Tech Skills

Cybersecurity

Ethical hacking, penetration testing, network security, CTFs and defensive security

6405
lessons
Skills in this topic
View full skill map โ†’
Security Basics
beginner
Fix OWASP top 10 vulnerabilities
AI Security
intermediate
Identify and patch prompt injection vulnerabilities
Network Security
intermediate
Configure a firewall with proper inbound/outbound rules
Ethical Hacking & Pen Testing
intermediate
Conduct a full pen test with Kali Linux
Cloud Security
intermediate
Implement IAM least-privilege policies on AWS/GCP
Incident Response
intermediate
Build an incident response playbook
Security Compliance
intermediate
Map controls for SOC 2 Type II compliance
Defensive AI
advanced
Build an AI-powered log anomaly detector
Transition to Cyber Security From a Non-Cyber Role: Creative Ways to Land Your Dream Cyber Role
Cybersecurity
Transition to Cyber Security From a Non-Cyber Role: Creative Ways to Land Your Dream Cyber Role
SANS Institute Advanced 4y ago
JScript Deobfuscation - More WSHRAT (Malware Analysis)
Cybersecurity
JScript Deobfuscation - More WSHRAT (Malware Analysis)
John Hammond Intermediate 4y ago
Roger Reaves: Smuggling Drugs for Pablo Escobar and the Medellin Cartel | Lex Fridman Podcast #199
Cybersecurity
Roger Reaves: Smuggling Drugs for Pablo Escobar and the Medellin Cartel | Lex Fridman Podcast #199
Lex Fridman Beginner 4y ago
Yuan Qi: Origin and Source. Reading in Ancient Texts with Elisabeth Rochat de la Vallรฉe
Cybersecurity
Yuan Qi: Origin and Source. Reading in Ancient Texts with Elisabeth Rochat de la Vallรฉe
TCM Academy Beginner 4y ago
BlockChain,Cloud,Devops,Data Science, Big Data, Cybersecurity- Which Technology To Select?๐Ÿ˜ฐ๐Ÿ˜ฐ๐Ÿ˜ฐ๐Ÿ˜ฐ๐Ÿ˜ฐ
Cybersecurity
BlockChain,Cloud,Devops,Data Science, Big Data, Cybersecurity- Which Technology To Select?๐Ÿ˜ฐ๐Ÿ˜ฐ๐Ÿ˜ฐ๐Ÿ˜ฐ๐Ÿ˜ฐ
Krish Naik Intermediate 4y ago
how to get remote access to your hacking targets // reverse shells with netcat (Windows and Linux!!)
Cybersecurity
how to get remote access to your hacking targets // reverse shells with netcat (Windows and Linux!!)
NetworkChuck Beginner 4y ago
You must fight! Lessons from Kaseya hack
Cybersecurity
You must fight! Lessons from Kaseya hack
David Bombal Beginner 4y ago
Redis in 100 Seconds
Cybersecurity
Redis in 100 Seconds
Fireship Intermediate 4y ago
AddressSanitizer and Fighting Build Systems | Watch Together & Q&A
Cybersecurity
AddressSanitizer and Fighting Build Systems | Watch Together & Q&A
LiveUnderflow Intermediate 4y ago
Machine Learning in Cybersecurity // Monika Venฤkauskaitฤ— // MLOps Meetup #70
Cybersecurity
Machine Learning in Cybersecurity // Monika Venฤkauskaitฤ— // MLOps Meetup #70
MLOps.community Beginner 4y ago
HackTheBox - Ophiuchi
Cybersecurity
HackTheBox - Ophiuchi
IppSec Beginner 4y ago
Own a WiFi network with Python! WiFi DoS and ownership attack ๐Ÿ˜€ ๐Ÿ˜‚
Cybersecurity
Own a WiFi network with Python! WiFi DoS and ownership attack ๐Ÿ˜€ ๐Ÿ˜‚
David Bombal Beginner 4y ago
HackTheBox Beep Walkthrough - LFI Exploitation
Cybersecurity
HackTheBox Beep Walkthrough - LFI Exploitation
HackerSploit Intermediate 4y ago
Studying Cybersecurity in USA vs. Germany | ReHacked
Cybersecurity
