Tech Skills

Cybersecurity

Ethical hacking, penetration testing, network security, CTFs and defensive security

5198
lessons
Skills in this topic
View full skill map →
Security Basics
beginner
Fix OWASP top 10 vulnerabilities
AI Security
intermediate
Identify and patch prompt injection vulnerabilities
Network Security
intermediate
Configure a firewall with proper inbound/outbound rules
Ethical Hacking & Pen Testing
intermediate
Conduct a full pen test with Kali Linux
Cloud Security
intermediate
Implement IAM least-privilege policies on AWS/GCP
Incident Response
intermediate
Build an incident response playbook
Security Compliance
intermediate
Map controls for SOC 2 Type II compliance
Defensive AI
advanced
Build an AI-powered log anomaly detector
bWAPP - OS Command Injection With Commix (All levels)
Cybersecurity
bWAPP - OS Command Injection With Commix (All levels)
HackerSploit Intermediate 6y ago
bWAPP - HTML Injection - Stored (Blog)
Cybersecurity
bWAPP - HTML Injection - Stored (Blog)
HackerSploit Intermediate 6y ago
Zero to Hero: Week 9 - NTLM Relay, Token Impersonation, Pass the Hash, PsExec, and more
Cybersecurity
Zero to Hero: Week 9 - NTLM Relay, Token Impersonation, Pass the Hash, PsExec, and more
The Cyber Mentor Beginner 6y ago
Active Directory Exploitation - LLMNR/NBT-NS Poisoning
Cybersecurity
Active Directory Exploitation - LLMNR/NBT-NS Poisoning
The Cyber Mentor Beginner 6y ago
HackTheBox - LightWeight
Cybersecurity
HackTheBox - LightWeight
IppSec Intermediate 6y ago
HackTheBox - Bighead
Cybersecurity
HackTheBox - Bighead
IppSec Intermediate 6y ago
CCNA Dynamic Trunking Protocol (DTP) Quiz: Can you answer the ccna quiz questions?
Cybersecurity
CCNA Dynamic Trunking Protocol (DTP) Quiz: Can you answer the ccna quiz questions?
David Bombal Intermediate 6y ago
CCNA Quiz: The OSI model with Wireshark captures. Can you answer these quiz questions?
Cybersecurity
CCNA Quiz: The OSI model with Wireshark captures. Can you answer these quiz questions?
David Bombal Intermediate 7y ago
SunshineCTF 2019: Wrestler Book (Explicit SQL Injection)
Cybersecurity
SunshineCTF 2019: Wrestler Book (Explicit SQL Injection)
John Hammond Intermediate 7y ago
SunshineCTF 2019: WelcomeCrypto [ROT47]
Cybersecurity
SunshineCTF 2019: WelcomeCrypto [ROT47]
John Hammond Intermediate 7y ago
KALI LINUX! - CS50 Live, EP. 51
Cybersecurity
KALI LINUX! - CS50 Live, EP. 51
CS50 Intermediate 7y ago
LIVE CTF, PART 2! - CS50 Live, EP. 50
Cybersecurity
LIVE CTF, PART 2! - CS50 Live, EP. 50
CS50 Beginner 7y ago
bWAPP - HTML Injection - Reflected POST
Cybersecurity
bWAPP - HTML Injection - Reflected POST
HackerSploit Intermediate 6y ago
CrunchBangPlusPlus - #!++ - Installation & Review
Cybersecurity
CrunchBangPlusPlus - #!++ - Installation & Review
