Tech Skills

Cybersecurity

Ethical hacking, penetration testing, network security, CTFs and defensive security

6405
lessons
Skills in this topic
View full skill map →
Security Basics
beginner
Fix OWASP top 10 vulnerabilities
AI Security
intermediate
Identify and patch prompt injection vulnerabilities
Network Security
intermediate
Configure a firewall with proper inbound/outbound rules
Ethical Hacking & Pen Testing
intermediate
Conduct a full pen test with Kali Linux
Cloud Security
intermediate
Implement IAM least-privilege policies on AWS/GCP
Incident Response
intermediate
Build an incident response playbook
Security Compliance
intermediate
Map controls for SOC 2 Type II compliance
Defensive AI
advanced
Build an AI-powered log anomaly detector
"Prevention First": An Approach to Cybersecurity w/ Minerva Labs!
Cybersecurity
"Prevention First": An Approach to Cybersecurity w/ Minerva Labs!
John Hammond Beginner 4y ago
who? fauna
Cybersecurity
who? fauna
Ceres Fauna Ch. hololive-EN Beginner 4y ago
Windows Privilege Escalation - Startup Apps
Cybersecurity
Windows Privilege Escalation - Startup Apps
HackerSploit Beginner 4y ago
WHO????
Cybersecurity
WHO????
Ceres Fauna Ch. hololive-EN Beginner 4y ago
why David Bombal became a hacker
Cybersecurity
why David Bombal became a hacker
NetworkChuck (2) Beginner 4y ago
Introducing PurplePanda: AUTOMATED Privilege Escalation IN THE CLOUD
Cybersecurity
Introducing PurplePanda: AUTOMATED Privilege Escalation IN THE CLOUD
John Hammond Beginner 4y ago
How to Connect Facebook Ads to HubSpot
Cybersecurity
How to Connect Facebook Ads to HubSpot
Paid Media Pros Beginner 4y ago
WiFi WPA/WPA2 vs hashcat and hcxdumptool
Cybersecurity
WiFi WPA/WPA2 vs hashcat and hcxdumptool
David Bombal Beginner 4y ago
Linux Defense Evasion - Apache2 Rootkit
Cybersecurity
Linux Defense Evasion - Apache2 Rootkit
HackerSploit Intermediate 4y ago
Strong Tools for the Effective Treatment of Endometriosis-related Pain with Nora Giese, MSc
Cybersecurity
Strong Tools for the Effective Treatment of Endometriosis-related Pain with Nora Giese, MSc
TCM Academy Intermediate 4y ago
Visions, Priorities and Strategy - Oh My!
Cybersecurity
Visions, Priorities and Strategy - Oh My!
SANS Institute Beginner 4y ago
Facebook Marketing Course - HubSpot Academy
Cybersecurity
Facebook Marketing Course - HubSpot Academy
HubSpot Marketing Beginner 4y ago
i HACKED my wife’s web browser (it’s SCARY easy!!)
Cybersecurity
i HACKED my wife’s web browser (it’s SCARY easy!!)
NetworkChuck Beginner 4y ago
HackTheBox - EarlyAccess
Cybersecurity
HackTheBox - EarlyAccess
IppSec Beginner 4y ago
Hack WiFi with a Raspberry Pi and Kali Linux
Cybersecurity
Hack WiFi with a Raspberry Pi and Kali Linux
David Bombal Beginner 4y ago
This lets you create complex applications on the web👩‍💻 #technology #programming #webdev #software
Cybersecurity
This lets you create complex applications on the web👩‍💻 #technology #programming #webdev #software
Coding with Lewis Intermediate 4y ago
What happens if you hack 4.5 billion BTC? // The Code Report
Cybersecurity
What happens if you hack 4.5 billion BTC? // The Code Report
Fireship Intermediate 4y ago
Top Cybersecurity Risks 2022
Cybersecurity
Top Cybersecurity Risks 2022
SANS Institute Beginner 4y ago
My Sleep Hacking Routine + Evening Habits
Cybersecurity
My Sleep Hacking Routine + Evening Habits
Matt Diggity Beginner 4y ago
noobs Q&A with NetworkChuck and Cameron
Cybersecurity
noobs Q&A with NetworkChuck and Cameron
NetworkChuck (2) Beginner 4y ago
How to Be an Ethical Hacker in 2022
Cybersecurity
How to Be an Ethical Hacker in 2022
The Cyber Mentor Beginner 4y ago
UHC - Pressed
Cybersecurity
UHC - Pressed
IppSec Beginner 4y ago
how to NOT be a hacking noob in 2022 // ft. John Hammond
Cybersecurity
how to NOT be a hacking noob in 2022 // ft. John Hammond
NetworkChuck Intermediate 4y ago
Hacking ELECTRON: JavaScript Desktop Applications w/ 7aSecurity
Cybersecurity
Hacking ELECTRON: JavaScript Desktop Applications w/ 7aSecurity
John Hammond Beginner 4y ago
Uncovering NETWIRE Malware - Discovery & Deobfuscation
Cybersecurity
Uncovering NETWIRE Malware - Discovery & Deobfuscation
John Hammond Beginner 4y ago
【SKYRIM】 so you're finally awake...
Cybersecurity
【SKYRIM】 so you're finally awake...
Ceres Fauna Ch. hololive-EN Beginner 4y ago
【Pokémon Legends: Arceus】 hand over your (poke)mons ✧ #3 (and getting over it haha)
