Tech Skills

Cybersecurity

Ethical hacking, penetration testing, network security, CTFs and defensive security

7,092
lessons
Skills in this topic
View full skill map →
Security Basics
beginner
Fix OWASP top 10 vulnerabilities
AI Security
intermediate
Identify and patch prompt injection vulnerabilities
Network Security
intermediate
Configure a firewall with proper inbound/outbound rules
Ethical Hacking & Pen Testing
intermediate
Conduct a full pen test with Kali Linux
Cloud Security
intermediate
Implement IAM least-privilege policies on AWS/GCP
Incident Response
intermediate
Build an incident response playbook
Security Compliance
intermediate
Map controls for SOC 2 Type II compliance
Defensive AI
advanced
Build an AI-powered log anomaly detector
Security Myths: Your locked laptop keeps you safe // hak5 Bash Bunny
Cybersecurity
Security Myths: Your locked laptop keeps you safe // hak5 Bash Bunny
David Bombal Beginner 4y ago
PowerPoint Phishing Malware Analysis - HackTheBox Cyber Apocalypse CTF
Cybersecurity ⚡ AI Lesson
PowerPoint Phishing Malware Analysis - HackTheBox Cyber Apocalypse CTF
John Hammond Intermediate 4y ago
Mark Morowczynski & Thomas Detzner: Microsoft Incident Response Playbooks
Cybersecurity ⚡ AI Lesson
Mark Morowczynski & Thomas Detzner: Microsoft Incident Response Playbooks
SANS Institute Beginner 4y ago
Frank Wilczek: Physics of Quarks, Dark Matter, Complexity, Life & Aliens | Lex Fridman Podcast #187
Cybersecurity
Frank Wilczek: Physics of Quarks, Dark Matter, Complexity, Life & Aliens | Lex Fridman Podcast #187
Lex Fridman Beginner 4y ago
HackTheBox - Cereal
Cybersecurity
HackTheBox - Cereal
IppSec Beginner 4y ago
Data Visualization: Bridging the Gap Between Users and Information
Cybersecurity
Data Visualization: Bridging the Gap Between Users and Information
Microsoft Research Intermediate 4y ago
Phishing Document "Invitation" - HackTheBox Cyber Apocalypse CTF
Cybersecurity
Phishing Document "Invitation" - HackTheBox Cyber Apocalypse CTF
John Hammond Intermediate 4y ago
AJ Yawn: Cloud, Compliance and Automating Security
Cybersecurity ⚡ AI Lesson
AJ Yawn: Cloud, Compliance and Automating Security
SANS Institute Beginner 4y ago
TryHackMe - Vulnversity Walkthrough
Cybersecurity ⚡ AI Lesson
TryHackMe - Vulnversity Walkthrough
HackerSploit Intermediate 4y ago
Bryan Johnson: Kernel Brain-Computer Interfaces | Lex Fridman Podcast #186
Cybersecurity ⚡ AI Lesson
Bryan Johnson: Kernel Brain-Computer Interfaces | Lex Fridman Podcast #186
Lex Fridman Beginner 4y ago
Advanced Growth Tactics - Steal The Top-Performing Tech Companies' Best-Kept Secrets
Cybersecurity
Advanced Growth Tactics - Steal The Top-Performing Tech Companies' Best-Kept Secrets
Neil Patel Beginner 5y ago
Passwords: Am i a joke to you?
Cybersecurity
Passwords: Am i a joke to you?
David Bombal Beginner 5y ago
Windows Privilege Escalation Tutorial For Beginners
Cybersecurity ⚡ AI Lesson
Windows Privilege Escalation Tutorial For Beginners
HackerSploit Beginner 5y ago
Pentesting vs. Bug Bounty vs. Pentesting ???
Cybersecurity
Pentesting vs. Bug Bounty vs. Pentesting ???
