Tech Skills

Cybersecurity

Ethical hacking, penetration testing, network security, CTFs and defensive security

5257
lessons
Skills in this topic
View full skill map →
Security Basics
beginner
Fix OWASP top 10 vulnerabilities
AI Security
intermediate
Identify and patch prompt injection vulnerabilities
Network Security
intermediate
Configure a firewall with proper inbound/outbound rules
Ethical Hacking & Pen Testing
intermediate
Conduct a full pen test with Kali Linux
Cloud Security
intermediate
Implement IAM least-privilege policies on AWS/GCP
Incident Response
intermediate
Build an incident response playbook
Security Compliance
intermediate
Map controls for SOC 2 Type II compliance
Defensive AI
advanced
Build an AI-powered log anomaly detector
How To Install Kali Linux 2.0 On Virtual Box
Cybersecurity ⚡ AI Lesson
How To Install Kali Linux 2.0 On Virtual Box
HackerSploit Intermediate 9y ago
SANS VetSuccess Academy Overview
Cybersecurity
SANS VetSuccess Academy Overview
SANS Institute Advanced 9y ago
SANS VetSuccess Academy: Hands-on Skills
Cybersecurity
SANS VetSuccess Academy: Hands-on Skills
SANS Institute Intermediate 9y ago
Diamond Model of Intrusion Analysis - An Overview
Cybersecurity
Diamond Model of Intrusion Analysis - An Overview
Jack Rhysider Beginner 10y ago
A simple Format String exploit example - bin 0x11
Cybersecurity
A simple Format String exploit example - bin 0x11
LiveOverflow Beginner 10y ago
Privacy, Security, Society - Computer Science for Business Leaders 2016
Cybersecurity
Privacy, Security, Society - Computer Science for Business Leaders 2016
CS50 Intermediate 10y ago
Internet Technologies - Computer Science for Business Leaders 2016
Cybersecurity
Internet Technologies - Computer Science for Business Leaders 2016
CS50 Intermediate 10y ago
Live Hacking - Internetwache CTF 2016 - crypto60, crypto70, crypto90
Cybersecurity
Live Hacking - Internetwache CTF 2016 - crypto60, crypto70, crypto90
LiveOverflow Intermediate 10y ago
Python Challenge! 17 COOKIES
Cybersecurity
Python Challenge! 17 COOKIES
John Hammond Intermediate 10y ago
Python 04: PEP8 Coding
Cybersecurity
Python 04: PEP8 Coding
John Hammond Intermediate 10y ago
SEJ Summit SEO/SEM Conference
Cybersecurity
SEJ Summit SEO/SEM Conference
Search Engine Journal Beginner 10y ago
Running a Buffer Overflow Attack - Computerphile
Cybersecurity ⚡ AI Lesson
Running a Buffer Overflow Attack - Computerphile
Computerphile Intermediate 10y ago
Crisper: Protecting your Polymer app with CSP -- Polycasts #40
Cybersecurity
Crisper: Protecting your Polymer app with CSP -- Polycasts #40
Chrome for Developers Beginner 10y ago
Brain Scanner - Computerphile
Cybersecurity ⚡ AI Lesson
Brain Scanner - Computerphile
Computerphile Intermediate 10y ago
Live Q&A on hacking prevention and recovery
Cybersecurity
Live Q&A on hacking prevention and recovery
Google Search Central Advanced 10y ago
Programming Terms: String Interpolation
Cybersecurity
Programming Terms: String Interpolation
Corey Schafer Beginner 10y ago
How to Study Effectively: 8 Advanced Tips - College Info Geek
Cybersecurity
How to Study Effectively: 8 Advanced Tips - College Info Geek
Thomas Frank Beginner 11y ago
How to Read Your Textbooks More Efficiently - College Info Geek
Cybersecurity
How to Read Your Textbooks More Efficiently - College Info Geek
Thomas Frank Intermediate 11y ago
Live Hacking - Internetwache CTF 2016 - web50, web60, web80
Cybersecurity
Live Hacking - Internetwache CTF 2016 - web50, web60, web80
LiveOverflow Intermediate 10y ago
Arbitrary write with House of Force (heap exploit) - BKPCTF cookbook (pwn 6) part 3
Cybersecurity
Arbitrary write with House of Force (heap exploit) - BKPCTF cookbook (pwn 6) part 3
LiveOverflow Intermediate 10y ago
Leaking Heap and Libc address - BKPCTF cookbook (pwn 6) part 2
Cybersecurity
Leaking Heap and Libc address - BKPCTF cookbook (pwn 6) part 2
LiveOverflow Intermediate 10y ago
Reverse Engineering and identifying Bugs - BKPCTF cookbook (pwn 6) part 1
Cybersecurity ⚡ AI Lesson
Reverse Engineering and identifying Bugs - BKPCTF cookbook (pwn 6) part 1
LiveOverflow Intermediate 10y ago
pwnable.kr - Levels: fd, collision, bof, flag
Cybersecurity
pwnable.kr - Levels: fd, collision, bof, flag
LiveOverflow Intermediate 10y ago
Reverse engineering C programs (64bit vs 32bit) - bin 0x10
Cybersecurity
Reverse engineering C programs (64bit vs 32bit) - bin 0x10
LiveOverflow Beginner 10y ago
Live Hacking - EFF-CTF 2016 - Level 0-4 (Enigma Conference)
Cybersecurity
