Tech Skills

Cybersecurity

Ethical hacking, penetration testing, network security, CTFs and defensive security

7,099
lessons
Skills in this topic
View full skill map →
Security Basics
beginner
Fix OWASP top 10 vulnerabilities
AI Security
intermediate
Identify and patch prompt injection vulnerabilities
Network Security
intermediate
Configure a firewall with proper inbound/outbound rules
Ethical Hacking & Pen Testing
intermediate
Conduct a full pen test with Kali Linux
Cloud Security
intermediate
Implement IAM least-privilege policies on AWS/GCP
Incident Response
intermediate
Build an incident response playbook
Security Compliance
intermediate
Map controls for SOC 2 Type II compliance
Defensive AI
advanced
Build an AI-powered log anomaly detector
HackTheBox Walkthrough - Legacy
Cybersecurity ⚡ AI Lesson
HackTheBox Walkthrough - Legacy
HackerSploit Intermediate 6y ago
SPECIAL WEBCAST: What you need to know about the Crypt32.dll / CryptoAPI Flaw
Cybersecurity
SPECIAL WEBCAST: What you need to know about the Crypt32.dll / CryptoAPI Flaw
SANS Institute Advanced 6y ago
Hosting My Own CTF - BsidesDE 2019
Cybersecurity
Hosting My Own CTF - BsidesDE 2019
John Hammond Intermediate 6y ago
OverTheWire Natas Walkthrough - Level 5 - 10 (LFI & Command Injection)
Cybersecurity ⚡ AI Lesson
OverTheWire Natas Walkthrough - Level 5 - 10 (LFI & Command Injection)
HackerSploit Intermediate 6y ago
VirtualBox nested Intel virtualization is here!
Cybersecurity
VirtualBox nested Intel virtualization is here!
David Bombal Intermediate 6y ago
Perfect Forward Secrecy in TLS Explained
Cybersecurity ⚡ AI Lesson
Perfect Forward Secrecy in TLS Explained
Hussein Nasser Beginner 6y ago
How I Made $100,000 in a Month
Cybersecurity ⚡ AI Lesson
How I Made $100,000 in a Month
The Cyber Mentor Beginner 6y ago
How HTTPS Work?
Cybersecurity
How HTTPS Work?
Hussein Nasser Advanced 6y ago
HackTheBox - Smasher2
Cybersecurity
HackTheBox - Smasher2
IppSec Beginner 6y ago
How to Build an Active Directory Hacking Lab
Cybersecurity ⚡ AI Lesson
How to Build an Active Directory Hacking Lab
The Cyber Mentor Beginner 6y ago
Christmas Giveaway Day 7: Your Last Chance.
Cybersecurity
Christmas Giveaway Day 7: Your Last Chance.
David Bombal Beginner 6y ago
Hacking My Instagram Account
Cybersecurity
Hacking My Instagram Account
LiveOverflow Intermediate 6y ago
Race Condition Trick /proc/self/fd
Cybersecurity
Race Condition Trick /proc/self/fd
LiveOverflow Intermediate 6y ago
End of year AMA - Full recording of last stream of the year!
Cybersecurity
End of year AMA - Full recording of last stream of the year!
Fun Fun Function Beginner 6y ago
Chef and Rezilion Team Up to Automate Resilience
Cybersecurity
Chef and Rezilion Team Up to Automate Resilience
The New Stack Intermediate 6y ago
Introducing Core NetWars Continuous 2
Cybersecurity
Introducing Core NetWars Continuous 2
SANS Institute Beginner 6y ago
HackTheBox - Heist
Cybersecurity ⚡ AI Lesson
HackTheBox - Heist
IppSec Intermediate 6y ago
OverTheWire Natas Walkthrough - Level 0 - 4
Cybersecurity ⚡ AI Lesson
OverTheWire Natas Walkthrough - Level 0 - 4
HackerSploit Intermediate 6y ago
What Is The Best Linux Distribution?
Cybersecurity ⚡ AI Lesson
What Is The Best Linux Distribution?
HackerSploit Beginner 6y ago
OverTheWire Bandit Walkthrough - Level 32 - 33
Cybersecurity ⚡ AI Lesson
OverTheWire Bandit Walkthrough - Level 32 - 33
HackerSploit Beginner 6y ago
OverTheWire Bandit Walkthrough - Level 27 - 31
Cybersecurity ⚡ AI Lesson
OverTheWire Bandit Walkthrough - Level 27 - 31
HackerSploit Intermediate 6y ago
OverTheWire Bandit Walkthrough - Level 24 - 26
Cybersecurity ⚡ AI Lesson
OverTheWire Bandit Walkthrough - Level 24 - 26
HackerSploit Intermediate 6y ago
OverTheWire Bandit Walkthrough - Level 19 - 20
Cybersecurity ⚡ AI Lesson
OverTheWire Bandit Walkthrough - Level 19 - 20
HackerSploit Intermediate 6y ago
OverTheWire Bandit Walkthrough - Level 13 - 18
Cybersecurity ⚡ AI Lesson
OverTheWire Bandit Walkthrough - Level 13 - 18
HackerSploit Intermediate 6y ago
OverTheWire Bandit Walkthrough - Level 12
Cybersecurity ⚡ AI Lesson
OverTheWire Bandit Walkthrough - Level 12
HackerSploit Intermediate 6y ago
OverTheWire Bandit Walkthrough - Level 7 - 11
Cybersecurity ⚡ AI Lesson
OverTheWire Bandit Walkthrough - Level 7 - 11
