Tech Skills

Cybersecurity

Ethical hacking, penetration testing, network security, CTFs and defensive security

7,097
lessons
Skills in this topic
View full skill map →
Security Basics
beginner
Fix OWASP top 10 vulnerabilities
AI Security
intermediate
Identify and patch prompt injection vulnerabilities
Network Security
intermediate
Configure a firewall with proper inbound/outbound rules
Ethical Hacking & Pen Testing
intermediate
Conduct a full pen test with Kali Linux
Cloud Security
intermediate
Implement IAM least-privilege policies on AWS/GCP
Incident Response
intermediate
Build an incident response playbook
Security Compliance
intermediate
Map controls for SOC 2 Type II compliance
Defensive AI
advanced
Build an AI-powered log anomaly detector
How To Fix Metasploit V5 "Exploit Failed: An Exploitation Error Occurred"
Cybersecurity ⚡ AI Lesson
How To Fix Metasploit V5 "Exploit Failed: An Exploitation Error Occurred"
HackerSploit Intermediate 5y ago
Cyber Camp Panel - SANS Cyber Camp
Cybersecurity
Cyber Camp Panel - SANS Cyber Camp
SANS Institute Beginner 5y ago
Introduction to Network Analysis Workshop - SANS Cyber Camp
Cybersecurity
Introduction to Network Analysis Workshop - SANS Cyber Camp
SANS Institute Beginner 5y ago
Hosting BsidesBOS CTF - SEPTEMBER 26
Cybersecurity ⚡ AI Lesson
Hosting BsidesBOS CTF - SEPTEMBER 26
John Hammond Intermediate 5y ago
Kioptrix 2014 Walkthrough - Boot-To-Root
Cybersecurity ⚡ AI Lesson
Kioptrix 2014 Walkthrough - Boot-To-Root
HackerSploit Intermediate 5y ago
Why is HTTPS Important: Creating a Simple Flask Server
Cybersecurity
Why is HTTPS Important: Creating a Simple Flask Server
Real Python Intermediate 5y ago
XSS a Paste Service - Pasteurize (web) Google CTF 2020
Cybersecurity
XSS a Paste Service - Pasteurize (web) Google CTF 2020
LiveOverflow Beginner 5y ago
David Fravor: UFOs, Aliens, Fighter Jets, and Aerospace Engineering | Lex Fridman Podcast #122
Cybersecurity ⚡ AI Lesson
David Fravor: UFOs, Aliens, Fighter Jets, and Aerospace Engineering | Lex Fridman Podcast #122
Lex Fridman Beginner 5y ago
3 More Unique and Impactful Projects to get a Data Science Job
Cybersecurity ⚡ AI Lesson
3 More Unique and Impactful Projects to get a Data Science Job
Tina Huang Beginner 5y ago
When to use UDP vs TCP in Building a Backend Application?
Cybersecurity
When to use UDP vs TCP in Building a Backend Application?
Hussein Nasser Intermediate 5y ago
Doordash moves their Backend to Apache Kafka from RabbitMQ, VERY interesting! Let us discuss it!
Cybersecurity
Doordash moves their Backend to Apache Kafka from RabbitMQ, VERY interesting! Let us discuss it!
