Tech Skills

Cybersecurity

Ethical hacking, penetration testing, network security, CTFs and defensive security

6406
lessons
Skills in this topic
View full skill map โ†’
Security Basics
beginner
Fix OWASP top 10 vulnerabilities
AI Security
intermediate
Identify and patch prompt injection vulnerabilities
Network Security
intermediate
Configure a firewall with proper inbound/outbound rules
Ethical Hacking & Pen Testing
intermediate
Conduct a full pen test with Kali Linux
Cloud Security
intermediate
Implement IAM least-privilege policies on AWS/GCP
Incident Response
intermediate
Build an incident response playbook
Security Compliance
intermediate
Map controls for SOC 2 Type II compliance
Defensive AI
advanced
Build an AI-powered log anomaly detector
Binary IP Conversions  | Free CCNA 200-301 Course | Video #14
Cybersecurity
Binary IP Conversions | Free CCNA 200-301 Course | Video #14
David Bombal Beginner 5y ago
Doordash moves their Backend to Apache Kafka from RabbitMQ, VERY interesting! Let us discuss it!
Cybersecurity
Doordash moves their Backend to Apache Kafka from RabbitMQ, VERY interesting! Let us discuss it!
Hussein Nasser Intermediate 5y ago
HackTheBox - Remote
Cybersecurity
HackTheBox - Remote
IppSec Beginner 5y ago
Wiresharking Secure Shell (SSH) - Spoiler alert ๐Ÿšจ : its chatty
Cybersecurity
Wiresharking Secure Shell (SSH) - Spoiler alert ๐Ÿšจ : its chatty
Hussein Nasser Intermediate 5y ago
Too much Wireshark?! | Free Wireshark and Ethical Hacking Course: Video #5
Cybersecurity
Too much Wireshark?! | Free Wireshark and Ethical Hacking Course: Video #5
David Bombal Beginner 5y ago
TryHackMe GAMING SERVER - LXD Privilege Escalation
Cybersecurity
TryHackMe GAMING SERVER - LXD Privilege Escalation
John Hammond Intermediate 5y ago
HackTheBox - Quick
Cybersecurity
HackTheBox - Quick
IppSec Intermediate 5y ago
setup a FREE VPN server in the cloud (AWS)
Cybersecurity
setup a FREE VPN server in the cloud (AWS)
NetworkChuck Beginner 5y ago
Google CTF - BEGINNER Reverse Engineering w/ ANGR
Cybersecurity
Google CTF - BEGINNER Reverse Engineering w/ ANGR
John Hammond Beginner 5y ago
The Human Side of Threats: Why it Matters that Adversaries are Human Too | Katie Nickels
Cybersecurity
The Human Side of Threats: Why it Matters that Adversaries are Human Too | Katie Nickels
SANS Institute Advanced 5y ago
The 20 Critical Security Controls: From Framework to Operational to Implementation
Cybersecurity
The 20 Critical Security Controls: From Framework to Operational to Implementation
SANS Institute Beginner 5y ago
HackTheBox Walkthrough Using Pwnbox - Traceback
Cybersecurity
HackTheBox Walkthrough Using Pwnbox - Traceback
HackerSploit Beginner 5y ago
FPGA simulated on a GPU - GPURTL Google CTF Finals 2019 (reversing)
Cybersecurity
FPGA simulated on a GPU - GPURTL Google CTF Finals 2019 (reversing)
LiveOverflow Beginner 5y ago
Customer lifetime value in a discrete-time contractual setting (math and Python implementation)
Cybersecurity
Customer lifetime value in a discrete-time contractual setting (math and Python implementation)
Sophia Yang Intermediate 5y ago
HackTheBox Walkthrough - Cronos
Cybersecurity
HackTheBox Walkthrough - Cronos
HackerSploit Intermediate 5y ago
Best hidden feature of Python | Chaining comparison operators
Cybersecurity
Best hidden feature of Python | Chaining comparison operators
Lex Fridman Beginner 5y ago
how to HACK a password // password cracking with Kali Linux and HashCat
Cybersecurity
how to HACK a password // password cracking with Kali Linux and HashCat
NetworkChuck Beginner 5y ago
Sheldon Solomon: Death and Meaning | Lex Fridman Podcast #117
Cybersecurity
Sheldon Solomon: Death and Meaning | Lex Fridman Podcast #117
Lex Fridman Beginner 5y ago
Working with Dreams in Chinese Medicine
Cybersecurity
Working with Dreams in Chinese Medicine
TCM Academy Intermediate 5y ago
Interview with a Cybersecurity Recruiter
Cybersecurity
Interview with a Cybersecurity Recruiter
The Cyber Mentor Beginner 5y ago
Binary? How does that work?  | Free CCNA 200-301 Course | Video #13
Cybersecurity
Binary? How does that work? | Free CCNA 200-301 Course | Video #13
David Bombal Intermediate 5y ago
Cloudflare fixes a HUGE limitation in HTTP/2 upload implementation in  NGINX - Let us discuss
Cybersecurity
Cloudflare fixes a HUGE limitation in HTTP/2 upload implementation in NGINX - Let us discuss
Hussein Nasser Intermediate 5y ago
A SameSite Cookie Exception was made to avoid Redirect Loop in Single Sign-On (SSO) Let us Discuss
Cybersecurity
A SameSite Cookie Exception was made to avoid Redirect Loop in Single Sign-On (SSO) Let us Discuss
Hussein Nasser Intermediate 5y ago
