Tech Skills

Cybersecurity

Ethical hacking, penetration testing, network security, CTFs and defensive security

7,115
lessons
Skills in this topic
View full skill map →
Security Basics
beginner
Fix OWASP top 10 vulnerabilities
AI Security
intermediate
Identify and patch prompt injection vulnerabilities
Network Security
intermediate
Configure a firewall with proper inbound/outbound rules
Ethical Hacking & Pen Testing
intermediate
Conduct a full pen test with Kali Linux
Cloud Security
intermediate
Implement IAM least-privilege policies on AWS/GCP
Incident Response
intermediate
Build an incident response playbook
Security Compliance
intermediate
Map controls for SOC 2 Type II compliance
Defensive AI
advanced
Build an AI-powered log anomaly detector
GNS3 Talks: Docker container upgrades: Network Automation container: Ansible, Python3, NAPALM & more
Cybersecurity
GNS3 Talks: Docker container upgrades: Network Automation container: Ansible, Python3, NAPALM & more
David Bombal Intermediate 8y ago
CCNA v3.0 200-125 GNS3 Labs: PPP troubleshooting lab 1 (Part 1). Use debugs to fix the network!
Cybersecurity
CCNA v3.0 200-125 GNS3 Labs: PPP troubleshooting lab 1 (Part 1). Use debugs to fix the network!
David Bombal Beginner 8y ago
Growth Hacking Advice
Cybersecurity
Growth Hacking Advice
Flux Academy Beginner 8y ago
Identifying another exploit mitigation and find bypass. stack0: part 2 - bin 0x22
Cybersecurity
Identifying another exploit mitigation and find bypass. stack0: part 2 - bin 0x22
LiveOverflow Intermediate 8y ago
Buffer overflow on a modern system impossible? stack0: part 1 - bin 0x21
Cybersecurity
Buffer overflow on a modern system impossible? stack0: part 1 - bin 0x21
LiveOverflow Intermediate 8y ago
HackTheBox - Arctic
Cybersecurity
HackTheBox - Arctic
IppSec Beginner 8y ago
Graduation Day - SANS HM Gov Cyber Retraining Academy
Cybersecurity
Graduation Day - SANS HM Gov Cyber Retraining Academy
SANS Institute Beginner 8y ago
How TOR Works- Computerphile
Cybersecurity ⚡ AI Lesson
How TOR Works- Computerphile
Computerphile Intermediate 8y ago
VPN And DNS For Beginners | Kali Linux
Cybersecurity ⚡ AI Lesson
VPN And DNS For Beginners | Kali Linux
HackerSploit Beginner 9y ago
Dealing With Depression & Anxiety In Programming
Cybersecurity ⚡ AI Lesson
Dealing With Depression & Anxiety In Programming
Traversy Media Intermediate 9y ago
Learn Web Security with Google (Google I/O '17)
Cybersecurity
Learn Web Security with Google (Google I/O '17)
Chrome for Developers Beginner 9y ago
Multiple Comparisons and Conversion Optimization
Cybersecurity ⚡ AI Lesson
Multiple Comparisons and Conversion Optimization
Data Skeptic Advanced 9y ago
Insecurity - CS50 Live - S3E2
Cybersecurity
Insecurity - CS50 Live - S3E2
CS50 Intermediate 9y ago
CCNA v3.0 200-125 GNS3 Labs: PPP troubleshooting (Part 4): EIGRP & Wireshark captures
Cybersecurity
CCNA v3.0 200-125 GNS3 Labs: PPP troubleshooting (Part 4): EIGRP & Wireshark captures
David Bombal Intermediate 8y ago
CCNA v3.0 200-125 GNS3 Labs:: PPP troubleshooting (Part 3): PAP and CHAP Wireshark captures
Cybersecurity
CCNA v3.0 200-125 GNS3 Labs:: PPP troubleshooting (Part 3): PAP and CHAP Wireshark captures
David Bombal Intermediate 8y ago
CCNA v3.0 200-125 GNS3 Labs: PPP troubleshooting (Part 2): PPP and CHAP authentication (plus debugs)
Cybersecurity
CCNA v3.0 200-125 GNS3 Labs: PPP troubleshooting (Part 2): PPP and CHAP authentication (plus debugs)
David Bombal Intermediate 8y ago
GNS3 Talks: The CLI is dead! What are you going to do about it?
Cybersecurity
GNS3 Talks: The CLI is dead! What are you going to do about it?
