOKIES
Cybersecurity
Python Challenge! 17 COOKIES
John Hammond Intermediate 10y ago
Live Hacking - Internetwache CTF 2016 - web50, web60, web80
Cybersecurity
Live Hacking - Internetwache CTF 2016 - web50, web60, web80
LiveOverflow Intermediate 10y ago
Python 04: PEP8 Coding
Cybersecurity
Python 04: PEP8 Coding
John Hammond Intermediate 10y ago
Arbitrary write with House of Force (heap exploit) - BKPCTF cookbook (pwn 6) part 3
Cybersecurity
Arbitrary write with House of Force (heap exploit) - BKPCTF cookbook (pwn 6) part 3
LiveOverflow Intermediate 10y ago
Leaking Heap and Libc address - BKPCTF cookbook (pwn 6) part 2
Cybersecurity
Leaking Heap and Libc address - BKPCTF cookbook (pwn 6) part 2
LiveOverflow Intermediate 10y ago
Reverse Engineering and identifying Bugs - BKPCTF cookbook (pwn 6) part 1
Cybersecurity ⚡ AI Lesson
Reverse Engineering and identifying Bugs - BKPCTF cookbook (pwn 6) part 1
LiveOverflow Intermediate 10y ago
pwnable.kr - Levels: fd, collision, bof, flag
Cybersecurity ⚡ AI Lesson
pwnable.kr - Levels: fd, collision, bof, flag
LiveOverflow Intermediate 10y ago
Live Hacking - EFF-CTF 2016 - Level 0-4 (Enigma Conference)
Cybersecurity
Live Hacking - EFF-CTF 2016 - Level 0-4 (Enigma Conference)
LiveOverflow Intermediate 10y ago
Live Hacking - Twitch Recording overthewire.org - Vortex 0x01-0x03 (3h)
Cybersecurity
Live Hacking - Twitch Recording overthewire.org - Vortex 0x01-0x03 (3h)
LiveOverflow Intermediate 10y ago
Man in the Middle Attacks & Superfish - Computerphile
Cybersecurity ⚡ AI Lesson
Man in the Middle Attacks & Superfish - Computerphile
Computerphile Intermediate 10y ago
Zig Zag Decryption - Computerphile
Cybersecurity ⚡ AI Lesson
Zig Zag Decryption - Computerphile
Computerphile Intermediate 10y ago
Inside a Data Centre - Computerphile
Cybersecurity ⚡ AI Lesson
Inside a Data Centre - Computerphile
Computerphile Intermediate 10y ago
Could We Ban Encryption? - Computerphile
Cybersecurity ⚡ AI Lesson
Could We Ban Encryption? - Computerphile
Computerphile Intermediate 10y ago
LiveOverflow - Trailer
Cybersecurity
LiveOverflow - Trailer
LiveOverflow Intermediate 11y ago
Wearables and Augmented Reality - Computerphile
Cybersecurity ⚡ AI Lesson
Wearables and Augmented Reality - Computerphile
Computerphile Intermediate 11y ago
SANS FOR610: Reverse Engineering Malware: Malware Analysis Tools & Techniques
Cybersecurity
SANS FOR610: Reverse Engineering Malware: Malware Analysis Tools & Techniques
SANS Institute Intermediate 11y ago
CS50 2014 - Week 10
Cybersecurity
CS50 2014 - Week 10
CS50 Intermediate 11y ago
Is College Worth It? Use the Tony Hawk Method to Find Out. - College Info Geek
Cybersecurity
Is College Worth It? Use the Tony Hawk Method to Find Out. - College Info Geek
Thomas Frank Intermediate 11y ago
Python [pygame] 12 Platforming Rectangular Collision Resolution
Cybersecurity
Python [pygame] 12 Platforming Rectangular Collision Resolution
John Hammond Intermediate 12y ago
Python [pygame] 11 Rectangular Collision Detection
Cybersecurity
Python [pygame] 11 Rectangular Collision Detection
John Hammond Intermediate 12y ago
📚 Coursera Courses Opens on Coursera · Free to audit
1 / 3 View all →
Practical Cybersecurity Fundamentals: Unit 3
📚 Coursera Course ↗
Self-paced
Practical Cybersecurity Fundamentals: Unit 3
Opens on Coursera ↗
Legal and Ethical Cyber Investigations
📚 Coursera Course ↗
Self-paced
Legal and Ethical Cyber Investigations
Opens on Coursera ↗
Ethical Hacking with Kali Linux: Learn & Secure
📚 Coursera Course ↗
Self-paced
Ethical Hacking with Kali Linux: Learn & Secure
Opens on Coursera ↗
Network Traffic Analysis for Incident Response
📚 Coursera Course ↗
Self-paced
Network Traffic Analysis for Incident Response
Opens on Coursera ↗
Microsoft Copilot for Security
📚 Coursera Course ↗
Self-paced
Microsoft Copilot for Security
Opens on Coursera ↗
Cyber Security: Data Security and Information Privacy
📚 Coursera Course ↗
Self-paced
Cyber Security: Data Security and Information Privacy
Opens on Coursera ↗