Tech Skills

Cybersecurity

Ethical hacking, penetration testing, network security, CTFs and defensive security

5252
lessons
Skills in this topic
View full skill map →
Security Basics
beginner
Fix OWASP top 10 vulnerabilities
AI Security
intermediate
Identify and patch prompt injection vulnerabilities
Network Security
intermediate
Configure a firewall with proper inbound/outbound rules
Ethical Hacking & Pen Testing
intermediate
Conduct a full pen test with Kali Linux
Cloud Security
intermediate
Implement IAM least-privilege policies on AWS/GCP
Incident Response
intermediate
Build an incident response playbook
Security Compliance
intermediate
Map controls for SOC 2 Type II compliance
Defensive AI
advanced
Build an AI-powered log anomaly detector
HackTheBox - Sunday Walkthrough (Re-Up)
Cybersecurity
HackTheBox - Sunday Walkthrough (Re-Up)
The Cyber Mentor Beginner 7y ago
The Changing Landscape of Offense - SANS Pen Test HackFest 2018
Cybersecurity
The Changing Landscape of Offense - SANS Pen Test HackFest 2018
SANS Institute Intermediate 7y ago
HackTheBox - Ypuffy
Cybersecurity
HackTheBox - Ypuffy
IppSec Intermediate 7y ago
Buffer Overflows Made Easy - Part 8: Generating Shellcode and Gaining Shells
Cybersecurity
Buffer Overflows Made Easy - Part 8: Generating Shellcode and Gaining Shells
The Cyber Mentor Beginner 7y ago
Burning Down the Haystack - SANS Security Operations Summit 2018
Cybersecurity
Burning Down the Haystack - SANS Security Operations Summit 2018
SANS Institute Intermediate 7y ago
What's the future? Do I have to learn network automation today? Which language? @bigevilbeard shares
Cybersecurity
What's the future? Do I have to learn network automation today? Which language? @bigevilbeard shares
David Bombal Beginner 7y ago
BSIDES LONG ISLAND 2019 CTF
Cybersecurity
BSIDES LONG ISLAND 2019 CTF
John Hammond Intermediate 7y ago
Vim Editor Fundamentals
Cybersecurity
Vim Editor Fundamentals
HackerSploit Intermediate 7y ago
Netstat Commands - Network Administration Tutorial
Cybersecurity
Netstat Commands - Network Administration Tutorial
HackerSploit Beginner 7y ago
Reality Check: Is Network Automation hype? Is this stuff actually real?
Cybersecurity
Reality Check: Is Network Automation hype? Is this stuff actually real?
David Bombal Intermediate 7y ago
Growth Design Workshop (Hacking Growth + Design Sprint)
Cybersecurity
Growth Design Workshop (Hacking Growth + Design Sprint)
AJ&Smart Beginner 7y ago
Website Photos 101: The Photos You SHOULD Be Using & Where to Get Them
Cybersecurity
Website Photos 101: The Photos You SHOULD Be Using & Where to Get Them
Wes McDowell Beginner 7y ago
XS-Search abusing the Chrome XSS Auditor - filemanager 35c3ctf
Cybersecurity
XS-Search abusing the Chrome XSS Auditor - filemanager 35c3ctf
LiveOverflow Intermediate 7y ago
[Live] Making-of a LiveOverflow CTF video write-up 2019 (35c3ctf)
Cybersecurity
[Live] Making-of a LiveOverflow CTF video write-up 2019 (35c3ctf)
LiveOverflow Intermediate 7y ago
HackTheBox - SecNotes
Cybersecurity
HackTheBox - SecNotes
IppSec Intermediate 7y ago
Improve Cybersecurity Skills with CTFs - PicoCTF Walkthrough (2018)
Cybersecurity
Improve Cybersecurity Skills with CTFs - PicoCTF Walkthrough (2018)
freeCodeCamp.org Beginner 7y ago
Big Brother: China Edition!
Cybersecurity
Big Brother: China Edition!
ColdFusion Beginner 7y ago
a16z Podcast | Changing the Conversation about Cybersecurity
Cybersecurity
a16z Podcast | Changing the Conversation about Cybersecurity
a16z Intermediate 7y ago
a16z Podcast | The Law (and Tech) of Warfare
Cybersecurity
a16z Podcast | The Law (and Tech) of Warfare
a16z Beginner 7y ago
XMAS CTF HIGHLIGHTS
Cybersecurity
XMAS CTF HIGHLIGHTS
John Hammond Intermediate 7y ago
Buffer Overflows Made Easy - Part 7: Finding the Right Module
Cybersecurity
Buffer Overflows Made Easy - Part 7: Finding the Right Module
The Cyber Mentor Beginner 7y ago
Buffer Overflows Made Easy - Part 6: Finding Bad Characters
Cybersecurity
Buffer Overflows Made Easy - Part 6: Finding Bad Characters
The Cyber Mentor Beginner 7y ago
Buffer Overflows Made Easy - Part 5: Overwriting the EIP
Cybersecurity
Buffer Overflows Made Easy - Part 5: Overwriting the EIP
The Cyber Mentor Beginner 7y ago
Buffer Overflows Made Easy - Part 4: Finding the Offset
Cybersecurity
