Tech Skills

Cybersecurity

Ethical hacking, penetration testing, network security, CTFs and defensive security

2563
lessons
Skills in this topic
View full skill map →
Security Basics
beginner
Fix OWASP top 10 vulnerabilities
AI Security
intermediate
Identify and patch prompt injection vulnerabilities
Network Security
intermediate
Configure a firewall with proper inbound/outbound rules
Ethical Hacking & Pen Testing
intermediate
Conduct a full pen test with Kali Linux
Cloud Security
intermediate
Implement IAM least-privilege policies on AWS/GCP
Incident Response
intermediate
Build an incident response playbook
Security Compliance
intermediate
Map controls for SOC 2 Type II compliance
Defensive AI
advanced
Build an AI-powered log anomaly detector
Python [hashlib] 03 MD5 Hashing
Cybersecurity
Python [hashlib] 03 MD5 Hashing
John Hammond Intermediate 13y ago
Python [hashlib] 02 Algorithms
Cybersecurity
Python [hashlib] 02 Algorithms
John Hammond Intermediate 13y ago
Python [hashlib] 04 SHA1 Hashing
Cybersecurity
Python [hashlib] 04 SHA1 Hashing
John Hammond Intermediate 13y ago
Python [getpass] 02 Get Password
Cybersecurity
Python [getpass] 02 Get Password
John Hammond Intermediate 13y ago
Python [getpass] 01 Get User
Cybersecurity
Python [getpass] 01 Get User
John Hammond Intermediate 13y ago
Python [sys] 05 Autoreset
Cybersecurity
Python [sys] 05 Autoreset
John Hammond Intermediate 13y ago
Python [sys] 08 Conclusion
Cybersecurity
Python [sys] 08 Conclusion
John Hammond Intermediate 13y ago
Python [sys] 07 Command-line Arguments
Cybersecurity
Python [sys] 07 Command-line Arguments
John Hammond Intermediate 13y ago
Python [sys] 06 Streams
Cybersecurity
Python [sys] 06 Streams
John Hammond Intermediate 13y ago
Python [sys] 05 Exit Codes
Cybersecurity
Python [sys] 05 Exit Codes
John Hammond Intermediate 13y ago
Python [sys] 04 Windows Version
Cybersecurity
Python [sys] 04 Windows Version
John Hammond Intermediate 13y ago
Python [sys] 03 Platform
Cybersecurity
Python [sys] 03 Platform
John Hammond Intermediate 13y ago
Python [sys] 02 Module Madness
Cybersecurity
Python [sys] 02 Module Madness
John Hammond Intermediate 13y ago
Python [sys] 01 Basic Information
Cybersecurity
Python [sys] 01 Basic Information
John Hammond Intermediate 13y ago
Batch 93 Ipconfig Command
Cybersecurity
Batch 93 Ipconfig Command
John Hammond Intermediate 13y ago
Batch 92 Nslookup Command
Cybersecurity
Batch 92 Nslookup Command
John Hammond Intermediate 13y ago
nullshell.com Forum!
Cybersecurity
nullshell.com Forum!
John Hammond Intermediate 13y ago
Batch 91 Custom Shell
Cybersecurity
Batch 91 Custom Shell
John Hammond Intermediate 13y ago
Batch 90 Array Reverse
Cybersecurity
Batch 90 Array Reverse
John Hammond Intermediate 13y ago
Batch 89 Array Remove
Cybersecurity
Batch 89 Array Remove
John Hammond Intermediate 13y ago
Batch 88 Array Insert
Cybersecurity
Batch 88 Array Insert
John Hammond Intermediate 13y ago
Batch 87 Array Index
Cybersecurity
Batch 87 Array Index
John Hammond Intermediate 13y ago
Batch 86 Array Count
Cybersecurity
Batch 86 Array Count
John Hammond Intermediate 13y ago
Batch 85 Array Append
Cybersecurity
Batch 85 Array Append
John Hammond Intermediate 13y ago
Batch 84 String Swapcase
Cybersecurity
Batch 84 String Swapcase
John Hammond Intermediate 13y ago
Batch 83 String to Upper
