Tech Skills

Cybersecurity

Ethical hacking, penetration testing, network security, CTFs and defensive security

5252
lessons
Skills in this topic
View full skill map →
Security Basics
beginner
Fix OWASP top 10 vulnerabilities
AI Security
intermediate
Identify and patch prompt injection vulnerabilities
Network Security
intermediate
Configure a firewall with proper inbound/outbound rules
Ethical Hacking & Pen Testing
intermediate
Conduct a full pen test with Kali Linux
Cloud Security
intermediate
Implement IAM least-privilege policies on AWS/GCP
Incident Response
intermediate
Build an incident response playbook
Security Compliance
intermediate
Map controls for SOC 2 Type II compliance
Defensive AI
advanced
Build an AI-powered log anomaly detector
Python Web Hacking: HTTP Headers & Cookies | Natas: OverTheWire (Levels 4-5)
Cybersecurity
Python Web Hacking: HTTP Headers & Cookies | Natas: OverTheWire (Levels 4-5)
John Hammond Intermediate 7y ago
Python Web Hacking: robots.txt & Directory Indexing | Natas: OverTheWire (Levels 2-3)
Cybersecurity
Python Web Hacking: robots.txt & Directory Indexing | Natas: OverTheWire (Levels 2-3)
John Hammond Intermediate 7y ago
Flying and our first Flag! (Cow King) - Pwn Adventure 3
Cybersecurity
Flying and our first Flag! (Cow King) - Pwn Adventure 3
LiveOverflow Intermediate 7y ago
You’re Probably Not Red Teaming (And Usually I’m Not, Either) – SANS ICS Summit 2018
Cybersecurity
You’re Probably Not Red Teaming (And Usually I’m Not, Either) – SANS ICS Summit 2018
SANS Institute Beginner 7y ago
JavaScript Vulnerabilities - The State of the Web
Cybersecurity
JavaScript Vulnerabilities - The State of the Web
Chrome for Developers Intermediate 7y ago
Sh*t Happens!  (But You Still Need to Drink the Water) – SANS ICS Summit 2018
Cybersecurity
Sh*t Happens! (But You Still Need to Drink the Water) – SANS ICS Summit 2018
SANS Institute Intermediate 7y ago
How To Stay Focused - From Poorhouse To Penthouse
Cybersecurity
How To Stay Focused - From Poorhouse To Penthouse
Dan Lok Beginner 7y ago
HackTheBox - Tally
Cybersecurity
HackTheBox - Tally
IppSec Beginner 7y ago
Web App Penetration Testing - #8 - SQL Injection With sqlmap
Cybersecurity
Web App Penetration Testing - #8 - SQL Injection With sqlmap
HackerSploit Intermediate 7y ago
Hooking on Linux with LD_PRELOAD - Pwn Adventure 3
Cybersecurity
Hooking on Linux with LD_PRELOAD - Pwn Adventure 3
LiveOverflow Intermediate 7y ago
PentestBox - Portable Penetration Testing Environment For Windows
Cybersecurity
PentestBox - Portable Penetration Testing Environment For Windows
HackerSploit Intermediate 7y ago
How To Become a Product Strategist
Cybersecurity
How To Become a Product Strategist
Flux Academy Beginner 7y ago
HackTheBox - Flux Capacitor
Cybersecurity
HackTheBox - Flux Capacitor
IppSec Intermediate 7y ago
GNS3 Talks: Linux Whitebox FRRouting Appliance import; and Cisco IOS OSPF demo (Part 2)
Cybersecurity
GNS3 Talks: Linux Whitebox FRRouting Appliance import; and Cisco IOS OSPF demo (Part 2)
David Bombal Beginner 7y ago
GNS3 Talks: Linux Whitebox FRRouting Appliance import; and Cisco IOS OSPF demo (Part 1)
Cybersecurity
GNS3 Talks: Linux Whitebox FRRouting Appliance import; and Cisco IOS OSPF demo (Part 1)
David Bombal Beginner 7y ago
Ep 12: Crypto Wars
Cybersecurity
Ep 12: Crypto Wars
Jack Rhysider Intermediate 7y ago
Niche Analysis - Proving You Can Actually Help People Solve Their Problems & Achieve Their Goals!
Cybersecurity
Niche Analysis - Proving You Can Actually Help People Solve Their Problems & Achieve Their Goals!
