Tech Skills

Cybersecurity

Ethical hacking, penetration testing, network security, CTFs and defensive security

2563
lessons
Skills in this topic
View full skill map →
Security Basics
beginner
Fix OWASP top 10 vulnerabilities
AI Security
intermediate
Identify and patch prompt injection vulnerabilities
Network Security
intermediate
Configure a firewall with proper inbound/outbound rules
Ethical Hacking & Pen Testing
intermediate
Conduct a full pen test with Kali Linux
Cloud Security
intermediate
Implement IAM least-privilege policies on AWS/GCP
Incident Response
intermediate
Build an incident response playbook
Security Compliance
intermediate
Map controls for SOC 2 Type II compliance
Defensive AI
advanced
Build an AI-powered log anomaly detector
Python [npyscreen] 08 Messages and Choices
Cybersecurity
Python [npyscreen] 08 Messages and Choices
John Hammond Intermediate 11y ago
Python [npyscreen] 06 Forms Functionality
Cybersecurity
Python [npyscreen] 06 Forms Functionality
John Hammond Intermediate 11y ago
Wearables and Augmented Reality - Computerphile
Cybersecurity
Wearables and Augmented Reality - Computerphile
Computerphile Intermediate 11y ago
SANS FOR610: Reverse Engineering Malware: Malware Analysis Tools & Techniques
Cybersecurity
SANS FOR610: Reverse Engineering Malware: Malware Analysis Tools & Techniques
SANS Institute Intermediate 11y ago
Python [npyscreen] 05 Beginning Widgets
Cybersecurity
Python [npyscreen] 05 Beginning Widgets
John Hammond Intermediate 11y ago
Python [npyscreen] 04 NEXT_ACTIVE_FORM
Cybersecurity
Python [npyscreen] 04 NEXT_ACTIVE_FORM
John Hammond Intermediate 11y ago
Python [npyscreen] 03 Beginning Applications
Cybersecurity
Python [npyscreen] 03 Beginning Applications
John Hammond Intermediate 11y ago
Python [npyscreen] 02 Beginning Forms
Cybersecurity
Python [npyscreen] 02 Beginning Forms
John Hammond Intermediate 11y ago
Python [pyenchant] 05 wx GUI and CLI tools
Cybersecurity
Python [pyenchant] 05 wx GUI and CLI tools
John Hammond Intermediate 11y ago
Python [pyenchant] 02 Check & Suggest Words
Cybersecurity
Python [pyenchant] 02 Check & Suggest Words
John Hammond Intermediate 11y ago
Python [pxssh]  04 SSH_OPTS & Interactive Mode
Cybersecurity
Python [pxssh] 04 SSH_OPTS & Interactive Mode
John Hammond Intermediate 11y ago
Python [pyenchant] 01 Installing and Dictionaries
Cybersecurity
Python [pyenchant] 01 Installing and Dictionaries
John Hammond Intermediate 11y ago
Python [npyscreen] 07 SplitForm and ActionForm
Cybersecurity
Python [npyscreen] 07 SplitForm and ActionForm
John Hammond Intermediate 11y ago
Python [pxssh] 03 Sending Commands
Cybersecurity
Python [pxssh] 03 Sending Commands
John Hammond Intermediate 11y ago
Python [pxssh] 02 Variables
Cybersecurity
Python [pxssh] 02 Variables
John Hammond Intermediate 11y ago
Python [pxssh] 01 Installing and Login
Cybersecurity
Python [pxssh] 01 Installing and Login
John Hammond Intermediate 11y ago
Python Cracking Unix User Passwords 03 crypt
Cybersecurity
Python Cracking Unix User Passwords 03 crypt
John Hammond Intermediate 11y ago
2000 THANK YOU & Cyberstakes 2015!
Cybersecurity
2000 THANK YOU & Cyberstakes 2015!
John Hammond Intermediate 11y ago
Python Cracking Unix User Passwords 02 - spwd
Cybersecurity
Python Cracking Unix User Passwords 02 - spwd
John Hammond Intermediate 11y ago
Python Cracking Unix User Passwords 01 - pwd
Cybersecurity
Python Cracking Unix User Passwords 01 - pwd
John Hammond Intermediate 11y ago
Python Challenge! 15 "Whom?"
Cybersecurity
Python Challenge! 15 "Whom?"
John Hammond Intermediate 11y ago
Python Challenge! 14 Walk Around the Wire~
Cybersecurity
Python Challenge! 14 Walk Around the Wire~
John Hammond Intermediate 11y ago
Python [PIL ImageEnhance] Enhance Color, Sharpness, Brightness & Contrast
Cybersecurity
Python [PIL ImageEnhance] Enhance Color, Sharpness, Brightness & Contrast
John Hammond Intermediate 11y ago
Python [PIL ImageOps] 22 Grayscale, Colorize, & More
