Tech Skills

Cybersecurity

Ethical hacking, penetration testing, network security, CTFs and defensive security

2563
lessons
Skills in this topic
View full skill map →
Security Basics
beginner
Fix OWASP top 10 vulnerabilities
AI Security
intermediate
Identify and patch prompt injection vulnerabilities
Network Security
intermediate
Configure a firewall with proper inbound/outbound rules
Ethical Hacking & Pen Testing
intermediate
Conduct a full pen test with Kali Linux
Cloud Security
intermediate
Implement IAM least-privilege policies on AWS/GCP
Incident Response
intermediate
Build an incident response playbook
Security Compliance
intermediate
Map controls for SOC 2 Type II compliance
Defensive AI
advanced
Build an AI-powered log anomaly detector
GNS3 Talks: Packet.net and GNS3 (Part 4): Deploy Server and setup VPN
Cybersecurity
GNS3 Talks: Packet.net and GNS3 (Part 4): Deploy Server and setup VPN
David Bombal Intermediate 8y ago
GNS3 Talks: Packet.net and GNS3 (Part 3): SSH Keys (Generate with PuttyGen)
Cybersecurity
GNS3 Talks: Packet.net and GNS3 (Part 3): SSH Keys (Generate with PuttyGen)
David Bombal Intermediate 8y ago
Hardware Power Glitch Attack (Fault Injection) - rhme2 Fiesta (FI 100)
Cybersecurity
Hardware Power Glitch Attack (Fault Injection) - rhme2 Fiesta (FI 100)
LiveOverflow Intermediate 8y ago
How TOR Works- Computerphile
Cybersecurity
How TOR Works- Computerphile
Computerphile Intermediate 8y ago
Dealing With Depression & Anxiety In Programming
Cybersecurity
Dealing With Depression & Anxiety In Programming
Traversy Media Intermediate 8y ago
Breaking ECDSA (Elliptic Curve Cryptography) - rhme2 Secure Filesystem v1.92r1 (crypto 150)
Cybersecurity
Breaking ECDSA (Elliptic Curve Cryptography) - rhme2 Secure Filesystem v1.92r1 (crypto 150)
LiveOverflow Intermediate 8y ago
Insecurity - CS50 Live - S3E2
Cybersecurity
Insecurity - CS50 Live - S3E2
CS50 Intermediate 8y ago
How To Setup Proxychains In Kali Linux - #2 - Change Your IP
Cybersecurity
How To Setup Proxychains In Kali Linux - #2 - Change Your IP
HackerSploit Intermediate 9y ago
How To Setup Proxychains In Kali Linux - #1 - Stay Anonymous
Cybersecurity
How To Setup Proxychains In Kali Linux - #1 - Stay Anonymous
HackerSploit Intermediate 9y ago
The Blockchain & Bitcoin - Computerphile
Cybersecurity
The Blockchain & Bitcoin - Computerphile
Computerphile Intermediate 9y ago
GNS3 Talks: Packet.net and GNS3 (Part 2): Documentation, Discounts and signup
Cybersecurity
GNS3 Talks: Packet.net and GNS3 (Part 2): Documentation, Discounts and signup
David Bombal Intermediate 8y ago
GNS3 2.0 Install on Windows 10 (Part 2). Local server network. GNS3 GUI, VPCS, Hub network.
Cybersecurity
GNS3 2.0 Install on Windows 10 (Part 2). Local server network. GNS3 GUI, VPCS, Hub network.
David Bombal Intermediate 8y ago
Reversing an unkown digital protocol with an Arduino - rhme2 Whac the mole (misc 200)
Cybersecurity
Reversing an unkown digital protocol with an Arduino - rhme2 Whac the mole (misc 200)
LiveOverflow Intermediate 8y ago
CCNA #085: MPLS Part 2: MPLS Labels and reasons to implement MPLS
Cybersecurity
CCNA #085: MPLS Part 2: MPLS Labels and reasons to implement MPLS
David Bombal Intermediate 8y ago
CCNA #083: IP Addressing and IP Subnetting for the CCNA Exam (Part 4). Practical IP Subnetting.
Cybersecurity
CCNA #083: IP Addressing and IP Subnetting for the CCNA Exam (Part 4). Practical IP Subnetting.
David Bombal Intermediate 8y ago
GNS3 Talks: Vote for Videos - which videos should I create?
Cybersecurity
GNS3 Talks: Vote for Videos - which videos should I create?
David Bombal Intermediate 8y ago
Blind Buffer Overflow exploitation to leak secret data - rhme2 Animals (pwn 200)
Cybersecurity
Blind Buffer Overflow exploitation to leak secret data - rhme2 Animals (pwn 200)
LiveOverflow Intermediate 8y ago
CCNA #081: IP Addressing and IP Subnetting for the CCNA Exam (Part 3). Practical IP Subnetting.
