Tech Skills

Cybersecurity

Ethical hacking, penetration testing, network security, CTFs and defensive security

6405
lessons
Skills in this topic
View full skill map →
Security Basics
beginner
Fix OWASP top 10 vulnerabilities
AI Security
intermediate
Identify and patch prompt injection vulnerabilities
Network Security
intermediate
Configure a firewall with proper inbound/outbound rules
Ethical Hacking & Pen Testing
intermediate
Conduct a full pen test with Kali Linux
Cloud Security
intermediate
Implement IAM least-privilege policies on AWS/GCP
Incident Response
intermediate
Build an incident response playbook
Security Compliance
intermediate
Map controls for SOC 2 Type II compliance
Defensive AI
advanced
Build an AI-powered log anomaly detector
【HoloEN】 HAPPY HOLOWEEN #holoCouncil
Cybersecurity
【HoloEN】 HAPPY HOLOWEEN #holoCouncil
Ceres Fauna Ch. hololive-EN Beginner 4y ago
Windows Red Team Exploitation Techniques | Luckystrike & PowerShell Empire
Cybersecurity
Windows Red Team Exploitation Techniques | Luckystrike & PowerShell Empire
HackerSploit Intermediate 4y ago
Red Team Reconnaissance Techniques
Cybersecurity
Red Team Reconnaissance Techniques
HackerSploit Intermediate 4y ago
【Fauna's ASMR】 Relax with Ear Cleaning & Oil Massage 🌿 #holoCouncil
Cybersecurity
【Fauna's ASMR】 Relax with Ear Cleaning & Oil Massage 🌿 #holoCouncil
Ceres Fauna Ch. hololive-EN Beginner 4y ago
He won $21,000 in a Live Hacking Event | Bug Bounty
Cybersecurity
He won $21,000 in a Live Hacking Event | Bug Bounty
codebasics Beginner 4y ago
Implementing Security Best Practices for Amazon WorkSpaces and Amazon AppStream 2.0
Cybersecurity
Implementing Security Best Practices for Amazon WorkSpaces and Amazon AppStream 2.0
AWS Developers Intermediate 4y ago
UHC - Spooktrol
Cybersecurity
UHC - Spooktrol
IppSec Intermediate 4y ago
Design Flaw in Security Product - ALLES! CTF 2021
Cybersecurity
Design Flaw in Security Product - ALLES! CTF 2021
LiveOverflow Beginner 4y ago
The Treatment of Diarrhea in Cancer Patients & the General Public
Cybersecurity
The Treatment of Diarrhea in Cancer Patients & the General Public
TCM Academy Intermediate 4y ago
Cōng Bái, An excerpt from Heavenly Moxibustion: Ancient Knowledge in Modern Practice by Shay Sharabi
Cybersecurity
Cōng Bái, An excerpt from Heavenly Moxibustion: Ancient Knowledge in Modern Practice by Shay Sharabi
TCM Academy Beginner 4y ago
Intel AI Global Impact Festival
Cybersecurity
Intel AI Global Impact Festival
Krish Naik Beginner 4y ago
HackTheBox - Spider
Cybersecurity
HackTheBox - Spider
IppSec Beginner 4y ago
Ex-NSA hacker tools for real world pentesting
Cybersecurity
Ex-NSA hacker tools for real world pentesting
David Bombal Beginner 4y ago
The New ICS418: Training OT Security Managers | REBROADCAST
Cybersecurity
The New ICS418: Training OT Security Managers | REBROADCAST
SANS Institute Advanced 4y ago
Running Applications Across Elastic Beanstalk and AWS App Runner - AWS Online Tech Talk
Cybersecurity
Running Applications Across Elastic Beanstalk and AWS App Runner - AWS Online Tech Talk
AWS Developers Intermediate 4y ago