David Bombal Intermediate 8y ago
CCNA v3.0 200-125 GNS3 Labs: PPP troubleshooting (Part 1): PPP and PAP authentication (plus debugs)
Cybersecurity
CCNA v3.0 200-125 GNS3 Labs: PPP troubleshooting (Part 1): PPP and PAP authentication (plus debugs)
David Bombal Intermediate 8y ago
GNS3 Talks: Network Automation Docker Container (Part 2): Python, Netmiko, Pyntc and Ansible
Cybersecurity
GNS3 Talks: Network Automation Docker Container (Part 2): Python, Netmiko, Pyntc and Ansible
David Bombal Beginner 8y ago
GNS3 Talks: Network Automation Docker Container (Part 1): Python, Netmiko, Pyntc and Ansible
Cybersecurity
GNS3 Talks: Network Automation Docker Container (Part 1): Python, Netmiko, Pyntc and Ansible
David Bombal Beginner 8y ago
CCIEPython: If Else logic: Learn Python, Netmiko, NAPALM, pyntc and more!
Cybersecurity
CCIEPython: If Else logic: Learn Python, Netmiko, NAPALM, pyntc and more!
David Bombal Beginner 8y ago
GNS3 Talks: Packet.net and GNS3 (Part 5): Integrate the GNS3 GUI with Packet.net server
Cybersecurity
GNS3 Talks: Packet.net and GNS3 (Part 5): Integrate the GNS3 GUI with Packet.net server
David Bombal Intermediate 8y ago
GNS3 Talks: Packet.net and GNS3 (Part 4): Deploy Server and setup VPN
Cybersecurity
GNS3 Talks: Packet.net and GNS3 (Part 4): Deploy Server and setup VPN
David Bombal Intermediate 8y ago
GNS3 Talks: Packet.net and GNS3 (Part 3): SSH Keys (Generate with PuttyGen)
Cybersecurity
GNS3 Talks: Packet.net and GNS3 (Part 3): SSH Keys (Generate with PuttyGen)
David Bombal Intermediate 8y ago
GNS3 Talks: Packet.net and GNS3 (Part 2): Documentation, Discounts and signup
Cybersecurity
GNS3 Talks: Packet.net and GNS3 (Part 2): Documentation, Discounts and signup
David Bombal Intermediate 8y ago
GNS3 Talks: Packet.net and GNS3 (Part 1): Overview
Cybersecurity
GNS3 Talks: Packet.net and GNS3 (Part 1): Overview
David Bombal Beginner 8y ago
CCIEPython: pyntc: Automate Legacy Devices easily! Python, Netmiko, NAPALM, pyntc, SSH, NETCONF
Cybersecurity
CCIEPython: pyntc: Automate Legacy Devices easily! Python, Netmiko, NAPALM, pyntc, SSH, NETCONF
David Bombal Beginner 8y ago
CCIEPython: NAPALM: Network Automation, Programmability, Abstraction & Multivendor Python
Cybersecurity
CCIEPython: NAPALM: Network Automation, Programmability, Abstraction & Multivendor Python
David Bombal Beginner 8y ago
CCIEPython: What should I learn? Network Automation?
Cybersecurity
CCIEPython: What should I learn? Network Automation?
David Bombal Beginner 8y ago
CCIEPython: Learn Python programming with David Bombal: Python 2 or Python 3?
Cybersecurity
CCIEPython: Learn Python programming with David Bombal: Python 2 or Python 3?
David Bombal Beginner 8y ago
CCIEPython: Learn Python programming with David Bombal: Python Dictionaries and Netmiko (Part 2)
Cybersecurity
CCIEPython: Learn Python programming with David Bombal: Python Dictionaries and Netmiko (Part 2)
David Bombal Beginner 8y ago
CCIEPython: Learn Python programming with David Bombal: Python Dictionaries and Netmiko (Part 1)
Cybersecurity
CCIEPython: Learn Python programming with David Bombal: Python Dictionaries and Netmiko (Part 1)
David Bombal Beginner 8y ago
GNS3 Talks: How to import Docker containers into GNS3: your own or others available on Docker Hub.
Cybersecurity
GNS3 Talks: How to import Docker containers into GNS3: your own or others available on Docker Hub.
David Bombal Beginner 8y ago
GNS3 Talks: WordPress Docker appliance now available! Add web servers to your GNS3 Topologies.
Cybersecurity
GNS3 Talks: WordPress Docker appliance now available! Add web servers to your GNS3 Topologies.
David Bombal Beginner 8y ago
GNS3 Talks: Docker Ubuntu container not getting DHCP IP address (Part 2 - Windows). Troubleshooting.
Cybersecurity
GNS3 Talks: Docker Ubuntu container not getting DHCP IP address (Part 2 - Windows). Troubleshooting.
