Tech Skills

Cybersecurity

Ethical hacking, penetration testing, network security, CTFs and defensive security

7,092
lessons
Skills in this topic
View full skill map โ†’
Security Basics
beginner
Fix OWASP top 10 vulnerabilities
AI Security
intermediate
Identify and patch prompt injection vulnerabilities
Network Security
intermediate
Configure a firewall with proper inbound/outbound rules
Ethical Hacking & Pen Testing
intermediate
Conduct a full pen test with Kali Linux
Cloud Security
intermediate
Implement IAM least-privilege policies on AWS/GCP
Incident Response
intermediate
Build an incident response playbook
Security Compliance
intermediate
Map controls for SOC 2 Type II compliance
Defensive AI
advanced
Build an AI-powered log anomaly detector
BAD RANSOMWARE - HackTheBox Business CTF
Cybersecurity โšก AI Lesson
BAD RANSOMWARE - HackTheBox Business CTF
John Hammond Intermediate 4y ago
Hacking Spanning Tree with Python, Scapy and Kali Linux  (Ep 2)  // STP Root Bridge attack! ๐Ÿ˜€
Cybersecurity
Hacking Spanning Tree with Python, Scapy and Kali Linux (Ep 2) // STP Root Bridge attack! ๐Ÿ˜€
David Bombal Beginner 4y ago
HackTheBox - TheNotebook
Cybersecurity
HackTheBox - TheNotebook
IppSec Beginner 4y ago
Reverse Engineering Loops - "Syncopation" HackTheBox Business CTF
Cybersecurity
Reverse Engineering Loops - "Syncopation" HackTheBox Business CTF
John Hammond Intermediate 4y ago
Cybertalk - EP10 - Interview With GhostSec
Cybersecurity โšก AI Lesson
Cybertalk - EP10 - Interview With GhostSec
HackerSploit Intermediate 4y ago
The Creepiest OSINT Tool to Date
Cybersecurity โšก AI Lesson
The Creepiest OSINT Tool to Date
The Cyber Mentor Beginner 4y ago
Python Network Hacking with Kali Linux and Scapy = attack one! ๐Ÿ˜€
Cybersecurity
Python Network Hacking with Kali Linux and Scapy = attack one! ๐Ÿ˜€
David Bombal Beginner 4y ago
DEF CON DC9111 - Docker For Pentesting & Bug Bounty Hunting
Cybersecurity โšก AI Lesson
DEF CON DC9111 - Docker For Pentesting & Bug Bounty Hunting
HackerSploit Intermediate 4y ago
Stealing Hashes with SeriousSam (CVE-2021โ€“36934)
Cybersecurity โšก AI Lesson
Stealing Hashes with SeriousSam (CVE-2021โ€“36934)
The Cyber Mentor Beginner 4y ago
Why Being a Destructive Architect is the Way Forward for Black in Tech
Cybersecurity โšก AI Lesson
Why Being a Destructive Architect is the Way Forward for Black in Tech
SANS Institute Beginner 4y ago
Reading SECRET U.S. Air Force HACKING Document!!
Cybersecurity โšก AI Lesson
Reading SECRET U.S. Air Force HACKING Document!!
LiveUnderflow Advanced 4y ago
HackTheBox - Breadcrumbs
Cybersecurity โšก AI Lesson
HackTheBox - Breadcrumbs
IppSec Beginner 4y ago
Transition to Cyber Security From a Non-Cyber Role: Creative Ways to Land Your Dream Cyber Role
Cybersecurity โšก AI Lesson
Transition to Cyber Security From a Non-Cyber Role: Creative Ways to Land Your Dream Cyber Role
SANS Institute Advanced 4y ago
Roger Reaves: Smuggling Drugs for Pablo Escobar and the Medellin Cartel | Lex Fridman Podcast #199
Cybersecurity
Roger Reaves: Smuggling Drugs for Pablo Escobar and the Medellin Cartel | Lex Fridman Podcast #199
Lex Fridman Beginner 4y ago
BlockChain,Cloud,Devops,Data Science, Big Data, Cybersecurity- Which Technology To Select?๐Ÿ˜ฐ๐Ÿ˜ฐ๐Ÿ˜ฐ๐Ÿ˜ฐ๐Ÿ˜ฐ
Cybersecurity
BlockChain,Cloud,Devops,Data Science, Big Data, Cybersecurity- Which Technology To Select?๐Ÿ˜ฐ๐Ÿ˜ฐ๐Ÿ˜ฐ๐Ÿ˜ฐ๐Ÿ˜ฐ
Krish Naik Intermediate 4y ago
how to get remote access to your hacking targets // reverse shells with netcat (Windows and Linux!!)
