Tech Skills

Cybersecurity

Ethical hacking, penetration testing, network security, CTFs and defensive security

5196
lessons
Skills in this topic
View full skill map →
Security Basics
beginner
Fix OWASP top 10 vulnerabilities
AI Security
intermediate
Identify and patch prompt injection vulnerabilities
Network Security
intermediate
Configure a firewall with proper inbound/outbound rules
Ethical Hacking & Pen Testing
intermediate
Conduct a full pen test with Kali Linux
Cloud Security
intermediate
Implement IAM least-privilege policies on AWS/GCP
Incident Response
intermediate
Build an incident response playbook
Security Compliance
intermediate
Map controls for SOC 2 Type II compliance
Defensive AI
advanced
Build an AI-powered log anomaly detector
Christmas Giveaway Day 2: CISSP, CCNA, Python and more!
Cybersecurity
Christmas Giveaway Day 2: CISSP, CCNA, Python and more!
David Bombal Intermediate 6y ago
How To Install Metasploitable3 [Cybersecurity]
Cybersecurity
How To Install Metasploitable3 [Cybersecurity]
HackerSploit Intermediate 6y ago
Christmas Giveaway Day 1: CEH, CCNA, Python and more!
Cybersecurity
Christmas Giveaway Day 1: CEH, CCNA, Python and more!
David Bombal Intermediate 6y ago
Docker For Pentesting On Windows [Cybersecurity]
Cybersecurity
Docker For Pentesting On Windows [Cybersecurity]
HackerSploit Intermediate 6y ago
VPN vs Proxy Explained Pros and Cons
Cybersecurity
VPN vs Proxy Explained Pros and Cons
Hussein Nasser Beginner 6y ago
Chef and Rezilion Team Up to Automate Resilience
Cybersecurity
Chef and Rezilion Team Up to Automate Resilience
The New Stack Intermediate 6y ago
Public Penetration Test Reports - Learning Resource
Cybersecurity
Public Penetration Test Reports - Learning Resource
LiveOverflow Beginner 6y ago
Introducing Core NetWars Continuous 2
Cybersecurity
Introducing Core NetWars Continuous 2
SANS Institute Beginner 6y ago
Domain Admin via IPv6 DNS Takeover
Cybersecurity
Domain Admin via IPv6 DNS Takeover
The Cyber Mentor Beginner 6y ago
How To Learn Hacking With CTFs
Cybersecurity
How To Learn Hacking With CTFs
LiveOverflow Beginner 6y ago
HackTheBox - Heist
Cybersecurity
HackTheBox - Heist
IppSec Intermediate 6y ago
How Tor Works?  (The Onion Router)
Cybersecurity
How Tor Works? (The Onion Router)
Hussein Nasser Intermediate 6y ago
Rubik's Cube Encryption Demo
Cybersecurity
Rubik's Cube Encryption Demo
Dwarkesh Patel Intermediate 6y ago
Funnel Hacking Live FULL Documentary - A ClickFunnels Studio Presentation
Cybersecurity
Funnel Hacking Live FULL Documentary - A ClickFunnels Studio Presentation
Russell Brunson Beginner 6y ago
Burp Suite Pro Walkthrough
Cybersecurity
Burp Suite Pro Walkthrough
The Cyber Mentor Beginner 6y ago
Funnel Hacking LIVE Documentary Trailer - Why We Do It...
Cybersecurity
Funnel Hacking LIVE Documentary Trailer - Why We Do It...
Russell Brunson Beginner 6y ago
AES Explained (Advanced Encryption Standard) - Computerphile
Cybersecurity
AES Explained (Advanced Encryption Standard) - Computerphile
Computerphile Beginner 6y ago
One Encryption Standard to Rule Them All! - Computerphile
Cybersecurity
One Encryption Standard to Rule Them All! - Computerphile
Computerphile Beginner 6y ago
Not giving credit where credit is due - Common Cybersecurity Writing Mistakes
Cybersecurity
Not giving credit where credit is due - Common Cybersecurity Writing Mistakes
SANS Institute Beginner 6y ago
Cybertalk - EP4 - IDA Pro, Malware Analysis & Python Libraries
Cybersecurity
Cybertalk - EP4 - IDA Pro, Malware Analysis & Python Libraries
HackerSploit Intermediate 6y ago
Docker For Pentesting And Bug Bounty Hunting
Cybersecurity
Docker For Pentesting And Bug Bounty Hunting
HackerSploit Intermediate 6y ago
WHY YOUR HACKING QUESTIONS ARE FRUSTRATING!!!
Cybersecurity
WHY YOUR HACKING QUESTIONS ARE FRUSTRATING!!!
LiveOverflow Intermediate 6y ago
Kali Linux WiFi
Cybersecurity
Kali Linux WiFi
David Bombal Beginner 6y ago
Best Operating Systems for Hacking?!
Cybersecurity
Best Operating Systems for Hacking?!
LiveOverflow Intermediate 6y ago
Cybertalk - EP3 - Cybersecurity Certifications & Learning Resources
Cybersecurity
Cybertalk - EP3 - Cybersecurity Certifications & Learning Resources
HackerSploit Beginner 6y ago
SECRET HACKER FORUM - The Place Where We Talk and Learn
Cybersecurity
SECRET HACKER FORUM - The Place Where We Talk and Learn
LiveOverflow Beginner 6y ago
Stapler 1 - CTF Walkthrough - Boot-To-Root
