Tech Skills

Cybersecurity

Ethical hacking, penetration testing, network security, CTFs and defensive security

5198
lessons
Skills in this topic
View full skill map →
Security Basics
beginner
Fix OWASP top 10 vulnerabilities
AI Security
intermediate
Identify and patch prompt injection vulnerabilities
Network Security
intermediate
Configure a firewall with proper inbound/outbound rules
Ethical Hacking & Pen Testing
intermediate
Conduct a full pen test with Kali Linux
Cloud Security
intermediate
Implement IAM least-privilege policies on AWS/GCP
Incident Response
intermediate
Build an incident response playbook
Security Compliance
intermediate
Map controls for SOC 2 Type II compliance
Defensive AI
advanced
Build an AI-powered log anomaly detector
Web App Testing: Episode 2 - Enumeration, XSS, and UI Bypassing
Cybersecurity
Web App Testing: Episode 2 - Enumeration, XSS, and UI Bypassing
The Cyber Mentor Beginner 6y ago
Malware Analysis Bootcamp - Understanding The PE Header
Cybersecurity
Malware Analysis Bootcamp - Understanding The PE Header
HackerSploit Beginner 6y ago
How Speedrunners Use Game Hacking Tools
Cybersecurity
How Speedrunners Use Game Hacking Tools
LiveOverflow Intermediate 6y ago
The TOP 3 uses for a Raspberry Pi!!
Cybersecurity
The TOP 3 uses for a Raspberry Pi!!
NetworkChuck Intermediate 6y ago
Pentesting for n00bs: Episode 5 - Jerry
Cybersecurity
Pentesting for n00bs: Episode 5 - Jerry
The Cyber Mentor Beginner 6y ago
Wireshark Tutorial - Installation and Password sniffing
Cybersecurity
Wireshark Tutorial - Installation and Password sniffing
David Bombal Beginner 6y ago
ATT&CKing Your Enterprise: Adversary Detection Pipelines & Adversary Simulation
Cybersecurity
ATT&CKing Your Enterprise: Adversary Detection Pipelines & Adversary Simulation
SANS Institute Intermediate 6y ago
Malware Analysis Bootcamp - Packers & Unpacking
Cybersecurity
Malware Analysis Bootcamp - Packers & Unpacking
HackerSploit Beginner 6y ago
Almost All Web Encryption Works Like This (SP Networks) - Computerphile
Cybersecurity
Almost All Web Encryption Works Like This (SP Networks) - Computerphile
Computerphile Intermediate 6y ago
What you need to know about SEC503: Intrusion Detection In-Depth
Cybersecurity
What you need to know about SEC503: Intrusion Detection In-Depth
SANS Institute Beginner 6y ago
Windows Game Hacking with Ghidra and Cheat Engine
Cybersecurity
Windows Game Hacking with Ghidra and Cheat Engine
LiveOverflow Beginner 6y ago
HACKERS REACT: Bad Hollywood Hacking Scenes
Cybersecurity
HACKERS REACT: Bad Hollywood Hacking Scenes
John Hammond Intermediate 6y ago
HackTheBox - LaCasaDePapel
Cybersecurity
HackTheBox - LaCasaDePapel
IppSec Beginner 6y ago
MITRE CTF 2019 HIGHLIGHTS
Cybersecurity
MITRE CTF 2019 HIGHLIGHTS
John Hammond Intermediate 6y ago
How public WIFI can be sniffed?
Cybersecurity
How public WIFI can be sniffed?
Hussein Nasser Intermediate 6y ago
Chatting about Cryptography and Exploit Regulations
Cybersecurity
Chatting about Cryptography and Exploit Regulations
LiveUnderflow Intermediate 6y ago
Hacking Skills Perspective
Cybersecurity
Hacking Skills Perspective
LiveUnderflow Intermediate 6y ago
tshark and Termshark tutorial: Capture and view wireshark captures in a console
Cybersecurity
tshark and Termshark tutorial: Capture and view wireshark captures in a console
David Bombal Beginner 6y ago
Pentesting for n00bs: Episode 4 - Devel
Cybersecurity
Pentesting for n00bs: Episode 4 - Devel
The Cyber Mentor Beginner 6y ago
Web App Testing: Episode 1 - Enumeration
Cybersecurity
Web App Testing: Episode 1 - Enumeration
The Cyber Mentor Beginner 6y ago
Malware Analysis Bootcamp - Extracting Strings
Cybersecurity
Malware Analysis Bootcamp - Extracting Strings
HackerSploit Beginner 6y ago
What you need to know about SEC487: Open-Source Intelligence (OSINT) Gathering and Analysis
Cybersecurity
What you need to know about SEC487: Open-Source Intelligence (OSINT) Gathering and Analysis
SANS Institute Beginner 6y ago
Malware Analysis Bootcamp - Generating Malware Hashes
Cybersecurity
Malware Analysis Bootcamp - Generating Malware Hashes
HackerSploit Beginner 6y ago
Malware Analysis Bootcamp - File Type Identification
Cybersecurity
Malware Analysis Bootcamp - File Type Identification
HackerSploit Beginner 6y ago
Malware Analysis Bootcamp - Introduction To Static Analysis
Cybersecurity
Malware Analysis Bootcamp - Introduction To Static Analysis
HackerSploit Beginner 6y ago
Pentesting for n00bs: Episode 3 - Blue
