Tech Skills

Cybersecurity

Ethical hacking, penetration testing, network security, CTFs and defensive security

2563
lessons
Skills in this topic
View full skill map →
Security Basics
beginner
Fix OWASP top 10 vulnerabilities
AI Security
intermediate
Identify and patch prompt injection vulnerabilities
Network Security
intermediate
Configure a firewall with proper inbound/outbound rules
Ethical Hacking & Pen Testing
intermediate
Conduct a full pen test with Kali Linux
Cloud Security
intermediate
Implement IAM least-privilege policies on AWS/GCP
Incident Response
intermediate
Build an incident response playbook
Security Compliance
intermediate
Map controls for SOC 2 Type II compliance
Defensive AI
advanced
Build an AI-powered log anomaly detector
Python Challenge! 17 COOKIES
Cybersecurity
Python Challenge! 17 COOKIES
John Hammond Intermediate 10y ago
LASACTF: "Grep Request" Challenge
Cybersecurity
LASACTF: "Grep Request" Challenge
John Hammond Intermediate 10y ago
Live Hacking - Internetwache CTF 2016 - web50, web60, web80
Cybersecurity
Live Hacking - Internetwache CTF 2016 - web50, web60, web80
LiveOverflow Intermediate 10y ago
Arbitrary write with House of Force (heap exploit) - BKPCTF cookbook (pwn 6) part 3
Cybersecurity
Arbitrary write with House of Force (heap exploit) - BKPCTF cookbook (pwn 6) part 3
LiveOverflow Intermediate 10y ago
Running a Buffer Overflow Attack - Computerphile
Cybersecurity
Running a Buffer Overflow Attack - Computerphile
Computerphile Intermediate 10y ago
SANS VetSuccess Academy: Identifying Top Cyber Talent
Cybersecurity
SANS VetSuccess Academy: Identifying Top Cyber Talent
SANS Institute Intermediate 10y ago
Brain Scanner - Computerphile
Cybersecurity
Brain Scanner - Computerphile
Computerphile Intermediate 10y ago
The 2015 SANS Holiday Hack Challenge
Cybersecurity
The 2015 SANS Holiday Hack Challenge
SANS Institute Intermediate 10y ago
LASACTF: "Four Oh Four" Challenge
Cybersecurity
LASACTF: "Four Oh Four" Challenge
John Hammond Intermediate 10y ago
Python Challenge! 16: MOZART
Cybersecurity
Python Challenge! 16: MOZART
John Hammond Intermediate 10y ago
LASACTF: "R3ndom Eye" Challenge
Cybersecurity
LASACTF: "R3ndom Eye" Challenge
John Hammond Intermediate 10y ago
LASACTF: "Shifty Letters" Challenge
Cybersecurity
LASACTF: "Shifty Letters" Challenge
John Hammond Intermediate 10y ago
05 SOLUTION: Hazy Days
Cybersecurity
05 SOLUTION: Hazy Days
John Hammond Intermediate 10y ago
05 CHALLENGE: Hazy Days
Cybersecurity
05 CHALLENGE: Hazy Days
John Hammond Intermediate 10y ago
04 SOLUTION: Spelling States
Cybersecurity
04 SOLUTION: Spelling States
John Hammond Intermediate 10y ago
04 CHALLENGE: Spelling States
Cybersecurity
04 CHALLENGE: Spelling States
John Hammond Intermediate 10y ago
03 SOLUTION: Dog Showdown
Cybersecurity
03 SOLUTION: Dog Showdown
John Hammond Intermediate 10y ago
03 CHALLENGE: Dog Showdown
Cybersecurity
03 CHALLENGE: Dog Showdown
John Hammond Intermediate 10y ago
02 SOLUTION: Missing Numbers
Cybersecurity
02 SOLUTION: Missing Numbers
John Hammond Intermediate 10y ago
02 CHALLENGE: Missing Numbers
Cybersecurity
02 CHALLENGE: Missing Numbers
John Hammond Intermediate 10y ago
01 SOLUTION: Word Find
Cybersecurity
01 SOLUTION: Word Find
John Hammond Intermediate 10y ago
01 CHALLENGE: Word Find
Cybersecurity
01 CHALLENGE: Word Find
John Hammond Intermediate 10y ago
Template BASH Script
Cybersecurity
Template BASH Script
John Hammond Intermediate 10y ago
Creating a BitBucket Repository
Cybersecurity
Creating a BitBucket Repository
John Hammond Intermediate 10y ago
LaTeX 01: Text Formatting
Cybersecurity
LaTeX 01: Text Formatting
John Hammond Intermediate 10y ago
LaTeX 00: Hello World!
Cybersecurity
LaTeX 00: Hello World!
John Hammond Intermediate 10y ago