Cybersecurity
Batch 83 String to Upper
John Hammond Intermediate 13y ago
Batch 82 String to Lower
Cybersecurity
Batch 82 String to Lower
John Hammond Intermediate 13y ago
Batch 81 String Join
Cybersecurity
Batch 81 String Join
John Hammond Intermediate 13y ago
Batch 80 String is Upper
Cybersecurity
Batch 80 String is Upper
John Hammond Intermediate 13y ago
Batch 79 String is Full of Digits
Cybersecurity
Batch 79 String is Full of Digits
John Hammond Intermediate 13y ago
Batch 78 String is Lower
Cybersecurity
Batch 78 String is Lower
John Hammond Intermediate 13y ago
Batch 77 String is Alphabetical
Cybersecurity
Batch 77 String is Alphabetical
John Hammond Intermediate 13y ago
Batch 76 String Find
Cybersecurity
Batch 76 String Find
John Hammond Intermediate 13y ago
Batch 73 String Count
Cybersecurity
Batch 73 String Count
John Hammond Intermediate 13y ago
Batch 72 String Capitalize
Cybersecurity
Batch 72 String Capitalize
John Hammond Intermediate 13y ago
Batch 54 Colormsg Script
Cybersecurity
Batch 54 Colormsg Script
John Hammond Intermediate 13y ago
Batch 71 String Center
Cybersecurity
Batch 71 String Center
John Hammond Intermediate 13y ago
Batch 70 Sort Function
Cybersecurity
Batch 70 Sort Function
John Hammond Intermediate 13y ago
Batch 69 Sum Function
Cybersecurity
Batch 69 Sum Function
John Hammond Intermediate 13y ago
Batch 68 Range Function
Cybersecurity
Batch 68 Range Function
John Hammond Intermediate 13y ago
Batch 67 Absolute Value Function
Cybersecurity
Batch 67 Absolute Value Function
John Hammond Intermediate 13y ago
Batch 66 Power Function
Cybersecurity
Batch 66 Power Function
John Hammond Intermediate 13y ago
Batch 65 Maximum Function
Cybersecurity
Batch 65 Maximum Function
John Hammond Intermediate 13y ago
Batch 64 Minimum Function
Cybersecurity
Batch 64 Minimum Function
John Hammond Intermediate 13y ago
Batch 63 Testing Delayed Variable Expansion
Cybersecurity
Batch 63 Testing Delayed Variable Expansion
John Hammond Intermediate 13y ago
Batch 61 Building Arrays
Cybersecurity
Batch 61 Building Arrays
John Hammond Intermediate 13y ago
Batch 60 Modifying "Create String" Function
Cybersecurity
Batch 60 Modifying "Create String" Function
John Hammond Intermediate 13y ago
Batch 59 Continuing "Create String" Function
Cybersecurity
Batch 59 Continuing "Create String" Function
John Hammond Intermediate 13y ago
📚 Coursera Courses Opens on Coursera · Free to audit
1 / 3 View all →
Prevention of Harassment in the Workplace: US
📚 Coursera Course ↗
Self-paced
Prevention of Harassment in the Workplace: US
Opens on Coursera ↗
CCNA Cybersecurity (200-201) - Video Training Series
📚 Coursera Course ↗
Self-paced
CCNA Cybersecurity (200-201) - Video Training Series
Opens on Coursera ↗
Security-Driven Software Development
📚 Coursera Course ↗
Self-paced
Security-Driven Software Development
Opens on Coursera ↗
Sécuriser des réseaux VPC - Cloud Next Generation Firewall
📚 Coursera Course ↗
Self-paced
Sécuriser des réseaux VPC - Cloud Next Generation Firewall
Opens on Coursera ↗
Practical Cybersecurity: Stay Safe Online
📚 Coursera Course ↗
Self-paced
Practical Cybersecurity: Stay Safe Online
Opens on Coursera ↗
Penetration Testing, Threat Hunting, and Cryptography
📚 Coursera Course ↗
Self-paced
Penetration Testing, Threat Hunting, and Cryptography
Opens on Coursera ↗