Hussein Nasser Intermediate 5y ago
HackTheBox - Remote
Cybersecurity
HackTheBox - Remote
IppSec Beginner 5y ago
Too much Wireshark?! | Free Wireshark and Ethical Hacking Course: Video #5
Cybersecurity
Too much Wireshark?! | Free Wireshark and Ethical Hacking Course: Video #5
David Bombal Beginner 5y ago
TryHackMe GAMING SERVER - LXD Privilege Escalation
Cybersecurity
TryHackMe GAMING SERVER - LXD Privilege Escalation
John Hammond Intermediate 5y ago
HackTheBox - Quick
Cybersecurity
HackTheBox - Quick
IppSec Intermediate 5y ago
setup a FREE VPN server in the cloud (AWS)
Cybersecurity ⚡ AI Lesson
setup a FREE VPN server in the cloud (AWS)
NetworkChuck Beginner 5y ago
Wireshark Display Filters | Free Wireshark and Ethical Hacking Course: Video #4
Cybersecurity
Wireshark Display Filters | Free Wireshark and Ethical Hacking Course: Video #4
David Bombal Beginner 5y ago
FPGA simulated on a GPU - GPURTL Google CTF Finals 2019 (reversing)
Cybersecurity
FPGA simulated on a GPU - GPURTL Google CTF Finals 2019 (reversing)
LiveOverflow Beginner 5y ago
Customer lifetime value in a discrete-time contractual setting (math and Python implementation)
Cybersecurity
Customer lifetime value in a discrete-time contractual setting (math and Python implementation)
Sophia Yang Intermediate 5y ago
Best hidden feature of Python | Chaining comparison operators
Cybersecurity
Best hidden feature of Python | Chaining comparison operators
Lex Fridman Beginner 5y ago
how to HACK a password // password cracking with Kali Linux and HashCat
Cybersecurity ⚡ AI Lesson
how to HACK a password // password cracking with Kali Linux and HashCat
NetworkChuck Beginner 5y ago
Introduction to SANS Cyber Camp
Cybersecurity
Introduction to SANS Cyber Camp
SANS Institute Beginner 5y ago
The Hidden Information in Photos - SANS Cyber Camp
Cybersecurity
The Hidden Information in Photos - SANS Cyber Camp
SANS Institute Beginner 5y ago
Thinking Like a Forensicator - SANS Cyber Camp
Cybersecurity
Thinking Like a Forensicator - SANS Cyber Camp
SANS Institute Beginner 5y ago
Cybersecurity for Social Good - SANS Cyber Camp
Cybersecurity
Cybersecurity for Social Good - SANS Cyber Camp
SANS Institute Beginner 5y ago
Introduction to Programming Workshop - SANS Cyber Camp
Cybersecurity
Introduction to Programming Workshop - SANS Cyber Camp
SANS Institute Beginner 5y ago
Introduction to Metasploit w/ Jeff McJunkin - SANS Cyber Camp
Cybersecurity
Introduction to Metasploit w/ Jeff McJunkin - SANS Cyber Camp
SANS Institute Advanced 5y ago
Need for Speed: Cracking Hashes to Pwn Passwords w/ Jason Nickola - SANS Cyber Camp: New to Cyber
Cybersecurity
Need for Speed: Cracking Hashes to Pwn Passwords w/ Jason Nickola - SANS Cyber Camp: New to Cyber
SANS Institute Advanced 5y ago
How to Build a Global, Digital Security Awareness Scavenger Hunt | Neaka Balloge
Cybersecurity
How to Build a Global, Digital Security Awareness Scavenger Hunt | Neaka Balloge
SANS Institute Intermediate 5y ago
Becoming the Adversary: Creating a Defensive Lab to Understand the Offense
Cybersecurity ⚡ AI Lesson
Becoming the Adversary: Creating a Defensive Lab to Understand the Offense
SANS Institute Beginner 5y ago
Wiresharking Secure Shell (SSH) - Spoiler alert 🚨 : its chatty
Cybersecurity ⚡ AI Lesson
Wiresharking Secure Shell (SSH) - Spoiler alert 🚨 : its chatty
Hussein Nasser Intermediate 5y ago
Google CTF - BEGINNER Reverse Engineering w/ ANGR
Cybersecurity
Google CTF - BEGINNER Reverse Engineering w/ ANGR
John Hammond Beginner 5y ago
The Human Side of Threats: Why it Matters that Adversaries are Human Too | Katie Nickels
Cybersecurity
The Human Side of Threats: Why it Matters that Adversaries are Human Too | Katie Nickels