Security in Software Development Process / PART 2: Hints for developers
Cybersecurity
Security in Software Development Process / PART 2: Hints for developers
Stepwise Intermediate 4y ago
#ShareTheMicInCyber and SANS:  From Speaking Opportunities to Faculty Positions
Cybersecurity
#ShareTheMicInCyber and SANS: From Speaking Opportunities to Faculty Positions
SANS Institute Beginner 4y ago
The real DARK WEB 😱 // How you can get easy access // Ransomware awareness
Cybersecurity
The real DARK WEB 😱 // How you can get easy access // Ransomware awareness
David Bombal Beginner 4y ago
SnykCon CTF - Sauerkraut - Python Pickle Vulnerabilities
Cybersecurity
SnykCon CTF - Sauerkraut - Python Pickle Vulnerabilities
John Hammond Beginner 4y ago
SnykCon CTF - "Random Flag Generator" Weak PRNG Seed
Cybersecurity
SnykCon CTF - "Random Flag Generator" Weak PRNG Seed
John Hammond Intermediate 4y ago
Red Team Adversary Emulation With Caldera
Cybersecurity
Red Team Adversary Emulation With Caldera
HackerSploit Intermediate 4y ago
【konfauna!】 chatting & catching up on superchats! #holoCouncil
Cybersecurity
【konfauna!】 chatting & catching up on superchats! #holoCouncil
Ceres Fauna Ch. hololive-EN Beginner 4y ago
【Dead by Daylight】 mom says it's my turn to be the killer #holoCouncil
Cybersecurity
【Dead by Daylight】 mom says it's my turn to be the killer #holoCouncil
Ceres Fauna Ch. hololive-EN Beginner 4y ago
【DEVOUR】 mogu mogu #holoCouncil
Cybersecurity
【DEVOUR】 mogu mogu #holoCouncil
Ceres Fauna Ch. hololive-EN Beginner 4y ago
BOOK RELEASE - Privilege Escalation Techniques
Cybersecurity
BOOK RELEASE - Privilege Escalation Techniques
HackerSploit Beginner 4y ago
Alaine Duncan: Discharging Arousal (from Integrating Chinese Medicine with Neurobiology)
Cybersecurity
Alaine Duncan: Discharging Arousal (from Integrating Chinese Medicine with Neurobiology)
TCM Academy Intermediate 4y ago
Windows Post Exploitation - Dumping Hashes With Mimikatz
Cybersecurity
Windows Post Exploitation - Dumping Hashes With Mimikatz
HackerSploit Intermediate 4y ago
【PHASMOPHOBIA】 Life, death, rebirth, and chaos walk into a haunted house #holoCouncil
Cybersecurity
【PHASMOPHOBIA】 Life, death, rebirth, and chaos walk into a haunted house #holoCouncil
Ceres Fauna Ch. hololive-EN Beginner 4y ago
【HoloEN Among Us】 It wasn't me (◕‿◕) #HoloENAmongUs #holoCouncil
Cybersecurity
【HoloEN Among Us】 It wasn't me (◕‿◕) #HoloENAmongUs #holoCouncil
Ceres Fauna Ch. hololive-EN Beginner 4y ago
【Fauna's ASMR】 Washing Your Hair ✿ Fauna's Hair Salon #holoCouncil
Cybersecurity
【Fauna's ASMR】 Washing Your Hair ✿ Fauna's Hair Salon #holoCouncil
Ceres Fauna Ch. hololive-EN Beginner 4y ago
Active Directory Enumeration With BloodHound
Cybersecurity
Active Directory Enumeration With BloodHound
HackerSploit Intermediate 4y ago
【MINECRAFT】 go fast #holoCouncil
Cybersecurity
【MINECRAFT】 go fast #holoCouncil
Ceres Fauna Ch. hololive-EN Beginner 4y ago
Active Directory Enumeration With PowerView
Cybersecurity
Active Directory Enumeration With PowerView
HackerSploit Intermediate 4y ago
Windows Post Exploitation - Local Enumeration
Cybersecurity