Miles Beckler Beginner 7y ago
Python Web Hacking: View Source | Natas: OverTheWire (Levels 0-1)
Cybersecurity
Python Web Hacking: View Source | Natas: OverTheWire (Levels 0-1)
John Hammond Intermediate 7y ago
C++ TicTacToe Game [1] Programming The Grid
Cybersecurity
C++ TicTacToe Game [1] Programming The Grid
John Hammond Intermediate 7y ago
Linux Hacking: Brute-Force Loop | Leviathan: OverTheWire (Levels 5-6) FINALE
Cybersecurity
Linux Hacking: Brute-Force Loop | Leviathan: OverTheWire (Levels 5-6) FINALE
John Hammond Intermediate 7y ago
Linux Hacking: Binary & Hex | Leviathan: OverTheWire (Levels 3-4)
Cybersecurity
Linux Hacking: Binary & Hex | Leviathan: OverTheWire (Levels 3-4)
John Hammond Intermediate 7y ago
Linux Hacking: Symbolic Links | Leviathan: OverTheWire (Level 2)
Cybersecurity
Linux Hacking: Symbolic Links | Leviathan: OverTheWire (Level 2)
John Hammond Intermediate 7y ago
Linux Hacking: strings & ltrace: Leviathan: OverTheWire (Levels 0-1)
Cybersecurity
Linux Hacking: strings & ltrace: Leviathan: OverTheWire (Levels 0-1)
John Hammond Intermediate 7y ago
Linux Hacking: CTF Jail Escaping (More) | Bandit: OverTheWire (Level 25) FINALE
Cybersecurity
Linux Hacking: CTF Jail Escaping (More) | Bandit: OverTheWire (Level 25) FINALE
John Hammond Intermediate 7y ago
Linux Hacking: Bruteforce For Loop | Bandit: OverTheWire (Level 24)
Cybersecurity
Linux Hacking: Bruteforce For Loop | Bandit: OverTheWire (Level 24)
John Hammond Intermediate 7y ago
Linux Hacking: Shebang & Scripting | Bandit: OverTheWire (Level 23)
Cybersecurity
Linux Hacking: Shebang & Scripting | Bandit: OverTheWire (Level 23)
John Hammond Intermediate 7y ago
Linux Hacking: SETUID Binary, Netcat & Cron | Bandit: OverTheWire (Levels 19-22)
Cybersecurity
Linux Hacking: SETUID Binary, Netcat & Cron | Bandit: OverTheWire (Levels 19-22)
John Hammond Intermediate 7y ago
Linux Hacking: SSL, NMap Portscans & Diff | Bandit: OverTheWire (Levels 15-18)
Cybersecurity
Linux Hacking: SSL, NMap Portscans & Diff | Bandit: OverTheWire (Levels 15-18)
John Hammond Intermediate 7y ago
Linux Hacking: ROT13, Hexdump, SSH Private Keys | Bandit: OverTheWire (Levels  11-14)
Cybersecurity
Linux Hacking: ROT13, Hexdump, SSH Private Keys | Bandit: OverTheWire (Levels 11-14)
John Hammond Intermediate 7y ago
Unicode ZERO WIDTH Spaces to HIDE SECRET MESSAGES (MITRE CTF)
Cybersecurity
Unicode ZERO WIDTH Spaces to HIDE SECRET MESSAGES (MITRE CTF)
John Hammond Intermediate 7y ago
Linux Hacking: GREP & Base64 | Bandit: OverTheWire (Levels 7-10)
Cybersecurity
Linux Hacking: GREP & Base64 | Bandit: OverTheWire (Levels 7-10)
John Hammond Intermediate 7y ago
Linux Hacking: Hidden Files & File Ownership | Bandit: OverTheWire (Levels 4-6)
Cybersecurity
Linux Hacking: Hidden Files & File Ownership | Bandit: OverTheWire (Levels 4-6)
John Hammond Intermediate 7y ago
Linux Hacking: SSHPass & File Spaces | Bandit: OverTheWire (Levels 1-3)
Cybersecurity
Linux Hacking: SSHPass & File Spaces | Bandit: OverTheWire (Levels 1-3)
John Hammond Intermediate 7y ago
Linux Offsec Club 5/5 - Video Walkthrough (Levels 13-15)
Cybersecurity
Linux Offsec Club 5/5 - Video Walkthrough (Levels 13-15)
John Hammond Intermediate 7y ago
Linux Offsec Club 4/5 - Video Walkthrough (Levels 10-12)
Cybersecurity
