Tech Skills

Cybersecurity

Ethical hacking, penetration testing, network security, CTFs and defensive security

6405
lessons
Skills in this topic
View full skill map →
Security Basics
beginner
Fix OWASP top 10 vulnerabilities
AI Security
intermediate
Identify and patch prompt injection vulnerabilities
Network Security
intermediate
Configure a firewall with proper inbound/outbound rules
Ethical Hacking & Pen Testing
intermediate
Conduct a full pen test with Kali Linux
Cloud Security
intermediate
Implement IAM least-privilege policies on AWS/GCP
Incident Response
intermediate
Build an incident response playbook
Security Compliance
intermediate
Map controls for SOC 2 Type II compliance
Defensive AI
advanced
Build an AI-powered log anomaly detector
Revisiting Parrot OS
Cybersecurity
Revisiting Parrot OS
HackerSploit Intermediate 4y ago
Professional Data Encryption in Python
Cybersecurity
Professional Data Encryption in Python
NeuralNine Beginner 4y ago
Ethical Hacking in 12 Hours - Full Course - Learn to Hack!
Cybersecurity
Ethical Hacking in 12 Hours - Full Course - Learn to Hack!
The Cyber Mentor Beginner 4y ago
UHC - NodeBlog
Cybersecurity
UHC - NodeBlog
IppSec Beginner 4y ago
2022 Cybersecurity roadmap: How to get started?
Cybersecurity
2022 Cybersecurity roadmap: How to get started?
David Bombal Beginner 4y ago
CS50 2021 in HDR - Cybersecurity
Cybersecurity
CS50 2021 in HDR - Cybersecurity
CS50 Beginner 4y ago
CS50 2021 in HDR - Lecture 1 - C
Cybersecurity
CS50 2021 in HDR - Lecture 1 - C
CS50 Beginner 4y ago
Using OSINT to Find Location
Cybersecurity
Using OSINT to Find Location
The Cyber Mentor Beginner 4y ago
Hacker Simulator Walkthrough - Episode 3 - Phi$hing Frenzy!
Cybersecurity
Hacker Simulator Walkthrough - Episode 3 - Phi$hing Frenzy!
HackerSploit Intermediate 4y ago
What It Means to Lead: Key Skill for Creating Thriving Teams - Cybersecurity Leadership Summit 2021
Cybersecurity
What It Means to Lead: Key Skill for Creating Thriving Teams - Cybersecurity Leadership Summit 2021
SANS Institute Advanced 4y ago
【Merry Christmas!】 Making Presents for Saplings 🎁 #holoCouncil
Cybersecurity
【Merry Christmas!】 Making Presents for Saplings 🎁 #holoCouncil
Ceres Fauna Ch. hololive-EN Beginner 4y ago
fauna online
Cybersecurity
fauna online
Ceres Fauna Ch. hololive-EN Beginner 4y ago
UHC - LogForge
Cybersecurity
UHC - LogForge
IppSec Beginner 4y ago
Is this an attack? Wireshark Packet analysis // SYN Attack
Cybersecurity
Is this an attack? Wireshark Packet analysis // SYN Attack
David Bombal Beginner 4y ago
How to get a Million YouTube Subscribers in 100 Seconds
Cybersecurity
How to get a Million YouTube Subscribers in 100 Seconds
Fireship Intermediate 4y ago
NetWars Tournament of Champions Live Stream | December 16th 6pm ET
Cybersecurity
NetWars Tournament of Champions Live Stream | December 16th 6pm ET
SANS Institute Beginner 4y ago
Don't Use innerHTML Unless You Want To Be Hacked
Cybersecurity
Don't Use innerHTML Unless You Want To Be Hacked
Web Dev Simplified Intermediate 4y ago
Don't Be Afraid to Treat Oncology with Acupuncture, with Dr Yair Maimon PhD
Cybersecurity
Don't Be Afraid to Treat Oncology with Acupuncture, with Dr Yair Maimon PhD
TCM Academy Beginner 4y ago
Zangfu from the Ground Up: Liver, with Deborah Woolf, LicAc, MBAcC, MA
Cybersecurity
Zangfu from the Ground Up: Liver, with Deborah Woolf, LicAc, MBAcC, MA
TCM Academy Beginner 4y ago
ZipSlip w/ TAR & Server-Side Template Injection - HackTheBox University CTF - "Slippy"
Cybersecurity
ZipSlip w/ TAR & Server-Side Template Injection - HackTheBox University CTF - "Slippy"
John Hammond Beginner 4y ago
Windows Privilege Escalation - Insecure Service Executables
Cybersecurity
Windows Privilege Escalation - Insecure Service Executables
HackerSploit Intermediate 4y ago
Physical Pentesting Tools 2021
Cybersecurity
Physical Pentesting Tools 2021
The Cyber Mentor Beginner 4y ago
What to Look for in Cybersecurity Content Creators
Cybersecurity
What to Look for in Cybersecurity Content Creators
The Cyber Mentor Beginner 4y ago
Hacker Simulator Walkthrough - Episode 2 - Leveling Up
Cybersecurity
Hacker Simulator Walkthrough - Episode 2 - Leveling Up
HackerSploit Intermediate 4y ago
Hacker Simulator Walkthrough - Episode 1 - The Journey Begins
Cybersecurity
Hacker Simulator Walkthrough - Episode 1 - The Journey Begins
HackerSploit Intermediate 4y ago
Windows Privilege Escalation - Weak Registry Permissions