Buffer Overflows Made Easy - Part 4: Finding the Offset
The Cyber Mentor Beginner 7y ago
Buffer Overflows Made Easy - Part 3: Fuzzing
Cybersecurity
Buffer Overflows Made Easy - Part 3: Fuzzing
The Cyber Mentor Beginner 7y ago
Buffer Overflows Made Easy - Part 2: Spiking
Cybersecurity
Buffer Overflows Made Easy - Part 2: Spiking
The Cyber Mentor Beginner 7y ago
Buffer Overflows Made Easy - Part 1: Introduction
Cybersecurity
Buffer Overflows Made Easy - Part 1: Introduction
The Cyber Mentor Beginner 7y ago
Build it Once, Build it Right: Architecting for Detection - SANS Tactical Detection Summit 2018
Cybersecurity
Build it Once, Build it Right: Architecting for Detection - SANS Tactical Detection Summit 2018
SANS Institute Intermediate 7y ago
Everything New is Old Again - SANS Secure DevOps Summit 2018
Cybersecurity
Everything New is Old Again - SANS Secure DevOps Summit 2018
SANS Institute Beginner 7y ago
Nano Editor Fundamentals
Cybersecurity
Nano Editor Fundamentals
HackerSploit Intermediate 7y ago
Python3 For Pentesting - Developing An Nmap Scanner
Cybersecurity
Python3 For Pentesting - Developing An Nmap Scanner
HackerSploit Intermediate 7y ago
HackTheBox Discord - HackerSploit AMA
Cybersecurity
HackTheBox Discord - HackerSploit AMA
HackerSploit Intermediate 7y ago
Unicornscan - Port Scanning
Cybersecurity
Unicornscan - Port Scanning
HackerSploit Intermediate 7y ago
SANS ICS Security Summit & Training 2019
Cybersecurity
SANS ICS Security Summit & Training 2019
SANS Institute Advanced 7y ago
HackTheBox - Arctic - Walkthrough
Cybersecurity
HackTheBox - Arctic - Walkthrough
HackerSploit Intermediate 7y ago
HackTheBox - Oz
Cybersecurity
HackTheBox - Oz
IppSec Beginner 7y ago
How To Install Xfce4 & MATE Desktop Environments On Kali Linux
Cybersecurity
How To Install Xfce4 & MATE Desktop Environments On Kali Linux
HackerSploit Intermediate 7y ago
C Programming Fundamentals - Variable Scope
Cybersecurity
C Programming Fundamentals - Variable Scope
HackerSploit Intermediate 7y ago
HackTheBox - Mischief
Cybersecurity
HackTheBox - Mischief
IppSec Intermediate 7y ago
C Programming Fundamentals - Loops
Cybersecurity
C Programming Fundamentals - Loops
HackerSploit Intermediate 7y ago
C Programming Fundamentals - If Statements
Cybersecurity
C Programming Fundamentals - If Statements
HackerSploit Intermediate 7y ago
C Programming Fundamentals - Input
Cybersecurity
C Programming Fundamentals - Input
HackerSploit Intermediate 7y ago
VirtualBox nested virtualization: Now supported with version 6.0 on AMD processors! Great for GNS3!
Cybersecurity
VirtualBox nested virtualization: Now supported with version 6.0 on AMD processors! Great for GNS3!
David Bombal Beginner 7y ago
C Programming Fundamentals - Functions And Variables
Cybersecurity
C Programming Fundamentals - Functions And Variables
HackerSploit Intermediate 7y ago
a16z Podcast | On Wearables, Quantified Self, and Biohacking
Cybersecurity
a16z Podcast | On Wearables, Quantified Self, and Biohacking
a16z Beginner 7y ago
Kali Linux Quick Tips - How To Setup SSH On Kali
Cybersecurity
Kali Linux Quick Tips - How To Setup SSH On Kali
HackerSploit Intermediate 7y ago
DotDotPwn - Directory Traversal Fuzzing
Cybersecurity
DotDotPwn - Directory Traversal Fuzzing
HackerSploit Intermediate 7y ago
Jump Oriented Programming: Ethereum Smart Contract #2 - Real World CTF 2018
Cybersecurity
Jump Oriented Programming: Ethereum Smart Contract #2 - Real World CTF 2018
LiveOverflow Intermediate 7y ago
📚 Coursera Courses Opens on Coursera · Free to audit
1 / 3 View all →
Ethical Password Cracking
📚 Coursera Course ↗
Self-paced
Ethical Password Cracking
Opens on Coursera ↗
Certified Kubernetes Administrator (CKA): Unit 4
📚 Coursera Course ↗
Self-paced
Certified Kubernetes Administrator (CKA): Unit 4
Opens on Coursera ↗
Intermediate Ethical Hacking Hands-on Training
📚 Coursera Course ↗
Self-paced
Intermediate Ethical Hacking Hands-on Training
Opens on Coursera ↗
Kali Linux
📚 Coursera Course ↗
Self-paced
Kali Linux
Opens on Coursera ↗
Preparing for Your Professional Cloud Security Engineer Journey
📚 Coursera Course ↗
Self-paced
Preparing for Your Professional Cloud Security Engineer Journey
Opens on Coursera ↗
Cyber Threats and Network Security Foundations
📚 Coursera Course ↗
Self-paced
Cyber Threats and Network Security Foundations
Opens on Coursera ↗