Cybersecurity
【Pokémon Legends: Arceus】 hand over your (poke)mons ✧ #3 (and getting over it haha)
Ceres Fauna Ch. hololive-EN Beginner 4y ago
【Superchat Reading】 non-plant reads superchats! #holoCouncil
Cybersecurity
【Superchat Reading】 non-plant reads superchats! #holoCouncil
Ceres Fauna Ch. hololive-EN Beginner 4y ago
hanging out! #holoCouncil
Cybersecurity
hanging out! #holoCouncil
Ceres Fauna Ch. hololive-EN Beginner 4y ago
【ASMR】 KU100 ♡ onomatopoeia ✧ ear cleaning ✧ whispers ♡ For sleep and relaxation 🌿 #holoCouncil
Cybersecurity
【ASMR】 KU100 ♡ onomatopoeia ✧ ear cleaning ✧ whispers ♡ For sleep and relaxation 🌿 #holoCouncil
Ceres Fauna Ch. hololive-EN Beginner 4y ago
HackTheBox - Horizontall
Cybersecurity
HackTheBox - Horizontall
IppSec Beginner 4y ago
【Pokémon Legends: Arceus】 comfy late night pokemons #holoCouncil
Cybersecurity
【Pokémon Legends: Arceus】 comfy late night pokemons #holoCouncil
Ceres Fauna Ch. hololive-EN Beginner 4y ago
how to NOT be a hacking noob in 2022 // ft. John Hammond
Cybersecurity
how to NOT be a hacking noob in 2022 // ft. John Hammond
NetworkChuck (2) Intermediate 4y ago
SQLi, SSTI & Docker Escapes / Mounted Folders - HackTheBox University CTF "GoodGame"
Cybersecurity
SQLi, SSTI & Docker Escapes / Mounted Folders - HackTheBox University CTF "GoodGame"
John Hammond Beginner 4y ago
It’s All About the Data
Cybersecurity
It’s All About the Data
SANS Institute Beginner 4y ago
How To Crack ZIP & RAR Files With Hashcat
Cybersecurity
How To Crack ZIP & RAR Files With Hashcat
HackerSploit Intermediate 4y ago
noobs // a NetworkChuck Podcast Live Stream
Cybersecurity
noobs // a NetworkChuck Podcast Live Stream
NetworkChuck (2) Intermediate 4y ago
Web App Pentesting - Setting Up OWASP bWAPP With Docker
Cybersecurity
Web App Pentesting - Setting Up OWASP bWAPP With Docker
HackerSploit Intermediate 4y ago
Windows Privilege Escalation - Exploiting Insecure GUI Apps
Cybersecurity
Windows Privilege Escalation - Exploiting Insecure GUI Apps
HackerSploit Intermediate 4y ago
Master the fundamentals with SEC301 Introduction to Cyber Security
Cybersecurity
Master the fundamentals with SEC301 Introduction to Cyber Security
SANS Institute Beginner 4y ago
Windows Privilege Escalation - Exploiting Scheduled Tasks
Cybersecurity
Windows Privilege Escalation - Exploiting Scheduled Tasks
HackerSploit Intermediate 4y ago
Hacker Simulator Walkthrough - Episode 5 - Almost Getting Jailed
Cybersecurity
Hacker Simulator Walkthrough - Episode 5 - Almost Getting Jailed
HackerSploit Intermediate 4y ago
【ASMR】 KU100 is here! Be my test subject~ #holoCouncil
Cybersecurity
【ASMR】 KU100 is here! Be my test subject~ #holoCouncil
Ceres Fauna Ch. hololive-EN Beginner 4y ago
【Resident Evil 7 END OF ZOE】 LET'S FINISH THIS (for real this time) #holoCouncil
Cybersecurity
【Resident Evil 7 END OF ZOE】 LET'S FINISH THIS (for real this time) #holoCouncil
Ceres Fauna Ch. hololive-EN Beginner 4y ago
HackTheBox - Anubis
Cybersecurity
HackTheBox - Anubis
IppSec Beginner 4y ago
【Pokémon Legends: Arceus】 Starting our adventure! #holoCouncil
Cybersecurity
【Pokémon Legends: Arceus】 Starting our adventure! #holoCouncil
Ceres Fauna Ch. hololive-EN Beginner 4y ago
How TCP really works // Three-way handshake // TCP/IP Deep Dive
Cybersecurity
How TCP really works // Three-way handshake // TCP/IP Deep Dive
David Bombal Beginner 4y ago
2021 SANS+HBCU Year in Review
Cybersecurity
2021 SANS+HBCU Year in Review
SANS Institute Beginner 4y ago
📚 Coursera Courses Opens on Coursera · Free to audit
1 / 3 View all →
Cryptography
📚 Coursera Course ↗
Self-paced
Cryptography
Opens on Coursera ↗
Bitcoin Transaction & Network Security
📚 Coursera Course ↗
Self-paced
Bitcoin Transaction & Network Security
Opens on Coursera ↗
Implementing a Risk Management Framework
📚 Coursera Course ↗
Self-paced
Implementing a Risk Management Framework
Opens on Coursera ↗
Seguridad informática: defensa contra las artes oscuras digitales
📚 Coursera Course ↗
Self-paced
Seguridad informática: defensa contra las artes oscuras digitales
Opens on Coursera ↗
Linux Fundamentals: Configure, Secure & Manage
📚 Coursera Course ↗
Self-paced
Linux Fundamentals: Configure, Secure & Manage
Opens on Coursera ↗
Advanced Networking, Security, and IT Operations
📚 Coursera Course ↗
Self-paced
Advanced Networking, Security, and IT Operations
Opens on Coursera ↗