Linux Offsec Club 4/5 - Video Walkthrough (Levels 10-12)
John Hammond Intermediate 7y ago
Linux Offsec Club 3/5 - Video Walkthrough (Levels 7-9)
Cybersecurity
Linux Offsec Club 3/5 - Video Walkthrough (Levels 7-9)
John Hammond Intermediate 7y ago
Linux Offsec Club 2/5 - Video Walkthrough (Levels 4-6)
Cybersecurity
Linux Offsec Club 2/5 - Video Walkthrough (Levels 4-6)
John Hammond Intermediate 7y ago
Recover Game Classes with gdb - Pwn Adventure 3
Cybersecurity
Recover Game Classes with gdb - Pwn Adventure 3
LiveOverflow Beginner 7y ago
Linux Offsec Club 1/5 - Video Walkthrough (Levels 1-3)
Cybersecurity
Linux Offsec Club 1/5 - Video Walkthrough (Levels 1-3)
John Hammond Intermediate 7y ago
Information Gathering / Recon - Pwn Adventure 3
Cybersecurity
Information Gathering / Recon - Pwn Adventure 3
LiveOverflow Beginner 7y ago
GNS3 Talks: AAA Docker Appliance: Easy TACACS & RADIUS GNS3 servers! Part 3
Cybersecurity
GNS3 Talks: AAA Docker Appliance: Easy TACACS & RADIUS GNS3 servers! Part 3
David Bombal Beginner 7y ago
GNS3 Talks: AAA Docker Appliance: Easy TACACS & RADIUS GNS3 servers! Part 2
Cybersecurity
GNS3 Talks: AAA Docker Appliance: Easy TACACS & RADIUS GNS3 servers! Part 2
David Bombal Beginner 7y ago
SANS Security Operations Summit & Training 2018
Cybersecurity
SANS Security Operations Summit & Training 2018
SANS Institute Intermediate 7y ago
GNS3 Talks: Easy DNS Server for GNS3 Topologies: Dnsmasq Docker Appliance Part 2
Cybersecurity
GNS3 Talks: Easy DNS Server for GNS3 Topologies: Dnsmasq Docker Appliance Part 2
David Bombal Beginner 7y ago
GNS3 Talks: Easy DNS Server for GNS3 Topologies: Dnsmasq Docker Appliance Part 1
Cybersecurity
GNS3 Talks: Easy DNS Server for GNS3 Topologies: Dnsmasq Docker Appliance Part 1
David Bombal Beginner 7y ago
Introduction to Reverse Engineering for Penetration Testers – SANS Pen Test HackFest Summit 2017
Cybersecurity
Introduction to Reverse Engineering for Penetration Testers – SANS Pen Test HackFest Summit 2017
SANS Institute Beginner 7y ago
Privesc Playground - SANS Pen Test HackFest Summit 2017
Cybersecurity
Privesc Playground - SANS Pen Test HackFest Summit 2017
SANS Institute Intermediate 7y ago
The Complete Meterpreter Guide | Privilege Escalation & Clearing Tracks
Cybersecurity
The Complete Meterpreter Guide | Privilege Escalation & Clearing Tracks
HackerSploit Beginner 7y ago
📚 Coursera Courses Opens on Coursera · Free to audit
1 / 3 View all →
Identifying Security Vulnerabilities
📚 Coursera Course ↗
Self-paced
Identifying Security Vulnerabilities
Opens on Coursera ↗
(SSCP) Systems Security Certified Practitioner: Unit 6
📚 Coursera Course ↗
Self-paced
(SSCP) Systems Security Certified Practitioner: Unit 6
Opens on Coursera ↗
Cybersécurité : comment sécuriser un site web
📚 Coursera Course ↗
Self-paced
Cybersécurité : comment sécuriser un site web
Opens on Coursera ↗
Metasploit for Beginners: Ethical Penetration Testing
📚 Coursera Course ↗
Self-paced
Metasploit for Beginners: Ethical Penetration Testing
Opens on Coursera ↗
Ethical Hacking Fundamentals
📚 Coursera Course ↗
Self-paced
Ethical Hacking Fundamentals
Opens on Coursera ↗
Advanced Techniques for Implementing Security Services
📚 Coursera Course ↗
Self-paced
Advanced Techniques for Implementing Security Services
Opens on Coursera ↗