Tech Skills

Cybersecurity

Ethical hacking, penetration testing, network security, CTFs and defensive security

5198
lessons
Skills in this topic
View full skill map →
Security Basics
beginner
Fix OWASP top 10 vulnerabilities
AI Security
intermediate
Identify and patch prompt injection vulnerabilities
Network Security
intermediate
Configure a firewall with proper inbound/outbound rules
Ethical Hacking & Pen Testing
intermediate
Conduct a full pen test with Kali Linux
Cloud Security
intermediate
Implement IAM least-privilege policies on AWS/GCP
Incident Response
intermediate
Build an incident response playbook
Security Compliance
intermediate
Map controls for SOC 2 Type II compliance
Defensive AI
advanced
Build an AI-powered log anomaly detector
Kali Linux Install: Ethical hacking getting started guide
Cybersecurity
Kali Linux Install: Ethical hacking getting started guide
David Bombal Beginner 6y ago
Cybertalk - EP1 -  Secure Coding, HackTheBox & Web App Penetration Testing
Cybersecurity
Cybertalk - EP1 - Secure Coding, HackTheBox & Web App Penetration Testing
HackerSploit Intermediate 6y ago
I Am So Nervous...Big Changes Ahead! | FHTV Ep 120
Cybersecurity
I Am So Nervous...Big Changes Ahead! | FHTV Ep 120
Russell Brunson Beginner 6y ago
Packet Tracer Installation: macOS Catalina
Cybersecurity
Packet Tracer Installation: macOS Catalina
David Bombal Beginner 6y ago
How to Become a Hacker (top certifications) feat. The Cyber Mentor
Cybersecurity
How to Become a Hacker (top certifications) feat. The Cyber Mentor
NetworkChuck Beginner 6y ago
HackTheBox - Ellingson
Cybersecurity
HackTheBox - Ellingson
IppSec Intermediate 6y ago
PicoCTF 2019 [02] Inspector (HTML, CSS, JavaScript)
Cybersecurity
PicoCTF 2019 [02] Inspector (HTML, CSS, JavaScript)
John Hammond Intermediate 6y ago
SUDO Security Policy Bypass Vulnerability - CVE-2019-14287
Cybersecurity
SUDO Security Policy Bypass Vulnerability - CVE-2019-14287
HackerSploit Intermediate 6y ago
HackTheBox - Writeup
Cybersecurity
HackTheBox - Writeup
IppSec Beginner 6y ago
Automating Recon with Bash Scripting
Cybersecurity
Automating Recon with Bash Scripting
The Cyber Mentor Beginner 6y ago
OSCP - Taking Notes & Resources
Cybersecurity
OSCP - Taking Notes & Resources
John Hammond Intermediate 6y ago
Bug Bounty - Hunting Third Level Domains
Cybersecurity
Bug Bounty - Hunting Third Level Domains
The Cyber Mentor Beginner 6y ago
The Hacking Wars - How Governments Hack Each Other
Cybersecurity
The Hacking Wars - How Governments Hack Each Other
ColdFusion Beginner 6y ago
Top 10 Writing Mistakes in Cybersecurity and How You Can Avoid Them
Cybersecurity
Top 10 Writing Mistakes in Cybersecurity and How You Can Avoid Them
SANS Institute Beginner 6y ago
i just turned 30.....5 thoughts
Cybersecurity
i just turned 30.....5 thoughts
NetworkChuck Beginner 6y ago
Cybersecurity, continued - CS50 for Lawyers 2019
Cybersecurity
Cybersecurity, continued - CS50 for Lawyers 2019
CS50 Beginner 6y ago
SANS Pen Test HackFest Summit & Training 2019: Sneak Peek
Cybersecurity
SANS Pen Test HackFest Summit & Training 2019: Sneak Peek
SANS Institute Beginner 6y ago
Cisco Packet Tracer Download
Cybersecurity
Cisco Packet Tracer Download
David Bombal Beginner 6y ago
Python3 For Pentesting - Developing A Banner Grabbing Script
Cybersecurity
Python3 For Pentesting - Developing A Banner Grabbing Script
HackerSploit Intermediate 6y ago
Web App Testing: Ep 5: SQL Injections and Live Bug Bounty Hunting
Cybersecurity
Web App Testing: Ep 5: SQL Injections and Live Bug Bounty Hunting
The Cyber Mentor Beginner 6y ago
A Hacker's Toolkit - Hak5 Elite Kit, Pentest Dropboxes, Wireless Gear, and More
Cybersecurity
A Hacker's Toolkit - Hak5 Elite Kit, Pentest Dropboxes, Wireless Gear, and More
The Cyber Mentor Beginner 6y ago
How To Upgrade Linux Kernel On Ubuntu
Cybersecurity
How To Upgrade Linux Kernel On Ubuntu
HackerSploit Intermediate 6y ago
Channel Update - Where I Have Been & What Is The Future Of The Channel
Cybersecurity
Channel Update - Where I Have Been & What Is The Future Of The Channel
HackerSploit Beginner 6y ago
BCACTF "For the NIght is Dark" (with SInisterMatrix!)
Cybersecurity
BCACTF "For the NIght is Dark" (with SInisterMatrix!)
John Hammond Intermediate 6y ago
100% OSCP: Offensive Security Certified Professional
Cybersecurity
100% OSCP: Offensive Security Certified Professional