SANS Institute Advanced 5y ago
Cloudflare fixes a HUGE limitation in HTTP/2 upload implementation in  NGINX - Let us discuss
Cybersecurity ⚡ AI Lesson
Cloudflare fixes a HUGE limitation in HTTP/2 upload implementation in NGINX - Let us discuss
Hussein Nasser Intermediate 5y ago
The 20 Critical Security Controls: From Framework to Operational to Implementation
Cybersecurity
The 20 Critical Security Controls: From Framework to Operational to Implementation
SANS Institute Beginner 5y ago
A SameSite Cookie Exception was made to avoid Redirect Loop in Single Sign-On (SSO) Let us Discuss
Cybersecurity
A SameSite Cookie Exception was made to avoid Redirect Loop in Single Sign-On (SSO) Let us Discuss
Hussein Nasser Intermediate 5y ago
HackTheBox Walkthrough Using Pwnbox - Traceback
Cybersecurity ⚡ AI Lesson
HackTheBox Walkthrough Using Pwnbox - Traceback
HackerSploit Beginner 5y ago
REST API has a major limitation and Vulcain solves it, Let us discuss
Cybersecurity
REST API has a major limitation and Vulcain solves it, Let us discuss
Hussein Nasser Beginner 5y ago
HackTheBox Walkthrough - Cronos
Cybersecurity ⚡ AI Lesson
HackTheBox Walkthrough - Cronos
HackerSploit Intermediate 5y ago
HackTheBox - Magic
Cybersecurity ⚡ AI Lesson
HackTheBox - Magic
IppSec Beginner 5y ago
Cleaning Up Our Cyber Hygiene
Cybersecurity ⚡ AI Lesson
Cleaning Up Our Cyber Hygiene
SANS Institute Beginner 5y ago
Free Wireshark and Ethical Hacking Course: Video #3
Cybersecurity
Free Wireshark and Ethical Hacking Course: Video #3
David Bombal Beginner 5y ago
They Web Scraped 235 MILLION YouTube, Instagram and TikTok Accounts and Left their Database Exposed
Cybersecurity ⚡ AI Lesson
They Web Scraped 235 MILLION YouTube, Instagram and TikTok Accounts and Left their Database Exposed
Hussein Nasser Intermediate 5y ago
Sheldon Solomon: Death and Meaning | Lex Fridman Podcast #117
Cybersecurity ⚡ AI Lesson
Sheldon Solomon: Death and Meaning | Lex Fridman Podcast #117
Lex Fridman Beginner 5y ago
What caused the cold start performance “dip” in MariaDB .. Let us discuss (@percona Article)
Cybersecurity ⚡ AI Lesson
What caused the cold start performance “dip” in MariaDB .. Let us discuss (@percona Article)
Hussein Nasser Beginner 5y ago
new Kali Linux GUI on Windows 10 (WSL 2) // 2020.3 Release
Cybersecurity ⚡ AI Lesson
new Kali Linux GUI on Windows 10 (WSL 2) // 2020.3 Release
NetworkChuck Beginner 5y ago
Greenbone Community Edition - Virtual Appliance Setup & Configuration
Cybersecurity ⚡ AI Lesson
Greenbone Community Edition - Virtual Appliance Setup & Configuration
HackerSploit Intermediate 5y ago
Free Wireshark and Ethical Hacking Course: Video #2
Cybersecurity
Free Wireshark and Ethical Hacking Course: Video #2
David Bombal Beginner 5y ago
📚 Coursera Courses Opens on Coursera · Free to audit
1 / 3 View all →
IT & Cloud Audit Masterclass – Fundamentals to Advanced
📚 Coursera Course ↗
Self-paced
IT & Cloud Audit Masterclass – Fundamentals to Advanced
Opens on Coursera ↗
Web Security, Social Engineering & External Attacks
📚 Coursera Course ↗
Self-paced
Web Security, Social Engineering & External Attacks
Opens on Coursera ↗
Database Essentials and Vulnerabilities
📚 Coursera Course ↗
Self-paced
Database Essentials and Vulnerabilities
Opens on Coursera ↗
Security for Artificial Intelligence Software and Services
📚 Coursera Course ↗
Self-paced
Security for Artificial Intelligence Software and Services
Opens on Coursera ↗
Demystifying Oracle Cloud Infrastructure (OCI) Security
📚 Coursera Course ↗
Self-paced
Demystifying Oracle Cloud Infrastructure (OCI) Security
Opens on Coursera ↗
Cybersecurity Awareness and Innovation
📚 Coursera Course ↗
Self-paced
Cybersecurity Awareness and Innovation
Opens on Coursera ↗