Wireshark Display Filters | Free Wireshark and Ethical Hacking Course: Video #4
Cybersecurity
Wireshark Display Filters | Free Wireshark and Ethical Hacking Course: Video #4
David Bombal Beginner 5y ago
SANS Security Awareness Learning Management System - Litmos
Cybersecurity
SANS Security Awareness Learning Management System - Litmos
SANS Institute Beginner 5y ago
REST API has a major limitation and Vulcain solves it, Let us discuss
Cybersecurity
REST API has a major limitation and Vulcain solves it, Let us discuss
Hussein Nasser Beginner 5y ago
Practical protocols: SMTP and POP3 | Free CCNA 200-301 Course | Video #12
Cybersecurity
Practical protocols: SMTP and POP3 | Free CCNA 200-301 Course | Video #12
David Bombal Beginner 5y ago
HackTheBox - Magic
Cybersecurity
HackTheBox - Magic
IppSec Beginner 5y ago
Cleaning Up Our Cyber Hygiene
Cybersecurity
Cleaning Up Our Cyber Hygiene
SANS Institute Beginner 5y ago
Free Wireshark and Ethical Hacking Course: Video #3
Cybersecurity
Free Wireshark and Ethical Hacking Course: Video #3
David Bombal Beginner 5y ago
They Web Scraped 235 MILLION YouTube, Instagram and TikTok Accounts and Left their Database Exposed
Cybersecurity
They Web Scraped 235 MILLION YouTube, Instagram and TikTok Accounts and Left their Database Exposed
Hussein Nasser Intermediate 5y ago
What caused the cold start performance โ€œdipโ€ in MariaDB .. Let us discuss (@percona Article)
Cybersecurity
What caused the cold start performance โ€œdipโ€ in MariaDB .. Let us discuss (@percona Article)
Hussein Nasser Beginner 5y ago
new Kali Linux GUI on Windows 10 (WSL 2) // 2020.3 Release
Cybersecurity
new Kali Linux GUI on Windows 10 (WSL 2) // 2020.3 Release
NetworkChuck Beginner 5y ago
Greenbone Community Edition - Virtual Appliance Setup & Configuration
Cybersecurity
Greenbone Community Edition - Virtual Appliance Setup & Configuration
HackerSploit Intermediate 5y ago
Free Wireshark and Ethical Hacking Course: Video #2
Cybersecurity
Free Wireshark and Ethical Hacking Course: Video #2
David Bombal Beginner 5y ago
My Struggle with the English Language in the US as an Arab Native Speaker and a Software Engineer
Cybersecurity
My Struggle with the English Language in the US as an Arab Native Speaker and a Software Engineer
Hussein Nasser Beginner 5y ago
Free Wireshark and Ethical Hacking Course: Video #1
Cybersecurity
Free Wireshark and Ethical Hacking Course: Video #1
David Bombal Beginner 5y ago
Vulnerability Scanning With Nmap
Cybersecurity
Vulnerability Scanning With Nmap
HackerSploit Intermediate 5y ago
Using History API to Animate URL and hmm what else?
Cybersecurity
Using History API to Animate URL and hmm what else?
Hussein Nasser Intermediate 5y ago
Cisco Packet Tracer Tips | Free CCNA 200-301 Course | Video #11
Cybersecurity
Cisco Packet Tracer Tips | Free CCNA 200-301 Course | Video #11
David Bombal Intermediate 5y ago
Nmap - MySQL Enumeration
Cybersecurity
Nmap - MySQL Enumeration
HackerSploit Intermediate 5y ago
Nmap - SMB Enumeration
Cybersecurity
Nmap - SMB Enumeration
HackerSploit Intermediate 5y ago
Wireshark Install Ubuntu 20.04
Cybersecurity
Wireshark Install Ubuntu 20.04
David Bombal Beginner 5y ago
Nmap - HTTP Enumeration - WAF Detection And Fingerprinting
Cybersecurity
Nmap - HTTP Enumeration - WAF Detection And Fingerprinting
HackerSploit Intermediate 5y ago
Nmap - HTTP Enumeration - Finding Hidden Files And Directories
Cybersecurity
Nmap - HTTP Enumeration - Finding Hidden Files And Directories
HackerSploit Intermediate 5y ago
Nmap - HTTP Enumeration - Detecting HTTP Methods
Cybersecurity
Nmap - HTTP Enumeration - Detecting HTTP Methods
HackerSploit Intermediate 5y ago
Packet Tracer Install Ubuntu 20.04
Cybersecurity
Packet Tracer Install Ubuntu 20.04
David Bombal Beginner 5y ago
Nmap - SMTP Enumeration
Cybersecurity
Nmap - SMTP Enumeration
HackerSploit Intermediate 5y ago
๐Ÿ“š Coursera Courses Opens on Coursera ยท Free to audit
1 / 3 View all โ†’
Secure Against Network Intrusions
๐Ÿ“š Coursera Course โ†—
Self-paced
Secure Against Network Intrusions
Opens on Coursera โ†—
Introduction to Cybersecurity for Business
๐Ÿ“š Coursera Course โ†—
Self-paced
Introduction to Cybersecurity for Business
Opens on Coursera โ†—
Network Monitoring and Analysis
๐Ÿ“š Coursera Course โ†—
Self-paced
Network Monitoring and Analysis
Opens on Coursera โ†—
GCP Security and Networking
๐Ÿ“š Coursera Course โ†—
Self-paced
GCP Security and Networking
Opens on Coursera โ†—
System & Network Security Essentials
๐Ÿ“š Coursera Course โ†—
Self-paced
System & Network Security Essentials
Opens on Coursera โ†—
Introduction to Bash Shell Scripting
๐Ÿ“š Coursera Course โ†—
Self-paced
Introduction to Bash Shell Scripting
Opens on Coursera โ†—