Cybersecurity โšก AI Lesson
how to get remote access to your hacking targets // reverse shells with netcat (Windows and Linux!!)
NetworkChuck Beginner 4y ago
Redis in 100 Seconds
Cybersecurity โšก AI Lesson
Redis in 100 Seconds
Fireship Intermediate 4y ago
CISSP Certification Course โ€“ PASS the Certified Information Security Professional Exam!
Cybersecurity
CISSP Certification Course โ€“ PASS the Certified Information Security Professional Exam!
freeCodeCamp.org Beginner 4y ago
Machine Learning in Cybersecurity // Monika Venฤkauskaitฤ— // MLOps Meetup #70
Cybersecurity
Machine Learning in Cybersecurity // Monika Venฤkauskaitฤ— // MLOps Meetup #70
MLOps.community Beginner 4y ago
Studying Cybersecurity in USA vs. Germany | ReHacked
Cybersecurity
Studying Cybersecurity in USA vs. Germany | ReHacked
LiveUnderflow Intermediate 4y ago
Charles Hoskinson: Cardano | Lex Fridman Podcast #192
Cybersecurity
Charles Hoskinson: Cardano | Lex Fridman Podcast #192
Lex Fridman Beginner 4y ago
Laravel CVE / PHP Deserialization - "Larablog" HTB Business CTF
Cybersecurity
Laravel CVE / PHP Deserialization - "Larablog" HTB Business CTF
John Hammond Intermediate 4y ago
JSON Web Keys (JWK & JWT) - "Emergency" - HackTheBox Business CTF
Cybersecurity
JSON Web Keys (JWK & JWT) - "Emergency" - HackTheBox Business CTF
John Hammond Intermediate 4y ago
GraphQL Introspection - HackTheBox "Business CTF" - NoteQL
Cybersecurity โšก AI Lesson
GraphQL Introspection - HackTheBox "Business CTF" - NoteQL
John Hammond Beginner 4y ago
HackTheBox "Business CTF" - Time - Command Injection
Cybersecurity
HackTheBox "Business CTF" - Time - Command Injection
John Hammond Intermediate 4y ago
HackTheBox "Business CTF" - discordvm - Node.js Sandbox Escape
Cybersecurity โšก AI Lesson
HackTheBox "Business CTF" - discordvm - Node.js Sandbox Escape
John Hammond Intermediate 4y ago
How To Secure & Harden Docker Containers
Cybersecurity โšก AI Lesson
How To Secure & Harden Docker Containers
HackerSploit Beginner 4y ago
Securing The Docker Daemon
Cybersecurity โšก AI Lesson
Securing The Docker Daemon
HackerSploit Intermediate 4y ago
Auditing Docker Security
Cybersecurity โšก AI Lesson
Auditing Docker Security
HackerSploit Beginner 4y ago
Insane $100,000 home lab!
Cybersecurity
Insane $100,000 home lab!
David Bombal Intermediate 4y ago
JScript Deobfuscation - More WSHRAT (Malware Analysis)
Cybersecurity
JScript Deobfuscation - More WSHRAT (Malware Analysis)
John Hammond Intermediate 4y ago
You must fight! Lessons from Kaseya hack
Cybersecurity
You must fight! Lessons from Kaseya hack
David Bombal Beginner 4y ago
HackTheBox - Ophiuchi
Cybersecurity โšก AI Lesson
HackTheBox - Ophiuchi
IppSec Beginner 4y ago
Own a WiFi network with Python! WiFi DoS and ownership attack ๐Ÿ˜€ ๐Ÿ˜‚
Cybersecurity
Own a WiFi network with Python! WiFi DoS and ownership attack ๐Ÿ˜€ ๐Ÿ˜‚
David Bombal Beginner 4y ago
HackTheBox Beep Walkthrough - LFI Exploitation
Cybersecurity โšก AI Lesson
HackTheBox Beep Walkthrough - LFI Exploitation
HackerSploit Intermediate 4y ago
HackTheBox - Spectra
Cybersecurity
HackTheBox - Spectra
IppSec Beginner 4y ago
This is just too fast! 100 GbE // 100 Gigabit Ethernet!
