Tech Skills

Cybersecurity

Ethical hacking, penetration testing, network security, CTFs and defensive security

5249
lessons
Skills in this topic
View full skill map →
Security Basics
beginner
Fix OWASP top 10 vulnerabilities
AI Security
intermediate
Identify and patch prompt injection vulnerabilities
Network Security
intermediate
Configure a firewall with proper inbound/outbound rules
Ethical Hacking & Pen Testing
intermediate
Conduct a full pen test with Kali Linux
Cloud Security
intermediate
Implement IAM least-privilege policies on AWS/GCP
Incident Response
intermediate
Build an incident response playbook
Security Compliance
intermediate
Map controls for SOC 2 Type II compliance
Defensive AI
advanced
Build an AI-powered log anomaly detector
Hacking Live Stream: Episode 2 - HackTheBox Active, Vulnserver Buffer Overflow, and Career Q&A / AMA
Cybersecurity
Hacking Live Stream: Episode 2 - HackTheBox Active, Vulnserver Buffer Overflow, and Career Q&A / AMA
The Cyber Mentor Beginner 7y ago
The Complete PGP Encryption Tutorial | Gpg4win & GnuPG
Cybersecurity
The Complete PGP Encryption Tutorial | Gpg4win & GnuPG
HackerSploit Beginner 7y ago
[Live] GHIDRA HYPE!! - NSA Reverse Engineering Tool
Cybersecurity
[Live] GHIDRA HYPE!! - NSA Reverse Engineering Tool
LiveOverflow Intermediate 7y ago
pfSense 2.4 - Enabling SSH Access
Cybersecurity
pfSense 2.4 - Enabling SSH Access
HackerSploit Intermediate 7y ago
The Hitchhiker’s Guide to Evidence Sources - SANS Webcast
Cybersecurity
The Hitchhiker’s Guide to Evidence Sources - SANS Webcast
SANS Institute Beginner 7y ago
Code Faster With Custom VS Code Snippets
Cybersecurity
Code Faster With Custom VS Code Snippets
Traversy Media Intermediate 7y ago
CCNA multicast quiz question: How will multicast traffic flow in the network? CCNA | CCNP
Cybersecurity
CCNA multicast quiz question: How will multicast traffic flow in the network? CCNA | CCNP
David Bombal Beginner 7y ago
Hacking Live Stream: Episode 1 - Kioptrix Level 1, HackTheBox Jerry, and Career Q&A / AMA
Cybersecurity
Hacking Live Stream: Episode 1 - Kioptrix Level 1, HackTheBox Jerry, and Career Q&A / AMA
The Cyber Mentor Beginner 7y ago
MITRE CTF 2019 - Web [150] Accessible Bazaar Repositories
Cybersecurity
MITRE CTF 2019 - Web [150] Accessible Bazaar Repositories
John Hammond Intermediate 7y ago
MITRE CTF 2019 - Web [100] Googling Alan Turing
Cybersecurity
MITRE CTF 2019 - Web [100] Googling Alan Turing
John Hammond Intermediate 7y ago
Analysing a Firefox Malware browserassist.dll - FLARE-On 2018
Cybersecurity
Analysing a Firefox Malware browserassist.dll - FLARE-On 2018
LiveOverflow Intermediate 7y ago
24 Hour Coding Livestream - Creating an Online Chess Game With Python
Cybersecurity
24 Hour Coding Livestream - Creating an Online Chess Game With Python
Tech With Tim Beginner 7y ago
CCNA Quiz: Spanning Tree Answers: Root ports, designated ports, blocking ports? CCNA | CCNP
Cybersecurity
CCNA Quiz: Spanning Tree Answers: Root ports, designated ports, blocking ports? CCNA | CCNP
David Bombal Intermediate 7y ago
Video Content – 3-steps to Present Your Ideas Clearly
Cybersecurity
Video Content – 3-steps to Present Your Ideas Clearly
The Futur Beginner 7y ago
HackTheBox - Giddy
Cybersecurity
HackTheBox - Giddy
IppSec Beginner 7y ago
The Changing Landscape of Offense - SANS Pen Test HackFest 2018
