Tech Skills

Cybersecurity

Ethical hacking, penetration testing, network security, CTFs and defensive security

5198
lessons
Skills in this topic
View full skill map →
Security Basics
beginner
Fix OWASP top 10 vulnerabilities
AI Security
intermediate
Identify and patch prompt injection vulnerabilities
Network Security
intermediate
Configure a firewall with proper inbound/outbound rules
Ethical Hacking & Pen Testing
intermediate
Conduct a full pen test with Kali Linux
Cloud Security
intermediate
Implement IAM least-privilege policies on AWS/GCP
Incident Response
intermediate
Build an incident response playbook
Security Compliance
intermediate
Map controls for SOC 2 Type II compliance
Defensive AI
advanced
Build an AI-powered log anomaly detector
Linux Essentials For Hackers - #16 - Service And Process Management (HTOP & systemctl)
Cybersecurity
Linux Essentials For Hackers - #16 - Service And Process Management (HTOP & systemctl)
HackerSploit Intermediate 6y ago
Linux Essentials For Hackers - #15 - TOR & Proxychains
Cybersecurity
Linux Essentials For Hackers - #15 - TOR & Proxychains
HackerSploit Intermediate 6y ago
How To Apply Reverse Engineering To Learn Data Science
Cybersecurity
How To Apply Reverse Engineering To Learn Data Science
Krish Naik Beginner 6y ago
Kali Linux: Hacking DHCP and MITM
Cybersecurity
Kali Linux: Hacking DHCP and MITM
David Bombal Beginner 6y ago
A Poor Man's Pentest: Automating the Manual - BsidesDE 2019
Cybersecurity
A Poor Man's Pentest: Automating the Manual - BsidesDE 2019
John Hammond Intermediate 6y ago
Pentesting for n00bs: Episode 10 - Netmon
Cybersecurity
Pentesting for n00bs: Episode 10 - Netmon
The Cyber Mentor Beginner 6y ago
Kali Linux: Hacking Networks Part 2
Cybersecurity
Kali Linux: Hacking Networks Part 2
David Bombal Beginner 6y ago
Do you REALLY need a VPN?
Cybersecurity
Do you REALLY need a VPN?
Hussein Nasser Intermediate 6y ago
John Hubbard - How were you introduced to SANS?
Cybersecurity
John Hubbard - How were you introduced to SANS?
SANS Institute Beginner 6y ago
John Hubbard -If you’ve completed a 500-level course should you still give thought to taking SEC450?
Cybersecurity
John Hubbard -If you’ve completed a 500-level course should you still give thought to taking SEC450?
SANS Institute Beginner 6y ago
Reading Player Position with DLL Injection - Pwn Adventure 3
Cybersecurity
Reading Player Position with DLL Injection - Pwn Adventure 3
LiveOverflow Beginner 6y ago
What to Expect in an Ethical Hacking Interview
Cybersecurity
What to Expect in an Ethical Hacking Interview
The Cyber Mentor Beginner 6y ago
HackTheBox - Safe
Cybersecurity
HackTheBox - Safe
IppSec Intermediate 6y ago
Linux Essentials For Hackers - #14 - Networking (ifconfig, netstat & netdiscover)
Cybersecurity
Linux Essentials For Hackers - #14 - Networking (ifconfig, netstat & netdiscover)
HackerSploit Beginner 6y ago
Linux Essentials For Hackers - #13 - Users And Groups & Permissions With Visudo
Cybersecurity
Linux Essentials For Hackers - #13 - Users And Groups & Permissions With Visudo
HackerSploit Intermediate 6y ago
Linux Essentials For Hackers - #12 - File Compression & Archiving With tar
Cybersecurity
Linux Essentials For Hackers - #12 - File Compression & Archiving With tar
HackerSploit Intermediate 6y ago
Linux Essentials For Hackers - #11 - Disk Usage
Cybersecurity
Linux Essentials For Hackers - #11 - Disk Usage
HackerSploit Intermediate 6y ago
Linux Essentials For Hackers - #10 - Shells & Bash Configuration
Cybersecurity
Linux Essentials For Hackers - #10 - Shells & Bash Configuration
HackerSploit Intermediate 6y ago
Linux Essentials For Hackers - #9 - Find + OverTheWire Bandit Challenge
Cybersecurity
Linux Essentials For Hackers - #9 - Find + OverTheWire Bandit Challenge
HackerSploit Intermediate 6y ago
Cybertalk Clips | How To Improve Your CTF Skills
Cybersecurity
Cybertalk Clips | How To Improve Your CTF Skills
HackerSploit Intermediate 6y ago
Linux Essentials For Hackers - #8 - Enumerating Distribution & Kernel Information
Cybersecurity
Linux Essentials For Hackers - #8 - Enumerating Distribution & Kernel Information
HackerSploit Intermediate 6y ago
Linux Essentials For Hackers - #7 - Finding Files With Locate
Cybersecurity
Linux Essentials For Hackers - #7 - Finding Files With Locate
HackerSploit Intermediate 6y ago
Linux Essentials For Hackers - #6 - grep & piping
Cybersecurity
Linux Essentials For Hackers - #6 - grep & piping
HackerSploit Intermediate 6y ago
Cybertalk - EP2 -  CEH vs CISSP, Cybersecurity Degrees & CTFs vs Penetration Tests
Cybersecurity
Cybertalk - EP2 - CEH vs CISSP, Cybersecurity Degrees & CTFs vs Penetration Tests
HackerSploit Intermediate 6y ago
Cybertalk Clips | Importance Of Secure Coding For Developers
Cybersecurity
