Tech Skills

Cybersecurity

Ethical hacking, penetration testing, network security, CTFs and defensive security

6399
lessons
Skills in this topic
View full skill map →
Security Basics
beginner
Fix OWASP top 10 vulnerabilities
AI Security
intermediate
Identify and patch prompt injection vulnerabilities
Network Security
intermediate
Configure a firewall with proper inbound/outbound rules
Ethical Hacking & Pen Testing
intermediate
Conduct a full pen test with Kali Linux
Cloud Security
intermediate
Implement IAM least-privilege policies on AWS/GCP
Incident Response
intermediate
Build an incident response playbook
Security Compliance
intermediate
Map controls for SOC 2 Type II compliance
Defensive AI
advanced
Build an AI-powered log anomaly detector
【Nintendo Switch Sports】 This Kirin challenges you to a game of golf... What do you do?
Cybersecurity
【Nintendo Switch Sports】 This Kirin challenges you to a game of golf... What do you do?
Ceres Fauna Ch. hololive-EN Beginner 3y ago
How To Bypass Website File Upload Restrictions
Cybersecurity
How To Bypass Website File Upload Restrictions
John Hammond Beginner 3y ago
Certified Penetration Testing Specialist! Chat with HackTheBox
Cybersecurity
Certified Penetration Testing Specialist! Chat with HackTheBox
John Hammond Beginner 3y ago
Revisiting 2b2t Tamed Animal Coordinate Exploit
Cybersecurity
Revisiting 2b2t Tamed Animal Coordinate Exploit
LiveOverflow Beginner 3y ago
Windows Red Team - Dynamic Shellcode Injection & PowerShell Obfuscation
Cybersecurity
Windows Red Team - Dynamic Shellcode Injection & PowerShell Obfuscation
HackerSploit Beginner 3y ago
Why my chat app broke… a cautionary tale
Cybersecurity
Why my chat app broke… a cautionary tale
Fireship Intermediate 3y ago
'Twas the Hack Before Christmas🎙Darknet Diaries Ep. 55: NoirNet
Cybersecurity
'Twas the Hack Before Christmas🎙Darknet Diaries Ep. 55: NoirNet
Jack Rhysider Intermediate 3y ago
HackTheBox - Support
Cybersecurity
HackTheBox - Support
IppSec Beginner 3y ago
I challenged ChatGPT to code and hack (Are we doomed?)
Cybersecurity
I challenged ChatGPT to code and hack (Are we doomed?)
David Bombal Beginner 3y ago
SANS Difference Makers Awards Ceremony
Cybersecurity
SANS Difference Makers Awards Ceremony
SANS Institute Intermediate 3y ago
Russia vs. Ukraine: The Biggest Cyber Attack Ever🎙Darknet Diaries Ep. 54: NotPetya
Cybersecurity
Russia vs. Ukraine: The Biggest Cyber Attack Ever🎙Darknet Diaries Ep. 54: NotPetya
Jack Rhysider Intermediate 3y ago
【SKYRIM】 Do NOT feed the Kirinborn
Cybersecurity
【SKYRIM】 Do NOT feed the Kirinborn
Ceres Fauna Ch. hololive-EN Beginner 3y ago
EXPOSE your home network to the INTERNET!! (it's safe)
Cybersecurity
EXPOSE your home network to the INTERNET!! (it's safe)
NetworkChuck Beginner 3y ago
Ethical Hacking in 15 Hours - 2023 Edition - Learn to Hack! (Part 2)
Cybersecurity
Ethical Hacking in 15 Hours - 2023 Edition - Learn to Hack! (Part 2)
The Cyber Mentor Beginner 3y ago
How to make Millions $$$ hacking zero days?
Cybersecurity
How to make Millions $$$ hacking zero days?
David Bombal Beginner 3y ago
Ethical Hacking in 15 Hours - 2023 Edition - Learn to Hack! (Part 1)
Cybersecurity
Ethical Hacking in 15 Hours - 2023 Edition - Learn to Hack! (Part 1)
The Cyber Mentor Beginner 3y ago
Kyrsten Sinema’s Shocking Decision: Independent or Betrayal?