Cybersecurity
Windows Privilege Escalation - Weak Registry Permissions
HackerSploit Intermediate 4y ago
Windows Privilege Escalation - Unquoted Service Paths
Cybersecurity
Windows Privilege Escalation - Unquoted Service Paths
HackerSploit Intermediate 4y ago
Log4J - CVE 2021-44228 (Log4Shell) - Exploitation & Mitigation
Cybersecurity
Log4J - CVE 2021-44228 (Log4Shell) - Exploitation & Mitigation
HackerSploit Beginner 4y ago
HackTheBox - Static
Cybersecurity
HackTheBox - Static
IppSec Beginner 4y ago
【Getting Over It】 STREAM DOESN'T END UNTIL I WIN #holoCouncil
Cybersecurity
【Getting Over It】 STREAM DOESN'T END UNTIL I WIN #holoCouncil
Ceres Fauna Ch. hololive-EN Beginner 4y ago
Windows Privilege Escalation - Exploiting Insecure Service Permissions
Cybersecurity
Windows Privilege Escalation - Exploiting Insecure Service Permissions
HackerSploit Intermediate 4y ago
Windows Enumeration With winPEAS
Cybersecurity
Windows Enumeration With winPEAS
HackerSploit Intermediate 4y ago
【Mother Simulator】 This should be easy, right? #holoCouncil
Cybersecurity
【Mother Simulator】 This should be easy, right? #holoCouncil
Ceres Fauna Ch. hololive-EN Beginner 4y ago
What do you need to know about the log4j (Log4Shell) vulnerability?
Cybersecurity
What do you need to know about the log4j (Log4Shell) vulnerability?
SANS Institute Intermediate 4y ago
【SKYRIM】 skyrim brain #holoCouncil
Cybersecurity
【SKYRIM】 skyrim brain #holoCouncil
Ceres Fauna Ch. hololive-EN Beginner 4y ago
HackTheBox - Writer
Cybersecurity
HackTheBox - Writer
IppSec Beginner 4y ago
Python keylogger bypasses Windows 11 Defender // Convert WIFI py to EXE
Cybersecurity
Python keylogger bypasses Windows 11 Defender // Convert WIFI py to EXE
David Bombal Beginner 4y ago
SANS Institute Business Case: Softbank
Cybersecurity
SANS Institute Business Case: Softbank
SANS Institute Beginner 4y ago
【MINECRAFT】 kirin go fast #holoCouncil
Cybersecurity
【MINECRAFT】 kirin go fast #holoCouncil
Ceres Fauna Ch. hololive-EN Beginner 4y ago
What Keeps You Up At Night?
Cybersecurity
What Keeps You Up At Night?
SANS Institute Intermediate 4y ago
【Getting Over It】 I'm over it alright (+ reading superchats after!) #holoCouncil
Cybersecurity
【Getting Over It】 I'm over it alright (+ reading superchats after!) #holoCouncil
Ceres Fauna Ch. hololive-EN Beginner 4y ago
Windows Post Exploitation - Persistence With Metasploit
Cybersecurity
Windows Post Exploitation - Persistence With Metasploit
HackerSploit Intermediate 4y ago
【ASMR】 Warm & Cozy Ear Cleaning & Oil Massage 💗 #holoCouncil
Cybersecurity
【ASMR】 Warm & Cozy Ear Cleaning & Oil Massage 💗 #holoCouncil
Ceres Fauna Ch. hololive-EN Beginner 4y ago
Active Directory Enumeration With Server Manager
Cybersecurity
Active Directory Enumeration With Server Manager
HackerSploit Intermediate 4y ago
Extract iPhone and Android EXIF metadata from online photos using PYTHON // OSINT with Kali Linux
Cybersecurity
Extract iPhone and Android EXIF metadata from online photos using PYTHON // OSINT with Kali Linux
David Bombal Beginner 4y ago
【SKYRIM】 You can't stop the Dovah-Kiirin #holoCouncil
Cybersecurity
【SKYRIM】 You can't stop the Dovah-Kiirin #holoCouncil
Ceres Fauna Ch. hololive-EN Beginner 4y ago
【PHASMOPHOBIA】 Hunt ghosts or hunted by ghosts? #holoCouncil
Cybersecurity
【PHASMOPHOBIA】 Hunt ghosts or hunted by ghosts? #holoCouncil
Ceres Fauna Ch. hololive-EN Beginner 4y ago
【HITMAN 2】 slap to kill #holoCouncil
Cybersecurity
【HITMAN 2】 slap to kill #holoCouncil
Ceres Fauna Ch. hololive-EN Beginner 4y ago
📚 Coursera Courses Opens on Coursera · Free to audit
1 / 3 View all →
Web Application Security Crash Training
📚 Coursera Course ↗
Self-paced
Web Application Security Crash Training
Opens on Coursera ↗
Incident Response, BC, and DR Concepts
📚 Coursera Course ↗
Self-paced
Incident Response, BC, and DR Concepts
Opens on Coursera ↗
Security Operations
📚 Coursera Course ↗
Self-paced
Security Operations
Opens on Coursera ↗
Memory, Encryption, and Protecting Data in iOS
📚 Coursera Course ↗
Self-paced
Memory, Encryption, and Protecting Data in iOS
Opens on Coursera ↗
Advanced Network Analysis and Incident Response
📚 Coursera Course ↗
Self-paced
Advanced Network Analysis and Incident Response
Opens on Coursera ↗
Evaluate Your Cloud Next Generation Firewall Needs
📚 Coursera Course ↗
Self-paced
Evaluate Your Cloud Next Generation Firewall Needs
Opens on Coursera ↗