Tech Skills

Cybersecurity

Ethical hacking, penetration testing, network security, CTFs and defensive security

2563
lessons
Skills in this topic
View full skill map →
Security Basics
beginner
Fix OWASP top 10 vulnerabilities
AI Security
intermediate
Identify and patch prompt injection vulnerabilities
Network Security
intermediate
Configure a firewall with proper inbound/outbound rules
Ethical Hacking & Pen Testing
intermediate
Conduct a full pen test with Kali Linux
Cloud Security
intermediate
Implement IAM least-privilege policies on AWS/GCP
Incident Response
intermediate
Build an incident response playbook
Security Compliance
intermediate
Map controls for SOC 2 Type II compliance
Defensive AI
advanced
Build an AI-powered log anomaly detector
GNS3 Talks: Mac OS X, HPE VSR, Chicken of the VNC, Cisco CSR Part 2
Cybersecurity
GNS3 Talks: Mac OS X, HPE VSR, Chicken of the VNC, Cisco CSR Part 2
David Bombal Intermediate 9y ago
GNS3 Talks: Mac OS X, HPE VSR, Chicken of the VNC, Cisco CSR Part 1
Cybersecurity
GNS3 Talks: Mac OS X, HPE VSR, Chicken of the VNC, Cisco CSR Part 1
David Bombal Intermediate 9y ago
Using UART / Serial to interact with an embedded device - rhme2 Setup
Cybersecurity
Using UART / Serial to interact with an embedded device - rhme2 Setup
LiveOverflow Intermediate 9y ago
riscure embedded hardware CTF is over - loopback 0x03
Cybersecurity
riscure embedded hardware CTF is over - loopback 0x03
LiveOverflow Intermediate 9y ago
Where Does Success Come From - A Tony Robbins Knowledge Bomb From Funnel Hacking Live 2017
Cybersecurity
Where Does Success Come From - A Tony Robbins Knowledge Bomb From Funnel Hacking Live 2017
Miles Beckler Intermediate 9y ago
The 3 Phases Of A Successful Online Business - Powerful Concept From Funnel Hacking Live 2017
Cybersecurity
The 3 Phases Of A Successful Online Business - Powerful Concept From Funnel Hacking Live 2017
Miles Beckler Intermediate 9y ago
dog_meme_extended.mkv
Cybersecurity
dog_meme_extended.mkv
John Hammond Intermediate 9y ago
CS50 VR 2016 - Week 9 - SQL
Cybersecurity
CS50 VR 2016 - Week 9 - SQL
CS50 Intermediate 9y ago
Juniors CTF 2016 :: Oh SSH!
Cybersecurity
Juniors CTF 2016 :: Oh SSH!
John Hammond Intermediate 9y ago
GNS3 Talks: HPE VSR, VNC Console and Cisco integration Part 2 (Cisco IOSv + HPE)
Cybersecurity
GNS3 Talks: HPE VSR, VNC Console and Cisco integration Part 2 (Cisco IOSv + HPE)
David Bombal Intermediate 9y ago
GNS3 Talks: HPE VSR, VNC Console and Cisco integration Part 1 (Cisco IOSv + HPE)
Cybersecurity
GNS3 Talks: HPE VSR, VNC Console and Cisco integration Part 1 (Cisco IOSv + HPE)
David Bombal Intermediate 9y ago
GNS3 Talks: Chicken of the VNC, Royal TSX to fix console issues with GNS3 on a Mac
Cybersecurity
GNS3 Talks: Chicken of the VNC, Royal TSX to fix console issues with GNS3 on a Mac
David Bombal Intermediate 9y ago
GynvaelEN Hacking Livestreams and how stack cookies work
Cybersecurity
GynvaelEN Hacking Livestreams and how stack cookies work
LiveOverflow Intermediate 9y ago
GNS3 : How to download Cisco IOS images and VIRL images. Which is the best? How do you get them?
