Tech Skills

Cybersecurity

Ethical hacking, penetration testing, network security, CTFs and defensive security

2563
lessons
Skills in this topic
View full skill map →
Security Basics
beginner
Fix OWASP top 10 vulnerabilities
AI Security
intermediate
Identify and patch prompt injection vulnerabilities
Network Security
intermediate
Configure a firewall with proper inbound/outbound rules
Ethical Hacking & Pen Testing
intermediate
Conduct a full pen test with Kali Linux
Cloud Security
intermediate
Implement IAM least-privilege policies on AWS/GCP
Incident Response
intermediate
Build an incident response playbook
Security Compliance
intermediate
Map controls for SOC 2 Type II compliance
Defensive AI
advanced
Build an AI-powered log anomaly detector
KaizenCTF 2016 :: Fun with Flags 2
Cybersecurity
KaizenCTF 2016 :: Fun with Flags 2
John Hammond Intermediate 9y ago
KaizenCTF 2016 :: Fun With Flags 1
Cybersecurity
KaizenCTF 2016 :: Fun With Flags 1
John Hammond Intermediate 9y ago
int0x80 from DualCore lent me his lockpicking set and I'm a horse - BruCON CTF part 2
Cybersecurity
int0x80 from DualCore lent me his lockpicking set and I'm a horse - BruCON CTF part 2
LiveOverflow Intermediate 9y ago
Abundant Circle Day 4 - Luxury Mastermind For Location Independent Entrepreneurs
Cybersecurity
Abundant Circle Day 4 - Luxury Mastermind For Location Independent Entrepreneurs
Miles Beckler Intermediate 9y ago
CS50 VR 2016 - Week 6 - HTTP
Cybersecurity
CS50 VR 2016 - Week 6 - HTTP
CS50 Intermediate 9y ago
Live Hacking - Internetwache CTF 2016 - exp50, exp70, exp80
Cybersecurity
Live Hacking - Internetwache CTF 2016 - exp50, exp70, exp80
LiveOverflow Intermediate 9y ago
Mustafa Suleyman – New Ways for Technology to Enhance Patient Care – King's Fund 5th July 2016
Cybersecurity
Mustafa Suleyman – New Ways for Technology to Enhance Patient Care – King's Fund 5th July 2016
Google DeepMind Intermediate 9y ago
How To Install Kali Linux 2.0 On Virtual Box
Cybersecurity
How To Install Kali Linux 2.0 On Virtual Box
HackerSploit Intermediate 9y ago
Things You Can Do to Make Security Worse in Your Network - Ignite Style
Cybersecurity
Things You Can Do to Make Security Worse in Your Network - Ignite Style
Jack Rhysider Intermediate 9y ago
SANS VetSuccess Academy: Hands-on Skills
Cybersecurity
SANS VetSuccess Academy: Hands-on Skills
SANS Institute Intermediate 9y ago
Privacy, Security, Society - Computer Science for Business Leaders 2016
Cybersecurity
Privacy, Security, Society - Computer Science for Business Leaders 2016
CS50 Intermediate 10y ago
KaizenCTF 2016 :: The Button
Cybersecurity
KaizenCTF 2016 :: The Button
John Hammond Intermediate 9y ago
KaizenCTF 2016 :: Gone But Not Forgotten
Cybersecurity
KaizenCTF 2016 :: Gone But Not Forgotten
John Hammond Intermediate 9y ago
KaizenCTF 2016 :: Zip-A-Dee
Cybersecurity
KaizenCTF 2016 :: Zip-A-Dee
John Hammond Intermediate 9y ago
KaizenCTF 2016 :: Stegosaurus
Cybersecurity
KaizenCTF 2016 :: Stegosaurus
John Hammond Intermediate 9y ago
KaizenCTF 2016 :: Blackjack
Cybersecurity
KaizenCTF 2016 :: Blackjack
John Hammond Intermediate 9y ago
KaizenCTF 2016 :: Search Leak 1
Cybersecurity
KaizenCTF 2016 :: Search Leak 1
John Hammond Intermediate 9y ago
KaizenCTF 2016 :: QR Nightmare
Cybersecurity
KaizenCTF 2016 :: QR Nightmare
John Hammond Intermediate 9y ago
United States Coast Guard Academy Windjammers 2016 Video
Cybersecurity
United States Coast Guard Academy Windjammers 2016 Video
John Hammond Intermediate 9y ago
SchoolCTF "Let's Play" (Live Recording)
Cybersecurity
SchoolCTF "Let's Play" (Live Recording)
John Hammond Intermediate 9y ago
Hack The Vote 2016 CTF Warpspeed [forensics150]
Cybersecurity
Hack The Vote 2016 CTF Warpspeed [forensics150]
John Hammond Intermediate 9y ago
Hack The Vote 2016 CTF: Sander's Fan Club [web100]
Cybersecurity
Hack The Vote 2016 CTF: Sander's Fan Club [web100]
John Hammond Intermediate 9y ago
misc50 : Hidden inside EKO :: EKOPARTY CTF 2016
Cybersecurity
misc50 : Hidden inside EKO :: EKOPARTY CTF 2016
John Hammond Intermediate 9y ago
web50 : RFC 7230 :: EKOPARTY CTF 2016
Cybersecurity
web50 : RFC 7230 :: EKOPARTY CTF 2016
John Hammond Intermediate 9y ago
web25 :: Mr. Robot : EKOPARTY CTF 2016
Cybersecurity
web25 :: Mr. Robot : EKOPARTY CTF 2016
John Hammond Intermediate 9y ago
Scripting radare2 with python for dynamic analysis - TUMCTF 2016 Zwiebel part 2