Cybersecurity
The Changing Landscape of Offense - SANS Pen Test HackFest 2018
SANS Institute Intermediate 7y ago
HackTheBox - Ypuffy
Cybersecurity
HackTheBox - Ypuffy
IppSec Intermediate 7y ago
Reminder: Twitch Hacking Live Stream Tonight! 2/26/19 at 8PM EST
Cybersecurity
Reminder: Twitch Hacking Live Stream Tonight! 2/26/19 at 8PM EST
The Cyber Mentor Beginner 7y ago
How To Clear Tracks & Logs On Linux
Cybersecurity
How To Clear Tracks & Logs On Linux
HackerSploit Intermediate 7y ago
MITRE CTF 2019 - Web [50] HTTPS Certificate Valid Addresses
Cybersecurity
MITRE CTF 2019 - Web [50] HTTPS Certificate Valid Addresses
John Hammond Intermediate 7y ago
MITRE CTF 2019 - JOURNEY TO THE CENTER OF THE FILE | ZIP Archive Matryoshka Doll
Cybersecurity
MITRE CTF 2019 - JOURNEY TO THE CENTER OF THE FILE | ZIP Archive Matryoshka Doll
John Hammond Intermediate 7y ago
MITRE CTF 2019 - Grab Bag [100] Rick Roll, Nomination & Strings
Cybersecurity
MITRE CTF 2019 - Grab Bag [100] Rick Roll, Nomination & Strings
John Hammond Intermediate 7y ago
MITRE CTF 2019 - Grab Bag [50] Filtering Nyan Cat
Cybersecurity
MITRE CTF 2019 - Grab Bag [50] Filtering Nyan Cat
John Hammond Intermediate 7y ago
MITRE CTF 2019 - Linux [200] Race Conditions with BASH
Cybersecurity
MITRE CTF 2019 - Linux [200] Race Conditions with BASH
John Hammond Intermediate 7y ago
MITRE CTF 2019 - Linux [150] Understanding Processes with /proc
Cybersecurity
MITRE CTF 2019 - Linux [150] Understanding Processes with /proc
John Hammond Intermediate 7y ago
MITRE CTF 2019 - Linux [100] Calling Shell commands with VIM
Cybersecurity
MITRE CTF 2019 - Linux [100] Calling Shell commands with VIM
John Hammond Intermediate 7y ago
MITRE CTF 2019 - Linux [100] Replacing Binaries in the PATH
Cybersecurity
MITRE CTF 2019 - Linux [100] Replacing Binaries in the PATH
John Hammond Intermediate 7y ago
MITRE CTF 2019 - Linux [50] Escaping RBASH with SSH
Cybersecurity
MITRE CTF 2019 - Linux [50] Escaping RBASH with SSH
John Hammond Intermediate 7y ago
UFW Firewall (Uncomplicated Firewall) - Complete Tutorial
Cybersecurity
UFW Firewall (Uncomplicated Firewall) - Complete Tutorial
HackerSploit Beginner 7y ago
Sucuri Web Application Firewall Review
Cybersecurity
Sucuri Web Application Firewall Review
HackerSploit Intermediate 7y ago
Cracking Linux Password Hashes with Hashcat
Cybersecurity
Cracking Linux Password Hashes with Hashcat
The Cyber Mentor Beginner 7y ago
How To Fully Anonymize Kali With Whonix
Cybersecurity
How To Fully Anonymize Kali With Whonix
HackerSploit Intermediate 7y ago
pfSense 2.4 - Installation & Configuration
Cybersecurity
pfSense 2.4 - Installation & Configuration
HackerSploit Intermediate 7y ago
Beginner Linux for Ethical Hackers - Installing and Updating Tools
Cybersecurity
Beginner Linux for Ethical Hackers - Installing and Updating Tools
The Cyber Mentor Beginner 7y ago
Beginner Linux for Ethical Hackers - Scripting with Bash
Cybersecurity
Beginner Linux for Ethical Hackers - Scripting with Bash
The Cyber Mentor Beginner 7y ago
Flare-On FireEye 2018 CTF - Malware Analysis With Amr Thabet - Flare Minesweeper
Cybersecurity
Flare-On FireEye 2018 CTF - Malware Analysis With Amr Thabet - Flare Minesweeper
HackerSploit Advanced 7y ago
CCNA can change your life! Hit the books and put in the hours! And use social media to get known!