Cybersecurity
Kyrsten Sinema’s Shocking Decision: Independent or Betrayal?
Evan Carmichael Intermediate 3y ago
Can AI Hack Websites with XSS? #ChatGPT
Cybersecurity
Can AI Hack Websites with XSS? #ChatGPT
LiveUnderflow Beginner 3y ago
HackTheBox UniCTF 2022  Talk - Variable is what you make of It
Cybersecurity
HackTheBox UniCTF 2022 Talk - Variable is what you make of It
IppSec Beginner 3y ago
The Most Difficult Puzzle Game - Dr. Kobushi's Labyrinthine Laboratory
Cybersecurity
The Most Difficult Puzzle Game - Dr. Kobushi's Labyrinthine Laboratory
LiveUnderflow Intermediate 3y ago
St-36, by Dr Bartosz Chmielnicki MD (An excerpt from Treat the Shen and Transform Emotions)
Cybersecurity
St-36, by Dr Bartosz Chmielnicki MD (An excerpt from Treat the Shen and Transform Emotions)
TCM Academy Beginner 3y ago
Filter Evasion in a REVERSE SHELL (no spaces!!)
Cybersecurity
Filter Evasion in a REVERSE SHELL (no spaces!!)
John Hammond Beginner 3y ago
ROP is DEAD! Kernel Driver Binary Exploitation
Cybersecurity
ROP is DEAD! Kernel Driver Binary Exploitation
John Hammond Beginner 3y ago
Start Hacking with the HEARTBLEED vulnerability: NahamCon CTF
Cybersecurity
Start Hacking with the HEARTBLEED vulnerability: NahamCon CTF
John Hammond Beginner 3y ago
Capture The Flag!  NahamCon EU CTF "MMORPG"
Cybersecurity
Capture The Flag! NahamCon EU CTF "MMORPG"
John Hammond Beginner 3y ago
Hardware Hacking! Day 19 - TryHackMe Advent of Cyber
Cybersecurity
Hardware Hacking! Day 19 - TryHackMe Advent of Cyber
John Hammond Beginner 3y ago
How To Manage Your Business Technology
Cybersecurity
How To Manage Your Business Technology
John Hammond Beginner 3y ago
Is this a SECURE laptop?
Cybersecurity
Is this a SECURE laptop?
John Hammond Beginner 3y ago
【ASMR】 Fluffy ASMR to heal your soul ♡ Ear cleaning & positive affirmations
Cybersecurity
【ASMR】 Fluffy ASMR to heal your soul ♡ Ear cleaning & positive affirmations
Ceres Fauna Ch. hololive-EN Beginner 3y ago
【Pokémon Violet】 Lass Fauna wants to battle! | #5
Cybersecurity
【Pokémon Violet】 Lass Fauna wants to battle! | #5
Ceres Fauna Ch. hololive-EN Beginner 3y ago
Unraveling the IcedID Malware Stager & Phishing Email
Cybersecurity
Unraveling the IcedID Malware Stager & Phishing Email
John Hammond Beginner 3y ago
【Nintendo Switch Sports】 You dare challenge me?
Cybersecurity
【Nintendo Switch Sports】 You dare challenge me?
Ceres Fauna Ch. hololive-EN Beginner 3y ago
Become a Certified Penetration Tester with HackTheBox CPTS!
Cybersecurity
Become a Certified Penetration Tester with HackTheBox CPTS!
John Hammond Beginner 3y ago
【NEW OUTFIT REVEAL】 Casual Fauna is here!! Come see my new clothes!
Cybersecurity
【NEW OUTFIT REVEAL】 Casual Fauna is here!! Come see my new clothes!