LiveOverflow Beginner 5y ago
HackTheBox - Ready
Cybersecurity ⚡ AI Lesson
HackTheBox - Ready
IppSec Beginner 5y ago
Live Office Hours for Entrepreneurs (AMA)
Cybersecurity ⚡ AI Lesson
Live Office Hours for Entrepreneurs (AMA)
Noah Kagan Raw Intermediate 5y ago
Russell Kane: How To Build Confidence & Stay Young | E79
Cybersecurity ⚡ AI Lesson
Russell Kane: How To Build Confidence & Stay Young | E79
The Diary Of A CEO Intermediate 5y ago
Live Office Hours for Entrepreneurs (AMA)
Cybersecurity
Live Office Hours for Entrepreneurs (AMA)
Noah Kagan Raw Intermediate 5y ago
Twitter OSiNT (Ethical Hacking)
Cybersecurity ⚡ AI Lesson
Twitter OSiNT (Ethical Hacking)
NetworkChuck Beginner 5y ago
FaceTiming Funnel Hacking Live Speakers (Reactions!) 🤯😱😭
Cybersecurity
FaceTiming Funnel Hacking Live Speakers (Reactions!) 🤯😱😭
Russell Brunson Beginner 5y ago
Technical Discussion on VPNs - How VPNs Work, their benefits, and What happens when VPNs are Hacked
Cybersecurity ⚡ AI Lesson
Technical Discussion on VPNs - How VPNs Work, their benefits, and What happens when VPNs are Hacked
Hussein Nasser Advanced 5y ago
Nodejs Nunjucks Template Injection - HackTheBox Cyber Apocalypse CTF
Cybersecurity
Nodejs Nunjucks Template Injection - HackTheBox Cyber Apocalypse CTF
John Hammond Intermediate 4y ago
Cloudflare CDN CSP - XSS Bypass / HackTheBox Cyber Apocalypse CTF
Cybersecurity ⚡ AI Lesson
Cloudflare CDN CSP - XSS Bypass / HackTheBox Cyber Apocalypse CTF
John Hammond Beginner 4y ago
I Want to Work in Cybersecurity...Whatever That Means!
Cybersecurity ⚡ AI Lesson
I Want to Work in Cybersecurity...Whatever That Means!
SANS Institute Advanced 5y ago
IFrame Parent XSS - HackTheBox Cyber Apocalypse CTF
Cybersecurity ⚡ AI Lesson
IFrame Parent XSS - HackTheBox Cyber Apocalypse CTF
John Hammond Beginner 5y ago
Blind MongoDB NoSQL Injection - HackTheBox Cyber Apocalypse CTF
Cybersecurity
Blind MongoDB NoSQL Injection - HackTheBox Cyber Apocalypse CTF
John Hammond Intermediate 5y ago
The 1% rule
Cybersecurity
The 1% rule
David Bombal Intermediate 5y ago
HackTheBox CA CTF - Using Snyk to Find & Fix Vulnerabilities
Cybersecurity
HackTheBox CA CTF - Using Snyk to Find & Fix Vulnerabilities
John Hammond Beginner 5y ago
VulnOS V2 - VulnHub Walkthrough - Boot-To-Root
Cybersecurity ⚡ AI Lesson
VulnOS V2 - VulnHub Walkthrough - Boot-To-Root
HackerSploit Intermediate 5y ago
XML Object Exfiltration - HackTheBox Cyber Apocalypse CTF "E. Tree"
Cybersecurity
XML Object Exfiltration - HackTheBox Cyber Apocalypse CTF "E. Tree"
John Hammond Beginner 5y ago
Network Myths: TCP/IP
Cybersecurity
Network Myths: TCP/IP
David Bombal Intermediate 5y ago
Josh Johnson: PowerShell and Defensive Automation for the Blue Team
Cybersecurity ⚡ AI Lesson
Josh Johnson: PowerShell and Defensive Automation for the Blue Team
SANS Institute Intermediate 5y ago
SQLite Blind SQL Injection - HackTheBox Cyber Apocalypse CTF