Studying Cybersecurity in USA vs. Germany | ReHacked
LiveUnderflow Intermediate 4y ago
Treating Menstrual Related Mental Emotional Disorders with Acupuncture & Chinese Herbal Medicine
Cybersecurity
Treating Menstrual Related Mental Emotional Disorders with Acupuncture & Chinese Herbal Medicine
TCM Academy Intermediate 4y ago
HackTheBox - Spectra
Cybersecurity
HackTheBox - Spectra
IppSec Beginner 4y ago
Dealing with Burnout
Cybersecurity
Dealing with Burnout
The Cyber Mentor Beginner 4y ago
I Want to Work in Cybersecurity...Whatever That Means! - SANS New to Cyber Summit
Cybersecurity
I Want to Work in Cybersecurity...Whatever That Means! - SANS New to Cyber Summit
SANS Institute Advanced 4y ago
Charles Hoskinson: Cardano | Lex Fridman Podcast #192
Cybersecurity
Charles Hoskinson: Cardano | Lex Fridman Podcast #192
Lex Fridman Beginner 4y ago
Information Stealer - Malware Analysis (PowerShell to .NET)
Cybersecurity
Information Stealer - Malware Analysis (PowerShell to .NET)
John Hammond Beginner 4y ago
I Spent $4500 to Promote My Podcast in Podcast Players. Was it Worth it?
Cybersecurity
I Spent $4500 to Promote My Podcast in Podcast Players. Was it Worth it?
Jack Rhysider Intermediate 4y ago
Data Visualization: Bridging the Gap Between Users and Information
Cybersecurity
Data Visualization: Bridging the Gap Between Users and Information
Microsoft Research Intermediate 4y ago
Minimizing AFL Testcases! | Watch Together & Q&A
Cybersecurity
Minimizing AFL Testcases! | Watch Together & Q&A
LiveUnderflow Intermediate 4y ago
How Do You Approach Security Testing?
Cybersecurity
How Do You Approach Security Testing?
LiveUnderflow Intermediate 4y ago
This is just too fast! 100 GbE // 100 Gigabit Ethernet!
Cybersecurity
This is just too fast! 100 GbE // 100 Gigabit Ethernet!
David Bombal Advanced 4y ago
Problem while debugging a simple buffer overflow
Cybersecurity
Problem while debugging a simple buffer overflow
LiveUnderflow Beginner 4y ago
HackTheBox - Tentacle
Cybersecurity
HackTheBox - Tentacle
IppSec Beginner 4y ago
burp suite
Cybersecurity
burp suite
David Bombal Beginner 4y ago
https://twitter.com/LiveOverflow/status/1405463614841106433
Cybersecurity
https://twitter.com/LiveOverflow/status/1405463614841106433
LiveUnderflow Intermediate 4y ago
Charles Buck: Cell Biology & Qi Mechanism from Thunderfire Miraculous Needling. Using Moxa Sticks
Cybersecurity
Charles Buck: Cell Biology & Qi Mechanism from Thunderfire Miraculous Needling. Using Moxa Sticks
TCM Academy Beginner 4y ago
Slow the Revolving Door of Talent. Creative Ways to Keep Your Existing Cyber Talent in Your Org
Cybersecurity
Slow the Revolving Door of Talent. Creative Ways to Keep Your Existing Cyber Talent in Your Org
SANS Institute Beginner 4y ago
HackTheBox - Tenet
Cybersecurity
HackTheBox - Tenet
IppSec Beginner 4y ago
Kali Linux 2021.2 zero to WiFi (Free install)
Cybersecurity
Kali Linux 2021.2 zero to WiFi (Free install)
David Bombal Beginner 4y ago
HackTheBox - ScriptKiddie
Cybersecurity
HackTheBox - ScriptKiddie
IppSec Intermediate 4y ago
AES-CTR Cryptography: Reused Key Weakness - HackTheBox Cyber Apocalypse CTF
Cybersecurity
AES-CTR Cryptography: Reused Key Weakness - HackTheBox Cyber Apocalypse CTF
John Hammond Beginner 4y ago