Cybersecurity
CCNA #081: IP Addressing and IP Subnetting for the CCNA Exam (Part 3). Practical IP Subnetting.
David Bombal Intermediate 8y ago
CCNA #080: IP Addressing and IP Subnetting for the CCNA Exam (Part 2). Practical IP Subnetting.
Cybersecurity
CCNA #080: IP Addressing and IP Subnetting for the CCNA Exam (Part 2). Practical IP Subnetting.
David Bombal Intermediate 8y ago
CCNA #079: IP Addressing and IP Subnetting for the CCNA Exam (Part 1). Practical IP Subnetting.
Cybersecurity
CCNA #079: IP Addressing and IP Subnetting for the CCNA Exam (Part 1). Practical IP Subnetting.
David Bombal Intermediate 8y ago
Format string exploit on an arduino - rhme2 Casino (pwn 150)
Cybersecurity
Format string exploit on an arduino - rhme2 Casino (pwn 150)
LiveOverflow Intermediate 8y ago
GNS3 Talks: Ostinato Wireshark Captures Part 5: Capture and generate GNS3 switch CDP messages
Cybersecurity
GNS3 Talks: Ostinato Wireshark Captures Part 5: Capture and generate GNS3 switch CDP messages
David Bombal Intermediate 8y ago
GNS3 Talks: Ostinato Wireshark Captures Part 4: Generate packets with COS and DSCP settings
Cybersecurity
GNS3 Talks: Ostinato Wireshark Captures Part 4: Generate packets with COS and DSCP settings
David Bombal Intermediate 8y ago
GNS3 Talks: Ostinato Wireshark Captures Part 3: Capture IP Phone CDP messages & craft your own
Cybersecurity
GNS3 Talks: Ostinato Wireshark Captures Part 3: Capture IP Phone CDP messages & craft your own
David Bombal Intermediate 8y ago
GNS3 Talks: Ostinato Wireshark Captures Part 2: Capture IP Phone CDP messages & craft your own
Cybersecurity
GNS3 Talks: Ostinato Wireshark Captures Part 2: Capture IP Phone CDP messages & craft your own
David Bombal Intermediate 8y ago
GNS3 Talks: Ostinato Wireshark Captures Part 1: Capture STP BPDUs & craft own (Ostinato Part 10)
Cybersecurity
GNS3 Talks: Ostinato Wireshark Captures Part 1: Capture STP BPDUs & craft own (Ostinato Part 10)
David Bombal Intermediate 8y ago
Recover RSA private key from public keys - rhme2 Key Server (crypto 200)
Cybersecurity
Recover RSA private key from public keys - rhme2 Key Server (crypto 200)
LiveOverflow Intermediate 8y ago
Defeat a stack cookie with bruteforce - rhme2 Photo manager (pwn 100)
Cybersecurity
Defeat a stack cookie with bruteforce - rhme2 Photo manager (pwn 100)
LiveOverflow Intermediate 8y ago
GNS3 Talks: Fast IOSv boot
Cybersecurity
GNS3 Talks: Fast IOSv boot
David Bombal Intermediate 9y ago
GNS3 Talks: Stop BPDUs from Ostinato breaking STP using STP Root Guard (Ostinato Part 9)
Cybersecurity
GNS3 Talks: Stop BPDUs from Ostinato breaking STP using STP Root Guard (Ostinato Part 9)
David Bombal Intermediate 9y ago
GNS3 Talks: Make your PC the Spanning Tree Root by crafting BPDUs with Ostinato (Ostinato Part 8)
Cybersecurity
GNS3 Talks: Make your PC the Spanning Tree Root by crafting BPDUs with Ostinato (Ostinato Part 8)
David Bombal Intermediate 9y ago
GNS3 Talks: OpenFlow FLOW MOD, PACKET IN, PACKET OUT and more captures using Wireshark and GNS3
Cybersecurity
GNS3 Talks: OpenFlow FLOW MOD, PACKET IN, PACKET OUT and more captures using Wireshark and GNS3
David Bombal Intermediate 9y ago
GNS3 Talks: Ostinato Packet Generator - double tag 802.1Q frames for VLAN hopping (Ostinato Part 7)
Cybersecurity
GNS3 Talks: Ostinato Packet Generator - double tag 802.1Q frames for VLAN hopping (Ostinato Part 7)
David Bombal Intermediate 9y ago
GNS3 Talks: Ostinato Packet Generator - Inject 802.1Q frames for VLAN hopping (Ostinato Part 6)
Cybersecurity
GNS3 Talks: Ostinato Packet Generator - Inject 802.1Q frames for VLAN hopping (Ostinato Part 6)
David Bombal Intermediate 9y ago
GNS3 Talks: Ostinato Packet Generator - Craft packets to hack network devices (Ostinato Part 5)
Cybersecurity
GNS3 Talks: Ostinato Packet Generator - Craft packets to hack network devices (Ostinato Part 5)
David Bombal Intermediate 9y ago
CCNA #051 CCNA IP addressing and subnetting: Can these hosts ping each other?