HackerSploit Intermediate 6y ago
How To Install And Configure Arch Linux For Penetration Testing
Cybersecurity ⚡ AI Lesson
How To Install And Configure Arch Linux For Penetration Testing
HackerSploit Intermediate 6y ago
Christmas Giveaway Day 6: MASSIVE Cisco Giveaway
Cybersecurity
Christmas Giveaway Day 6: MASSIVE Cisco Giveaway
David Bombal Beginner 6y ago
Christmas Giveaway Day 5: The start of HUGE Giveaways!
Cybersecurity
Christmas Giveaway Day 5: The start of HUGE Giveaways!
David Bombal Beginner 6y ago
Christmas Giveaway Day 4: CCNA, CompTIA, SDN, Wireshark and more!
Cybersecurity
Christmas Giveaway Day 4: CCNA, CompTIA, SDN, Wireshark and more!
David Bombal Beginner 6y ago
Christmas Giveaway Day 3: CCNA, CCNA Cyber Ops, Amazon eGift and more!
Cybersecurity
Christmas Giveaway Day 3: CCNA, CCNA Cyber Ops, Amazon eGift and more!
David Bombal Intermediate 6y ago
Christmas Giveaway Day 2: CISSP, CCNA, Python and more!
Cybersecurity
Christmas Giveaway Day 2: CISSP, CCNA, Python and more!
David Bombal Intermediate 6y ago
How To Install Metasploitable3 [Cybersecurity]
Cybersecurity ⚡ AI Lesson
How To Install Metasploitable3 [Cybersecurity]
HackerSploit Intermediate 6y ago
Christmas Giveaway Day 1: CEH, CCNA, Python and more!
Cybersecurity
Christmas Giveaway Day 1: CEH, CCNA, Python and more!
David Bombal Intermediate 6y ago
Docker For Pentesting On Windows [Cybersecurity]
Cybersecurity ⚡ AI Lesson
Docker For Pentesting On Windows [Cybersecurity]
HackerSploit Intermediate 6y ago
Cybertalk - EP4 - IDA Pro, Malware Analysis & Python Libraries
Cybersecurity ⚡ AI Lesson
Cybertalk - EP4 - IDA Pro, Malware Analysis & Python Libraries
HackerSploit Intermediate 6y ago
VPN vs Proxy Explained Pros and Cons
Cybersecurity
VPN vs Proxy Explained Pros and Cons
Hussein Nasser Beginner 6y ago
Docker For Pentesting And Bug Bounty Hunting
Cybersecurity ⚡ AI Lesson
Docker For Pentesting And Bug Bounty Hunting
HackerSploit Intermediate 6y ago
Public Penetration Test Reports - Learning Resource
Cybersecurity
Public Penetration Test Reports - Learning Resource
LiveOverflow Beginner 6y ago
Domain Admin via IPv6 DNS Takeover
Cybersecurity ⚡ AI Lesson
Domain Admin via IPv6 DNS Takeover
The Cyber Mentor Beginner 6y ago
How To Learn Hacking With CTFs
Cybersecurity ⚡ AI Lesson
How To Learn Hacking With CTFs
LiveOverflow Beginner 6y ago
WHY YOUR HACKING QUESTIONS ARE FRUSTRATING!!!
Cybersecurity
WHY YOUR HACKING QUESTIONS ARE FRUSTRATING!!!
LiveOverflow Intermediate 6y ago
Kali Linux WiFi
Cybersecurity
Kali Linux WiFi
David Bombal Beginner 6y ago
Best Operating Systems for Hacking?!
Cybersecurity
Best Operating Systems for Hacking?!
LiveOverflow Intermediate 6y ago
Cybertalk - EP3 - Cybersecurity Certifications & Learning Resources
Cybersecurity ⚡ AI Lesson
Cybertalk - EP3 - Cybersecurity Certifications & Learning Resources
HackerSploit Beginner 6y ago
SECRET HACKER FORUM - The Place Where We Talk and Learn
Cybersecurity ⚡ AI Lesson
SECRET HACKER FORUM - The Place Where We Talk and Learn
LiveOverflow Beginner 6y ago
Stapler 1 - CTF Walkthrough - Boot-To-Root
Cybersecurity ⚡ AI Lesson
Stapler 1 - CTF Walkthrough - Boot-To-Root
HackerSploit Intermediate 6y ago
Cybertalk Clips | Best Web App Pentesting Tools
Cybersecurity ⚡ AI Lesson
Cybertalk Clips | Best Web App Pentesting Tools
HackerSploit Intermediate 6y ago
📚 Coursera Courses Opens on Coursera · Free to audit
1 / 3 View all →
Wireshark 101: Packet Analysis Essentials
📚 Coursera Course ↗
Self-paced
Wireshark 101: Packet Analysis Essentials
Opens on Coursera ↗
Memory, Encryption, and Protecting Data in iOS
📚 Coursera Course ↗
Self-paced
Memory, Encryption, and Protecting Data in iOS
Opens on Coursera ↗
Palo Alto Networks Cybersecurity Fundamentals
📚 Coursera Course ↗
Self-paced
Palo Alto Networks Cybersecurity Fundamentals
Opens on Coursera ↗
Azure Cybersecurity Solutions And Microsoft Defender
📚 Coursera Course ↗
Self-paced
Azure Cybersecurity Solutions And Microsoft Defender
Opens on Coursera ↗
Securing Hosts, Network, and Edge in AWS
📚 Coursera Course ↗
Self-paced
Securing Hosts, Network, and Edge in AWS
Opens on Coursera ↗
Python Cryptography: Build & Explore Classical Ciphers
📚 Coursera Course ↗
Self-paced
Python Cryptography: Build & Explore Classical Ciphers
Opens on Coursera ↗