Cybersecurity
This is just too fast! 100 GbE // 100 Gigabit Ethernet!
David Bombal Advanced 4y ago
Dealing with Burnout
Cybersecurity โšก AI Lesson
Dealing with Burnout
The Cyber Mentor Beginner 4y ago
HackTheBox - Tentacle
Cybersecurity
HackTheBox - Tentacle
IppSec Beginner 4y ago
burp suite
Cybersecurity
burp suite
David Bombal Beginner 4y ago
I Want to Work in Cybersecurity...Whatever That Means! - SANS New to Cyber Summit
Cybersecurity โšก AI Lesson
I Want to Work in Cybersecurity...Whatever That Means! - SANS New to Cyber Summit
SANS Institute Advanced 4y ago
Slow the Revolving Door of Talent. Creative Ways to Keep Your Existing Cyber Talent in Your Org
Cybersecurity โšก AI Lesson
Slow the Revolving Door of Talent. Creative Ways to Keep Your Existing Cyber Talent in Your Org
SANS Institute Beginner 4y ago
HackTheBox - Tenet
Cybersecurity โšก AI Lesson
HackTheBox - Tenet
IppSec Beginner 4y ago
Information Stealer - Malware Analysis (PowerShell to .NET)
Cybersecurity
Information Stealer - Malware Analysis (PowerShell to .NET)
John Hammond Beginner 4y ago
Kali Linux 2021.2 zero to WiFi (Free install)
Cybersecurity
Kali Linux 2021.2 zero to WiFi (Free install)
David Bombal Beginner 4y ago
HackTheBox - ScriptKiddie
Cybersecurity โšก AI Lesson
HackTheBox - ScriptKiddie
IppSec Intermediate 4y ago
AES-CTR Cryptography: Reused Key Weakness - HackTheBox Cyber Apocalypse CTF
Cybersecurity โšก AI Lesson
AES-CTR Cryptography: Reused Key Weakness - HackTheBox Cyber Apocalypse CTF
John Hammond Beginner 4y ago
Ransomware - Do You Pay It Or Not? - Experts debate the costs ethics around paying ransomware - SANS
Cybersecurity โšก AI Lesson
Ransomware - Do You Pay It Or Not? - Experts debate the costs ethics around paying ransomware - SANS
SANS Institute Beginner 4y ago
๐Ÿ“š Coursera Courses Opens on Coursera ยท Free to audit
1 / 3 View all โ†’
Routing, Network Devices, and Security
๐Ÿ“š Coursera Course โ†—
Self-paced
Routing, Network Devices, and Security
Opens on Coursera โ†—
Ethical Hacking Fundamentals
๐Ÿ“š Coursera Course โ†—
Self-paced
Ethical Hacking Fundamentals
Opens on Coursera โ†—
Network Traffic Analysis for Incident Response
๐Ÿ“š Coursera Course โ†—
Self-paced
Network Traffic Analysis for Incident Response
Opens on Coursera โ†—
App Deployment, Security & Infrastructure Automation
๐Ÿ“š Coursera Course โ†—
Self-paced
App Deployment, Security & Infrastructure Automation
Opens on Coursera โ†—
Security and Troubleshooting Essentials
๐Ÿ“š Coursera Course โ†—
Self-paced
Security and Troubleshooting Essentials
Opens on Coursera โ†—
Cyber Security: Data Security and Information Privacy
๐Ÿ“š Coursera Course โ†—
Self-paced
Cyber Security: Data Security and Information Privacy
Opens on Coursera โ†—