John Hammond Intermediate 6y ago
BCACTF - Bruteforcing "Basic Pass" (with SinisterMatrix!)
Cybersecurity
BCACTF - Bruteforcing "Basic Pass" (with SinisterMatrix!)
John Hammond Intermediate 6y ago
Top 5 Internal Pentesting Methods
Cybersecurity
Top 5 Internal Pentesting Methods
The Cyber Mentor Beginner 6y ago
BCACTF - LISP "Thspeaking" (with SinisterMatrix!)
Cybersecurity
BCACTF - LISP "Thspeaking" (with SinisterMatrix!)
John Hammond Intermediate 6y ago
HackTheBox - Kryptos
Cybersecurity
HackTheBox - Kryptos
IppSec Beginner 6y ago
Pentesting for n00bs: Episode 9 - Grandpa
Cybersecurity
Pentesting for n00bs: Episode 9 - Grandpa
The Cyber Mentor Beginner 6y ago
Python3 For Pentesting - Developing A Port Scanner
Cybersecurity
Python3 For Pentesting - Developing A Port Scanner
HackerSploit Beginner 6y ago
Pentesting for n00bs: Episode 8 - Bashed (hackthebox)
Cybersecurity
Pentesting for n00bs: Episode 8 - Bashed (hackthebox)
The Cyber Mentor Beginner 6y ago
Malware Analysis Bootcamp - Creating YARA Rules
Cybersecurity
Malware Analysis Bootcamp - Creating YARA Rules
HackerSploit Beginner 6y ago
Malware Analysis Bootcamp - Malware Classification And Identification
Cybersecurity
Malware Analysis Bootcamp - Malware Classification And Identification
HackerSploit Beginner 6y ago
100k GIVEAWAY - Synology, Boson CCNA, David Bombal
Cybersecurity
100k GIVEAWAY - Synology, Boson CCNA, David Bombal
NetworkChuck Beginner 6y ago
10x Engineer: Linux commands on Cisco IOS? Wow!
Cybersecurity
10x Engineer: Linux commands on Cisco IOS? Wow!
David Bombal Beginner 6y ago
Pentesting for n00bs: Episode 7 - Optimum (hackthebox)
Cybersecurity
Pentesting for n00bs: Episode 7 - Optimum (hackthebox)
The Cyber Mentor Beginner 6y ago
Kioptrix 1.1 Walkthrough - Boot-To-Root
Cybersecurity
Kioptrix 1.1 Walkthrough - Boot-To-Root
HackerSploit Intermediate 6y ago
10x Engineer: What? You can do this on Cisco IOS?
Cybersecurity
10x Engineer: What? You can do this on Cisco IOS?
David Bombal Intermediate 6y ago
Web App Testing: Episode 4 - XXE, Input Validation, Broken Access Control, and More XSS
Cybersecurity
Web App Testing: Episode 4 - XXE, Input Validation, Broken Access Control, and More XSS
The Cyber Mentor Beginner 6y ago
GNS3 API: Jeremy explains how the API works
Cybersecurity
GNS3 API: Jeremy explains how the API works
David Bombal Beginner 6y ago
How NOT to Approach a Cybersecurity Mentor
Cybersecurity
How NOT to Approach a Cybersecurity Mentor
The Cyber Mentor Beginner 6y ago
GNS3: Docker containers vs Virtual Machines
Cybersecurity
GNS3: Docker containers vs Virtual Machines
David Bombal Intermediate 6y ago
Web App Testing: Episode 3 - XSS, SQL Injection, and Broken Access Control
Cybersecurity
Web App Testing: Episode 3 - XSS, SQL Injection, and Broken Access Control
The Cyber Mentor Intermediate 6y ago
Malware Analysis Bootcamp - Examining The Resources Section
Cybersecurity
Malware Analysis Bootcamp - Examining The Resources Section
HackerSploit Beginner 6y ago
Hacking (redacted) PUBLIC WiFi with a Raspberry Pi and Kali Linux
Cybersecurity
Hacking (redacted) PUBLIC WiFi with a Raspberry Pi and Kali Linux
NetworkChuck Beginner 6y ago
Malware Analysis Bootcamp - Analyzing The PE Header
Cybersecurity
Malware Analysis Bootcamp - Analyzing The PE Header
HackerSploit Beginner 6y ago
Pentesting for n00bs: Episode 6 - Nibbles
Cybersecurity
Pentesting for n00bs: Episode 6 - Nibbles
The Cyber Mentor Beginner 6y ago
📚 Coursera Courses Opens on Coursera · Free to audit
1 / 3 View all →
Crisis Communications
📚 Coursera Course ↗
Self-paced
Crisis Communications
Opens on Coursera ↗
Play It Safe: Manage Security Risks
📚 Coursera Course ↗
Self-paced
Play It Safe: Manage Security Risks
Opens on Coursera ↗
Managing and Optimizing SD-Branch Networks
📚 Coursera Course ↗
Self-paced
Managing and Optimizing SD-Branch Networks
Opens on Coursera ↗
IoT Security: Interface and Data Security
📚 Coursera Course ↗
Self-paced
IoT Security: Interface and Data Security
Opens on Coursera ↗
Ethical Hacking Capstone Project: Breach, Response, AI
📚 Coursera Course ↗
Self-paced
Ethical Hacking Capstone Project: Breach, Response, AI
Opens on Coursera ↗
Cybersecurity Compliance Framework, Standards & Regulations
📚 Coursera Course ↗
Self-paced
Cybersecurity Compliance Framework, Standards & Regulations
Opens on Coursera ↗