Tech Skills

Cybersecurity

Ethical hacking, penetration testing, network security, CTFs and defensive security

7,118
lessons
Skills in this topic
View full skill map →
Security Basics
beginner
Fix OWASP top 10 vulnerabilities
AI Security
intermediate
Identify and patch prompt injection vulnerabilities
Network Security
intermediate
Configure a firewall with proper inbound/outbound rules
Ethical Hacking & Pen Testing
intermediate
Conduct a full pen test with Kali Linux
Cloud Security
intermediate
Implement IAM least-privilege policies on AWS/GCP
Incident Response
intermediate
Build an incident response playbook
Security Compliance
intermediate
Map controls for SOC 2 Type II compliance
Defensive AI
advanced
Build an AI-powered log anomaly detector
Diamond Model of Intrusion Analysis - An Overview
Cybersecurity
Diamond Model of Intrusion Analysis - An Overview
Jack Rhysider Beginner 10y ago
A simple Format String exploit example - bin 0x11
Cybersecurity
A simple Format String exploit example - bin 0x11
LiveOverflow Beginner 10y ago
Privacy, Security, Society - Computer Science for Business Leaders 2016
Cybersecurity
Privacy, Security, Society - Computer Science for Business Leaders 2016
CS50 Intermediate 10y ago
Internet Technologies - Computer Science for Business Leaders 2016
Cybersecurity
Internet Technologies - Computer Science for Business Leaders 2016
CS50 Intermediate 10y ago
Live Hacking - Internetwache CTF 2016 - crypto60, crypto70, crypto90
Cybersecurity
Live Hacking - Internetwache CTF 2016 - crypto60, crypto70, crypto90
LiveOverflow Intermediate 10y ago
Python Challenge! 17 COOKIES
Cybersecurity
Python Challenge! 17 COOKIES
John Hammond Intermediate 10y ago
Python 04: PEP8 Coding
Cybersecurity
Python 04: PEP8 Coding
John Hammond Intermediate 10y ago
SEJ Summit SEO/SEM Conference
Cybersecurity
SEJ Summit SEO/SEM Conference
Search Engine Journal Beginner 10y ago
Running a Buffer Overflow Attack - Computerphile
Cybersecurity ⚡ AI Lesson
Running a Buffer Overflow Attack - Computerphile
Computerphile Intermediate 10y ago
Crisper: Protecting your Polymer app with CSP -- Polycasts #40
Cybersecurity
Crisper: Protecting your Polymer app with CSP -- Polycasts #40
Chrome for Developers Beginner 10y ago
Brain Scanner - Computerphile
Cybersecurity ⚡ AI Lesson
Brain Scanner - Computerphile
Computerphile Intermediate 10y ago
The 2015 SANS Holiday Hack Challenge
Cybersecurity ⚡ AI Lesson
The 2015 SANS Holiday Hack Challenge
SANS Institute Intermediate 10y ago
Hack The Drone - SANS Cyber Academy UK
Cybersecurity ⚡ AI Lesson
Hack The Drone - SANS Cyber Academy UK
SANS Institute Beginner 10y ago
Live Q&A on hacking prevention and recovery
Cybersecurity
Live Q&A on hacking prevention and recovery
Google Search Central Advanced 10y ago
Programming Terms: String Interpolation
Cybersecurity
Programming Terms: String Interpolation
Corey Schafer Beginner 10y ago
How to Study Effectively: 8 Advanced Tips - College Info Geek
Cybersecurity
How to Study Effectively: 8 Advanced Tips - College Info Geek
Thomas Frank Beginner 11y ago
How to Read Your Textbooks More Efficiently - College Info Geek
Cybersecurity
How to Read Your Textbooks More Efficiently - College Info Geek
Thomas Frank Intermediate 11y ago
Hire the hackers! - Misha Glenny
Cybersecurity
Hire the hackers! - Misha Glenny
TED-Ed Beginner 12y ago
Behind the Great Firewall of China - Michael Anti
Cybersecurity
Behind the Great Firewall of China - Michael Anti
TED-Ed Intermediate 12y ago
Live Hacking - Internetwache CTF 2016 - web50, web60, web80
Cybersecurity
Live Hacking - Internetwache CTF 2016 - web50, web60, web80
LiveOverflow Intermediate 10y ago
Arbitrary write with House of Force (heap exploit) - BKPCTF cookbook (pwn 6) part 3
Cybersecurity
Arbitrary write with House of Force (heap exploit) - BKPCTF cookbook (pwn 6) part 3
LiveOverflow Intermediate 10y ago
Leaking Heap and Libc address - BKPCTF cookbook (pwn 6) part 2
Cybersecurity
Leaking Heap and Libc address - BKPCTF cookbook (pwn 6) part 2
LiveOverflow Intermediate 10y ago
Reverse Engineering and identifying Bugs - BKPCTF cookbook (pwn 6) part 1
Cybersecurity ⚡ AI Lesson
Reverse Engineering and identifying Bugs - BKPCTF cookbook (pwn 6) part 1
LiveOverflow Intermediate 10y ago
pwnable.kr - Levels: fd, collision, bof, flag
Cybersecurity ⚡ AI Lesson
pwnable.kr - Levels: fd, collision, bof, flag
LiveOverflow Intermediate 10y ago
Reverse engineering C programs (64bit vs 32bit) - bin 0x10