Cybersecurity
SQLite Blind SQL Injection - HackTheBox Cyber Apocalypse CTF
John Hammond Beginner 5y ago
Anonymize Your Traffic With Proxychains & Tor
Cybersecurity ⚡ AI Lesson
Anonymize Your Traffic With Proxychains & Tor
HackerSploit Intermediate 5y ago
PwnLab VulnHub Walkthrough - Boot-To-Root
Cybersecurity ⚡ AI Lesson
PwnLab VulnHub Walkthrough - Boot-To-Root
HackerSploit Intermediate 5y ago
Metasploit
Cybersecurity
Metasploit
David Bombal Beginner 5y ago
HTB Cyber Apocalypse - cURL As a Service
Cybersecurity
HTB Cyber Apocalypse - cURL As a Service
John Hammond Beginner 5y ago
CTF Walkthrough with John Hammond
Cybersecurity
CTF Walkthrough with John Hammond
David Bombal Beginner 5y ago
Chris Baker: Get A Handle On Your Vulnerabilities
Cybersecurity ⚡ AI Lesson
Chris Baker: Get A Handle On Your Vulnerabilities
SANS Institute Advanced 5y ago
HackTheBox - Sharp
Cybersecurity
HackTheBox - Sharp
IppSec Beginner 5y ago
SQL Injection
Cybersecurity
SQL Injection
David Bombal Intermediate 5y ago
Are CTFs even real? Featuring John Hammond.
Cybersecurity
Are CTFs even real? Featuring John Hammond.
David Bombal Beginner 5y ago
Mick Douglas & Flynn Weeks: Simplifying your Logging Strategy with the What2Log Project
Cybersecurity ⚡ AI Lesson
Mick Douglas & Flynn Weeks: Simplifying your Logging Strategy with the What2Log Project
SANS Institute Intermediate 5y ago
HackTheBox - Bucket
Cybersecurity ⚡ AI Lesson
HackTheBox - Bucket
IppSec Beginner 5y ago
Live Office Hours for Entrepreneurs (AMA)
Cybersecurity ⚡ AI Lesson
Live Office Hours for Entrepreneurs (AMA)
Noah Kagan Raw Intermediate 5y ago
HTA JScript to PowerShell - Novter Malware Analysis
Cybersecurity
HTA JScript to PowerShell - Novter Malware Analysis
John Hammond Intermediate 5y ago
Cybersecurity hacking path
Cybersecurity
Cybersecurity hacking path
David Bombal Beginner 5y ago
TryHackMe - OSCP Voucher GIVEAWAY & Presentation
Cybersecurity
TryHackMe - OSCP Voucher GIVEAWAY & Presentation
John Hammond Intermediate 5y ago
📚 Coursera Courses Opens on Coursera · Free to audit
1 / 3 View all →
Analyze Network Traffic with TCPDump: Build a Logging Tool
📚 Coursera Course ↗
Self-paced
Analyze Network Traffic with TCPDump: Build a Logging Tool
Opens on Coursera ↗
Advanced Network Analysis and Incident Response
📚 Coursera Course ↗
Self-paced
Advanced Network Analysis and Incident Response
Opens on Coursera ↗
Cloud Security Basics
📚 Coursera Course ↗
Self-paced
Cloud Security Basics
Opens on Coursera ↗
Leading Teams Effectively: Skills for Impactful Leadership
📚 Coursera Course ↗
Self-paced
Leading Teams Effectively: Skills for Impactful Leadership
Opens on Coursera ↗
CompTIA PenTest+ (PT0-003)
📚 Coursera Course ↗
Self-paced
CompTIA PenTest+ (PT0-003)
Opens on Coursera ↗
Cybersecurity Capstone Project
📚 Coursera Course ↗
Self-paced
Cybersecurity Capstone Project
Opens on Coursera ↗