Cybersecurity
Python [PIL ImageOps] 22 Grayscale, Colorize, & More
John Hammond Intermediate 11y ago
Python [PIL ImageOps] 21 Invert, Posterize, Solarize
Cybersecurity
Python [PIL ImageOps] 21 Invert, Posterize, Solarize
John Hammond Intermediate 11y ago
Python [PIL Image] 20 Split and Merge
Cybersecurity
Python [PIL Image] 20 Split and Merge
John Hammond Intermediate 11y ago
Python [PIL Image] 19 Transpose
Cybersecurity
Python [PIL Image] 19 Transpose
John Hammond Intermediate 11y ago
Python [PIL Image] 18 Pixel Access Objects
Cybersecurity
Python [PIL Image] 18 Pixel Access Objects
John Hammond Intermediate 11y ago
Python [PIL Image] 17 PutPixel
Cybersecurity
Python [PIL Image] 17 PutPixel
John Hammond Intermediate 11y ago
Python [PIL Image] 16 Save()
Cybersecurity
Python [PIL Image] 16 Save()
John Hammond Intermediate 11y ago
Python Challenge! 13 WHO IS THE EVIL!!?!
Cybersecurity
Python Challenge! 13 WHO IS THE EVIL!!?!
John Hammond Intermediate 11y ago
Python Challenge?? 12.5? Evil4.jpg
Cybersecurity
Python Challenge?? 12.5? Evil4.jpg
John Hammond Intermediate 11y ago
Python [XML-RPC] 04 Multicall
Cybersecurity
Python [XML-RPC] 04 Multicall
John Hammond Intermediate 11y ago
Python [XML-RPC] 02 Client Demonstration
Cybersecurity
Python [XML-RPC] 02 Client Demonstration
John Hammond Intermediate 11y ago
Python Challenge! 12 So many Evils!
Cybersecurity
Python Challenge! 12 So many Evils!
John Hammond Intermediate 11y ago
Python Challenge! 11 Odd and Even
Cybersecurity
Python Challenge! 11 Odd and Even
John Hammond Intermediate 11y ago
Python Challenge! 10 Look and Say
Cybersecurity
Python Challenge! 10 Look and Say
John Hammond Intermediate 11y ago
Python Challenge! 08 INFLATE THIS BEE
Cybersecurity
Python Challenge! 08 INFLATE THIS BEE
John Hammond Intermediate 11y ago
Python Challenge! 09 Connect the Dots
Cybersecurity
Python Challenge! 09 Connect the Dots
John Hammond Intermediate 11y ago
Python Challenge! 07 Unveiling Oxygen.png
Cybersecurity
Python Challenge! 07 Unveiling Oxygen.png
John Hammond Intermediate 11y ago
Python [sympy] 04 Carets and Division
Cybersecurity
Python [sympy] 04 Carets and Division
John Hammond Intermediate 11y ago
Python [sympy] 03.5 Richardson's Theorem
Cybersecurity
Python [sympy] 03.5 Richardson's Theorem
John Hammond Intermediate 11y ago
Python [sympy] 03 Equality
Cybersecurity
Python [sympy] 03 Equality
John Hammond Intermediate 11y ago
Python [sympy] 02 Symbols
Cybersecurity
Python [sympy] 02 Symbols
John Hammond Intermediate 11y ago
Python [sympy] 00 Installation
Cybersecurity
Python [sympy] 00 Installation
John Hammond Intermediate 11y ago
Python Challenge! 06 "Zip"-itty doo dah!
Cybersecurity
Python Challenge! 06 "Zip"-itty doo dah!
John Hammond Intermediate 11y ago
Python Challenge! 05 We're in a Peakhell!
Cybersecurity
Python Challenge! 05 We're in a Peakhell!
John Hammond Intermediate 11y ago
Python [textwrap] TextWrapper Object Properties
Cybersecurity
Python [textwrap] TextWrapper Object Properties
John Hammond Intermediate 11y ago
📚 Coursera Courses Opens on Coursera · Free to audit
1 / 3 View all →
ENARSI (300-410) v1.1 Video Training Series
📚 Coursera Course ↗
Self-paced
ENARSI (300-410) v1.1 Video Training Series
Opens on Coursera ↗
CFR: Reconnaissance, Attack, and Post-Attack Analysis
📚 Coursera Course ↗
Self-paced
CFR: Reconnaissance, Attack, and Post-Attack Analysis
Opens on Coursera ↗
Cisco Collaboration Edge Services
📚 Coursera Course ↗
Self-paced
Cisco Collaboration Edge Services
Opens on Coursera ↗
The Complete Pentesting and Privilege Escalation Course
📚 Coursera Course ↗
Self-paced
The Complete Pentesting and Privilege Escalation Course
Opens on Coursera ↗
Python Cryptography: Analyze & Break Ciphers
📚 Coursera Course ↗
Self-paced
Python Cryptography: Analyze & Break Ciphers
Opens on Coursera ↗
Foundations of Data Visualization
📚 Coursera Course ↗
Self-paced
Foundations of Data Visualization
Opens on Coursera ↗