Cybersecurity
CCNA can change your life! Hit the books and put in the hours! And use social media to get known!
David Bombal Intermediate 7y ago
Beginner Linux for Ethical Hackers - Controlling Kali Services
Cybersecurity
Beginner Linux for Ethical Hackers - Controlling Kali Services
The Cyber Mentor Beginner 7y ago
Beginner Linux for Ethical Hackers - Viewing, Creating, and Editing Files
Cybersecurity
Beginner Linux for Ethical Hackers - Viewing, Creating, and Editing Files
The Cyber Mentor Beginner 7y ago
Beginner Linux for Ethical Hackers - Common Network Commands
Cybersecurity
Beginner Linux for Ethical Hackers - Common Network Commands
The Cyber Mentor Beginner 7y ago
Beginner Linux for Ethical Hackers - Users and Privileges
Cybersecurity
Beginner Linux for Ethical Hackers - Users and Privileges
The Cyber Mentor Beginner 7y ago
Beginner Linux for Ethical Hackers - Navigating the File System
Cybersecurity
Beginner Linux for Ethical Hackers - Navigating the File System
The Cyber Mentor Beginner 7y ago
HackTheBox - Fighter Walkthrough (Re-Up)
Cybersecurity
HackTheBox - Fighter Walkthrough (Re-Up)
The Cyber Mentor Beginner 7y ago
Networking for Ethical Hackers - Building A Basic Network with Cisco Packet Tracer (Re-Up)
Cybersecurity
Networking for Ethical Hackers - Building A Basic Network with Cisco Packet Tracer (Re-Up)
The Cyber Mentor Beginner 7y ago
Networking for Ethical Hackers - Network Subnetting Part 2: The Challenge (Re-Up)
Cybersecurity
Networking for Ethical Hackers - Network Subnetting Part 2: The Challenge (Re-Up)
The Cyber Mentor Beginner 7y ago
Networking for Ethical Hackers - Network Subnetting (Re-Up)
Cybersecurity
Networking for Ethical Hackers - Network Subnetting (Re-Up)
The Cyber Mentor Beginner 7y ago
Networking for Ethical Hackers - TCP, UDP, and the Three-Way Handshake (Re-Up)
Cybersecurity
Networking for Ethical Hackers - TCP, UDP, and the Three-Way Handshake (Re-Up)
The Cyber Mentor Beginner 7y ago
HackTheBox - Sunday Walkthrough (Re-Up)
Cybersecurity
HackTheBox - Sunday Walkthrough (Re-Up)
The Cyber Mentor Beginner 7y ago
📚 Coursera Courses Opens on Coursera · Free to audit
1 / 3 View all →
Business English: Finance and Economics
📚 Coursera Course ↗
Self-paced
Business English: Finance and Economics
Opens on Coursera ↗
Introduction to IT Security
📚 Coursera Course ↗
Self-paced
Introduction to IT Security
Opens on Coursera ↗
Wireshark for Security:  Detect Network Anomalies
📚 Coursera Course ↗
Self-paced
Wireshark for Security: Detect Network Anomalies
Opens on Coursera ↗
Cybersecurity Threat Vectors and Mitigation
📚 Coursera Course ↗
Self-paced
Cybersecurity Threat Vectors and Mitigation
Opens on Coursera ↗
AI for Cybersecurity
📚 Coursera Course ↗
Self-paced
AI for Cybersecurity
Opens on Coursera ↗
Web Application Security Testing with Google Hacking
📚 Coursera Course ↗
Self-paced
Web Application Security Testing with Google Hacking
Opens on Coursera ↗