Ceres Fauna Ch. hololive-EN Beginner 3y ago
Python Brute Force Password hacking (Kali Linux SSH)
Cybersecurity
Python Brute Force Password hacking (Kali Linux SSH)
David Bombal Beginner 3y ago
Setup EXTREME VULNERABLE Kernel Driver (HEVD)
Cybersecurity
Setup EXTREME VULNERABLE Kernel Driver (HEVD)
John Hammond Beginner 3y ago
Who Stole the NSA's Top Secret Hacking Tools?🎙Darknet Diaries Ep. 53: Shadow Brokers
Cybersecurity
Who Stole the NSA's Top Secret Hacking Tools?🎙Darknet Diaries Ep. 53: Shadow Brokers
Jack Rhysider Beginner 3y ago
【Slice & Dice】 Dice Rolling, Dungeon Crawling Indie Roguelite!
Cybersecurity
【Slice & Dice】 Dice Rolling, Dungeon Crawling Indie Roguelite!
Ceres Fauna Ch. hololive-EN Beginner 3y ago
Linux Portbending Explained
Cybersecurity
Linux Portbending Explained
John Hammond Beginner 3y ago
run SHELLCODE within BASH!?!
Cybersecurity
run SHELLCODE within BASH!?!
John Hammond Beginner 3y ago
【Pokémon Violet】 I'd like my bread dog with extra cinnamon please | #4
Cybersecurity
【Pokémon Violet】 I'd like my bread dog with extra cinnamon please | #4
Ceres Fauna Ch. hololive-EN Beginner 3y ago
Start KERNEL HACKING with VirtualKD!
Cybersecurity
Start KERNEL HACKING with VirtualKD!
John Hammond Beginner 3y ago
【BIOSHOCK】 Kirin beats BioShock!! | FINALE
Cybersecurity
【BIOSHOCK】 Kirin beats BioShock!! | FINALE
Ceres Fauna Ch. hololive-EN Beginner 3y ago
Top Cybersecurity job interview tips (2023 edition)
Cybersecurity
Top Cybersecurity job interview tips (2023 edition)
David Bombal Beginner 3y ago
HackTheBox - Carpediem
Cybersecurity
HackTheBox - Carpediem
IppSec Beginner 3y ago
【PHASMOPHOBIA】 Fearless & Fearful vs Ghosts
Cybersecurity
【PHASMOPHOBIA】 Fearless & Fearful vs Ghosts
Ceres Fauna Ch. hololive-EN Beginner 3y ago
explore a Wordpress PHP BACKDOOR webshell
Cybersecurity
explore a Wordpress PHP BACKDOOR webshell
John Hammond Beginner 3y ago
Being Caught Was Only The Beginning🎙Darknet Diaries Ep. 129: Gollumfun (Part 2)
Cybersecurity
Being Caught Was Only The Beginning🎙Darknet Diaries Ep. 129: Gollumfun (Part 2)
Jack Rhysider Intermediate 3y ago
📚 Coursera Courses Opens on Coursera · Free to audit
1 / 3 View all →
Web Hacker's Toolbox - Tools Used by Successful Hackers
📚 Coursera Course ↗
Self-paced
Web Hacker's Toolbox - Tools Used by Successful Hackers
Opens on Coursera ↗
Strategic Cyber Effects Management
📚 Coursera Course ↗
Self-paced
Strategic Cyber Effects Management
Opens on Coursera ↗
Penetration Testing, Threat Hunting, and Cryptography
📚 Coursera Course ↗
Self-paced
Penetration Testing, Threat Hunting, and Cryptography
Opens on Coursera ↗
Hacking COVID-19 — Course 1: Identifying a Deadly Pathogen
📚 Coursera Course ↗
Self-paced
Hacking COVID-19 — Course 1: Identifying a Deadly Pathogen
Opens on Coursera ↗
Security Services in AWS
📚 Coursera Course ↗
Self-paced
Security Services in AWS
Opens on Coursera ↗
Network Security, Troubleshooting, & Certification Prep
📚 Coursera Course ↗
Self-paced
Network Security, Troubleshooting, & Certification Prep
Opens on Coursera ↗