Cybersecurity
GNS3 : How to download Cisco IOS images and VIRL images. Which is the best? How do you get them?
David Bombal Intermediate 9y ago
GNS3 2.0 New Feature: Connect IOSv, IOSvL2 and other Qemu devices while powered on
Cybersecurity
GNS3 2.0 New Feature: Connect IOSv, IOSvL2 and other Qemu devices while powered on
David Bombal Intermediate 9y ago
GNS3 2.0 New Feature: Support for color-blind users
Cybersecurity
GNS3 2.0 New Feature: Support for color-blind users
David Bombal Intermediate 9y ago
Bash injection without letters or numbers - 33c3ctf hohoho (misc 350)
Cybersecurity
Bash injection without letters or numbers - 33c3ctf hohoho (misc 350)
LiveOverflow Intermediate 9y ago
GNS3 2.0 New Feature: Select where VPCS runs
Cybersecurity
GNS3 2.0 New Feature: Select where VPCS runs
David Bombal Intermediate 9y ago
GNS3 2.0 New Features: Smart packet capture and capture on any link
Cybersecurity
GNS3 2.0 New Features: Smart packet capture and capture on any link
David Bombal Intermediate 9y ago
ESXi Part 4: GNS3, VMware ESXi and the GNS3 VM
Cybersecurity
ESXi Part 4: GNS3, VMware ESXi and the GNS3 VM
David Bombal Intermediate 9y ago
ESXi Part 3: GNS3, VMware ESXi and the GNS3 VM
Cybersecurity
ESXi Part 3: GNS3, VMware ESXi and the GNS3 VM
David Bombal Intermediate 9y ago
ESXi Part 2: GNS3, VMware ESXi and the GNS3 VM
Cybersecurity
ESXi Part 2: GNS3, VMware ESXi and the GNS3 VM
David Bombal Intermediate 9y ago
CCNA #020: Static NAT Demo: CCNA 200-125 exam
Cybersecurity
CCNA #020: Static NAT Demo: CCNA 200-125 exam
David Bombal Intermediate 9y ago
Format String to dump binary and gain RCE - 33c3ctf ESPR (pwn 150)
Cybersecurity
Format String to dump binary and gain RCE - 33c3ctf ESPR (pwn 150)
LiveOverflow Intermediate 9y ago
GNS3 Talks: Install GNS3 1.5.X on a Mac with GNS3 VM
Cybersecurity
GNS3 Talks: Install GNS3 1.5.X on a Mac with GNS3 VM
David Bombal Intermediate 9y ago
CCNA 200-125 Exam: PPPoE Server Demo with GNS3
Cybersecurity
CCNA 200-125 Exam: PPPoE Server Demo with GNS3
David Bombal Intermediate 9y ago
Rooting a CTF server to get all the flags with Dirty COW - CVE-2016-5195
Cybersecurity
Rooting a CTF server to get all the flags with Dirty COW - CVE-2016-5195
LiveOverflow Intermediate 9y ago
GNS3 Talks: GNS3 version 1.5.X Appliance Tips
Cybersecurity
GNS3 Talks: GNS3 version 1.5.X Appliance Tips
David Bombal Intermediate 9y ago
GNS3 Talks: IOSv Appliance - get IOS 15.X on GNS3
Cybersecurity
GNS3 Talks: IOSv Appliance - get IOS 15.X on GNS3
David Bombal Intermediate 9y ago
GNS3 Talks: IOSvL2 switching appliance import & configuration
Cybersecurity
GNS3 Talks: IOSvL2 switching appliance import & configuration
David Bombal Intermediate 9y ago
RYU SDN Controller Part 3: OpenFlow 1.3: Practical GNS3 SDN and OpenFlow
Cybersecurity
RYU SDN Controller Part 3: OpenFlow 1.3: Practical GNS3 SDN and OpenFlow
David Bombal Intermediate 9y ago
Juniors CTF 2016 :: Restriced Area
Cybersecurity
Juniors CTF 2016 :: Restriced Area
John Hammond Intermediate 9y ago
Juniors CTF 2016 :: Stop Thief!