Cybertalk Clips | Importance Of Secure Coding For Developers
HackerSploit Intermediate 6y ago
Linux Essentials For Hackers - #5 - File & Directory Ownership
Cybersecurity
Linux Essentials For Hackers - #5 - File & Directory Ownership
HackerSploit Intermediate 6y ago
Linux Essentials For Hackers - #4 - File & Directory Permissions
Cybersecurity
Linux Essentials For Hackers - #4 - File & Directory Permissions
HackerSploit Intermediate 6y ago
John Hubbard - How to determine whether SEC401 or SEC450 is best?
Cybersecurity
John Hubbard - How to determine whether SEC401 or SEC450 is best?
SANS Institute Beginner 6y ago
John Hubbard - Will SEC 450 carry a certification?
Cybersecurity
John Hubbard - Will SEC 450 carry a certification?
SANS Institute Beginner 6y ago
John Hubbard - At the end of the SEC450 course, what do students come away with?
Cybersecurity
John Hubbard - At the end of the SEC450 course, what do students come away with?
SANS Institute Beginner 6y ago
John Hubbard - What are some of the key tools covered in SEC450?
Cybersecurity
John Hubbard - What are some of the key tools covered in SEC450?
SANS Institute Beginner 6y ago
John Hubbard - A high level walk through of each day of the SEC450 course
Cybersecurity
John Hubbard - A high level walk through of each day of the SEC450 course
SANS Institute Beginner 6y ago
John Hubbard - Who exactly was the SEC450 course designed for?
Cybersecurity
John Hubbard - Who exactly was the SEC450 course designed for?
SANS Institute Beginner 6y ago
John Hubbard – About the SEC450: Blue Team Fundamentals course
Cybersecurity
John Hubbard – About the SEC450: Blue Team Fundamentals course
SANS Institute Beginner 6y ago
John Hubbard - How long did it actually take you to write the SEC450 course?
Cybersecurity
John Hubbard - How long did it actually take you to write the SEC450 course?
SANS Institute Beginner 6y ago
John Hubbard - Did you interview other analysts and dial back to your days as an analyst?
Cybersecurity
John Hubbard - Did you interview other analysts and dial back to your days as an analyst?
SANS Institute Beginner 6y ago
John Hubbard - Why were you the one to create a course for new Blue Teamers?
Cybersecurity
John Hubbard - Why were you the one to create a course for new Blue Teamers?
SANS Institute Beginner 6y ago
John Hubbard - How did teaching at SANS come about?
Cybersecurity
John Hubbard - How did teaching at SANS come about?
SANS Institute Beginner 6y ago
John Hubbard - key things that helped him rise from being an analyst to becoming a SOC manager
Cybersecurity
John Hubbard - key things that helped him rise from being an analyst to becoming a SOC manager
SANS Institute Beginner 6y ago
John Hubbard - some of the early challenges as a young SOC analyst
Cybersecurity
John Hubbard - some of the early challenges as a young SOC analyst
SANS Institute Beginner 6y ago
John Hubbard - aspirations of becoming an engineer
Cybersecurity
John Hubbard - aspirations of becoming an engineer
SANS Institute Beginner 6y ago
Introducing John Hubbard
Cybersecurity
Introducing John Hubbard
SANS Institute Beginner 6y ago
Linux Essentials For Hackers - #3 - File Management & Manipulation
Cybersecurity
Linux Essentials For Hackers - #3 - File Management & Manipulation
HackerSploit Intermediate 6y ago
Linux Essentials For Hackers - #2 - Useful keyboard Shortcuts
Cybersecurity
Linux Essentials For Hackers - #2 - Useful keyboard Shortcuts
HackerSploit Intermediate 6y ago
Linux Essentials For Hackers - #1 - Introduction
Cybersecurity
Linux Essentials For Hackers - #1 - Introduction
HackerSploit Beginner 6y ago
Latest Techniques in Hacking the Human | SANS Security Awareness Summit
Cybersecurity
Latest Techniques in Hacking the Human | SANS Security Awareness Summit
SANS Institute Advanced 6y ago
Kali Linux: Hacking Networks Part 1
Cybersecurity
Kali Linux: Hacking Networks Part 1
David Bombal Beginner 6y ago
FristiLeaks1.3 - CTF Walkthrough - Boot-To-Root
Cybersecurity
FristiLeaks1.3 - CTF Walkthrough - Boot-To-Root
HackerSploit Intermediate 6y ago
📚 Coursera Courses Opens on Coursera · Free to audit
1 / 3 View all →
JavaScript Security Part 1
📚 Coursera Course ↗
Self-paced
JavaScript Security Part 1
Opens on Coursera ↗
Cloud Top Ten Risks
📚 Coursera Course ↗
Self-paced
Cloud Top Ten Risks
Opens on Coursera ↗
AWS Developer: Unit 2
📚 Coursera Course ↗
Self-paced
AWS Developer: Unit 2
Opens on Coursera ↗
Defense in Depth Cybersecurity – Layered Security Strategy
📚 Coursera Course ↗
Self-paced
Defense in Depth Cybersecurity – Layered Security Strategy
Opens on Coursera ↗
Biohacking Your Brain's Health
📚 Coursera Course ↗
Self-paced
Biohacking Your Brain's Health
Opens on Coursera ↗
Cloud Network Security & Operations
📚 Coursera Course ↗
Self-paced
Cloud Network Security & Operations
Opens on Coursera ↗