HackerSploit Intermediate 6y ago
Bug Bounty Hunting - PHP Code Injection
Cybersecurity
Bug Bounty Hunting - PHP Code Injection
HackerSploit Intermediate 6y ago
Heartbleed Exploit - Discovery & Exploitation
Cybersecurity
Heartbleed Exploit - Discovery & Exploitation
HackerSploit Intermediate 6y ago
A Day in the Life of an Ethical Hacker / Penetration Tester
Cybersecurity
A Day in the Life of an Ethical Hacker / Penetration Tester
The Cyber Mentor Beginner 6y ago
Zero to Hero: Week 8 - Building an AD Lab, LLMNR Poisoning, and NTLMv2 Cracking with Hashcat
Cybersecurity
Zero to Hero: Week 8 - Building an AD Lab, LLMNR Poisoning, and NTLMv2 Cracking with Hashcat
The Cyber Mentor Beginner 6y ago
Installing Windows Server 2016 on VMWare in 5 Minutes
Cybersecurity
Installing Windows Server 2016 on VMWare in 5 Minutes
The Cyber Mentor Beginner 6y ago
How To Backup Linux Systems With Grsync
Cybersecurity
How To Backup Linux Systems With Grsync
HackerSploit Intermediate 6y ago
Bug Bounty Hunting - iframe Injection & HTML Injection
Cybersecurity
Bug Bounty Hunting - iframe Injection & HTML Injection
HackerSploit Intermediate 6y ago
Zero to Hero Pentesting: Episode 7 - Exploitation, Shells, and Some Credential Stuffing
Cybersecurity
Zero to Hero Pentesting: Episode 7 - Exploitation, Shells, and Some Credential Stuffing
The Cyber Mentor Beginner 6y ago
HackTheBox - Irked
Cybersecurity
HackTheBox - Irked
IppSec Beginner 6y ago
Zero to Hero Pentesting: Episode 6 - Enumeration (Kioptrix & Hack The Box)
Cybersecurity
Zero to Hero Pentesting: Episode 6 - Enumeration (Kioptrix & Hack The Box)
The Cyber Mentor Beginner 6y ago
How To Setup VSCode In The Cloud - code-server
Cybersecurity
How To Setup VSCode In The Cloud - code-server
HackerSploit Intermediate 6y ago
Zero to Hero Pentesting: Episode 5 - Scanning Tools (Nmap, Nessus, BurpSuite, etc.) & Tactics
Cybersecurity
Zero to Hero Pentesting: Episode 5 - Scanning Tools (Nmap, Nessus, BurpSuite, etc.) & Tactics
The Cyber Mentor Beginner 6y ago
Bug Bounty Hunting - Wfuzz - Web Content Discovery & Form Manipulation
Cybersecurity
Bug Bounty Hunting - Wfuzz - Web Content Discovery & Form Manipulation
HackerSploit Beginner 6y ago
Bug Bounty Hunting - Tools I Use
Cybersecurity
Bug Bounty Hunting - Tools I Use
HackerSploit Beginner 7y ago
Securing Vendor Webapps - A Vulnerability Assessment on HELK
Cybersecurity
Securing Vendor Webapps - A Vulnerability Assessment on HELK
IppSec Intermediate 7y ago
HackTheBox - Redcross
Cybersecurity
HackTheBox - Redcross
IppSec Beginner 7y ago
No more excuses! Take ownership of your career. Your life. Your future. Your choice!
Cybersecurity
No more excuses! Take ownership of your career. Your life. Your future. Your choice!