Cybersecurity ⚡ AI Lesson
Reverse engineering C programs (64bit vs 32bit) - bin 0x10
LiveOverflow Beginner 10y ago
Live Hacking - EFF-CTF 2016 - Level 0-4 (Enigma Conference)
Cybersecurity
Live Hacking - EFF-CTF 2016 - Level 0-4 (Enigma Conference)
LiveOverflow Intermediate 10y ago
Live Hacking - Twitch Recording overthewire.org - Vortex 0x01-0x03 (3h)
Cybersecurity
Live Hacking - Twitch Recording overthewire.org - Vortex 0x01-0x03 (3h)
LiveOverflow Intermediate 10y ago
How Digital Audio Works - Computerphile
Cybersecurity ⚡ AI Lesson
How Digital Audio Works - Computerphile
Computerphile Beginner 10y ago
Man in the Middle Attacks & Superfish - Computerphile
Cybersecurity ⚡ AI Lesson
Man in the Middle Attacks & Superfish - Computerphile
Computerphile Intermediate 10y ago
Anti-Learning (So Bad, it's Good) - Computerphile
Cybersecurity ⚡ AI Lesson
Anti-Learning (So Bad, it's Good) - Computerphile
Computerphile Beginner 10y ago
Zig Zag Decryption - Computerphile
Cybersecurity ⚡ AI Lesson
Zig Zag Decryption - Computerphile
Computerphile Intermediate 10y ago
SANS DFIR NetWars
Cybersecurity
SANS DFIR NetWars
SANS Institute Beginner 10y ago
Inside a Data Centre - Computerphile
Cybersecurity ⚡ AI Lesson
Inside a Data Centre - Computerphile
Computerphile Intermediate 10y ago
Could We Ban Encryption? - Computerphile
Cybersecurity ⚡ AI Lesson
Could We Ban Encryption? - Computerphile
Computerphile Intermediate 10y ago
LiveOverflow - Trailer
Cybersecurity
LiveOverflow - Trailer
LiveOverflow Intermediate 11y ago
Wearables and Augmented Reality - Computerphile
Cybersecurity ⚡ AI Lesson
Wearables and Augmented Reality - Computerphile
Computerphile Intermediate 11y ago
SANS FOR610: Reverse Engineering Malware: Malware Analysis Tools & Techniques
Cybersecurity
SANS FOR610: Reverse Engineering Malware: Malware Analysis Tools & Techniques
SANS Institute Intermediate 11y ago
Do You Actually Need to Read Your Textbooks? - College Info Geek
Cybersecurity
Do You Actually Need to Read Your Textbooks? - College Info Geek
Thomas Frank Intermediate 11y ago
CS50 2014 - Week 10
Cybersecurity
CS50 2014 - Week 10
CS50 Intermediate 11y ago
Studying Well Requires Intellectual Combat - College Info Geek
Cybersecurity
Studying Well Requires Intellectual Combat - College Info Geek
Thomas Frank Beginner 11y ago
Is College Worth It? Use the Tony Hawk Method to Find Out. - College Info Geek
Cybersecurity
Is College Worth It? Use the Tony Hawk Method to Find Out. - College Info Geek
Thomas Frank Intermediate 11y ago
Gaining Momentum: A 4-Step Process for Starting Every Day Productively - College Info Geek
Cybersecurity
Gaining Momentum: A 4-Step Process for Starting Every Day Productively - College Info Geek
Thomas Frank Beginner 11y ago
Python [pygame] 12 Platforming Rectangular Collision Resolution
Cybersecurity
Python [pygame] 12 Platforming Rectangular Collision Resolution
John Hammond Intermediate 12y ago
Python [pygame] 11 Rectangular Collision Detection
Cybersecurity
Python [pygame] 11 Rectangular Collision Detection
John Hammond Intermediate 12y ago
Cross Site Request Forgery - Computerphile
Cybersecurity ⚡ AI Lesson
Cross Site Request Forgery - Computerphile
Computerphile Intermediate 12y ago
Hacking Websites with SQL Injection - Computerphile
Cybersecurity ⚡ AI Lesson
Hacking Websites with SQL Injection - Computerphile
Computerphile Intermediate 12y ago
Virtual Machines Power the Cloud - Computerphile
Cybersecurity ⚡ AI Lesson
Virtual Machines Power the Cloud - Computerphile
Computerphile Intermediate 12y ago
What is fat? - George Zaidan
Cybersecurity
What is fat? - George Zaidan
TED-Ed Beginner 13y ago
📚 Coursera Courses Opens on Coursera · Free to audit
1 / 3 View all →
Introduction à Cloud Next Generation Firewall
📚 Coursera Course ↗
Self-paced
Introduction à Cloud Next Generation Firewall
Opens on Coursera ↗
Advanced Network Security and Endpoint Strategies
📚 Coursera Course ↗
Self-paced
Advanced Network Security and Endpoint Strategies
Opens on Coursera ↗
Network Architecture
📚 Coursera Course ↗
Self-paced
Network Architecture
Opens on Coursera ↗
Ethical Hacking Foundations
📚 Coursera Course ↗
Self-paced
Ethical Hacking Foundations
Opens on Coursera ↗
Systems and Application Security
📚 Coursera Course ↗
Self-paced
Systems and Application Security
Opens on Coursera ↗
Effective .NET Memory Management
📚 Coursera Course ↗
Self-paced
Effective .NET Memory Management
Opens on Coursera ↗