David Bombal Beginner 8y ago
GNS3 Talks: Docker Ubuntu container not getting DHCP IP address (Part 1 - MAC). Troubleshooting GNS3
Cybersecurity
GNS3 Talks: Docker Ubuntu container not getting DHCP IP address (Part 1 - MAC). Troubleshooting GNS3
David Bombal Beginner 8y ago
Hardware Power Glitch Attack (Fault Injection) - rhme2 Fiesta (FI 100)
Cybersecurity ⚡ AI Lesson
Hardware Power Glitch Attack (Fault Injection) - rhme2 Fiesta (FI 100)
LiveOverflow Intermediate 8y ago
Breaking ECDSA (Elliptic Curve Cryptography) - rhme2 Secure Filesystem v1.92r1 (crypto 150)
Cybersecurity ⚡ AI Lesson
Breaking ECDSA (Elliptic Curve Cryptography) - rhme2 Secure Filesystem v1.92r1 (crypto 150)
LiveOverflow Intermediate 9y ago
Reversing an unkown digital protocol with an Arduino - rhme2 Whac the mole (misc 200)
Cybersecurity
Reversing an unkown digital protocol with an Arduino - rhme2 Whac the mole (misc 200)
LiveOverflow Intermediate 9y ago
CCNA #087: MPLS Part 4: Core MPLS Labels - CEF, forwarding tables, Wireshark captures, tracing
Cybersecurity
CCNA #087: MPLS Part 4: Core MPLS Labels - CEF, forwarding tables, Wireshark captures, tracing
David Bombal Beginner 9y ago
Blind Buffer Overflow exploitation to leak secret data - rhme2 Animals (pwn 200)
Cybersecurity ⚡ AI Lesson
Blind Buffer Overflow exploitation to leak secret data - rhme2 Animals (pwn 200)
LiveOverflow Intermediate 9y ago
Format string exploit on an arduino - rhme2 Casino (pwn 150)
Cybersecurity ⚡ AI Lesson
Format string exploit on an arduino - rhme2 Casino (pwn 150)
LiveOverflow Intermediate 9y ago
GNS3 Talks: Ostinato Wireshark Captures Part 5: Capture and generate GNS3 switch CDP messages
Cybersecurity
GNS3 Talks: Ostinato Wireshark Captures Part 5: Capture and generate GNS3 switch CDP messages
David Bombal Intermediate 9y ago
GNS3 Talks: Ostinato Wireshark Captures Part 4: Generate packets with COS and DSCP settings
Cybersecurity
GNS3 Talks: Ostinato Wireshark Captures Part 4: Generate packets with COS and DSCP settings
David Bombal Intermediate 9y ago
GNS3 Talks: Ostinato Wireshark Captures Part 3: Capture IP Phone CDP messages & craft your own
Cybersecurity
GNS3 Talks: Ostinato Wireshark Captures Part 3: Capture IP Phone CDP messages & craft your own
David Bombal Intermediate 9y ago
GNS3 Talks: Ostinato Wireshark Captures Part 2: Capture IP Phone CDP messages & craft your own
Cybersecurity
GNS3 Talks: Ostinato Wireshark Captures Part 2: Capture IP Phone CDP messages & craft your own
David Bombal Intermediate 9y ago
GNS3 Talks: Ostinato Wireshark Captures Part 1: Capture STP BPDUs & craft own (Ostinato Part 10)
Cybersecurity
GNS3 Talks: Ostinato Wireshark Captures Part 1: Capture STP BPDUs & craft own (Ostinato Part 10)
David Bombal Intermediate 9y ago
Recover RSA private key from public keys - rhme2 Key Server (crypto 200)
Cybersecurity
Recover RSA private key from public keys - rhme2 Key Server (crypto 200)
LiveOverflow Intermediate 9y ago
📚 Coursera Courses Opens on Coursera · Free to audit
1 / 3 View all →
Cybersecurity in Healthcare (Hospitals & Care Centres)
📚 Coursera Course ↗
Self-paced
Cybersecurity in Healthcare (Hospitals & Care Centres)
Opens on Coursera ↗
Azure Cybersecurity Solutions And Microsoft Defender
📚 Coursera Course ↗
Self-paced
Azure Cybersecurity Solutions And Microsoft Defender
Opens on Coursera ↗
Microsoft 365 Security: Identity, Compliance & Trust
📚 Coursera Course ↗
Self-paced
Microsoft 365 Security: Identity, Compliance & Trust
Opens on Coursera ↗
Introduction to Cybersecurity Essentials
📚 Coursera Course ↗
Self-paced
Introduction to Cybersecurity Essentials
Opens on Coursera ↗
Segurança no GKE com Cloud Next Generation Firewall
📚 Coursera Course ↗
Self-paced
Segurança no GKE com Cloud Next Generation Firewall
Opens on Coursera ↗
Strategic Cyber Effects Management
📚 Coursera Course ↗
Self-paced
Strategic Cyber Effects Management
Opens on Coursera ↗