David Bombal Advanced 7y ago
Zero to Hero Pentesting: Episode 4 - Five Phases of Hacking + Passive OSINT
Cybersecurity
Zero to Hero Pentesting: Episode 4 - Five Phases of Hacking + Passive OSINT
The Cyber Mentor Beginner 7y ago
b00t2root19 CTF: EasyPHP [PHP Web Exploits]
Cybersecurity
b00t2root19 CTF: EasyPHP [PHP Web Exploits]
John Hammond Beginner 7y ago
HackTheBox - Vault
Cybersecurity
HackTheBox - Vault
IppSec Beginner 7y ago
b00t2root19 CTF: Loopback [PCAP Forensics]
Cybersecurity
b00t2root19 CTF: Loopback [PCAP Forensics]
John Hammond Intermediate 7y ago
b00t2root19 CTF: Treasure [GameBoy ROMs]
Cybersecurity
b00t2root19 CTF: Treasure [GameBoy ROMs]
John Hammond Intermediate 7y ago
Zero to Hero Pentesting: Episode 3 - Python 102, Building a Terrible Port Scanner, and a Giveaway
Cybersecurity
Zero to Hero Pentesting: Episode 3 - Python 102, Building a Terrible Port Scanner, and a Giveaway
The Cyber Mentor Beginner 7y ago
b00t2root19 CTF: Can You Read Me [Esoteric Languages]
Cybersecurity
b00t2root19 CTF: Can You Read Me [Esoteric Languages]
John Hammond Intermediate 7y ago
CommandoVM Installation - Windows-based Penetration Testing Distribution
Cybersecurity
CommandoVM Installation - Windows-based Penetration Testing Distribution
HackerSploit Intermediate 7y ago
b00t2root19 CTF: Genetics [DNA Cryptography]
Cybersecurity
b00t2root19 CTF: Genetics [DNA Cryptography]
John Hammond Intermediate 7y ago
b00t2root19 CTF: Scatter Me [3D Scatter Plots]
Cybersecurity
b00t2root19 CTF: Scatter Me [3D Scatter Plots]
John Hammond Intermediate 7y ago
b00t2root CTF: cuz rsa is lub [RSA Cryptography]
Cybersecurity
b00t2root CTF: cuz rsa is lub [RSA Cryptography]
John Hammond Intermediate 7y ago
b00t2root19 CTF: Groot (3/3) [LINUX Post-Exploitation]
Cybersecurity
b00t2root19 CTF: Groot (3/3) [LINUX Post-Exploitation]
John Hammond Intermediate 7y ago
b00t2root19 CTF: Tony Stank (2/3) [LINUX Privilege Escalation]
Cybersecurity
b00t2root19 CTF: Tony Stank (2/3) [LINUX Privilege Escalation]
John Hammond Intermediate 7y ago
GitHub demonstration for network engineers: Hank Preston Explains: Part 2
Cybersecurity
GitHub demonstration for network engineers: Hank Preston Explains: Part 2
David Bombal Intermediate 7y ago
b00t2root19 CTF: Steve Rogers (1/3) [LINUX Enumeration]
Cybersecurity
b00t2root19 CTF: Steve Rogers (1/3) [LINUX Enumeration]
John Hammond Intermediate 7y ago
Zero to Hero Pentesting: Episode 2 - Python 101
Cybersecurity
Zero to Hero Pentesting: Episode 2 - Python 101
The Cyber Mentor Beginner 7y ago
How To Automatically Embed Payloads In APK's - Evil-Droid, Thefatrat & Apkinjector
Cybersecurity
How To Automatically Embed Payloads In APK's - Evil-Droid, Thefatrat & Apkinjector
HackerSploit Intermediate 7y ago
📚 Coursera Courses Opens on Coursera · Free to audit
1 / 3 View all →
Generative AI: Boost Your Cybersecurity Career
📚 Coursera Course ↗
Self-paced
Generative AI: Boost Your Cybersecurity Career
Opens on Coursera ↗
Cybersecurity in Healthcare (Hospitals & Care Centres)
📚 Coursera Course ↗
Self-paced
Cybersecurity in Healthcare (Hospitals & Care Centres)
Opens on Coursera ↗
Implementing MPLS VPNs
📚 Coursera Course ↗
Self-paced
Implementing MPLS VPNs
Opens on Coursera ↗
Security Governance & Compliance
📚 Coursera Course ↗
Self-paced
Security Governance & Compliance
Opens on Coursera ↗
Securing Systems and Networks
📚 Coursera Course ↗
Self-paced
Securing Systems and Networks
Opens on Coursera ↗
Case-Based Frameworks for Mastering Management Consulting
📚 Coursera Course ↗
Self-paced
Case-Based Frameworks for Mastering Management Consulting
Opens on Coursera ↗