Cybersecurity
Juniors CTF 2016 :: Stop Thief!
John Hammond Intermediate 9y ago
Juniors CTF 2016 :: ROFL
Cybersecurity
Juniors CTF 2016 :: ROFL
John Hammond Intermediate 9y ago
Juniors CTF 2016 :: The Good, The Bad and The Junkman
Cybersecurity
Juniors CTF 2016 :: The Good, The Bad and The Junkman
John Hammond Intermediate 9y ago
Juniors CTF 2016 :: Voting!!!
Cybersecurity
Juniors CTF 2016 :: Voting!!!
John Hammond Intermediate 9y ago
Juniors CTF 2016 :: Hackers Blog
Cybersecurity
Juniors CTF 2016 :: Hackers Blog
John Hammond Intermediate 9y ago
Juniors CTF 2016 :: Dirty Repo
Cybersecurity
Juniors CTF 2016 :: Dirty Repo
John Hammond Intermediate 9y ago
Juniors CTF 2016 :: Clone Attack
Cybersecurity
Juniors CTF 2016 :: Clone Attack
John Hammond Intermediate 9y ago
Juniors CTF 2016 :: Southern Cross
Cybersecurity
Juniors CTF 2016 :: Southern Cross
John Hammond Intermediate 9y ago
Juniors CTF 2016 :: Here Goes!
Cybersecurity
Juniors CTF 2016 :: Here Goes!
John Hammond Intermediate 9y ago
Juniors CTF 2016 :: Lost Code
Cybersecurity
Juniors CTF 2016 :: Lost Code
John Hammond Intermediate 9y ago
Juniors CTF 2016 :: Six Strange Tales
Cybersecurity
Juniors CTF 2016 :: Six Strange Tales
John Hammond Intermediate 9y ago
Juniors CTF 2016 :: Black Suprematic Square
Cybersecurity
Juniors CTF 2016 :: Black Suprematic Square
John Hammond Intermediate 9y ago
KaizenCTF 2016 :: Pickled Beets
Cybersecurity
KaizenCTF 2016 :: Pickled Beets
John Hammond Intermediate 9y ago
KaizenCTF 2016 :: IP in a Haystack
Cybersecurity
KaizenCTF 2016 :: IP in a Haystack
John Hammond Intermediate 9y ago
KaizenCTF 2016 :: Darlene
Cybersecurity
KaizenCTF 2016 :: Darlene
John Hammond Intermediate 9y ago
KaizenCTF 2016 :: Packets without Borders
Cybersecurity
KaizenCTF 2016 :: Packets without Borders
John Hammond Intermediate 9y ago
📚 Coursera Courses Opens on Coursera · Free to audit
1 / 3 View all →
Play It Safe: Manage Security Risks
📚 Coursera Course ↗
Self-paced
Play It Safe: Manage Security Risks
Opens on Coursera ↗
Cybersecurity: Protecting your Information at Home
📚 Coursera Course ↗
Self-paced
Cybersecurity: Protecting your Information at Home
Opens on Coursera ↗
Verbal Communications and Presentation Skills
📚 Coursera Course ↗
Self-paced
Verbal Communications and Presentation Skills
Opens on Coursera ↗
Hacking WEP/WPA/WPA2 Wi-Fi Networks Using Kali Linux
📚 Coursera Course ↗
Self-paced
Hacking WEP/WPA/WPA2 Wi-Fi Networks Using Kali Linux
Opens on Coursera ↗
Communication Strategies for a Virtual Age
📚 Coursera Course ↗
Self-paced
Communication Strategies for a Virtual Age
Opens on Coursera ↗
Microsoft Azure Management Tools and Security Solutions
📚 Coursera Course ↗
Self-paced
Microsoft Azure Management Tools and Security Solutions
Opens on Coursera ↗