Cybersecurity
Pentesting for n00bs: Episode 3 - Blue
The Cyber Mentor Beginner 6y ago
Malware Analysis Bootcamp - Setting Up Our Environment
Cybersecurity
Malware Analysis Bootcamp - Setting Up Our Environment
HackerSploit Beginner 6y ago
Malware Analysis Bootcamp - Introduction To Malware Analysis
Cybersecurity
Malware Analysis Bootcamp - Introduction To Malware Analysis
HackerSploit Beginner 6y ago
Malware Analysis Bootcamp - Introduction To The Course
Cybersecurity
Malware Analysis Bootcamp - Introduction To The Course
HackerSploit Beginner 6y ago
Pentesting for n00bs: Episode 2 - Lame
Cybersecurity
Pentesting for n00bs: Episode 2 - Lame
The Cyber Mentor Beginner 6y ago
Preventing Your Physical Access Control System from Being Used Against You - SANS ICS Summit 2019
Cybersecurity
Preventing Your Physical Access Control System from Being Used Against You - SANS ICS Summit 2019
SANS Institute Intermediate 6y ago
Pentesting for n00bs: Episode 1 - Legacy (hackthebox)
Cybersecurity
Pentesting for n00bs: Episode 1 - Legacy (hackthebox)
The Cyber Mentor Beginner 6y ago
Popping a Shell with SMB Relay and Empire
Cybersecurity
Popping a Shell with SMB Relay and Empire
The Cyber Mentor Beginner 6y ago
Network Flow Data: A Cornucopia of Value - SANS Blue Team Summit
Cybersecurity
Network Flow Data: A Cornucopia of Value - SANS Blue Team Summit
SANS Institute Beginner 6y ago
How To Install VMware Tools On BlackArch Linux
Cybersecurity
How To Install VMware Tools On BlackArch Linux
HackerSploit Intermediate 6y ago
How To Install Desktop Environments And Change Screen Resolution With xrandr
Cybersecurity
How To Install Desktop Environments And Change Screen Resolution With xrandr
HackerSploit Intermediate 6y ago
How To Install BlackArch Linux
Cybersecurity
How To Install BlackArch Linux
HackerSploit Intermediate 6y ago
Zero-Trust Networks: The Future Is Here - SANS Blue Team Summit 2019
Cybersecurity
Zero-Trust Networks: The Future Is Here - SANS Blue Team Summit 2019
SANS Institute Intermediate 6y ago
How To Setup A Virtualization Server With Proxmox
Cybersecurity
How To Setup A Virtualization Server With Proxmox
HackerSploit Intermediate 6y ago
Pivoting And Persistence With Armitage
Cybersecurity
Pivoting And Persistence With Armitage
HackerSploit Intermediate 6y ago
To Blue with ATT&CK-Flavored Love - SANS Blue Team Summit
Cybersecurity
To Blue with ATT&CK-Flavored Love - SANS Blue Team Summit
SANS Institute Intermediate 6y ago
Full Ethical Hacking Course - Beginner Network Penetration Testing (2019)
Cybersecurity
Full Ethical Hacking Course - Beginner Network Penetration Testing (2019)
The Cyber Mentor Beginner 6y ago
Post Exploitation With Windows Credentials Editor (WCE) - Dump Windows Password Hashes
Cybersecurity
Post Exploitation With Windows Credentials Editor (WCE) - Dump Windows Password Hashes
HackerSploit Intermediate 6y ago
Information Gathering With Shodan
Cybersecurity
Information Gathering With Shodan
HackerSploit Intermediate 6y ago
Speedrun Hacking Buffer Overflow - speedrun-001 DC27
Cybersecurity
Speedrun Hacking Buffer Overflow - speedrun-001 DC27
LiveOverflow Beginner 6y ago
Discussing Hacking Videos - Community Guidelines YouTube
Cybersecurity
Discussing Hacking Videos - Community Guidelines YouTube
LiveUnderflow Beginner 6y ago
YouTube BANNING Hacking Videos - Hot Take
Cybersecurity
YouTube BANNING Hacking Videos - Hot Take
LiveOverflow Beginner 6y ago
Python, Genie and CSV Files = Easy Network Automation (DevNet)
Cybersecurity
Python, Genie and CSV Files = Easy Network Automation (DevNet)
David Bombal Beginner 6y ago
📚 Coursera Courses Opens on Coursera · Free to audit
1 / 3 View all →
Security Hardening
📚 Coursera Course ↗
Self-paced
Security Hardening
Opens on Coursera ↗
An Introduction to Cryptography
📚 Coursera Course ↗
Self-paced
An Introduction to Cryptography
Opens on Coursera ↗
IT-Sicherheit: Grundlagen für Sicherheitsarchitektur
📚 Coursera Course ↗
Self-paced
IT-Sicherheit: Grundlagen für Sicherheitsarchitektur
Opens on Coursera ↗
Implementing Basic BGP
📚 Coursera Course ↗
Self-paced
Implementing Basic BGP
Opens on Coursera ↗
Foundations of Information Security and Incident Handling
📚 Coursera Course ↗
Self-paced
Foundations of Information Security and Incident Handling
Opens on Coursera ↗
Advanced Network Services, Security, and Programmability
📚 Coursera Course ↗
Self-paced
Advanced Network Services, Security, and Programmability
Opens on Coursera ↗