Python 04: PEP8 Coding
Cybersecurity
Python 04: PEP8 Coding
John Hammond Intermediate 10y ago
Leaking Heap and Libc address - BKPCTF cookbook (pwn 6) part 2
Cybersecurity
Leaking Heap and Libc address - BKPCTF cookbook (pwn 6) part 2
LiveOverflow Intermediate 10y ago
Python 03: Variables and Input
Cybersecurity
Python 03: Variables and Input
John Hammond Intermediate 10y ago
Python 01: Hello, World!
Cybersecurity
Python 01: Hello, World!
John Hammond Intermediate 10y ago
Python 02: Data Types
Cybersecurity
Python 02: Data Types
John Hammond Intermediate 10y ago
Sublime Text 2: PPA Install
Cybersecurity
Sublime Text 2: PPA Install
John Hammond Intermediate 10y ago
Reverse Engineering and identifying Bugs - BKPCTF cookbook (pwn 6) part 1
Cybersecurity
Reverse Engineering and identifying Bugs - BKPCTF cookbook (pwn 6) part 1
LiveOverflow Intermediate 10y ago
wget in Python!
Cybersecurity
wget in Python!
John Hammond Intermediate 10y ago
pwnable.kr - Levels: fd, collision, bof, flag
Cybersecurity
pwnable.kr - Levels: fd, collision, bof, flag
LiveOverflow Intermediate 10y ago
Live Hacking - EFF-CTF 2016 - Level 0-4 (Enigma Conference)
Cybersecurity
Live Hacking - EFF-CTF 2016 - Level 0-4 (Enigma Conference)
LiveOverflow Intermediate 10y ago
Live Hacking - Twitch Recording overthewire.org - Vortex 0x01-0x03 (3h)
Cybersecurity
Live Hacking - Twitch Recording overthewire.org - Vortex 0x01-0x03 (3h)
LiveOverflow Intermediate 10y ago
Man in the Middle Attacks & Superfish - Computerphile
Cybersecurity
Man in the Middle Attacks & Superfish - Computerphile
Computerphile Intermediate 10y ago
Zig Zag Decryption - Computerphile
Cybersecurity
Zig Zag Decryption - Computerphile
Computerphile Intermediate 10y ago
Inside a Data Centre - Computerphile
Cybersecurity
Inside a Data Centre - Computerphile
Computerphile Intermediate 10y ago
USCGA Windjammers Ultimate Frisbee
Cybersecurity
USCGA Windjammers Ultimate Frisbee
John Hammond Intermediate 10y ago
Building "Quote" Functions in Python! [urllib] 06
Cybersecurity
Building "Quote" Functions in Python! [urllib] 06
John Hammond Intermediate 10y ago
Python URL "Utility functions" [urllib] 05
Cybersecurity
Python URL "Utility functions" [urllib] 05
John Hammond Intermediate 10y ago
Downloading Web Content with Python [urllib] 02
Cybersecurity
Downloading Web Content with Python [urllib] 02
John Hammond Intermediate 10y ago
Could We Ban Encryption? - Computerphile
Cybersecurity
Could We Ban Encryption? - Computerphile
Computerphile Intermediate 10y ago
Getting Web Content with Python! [urllib] 01
Cybersecurity
Getting Web Content with Python! [urllib] 01
John Hammond Intermediate 10y ago
LiveOverflow - Trailer
Cybersecurity
LiveOverflow - Trailer
LiveOverflow Intermediate 10y ago
Python [npyscreen] 09 Form Menus
Cybersecurity
Python [npyscreen] 09 Form Menus
John Hammond Intermediate 10y ago
📚 Coursera Courses Opens on Coursera · Free to audit
1 / 3 View all →
Mastering Endpoint Security & Threat Defense
📚 Coursera Course ↗
Self-paced
Mastering Endpoint Security & Threat Defense
Opens on Coursera ↗
Consultative Selling and Buyer Engagement
📚 Coursera Course ↗
Self-paced
Consultative Selling and Buyer Engagement
Opens on Coursera ↗
Asset Security
📚 Coursera Course ↗
Self-paced
Asset Security
Opens on Coursera ↗
Introduction à Cloud Next Generation Firewall
📚 Coursera Course ↗
Self-paced
Introduction à Cloud Next Generation Firewall
Opens on Coursera ↗
Encryption and Decryption using C++
📚 Coursera Course ↗
Self-paced
Encryption and Decryption using C++
Opens on Coursera ↗
Empower Patients: Autonomy Through Simulation and Role-Play
📚 Coursera Course ↗
Self-paced
Empower Patients: Autonomy Through Simulation and Role-Play
Opens on Coursera ↗