Cybersecurity
CCNA #051 CCNA IP addressing and subnetting: Can these hosts ping each other?
David Bombal Intermediate 9y ago
GNS3 Talks: Ostinato Packet Generator - Broadcast traffic: What happens? (Ostinato Part 4)
Cybersecurity
GNS3 Talks: Ostinato Packet Generator - Broadcast traffic: What happens? (Ostinato Part 4)
David Bombal Intermediate 9y ago
GNS3 Talks: Ostinato Packet Generator - Multicast traffic: what happens? (Ostinato Part 3)
Cybersecurity
GNS3 Talks: Ostinato Packet Generator - Multicast traffic: what happens? (Ostinato Part 3)
David Bombal Intermediate 9y ago
GNS3 Talks: Ostinato Packet Generator - what happens to Unknown Unicast traffic? (Ostinato Part 2)
Cybersecurity
GNS3 Talks: Ostinato Packet Generator - what happens to Unknown Unicast traffic? (Ostinato Part 2)
David Bombal Intermediate 9y ago
GNS3 Talks: Ostinato Packet Generator and GNS3 - download, install and configure (Ostinato Part 1)
Cybersecurity
GNS3 Talks: Ostinato Packet Generator and GNS3 - download, install and configure (Ostinato Part 1)
David Bombal Intermediate 9y ago
Solving AVR reverse engineering challenge with radare2 - rhme2 Jumpy (reversing 100)
Cybersecurity
Solving AVR reverse engineering challenge with radare2 - rhme2 Jumpy (reversing 100)
LiveOverflow Intermediate 9y ago
Katoolin | How To Install Pentesting Tools On Any Linux Distro
Cybersecurity
Katoolin | How To Install Pentesting Tools On Any Linux Distro
HackerSploit Intermediate 9y ago
GNS3 Talks: Multiple clients sharing projects in real time, plus console session shadowing!
Cybersecurity
GNS3 Talks: Multiple clients sharing projects in real time, plus console session shadowing!
David Bombal Intermediate 9y ago
GNS3 Talks: GNS3 2.0 Profiles = multiple settings for different scenarios
Cybersecurity
GNS3 Talks: GNS3 2.0 Profiles = multiple settings for different scenarios
David Bombal Intermediate 9y ago
GNS3 Talks: Firefox appliance - add a Web browser to your GNS3 topologies
Cybersecurity
GNS3 Talks: Firefox appliance - add a Web browser to your GNS3 topologies
David Bombal Intermediate 9y ago
GNS3 Talks: Cisco IOS-XRv import and configuration Part 3: OSPF IOS-XRv and IOSv
Cybersecurity
GNS3 Talks: Cisco IOS-XRv import and configuration Part 3: OSPF IOS-XRv and IOSv
David Bombal Intermediate 9y ago
GNS3 Talks: Cisco IOS-XRv import and configuration Part 2: Don't forget to commit your changes!
Cybersecurity
GNS3 Talks: Cisco IOS-XRv import and configuration Part 2: Don't forget to commit your changes!
David Bombal Intermediate 9y ago
GNS3 Talks: Cisco IOS-XRv import and configuration Part 1: Don't forget to commit your changes!
Cybersecurity
GNS3 Talks: Cisco IOS-XRv import and configuration Part 1: Don't forget to commit your changes!
David Bombal Intermediate 9y ago
📚 Coursera Courses Opens on Coursera · Free to audit
1 / 3 View all →
Strategic Cyber Effects Management
📚 Coursera Course ↗
Self-paced
Strategic Cyber Effects Management
Opens on Coursera ↗
Digital Shield: Cybersecurity for Data and System Protection
📚 Coursera Course ↗
Self-paced
Digital Shield: Cybersecurity for Data and System Protection
Opens on Coursera ↗
Cybersecurity Job Search, Resume, and Interview Prep
📚 Coursera Course ↗
Self-paced
Cybersecurity Job Search, Resume, and Interview Prep
Opens on Coursera ↗
Securing and Monitoring AWS Infrastructure
📚 Coursera Course ↗
Self-paced
Securing and Monitoring AWS Infrastructure
Opens on Coursera ↗
Body Language for Effective Leadership Communication
📚 Coursera Course ↗
Self-paced
Body Language for Effective Leadership Communication
Opens on Coursera ↗
Advanced Strategic Threat Intelligence Research & Reporting
📚 Coursera Course ↗
Self-paced
Advanced Strategic Threat Intelligence Research & Reporting
Opens on Coursera ↗