Windows Post Exploitation - Local Enumeration
HackerSploit Intermediate 4y ago
【Fall Guys】 Let's fall... together! #holoCouncil
Cybersecurity
【Fall Guys】 Let's fall... together! #holoCouncil
Ceres Fauna Ch. hololive-EN Beginner 4y ago
【Mario Kart 8DX】GOOWA FWANA RACING #holoCouncil
Cybersecurity
【Mario Kart 8DX】GOOWA FWANA RACING #holoCouncil
Ceres Fauna Ch. hololive-EN Beginner 4y ago
SANS Training: What's In It For You
Cybersecurity
SANS Training: What's In It For You
SANS Institute Beginner 4y ago
【Halloween Drawing】 Which Fauna? Witch Fauna! #holoCouncil
Cybersecurity
【Halloween Drawing】 Which Fauna? Witch Fauna! #holoCouncil
Ceres Fauna Ch. hololive-EN Beginner 4y ago
【Resident Evil 7】 I am very bad at horror games #holoCouncil
Cybersecurity
【Resident Evil 7】 I am very bad at horror games #holoCouncil
Ceres Fauna Ch. hololive-EN Beginner 4y ago
TryHackMe - Steel Mountain Walkthrough - Manual Windows Exploitation
Cybersecurity
TryHackMe - Steel Mountain Walkthrough - Manual Windows Exploitation
HackerSploit Intermediate 4y ago
【hello】 chatting & reading supas & showing you my minecraft house #holoCouncil
Cybersecurity
【hello】 chatting & reading supas & showing you my minecraft house #holoCouncil
Ceres Fauna Ch. hololive-EN Beginner 4y ago
【MINECRAFT】 Fauna is SPEED #holoCouncil
Cybersecurity
【MINECRAFT】 Fauna is SPEED #holoCouncil
Ceres Fauna Ch. hololive-EN Beginner 4y ago
Host Discovery & Vulnerability Scanning With Nessus
Cybersecurity
Host Discovery & Vulnerability Scanning With Nessus
HackerSploit Intermediate 4y ago
Getting Started: Your First Two Years in Your Cybersecurity Career
Cybersecurity
Getting Started: Your First Two Years in Your Cybersecurity Career
SANS Institute Beginner 4y ago
SnykCon CTF - "Invisible Ink" Prototype Pollution
Cybersecurity
SnykCon CTF - "Invisible Ink" Prototype Pollution
John Hammond Intermediate 4y ago
What Keeps You Up At Night? with James Beeson
Cybersecurity
What Keeps You Up At Night? with James Beeson
SANS Institute Intermediate 4y ago
How To Install & Configure Nessus
Cybersecurity
How To Install & Configure Nessus
HackerSploit Intermediate 4y ago
Introduction To Vulnerability Scanning
Cybersecurity
Introduction To Vulnerability Scanning
HackerSploit Beginner 4y ago
📚 Coursera Courses Opens on Coursera · Free to audit
1 / 3 View all →
Data Visualization & Advanced App Logic
📚 Coursera Course ↗
Self-paced
Data Visualization & Advanced App Logic
Opens on Coursera ↗
Threat Hunting Techniques
📚 Coursera Course ↗
Self-paced
Threat Hunting Techniques
Opens on Coursera ↗
Enterprise Firewall Administrator
📚 Coursera Course ↗
Self-paced
Enterprise Firewall Administrator
Opens on Coursera ↗
Red Hat Certified Engineer (RHCE) EX294: Unit 1
📚 Coursera Course ↗
Self-paced
Red Hat Certified Engineer (RHCE) EX294: Unit 1
Opens on Coursera ↗
Security & Ethical Hacking: Attacking the Network
📚 Coursera Course ↗
Self-paced
Security & Ethical Hacking: Attacking the Network
Opens on Coursera ↗
Mastering Endpoint Security & Threat Defense
📚 Coursera Course ↗
Self-paced
Mastering Endpoint Security & Threat Defense
Opens on Coursera ↗