Cybersecurity
Stapler 1 - CTF Walkthrough - Boot-To-Root
HackerSploit Intermediate 6y ago
Cybertalk Clips | Best Web App Pentesting Tools
Cybersecurity
Cybertalk Clips | Best Web App Pentesting Tools
HackerSploit Intermediate 6y ago
Kali Linux: Hacking ARP
Cybersecurity
Kali Linux: Hacking ARP
David Bombal Intermediate 6y ago
Recon-ng V5 - Generating Reports
Cybersecurity
Recon-ng V5 - Generating Reports
HackerSploit Intermediate 6y ago
Recon-ng V5 - Working With The Database
Cybersecurity
Recon-ng V5 - Working With The Database
HackerSploit Intermediate 6y ago
Recon-ng V5 - Adding API Keys (Shodan & BuiltWith)
Cybersecurity
Recon-ng V5 - Adding API Keys (Shodan & BuiltWith)
HackerSploit Intermediate 6y ago
Recon-ng V5 - Marketplace & Installing Recon Modules (whois, subdomain enumeration)
Cybersecurity
Recon-ng V5 - Marketplace & Installing Recon Modules (whois, subdomain enumeration)
HackerSploit Intermediate 6y ago
Recon-ng V5 - Syntax & Workspace Management
Cybersecurity
Recon-ng V5 - Syntax & Workspace Management
HackerSploit Intermediate 6y ago
Recon-ng V5 - Introduction And New Updates
Cybersecurity
Recon-ng V5 - Introduction And New Updates
HackerSploit Beginner 6y ago
How to Install Ubuntu on VirtualBox using Windows 10
Cybersecurity
How to Install Ubuntu on VirtualBox using Windows 10
David Bombal Beginner 6y ago
SSH Brute Force Protection With Fail2Ban
Cybersecurity
SSH Brute Force Protection With Fail2Ban
HackerSploit Intermediate 6y ago
Including details most readers don't need - Common Cybersecurity Writing Mistakes
Cybersecurity
Including details most readers don't need - Common Cybersecurity Writing Mistakes
SANS Institute Beginner 6y ago
Escalating tensions in difficult situations - Common Cybersecurity Writing Mistakes
Cybersecurity
Escalating tensions in difficult situations - Common Cybersecurity Writing Mistakes
SANS Institute Beginner 6y ago
Using FUD to cause anxiety - Common Cybersecurity Writing Mistakes
Cybersecurity
Using FUD to cause anxiety - Common Cybersecurity Writing Mistakes
SANS Institute Beginner 6y ago
Not using parallel structure - Common Cybersecurity Writing Mistakes
Cybersecurity
Not using parallel structure - Common Cybersecurity Writing Mistakes
SANS Institute Beginner 6y ago
Using more words than necessary - Common Cybersecurity Writing Mistakes
Cybersecurity
Using more words than necessary - Common Cybersecurity Writing Mistakes
SANS Institute Beginner 6y ago
Applying Inconsistent formatting - Common Cybersecurity Writing Mistakes
Cybersecurity
Applying Inconsistent formatting - Common Cybersecurity Writing Mistakes
SANS Institute Beginner 6y ago
Including indecipherable graphics - Common Cybersecurity Writing Mistakes
Cybersecurity
Including indecipherable graphics - Common Cybersecurity Writing Mistakes
SANS Institute Beginner 6y ago
Burying the Main Point - Common Cybersecurity Writing Mistakes
Cybersecurity
Burying the Main Point - Common Cybersecurity Writing Mistakes
SANS Institute Beginner 6y ago
Linux Essentials For Hackers - #17 - SSH And SSH Security
Cybersecurity
Linux Essentials For Hackers - #17 - SSH And SSH Security
HackerSploit Intermediate 6y ago
Linux Essentials For Hackers - #16 - Service And Process Management (HTOP & systemctl)
Cybersecurity
Linux Essentials For Hackers - #16 - Service And Process Management (HTOP & systemctl)
HackerSploit Intermediate 6y ago
Linux Essentials For Hackers - #15 - TOR & Proxychains
Cybersecurity
Linux Essentials For Hackers - #15 - TOR & Proxychains
HackerSploit Intermediate 6y ago
📚 Coursera Courses Opens on Coursera · Free to audit
1 / 3 View all →
Cybersecurity: Protecting your Information at Home
📚 Coursera Course ↗
Self-paced
Cybersecurity: Protecting your Information at Home
Opens on Coursera ↗
Sécuriser GKE avec Cloud Next Generation Firewall
📚 Coursera Course ↗
Self-paced
Sécuriser GKE avec Cloud Next Generation Firewall
Opens on Coursera ↗
Introduction to reCAPTCHA
📚 Coursera Course ↗
Self-paced
Introduction to reCAPTCHA
Opens on Coursera ↗
Game Development and Prototyping
📚 Coursera Course ↗
Self-paced
Game Development and Prototyping
Opens on Coursera ↗
Digital Shield: Cybersecurity for Data and System Protection
📚 Coursera Course ↗
Self-paced
Digital Shield: Cybersecurity for Data and System Protection
Opens on Coursera ↗
Securing Systems and Networks
📚 Coursera Course ↗
Self-paced
Securing Systems and Networks
Opens on Coursera ↗