Ransomware - Do You Pay It Or Not? - Experts debate the costs ethics around paying ransomware - SANS
Cybersecurity
Ransomware - Do You Pay It Or Not? - Experts debate the costs ethics around paying ransomware - SANS
SANS Institute Beginner 4y ago
Heavenly Moxibustion: The Medicinal Qualities of Common Herbs & Spices
Cybersecurity
Heavenly Moxibustion: The Medicinal Qualities of Common Herbs & Spices
TCM Academy Beginner 4y ago
Security Myths: Your locked laptop keeps you safe // hak5 Bash Bunny
Cybersecurity
Security Myths: Your locked laptop keeps you safe // hak5 Bash Bunny
David Bombal Beginner 4y ago
PowerPoint Phishing Malware Analysis - HackTheBox Cyber Apocalypse CTF
Cybersecurity
PowerPoint Phishing Malware Analysis - HackTheBox Cyber Apocalypse CTF
John Hammond Intermediate 4y ago
Mark Morowczynski & Thomas Detzner: Microsoft Incident Response Playbooks
Cybersecurity
Mark Morowczynski & Thomas Detzner: Microsoft Incident Response Playbooks
SANS Institute Beginner 4y ago
Ethernet: True or False (NVT Phybridge LRE)
Cybersecurity
Ethernet: True or False (NVT Phybridge LRE)
David Bombal Advanced 4y ago
Frank Wilczek: Physics of Quarks, Dark Matter, Complexity, Life & Aliens | Lex Fridman Podcast #187
Cybersecurity
Frank Wilczek: Physics of Quarks, Dark Matter, Complexity, Life & Aliens | Lex Fridman Podcast #187
Lex Fridman Beginner 4y ago
HackTheBox - Cereal
Cybersecurity
HackTheBox - Cereal
IppSec Beginner 4y ago
Phishing Document "Invitation" - HackTheBox Cyber Apocalypse CTF
Cybersecurity
Phishing Document "Invitation" - HackTheBox Cyber Apocalypse CTF
John Hammond Intermediate 4y ago
Nodejs Nunjucks Template Injection - HackTheBox Cyber Apocalypse CTF
Cybersecurity
Nodejs Nunjucks Template Injection - HackTheBox Cyber Apocalypse CTF
John Hammond Intermediate 4y ago
Cloudflare CDN CSP - XSS Bypass / HackTheBox Cyber Apocalypse CTF
Cybersecurity
Cloudflare CDN CSP - XSS Bypass / HackTheBox Cyber Apocalypse CTF
John Hammond Beginner 4y ago
Laser Acupuncture &  Photobiomodulation, with Dr Gil Ton PhD
Cybersecurity
Laser Acupuncture & Photobiomodulation, with Dr Gil Ton PhD
TCM Academy Intermediate 4y ago
Bellโ€™s Palsy and Chinese Medicine with Dr Gil Ton PhD
Cybersecurity
Bellโ€™s Palsy and Chinese Medicine with Dr Gil Ton PhD
TCM Academy Intermediate 4y ago
๐Ÿ“š Coursera Courses Opens on Coursera ยท Free to audit
1 / 3 View all โ†’
Proactive Computer Security
๐Ÿ“š Coursera Course โ†—
Self-paced
Proactive Computer Security
Opens on Coursera โ†—
Security Architecture & Operations
๐Ÿ“š Coursera Course โ†—
Self-paced
Security Architecture & Operations
Opens on Coursera โ†—
IT-Sicherheit: Grundlagen fรผr Sicherheitsarchitektur
๐Ÿ“š Coursera Course โ†—
Self-paced
IT-Sicherheit: Grundlagen fรผr Sicherheitsarchitektur
Opens on Coursera โ†—
Mastering Endpoint Security & Threat Defense
๐Ÿ“š Coursera Course โ†—
Self-paced
Mastering Endpoint Security & Threat Defense
Opens on Coursera โ†—
Linux Security Techniques
๐Ÿ“š Coursera Course โ†—
Self-paced
Linux Security Techniques
Opens on Coursera โ†—
Advanced Network Attacks, Web Hacking, and Cryptography
๐Ÿ“š Coursera Course โ†—
Self-paced
Advanced Network Attacks, Web Hacking, and Cryptography
Opens on Coursera โ†—