Live Hacking - EFF-CTF 2016 - Level 0-4 (Enigma Conference)
LiveOverflow Intermediate 10y ago
Live Hacking - Twitch Recording overthewire.org - Vortex 0x01-0x03 (3h)
Cybersecurity
Live Hacking - Twitch Recording overthewire.org - Vortex 0x01-0x03 (3h)
LiveOverflow Intermediate 10y ago
The 2015 SANS Holiday Hack Challenge
Cybersecurity ⚡ AI Lesson
The 2015 SANS Holiday Hack Challenge
SANS Institute Intermediate 10y ago
Hack The Drone - SANS Cyber Academy UK
Cybersecurity ⚡ AI Lesson
Hack The Drone - SANS Cyber Academy UK
SANS Institute Beginner 10y ago
How Digital Audio Works - Computerphile
Cybersecurity ⚡ AI Lesson
How Digital Audio Works - Computerphile
Computerphile Beginner 10y ago
Man in the Middle Attacks & Superfish - Computerphile
Cybersecurity ⚡ AI Lesson
Man in the Middle Attacks & Superfish - Computerphile
Computerphile Intermediate 10y ago
Anti-Learning (So Bad, it's Good) - Computerphile
Cybersecurity ⚡ AI Lesson
Anti-Learning (So Bad, it's Good) - Computerphile
Computerphile Beginner 10y ago
Zig Zag Decryption - Computerphile
Cybersecurity ⚡ AI Lesson
Zig Zag Decryption - Computerphile
Computerphile Intermediate 10y ago
SANS DFIR NetWars
Cybersecurity
SANS DFIR NetWars
SANS Institute Beginner 10y ago
Inside a Data Centre - Computerphile
Cybersecurity ⚡ AI Lesson
Inside a Data Centre - Computerphile
Computerphile Intermediate 10y ago
Could We Ban Encryption? - Computerphile
Cybersecurity ⚡ AI Lesson
Could We Ban Encryption? - Computerphile
Computerphile Intermediate 10y ago
LiveOverflow - Trailer
Cybersecurity
LiveOverflow - Trailer
LiveOverflow Intermediate 10y ago
Wearables and Augmented Reality - Computerphile
Cybersecurity ⚡ AI Lesson
Wearables and Augmented Reality - Computerphile
Computerphile Intermediate 11y ago
SANS FOR610: Reverse Engineering Malware: Malware Analysis Tools & Techniques
Cybersecurity
SANS FOR610: Reverse Engineering Malware: Malware Analysis Tools & Techniques
SANS Institute Intermediate 11y ago
Do You Actually Need to Read Your Textbooks? - College Info Geek
Cybersecurity
Do You Actually Need to Read Your Textbooks? - College Info Geek
Thomas Frank Intermediate 11y ago
CS50 2014 - Week 10
Cybersecurity
CS50 2014 - Week 10
CS50 Intermediate 11y ago
Studying Well Requires Intellectual Combat - College Info Geek
Cybersecurity
Studying Well Requires Intellectual Combat - College Info Geek
Thomas Frank Beginner 11y ago
Is College Worth It? Use the Tony Hawk Method to Find Out. - College Info Geek
Cybersecurity
Is College Worth It? Use the Tony Hawk Method to Find Out. - College Info Geek
Thomas Frank Intermediate 11y ago
Gaining Momentum: A 4-Step Process for Starting Every Day Productively - College Info Geek
Cybersecurity
Gaining Momentum: A 4-Step Process for Starting Every Day Productively - College Info Geek
Thomas Frank Beginner 11y ago
Python [pygame] 12 Platforming Rectangular Collision Resolution
Cybersecurity
Python [pygame] 12 Platforming Rectangular Collision Resolution
John Hammond Intermediate 12y ago
Python [pygame] 11 Rectangular Collision Detection
Cybersecurity
Python [pygame] 11 Rectangular Collision Detection
John Hammond Intermediate 12y ago
Cross Site Request Forgery - Computerphile
Cybersecurity ⚡ AI Lesson
Cross Site Request Forgery - Computerphile
Computerphile Intermediate 12y ago
Hacking Websites with SQL Injection - Computerphile
Cybersecurity ⚡ AI Lesson
Hacking Websites with SQL Injection - Computerphile
Computerphile Intermediate 12y ago
Virtual Machines Power the Cloud - Computerphile
Cybersecurity ⚡ AI Lesson
Virtual Machines Power the Cloud - Computerphile
Computerphile Intermediate 12y ago
📚 Coursera Courses Opens on Coursera · Free to audit
1 / 3 View all →
Learn Man in the Middle Attacks from Scratch
📚 Coursera Course ↗
Self-paced
Learn Man in the Middle Attacks from Scratch
Opens on Coursera ↗
Microsoft Copilot for Security
📚 Coursera Course ↗
Self-paced
Microsoft Copilot for Security
Opens on Coursera ↗
Hacking WEP/WPA/WPA2 Wi-Fi Networks Using Kali Linux
📚 Coursera Course ↗
Self-paced
Hacking WEP/WPA/WPA2 Wi-Fi Networks Using Kali Linux
Opens on Coursera ↗
Cybersecurity for Data Science
📚 Coursera Course ↗
Self-paced
Cybersecurity for Data Science
Opens on Coursera ↗
How to Analyze Tweet Engagement with Twitter Analytics
📚 Coursera Course ↗
Self-paced
How to Analyze Tweet Engagement with Twitter Analytics
Opens on Coursera ↗
Introduction to Detection and Incident Response
📚 Coursera Course ↗
Self-paced
Introduction to Detection and Incident Response
Opens on Coursera ↗