Cybersecurity
Scripting radare2 with python for dynamic analysis - TUMCTF 2016 Zwiebel part 2
LiveOverflow Intermediate 9y ago
Reverse Engineering with Binary Ninja and gdb a key checking algorithm - TUMCTF 2016 Zwiebel part 1
Cybersecurity
Reverse Engineering with Binary Ninja and gdb a key checking algorithm - TUMCTF 2016 Zwiebel part 1
LiveOverflow Intermediate 9y ago
New Sandbox Bypass in 1.4.7 - XSS with AngularJS 0x3
Cybersecurity
New Sandbox Bypass in 1.4.7 - XSS with AngularJS 0x3
LiveOverflow Intermediate 9y ago
Previous Bypass is now fixed in version 1.4.7 - XSS with AngularJS 0x2
Cybersecurity
Previous Bypass is now fixed in version 1.4.7 - XSS with AngularJS 0x2
LiveOverflow Intermediate 9y ago
XSS Contexts and some Chrome XSS Auditor tricks - web 0x03
Cybersecurity
XSS Contexts and some Chrome XSS Auditor tricks - web 0x03
LiveOverflow Intermediate 9y ago
Homemade CTF Challenge: 06 "I lost my password!"
Cybersecurity
Homemade CTF Challenge: 06 "I lost my password!"
John Hammond Intermediate 9y ago
Capturing & Analyzing Packets with Saleae Logic Pro 8 - Reverse Engineering A/C Remote part 2
Cybersecurity
Capturing & Analyzing Packets with Saleae Logic Pro 8 - Reverse Engineering A/C Remote part 2
LiveOverflow Intermediate 9y ago
Homemade CTF Challenge: 06 "A Brisk Stroll"
Cybersecurity
Homemade CTF Challenge: 06 "A Brisk Stroll"
John Hammond Intermediate 9y ago
Sandbox Bypass in Version 1.0.8 - XSS with AngularJS 0x1
Cybersecurity
Sandbox Bypass in Version 1.0.8 - XSS with AngularJS 0x1
LiveOverflow Intermediate 9y ago
Homemade CTF Challenge: 05 "The Assumption Song"
Cybersecurity
Homemade CTF Challenge: 05 "The Assumption Song"
John Hammond Intermediate 9y ago
Homemade CTF Challenge: 04 "UPX"
Cybersecurity
Homemade CTF Challenge: 04 "UPX"
John Hammond Intermediate 9y ago
Homemade CTF Challenge: 03 "Web Hunt"
Cybersecurity
Homemade CTF Challenge: 03 "Web Hunt"
John Hammond Intermediate 9y ago
Homemade CTF Challenge: 02 "Bae's Base"
Cybersecurity
Homemade CTF Challenge: 02 "Bae's Base"
John Hammond Intermediate 9y ago
Homemade CTF Challenge: 01 "Orchestra"
Cybersecurity
Homemade CTF Challenge: 01 "Orchestra"
John Hammond Intermediate 9y ago
Building Poor Man's Logic Analyzer with an Arduino - Reverse Engineering A/C Remote part 1
Cybersecurity
Building Poor Man's Logic Analyzer with an Arduino - Reverse Engineering A/C Remote part 1
LiveOverflow Intermediate 9y ago
LASACTF: "Postman" Challenge
Cybersecurity
LASACTF: "Postman" Challenge
John Hammond Intermediate 10y ago
LASACTF: "Pixels" Challenge
Cybersecurity
LASACTF: "Pixels" Challenge
John Hammond Intermediate 10y ago
LASACTF: "Client Side" Challenge
Cybersecurity
LASACTF: "Client Side" Challenge
John Hammond Intermediate 10y ago
LASACTF: "Lost Extensions" Challenge
Cybersecurity
LASACTF: "Lost Extensions" Challenge
John Hammond Intermediate 10y ago
Python Challenge! 18 What's the difference?!
Cybersecurity
Python Challenge! 18 What's the difference?!
John Hammond Intermediate 10y ago
LASACTF: "Grep Request" (Script)
Cybersecurity
LASACTF: "Grep Request" (Script)
John Hammond Intermediate 10y ago
Internet Technologies - Computer Science for Business Leaders 2016
Cybersecurity
Internet Technologies - Computer Science for Business Leaders 2016
CS50 Intermediate 10y ago
Live Hacking - Internetwache CTF 2016 - crypto60, crypto70, crypto90
Cybersecurity
Live Hacking - Internetwache CTF 2016 - crypto60, crypto70, crypto90
LiveOverflow Intermediate 10y ago
📚 Coursera Courses Opens on Coursera · Free to audit
1 / 3 View all →
Network Systems Foundations
📚 Coursera Course ↗
Self-paced
Network Systems Foundations
Opens on Coursera ↗
Digital Forensics for Pentesters - Hands-On Learning
📚 Coursera Course ↗
Self-paced
Digital Forensics for Pentesters - Hands-On Learning
Opens on Coursera ↗
Cybersecurity Essentials - From Zero to Secure
📚 Coursera Course ↗
Self-paced
Cybersecurity Essentials - From Zero to Secure
Opens on Coursera ↗
Marketing Management Essentials:The Marketing Plan Structure
📚 Coursera Course ↗
Self-paced
Marketing Management Essentials:The Marketing Plan Structure
Opens on Coursera ↗
Network Defense Essentials (NDE)
📚 Coursera Course ↗
Self-paced
Network Defense Essentials (NDE)
Opens on Coursera ↗
Asset Security
📚 Coursera Course ↗
Self-paced
Asset Security
Opens on Coursera ↗