Tech Skills

Cybersecurity

Ethical hacking, penetration testing, network security, CTFs and defensive security

7,100
lessons
Skills in this topic
View full skill map →
Security Basics
beginner
Fix OWASP top 10 vulnerabilities
AI Security
intermediate
Identify and patch prompt injection vulnerabilities
Network Security
intermediate
Configure a firewall with proper inbound/outbound rules
Ethical Hacking & Pen Testing
intermediate
Conduct a full pen test with Kali Linux
Cloud Security
intermediate
Implement IAM least-privilege policies on AWS/GCP
Incident Response
intermediate
Build an incident response playbook
Security Compliance
intermediate
Map controls for SOC 2 Type II compliance
Defensive AI
advanced
Build an AI-powered log anomaly detector
Zero to Hero Pentesting: Episode 6 - Enumeration (Kioptrix & Hack The Box)
Cybersecurity ⚡ AI Lesson
Zero to Hero Pentesting: Episode 6 - Enumeration (Kioptrix & Hack The Box)
The Cyber Mentor Beginner 7y ago
How To Setup VSCode In The Cloud - code-server
Cybersecurity ⚡ AI Lesson
How To Setup VSCode In The Cloud - code-server
HackerSploit Intermediate 7y ago
Zero to Hero Pentesting: Episode 5 - Scanning Tools (Nmap, Nessus, BurpSuite, etc.) & Tactics
Cybersecurity ⚡ AI Lesson
Zero to Hero Pentesting: Episode 5 - Scanning Tools (Nmap, Nessus, BurpSuite, etc.) & Tactics
The Cyber Mentor Beginner 7y ago
Bug Bounty Hunting - Wfuzz - Web Content Discovery & Form Manipulation
Cybersecurity ⚡ AI Lesson
Bug Bounty Hunting - Wfuzz - Web Content Discovery & Form Manipulation
HackerSploit Beginner 7y ago
Securing Vendor Webapps - A Vulnerability Assessment on HELK
Cybersecurity
Securing Vendor Webapps - A Vulnerability Assessment on HELK
IppSec Intermediate 7y ago
CCNA Quiz: The OSI model with Wireshark captures. Can you answer these quiz questions?
Cybersecurity
CCNA Quiz: The OSI model with Wireshark captures. Can you answer these quiz questions?
David Bombal Intermediate 7y ago
HackTheBox - Redcross
Cybersecurity
HackTheBox - Redcross
IppSec Beginner 7y ago
SunshineCTF 2019: Wrestler Book (Explicit SQL Injection)
Cybersecurity ⚡ AI Lesson
SunshineCTF 2019: Wrestler Book (Explicit SQL Injection)
John Hammond Intermediate 7y ago
No more excuses! Take ownership of your career. Your life. Your future. Your choice!
Cybersecurity
No more excuses! Take ownership of your career. Your life. Your future. Your choice!
David Bombal Advanced 7y ago
SunshineCTF 2019: WelcomeCrypto [ROT47]
Cybersecurity
SunshineCTF 2019: WelcomeCrypto [ROT47]
John Hammond Intermediate 7y ago
KALI LINUX! - CS50 Live, EP. 51
Cybersecurity
KALI LINUX! - CS50 Live, EP. 51
CS50 Intermediate 7y ago
LIVE CTF, PART 2! - CS50 Live, EP. 50
Cybersecurity
LIVE CTF, PART 2! - CS50 Live, EP. 50
CS50 Beginner 7y ago
SANS Security Operations Summit & Training 2019: Sneak Peek
Cybersecurity
SANS Security Operations Summit & Training 2019: Sneak Peek
SANS Institute Intermediate 7y ago
Top 10 Writing Mistakes in Cybersecurity and How You Can Avoid Them
Cybersecurity ⚡ AI Lesson
Top 10 Writing Mistakes in Cybersecurity and How You Can Avoid Them
SANS Institute Beginner 7y ago
Ethereum Smart Contract Backdoored Using Malicious Constructor
Cybersecurity
Ethereum Smart Contract Backdoored Using Malicious Constructor
LiveOverflow Intermediate 7y ago
[Live] GHIDRA HYPE!! - NSA Reverse Engineering Tool
Cybersecurity
[Live] GHIDRA HYPE!! - NSA Reverse Engineering Tool
LiveOverflow Intermediate 7y ago
Bug Bounty Hunting - Tools I Use
Cybersecurity ⚡ AI Lesson
Bug Bounty Hunting - Tools I Use
HackerSploit Beginner 7y ago
Zero to Hero Pentesting: Episode 4 - Five Phases of Hacking + Passive OSINT
Cybersecurity ⚡ AI Lesson
Zero to Hero Pentesting: Episode 4 - Five Phases of Hacking + Passive OSINT
The Cyber Mentor Beginner 7y ago
b00t2root19 CTF: EasyPHP [PHP Web Exploits]
Cybersecurity
b00t2root19 CTF: EasyPHP [PHP Web Exploits]
John Hammond Beginner 7y ago
HackTheBox - Vault
Cybersecurity ⚡ AI Lesson
HackTheBox - Vault
IppSec Beginner 7y ago
b00t2root19 CTF: Loopback [PCAP Forensics]
Cybersecurity
b00t2root19 CTF: Loopback [PCAP Forensics]
John Hammond Intermediate 7y ago
b00t2root19 CTF: Treasure [GameBoy ROMs]
Cybersecurity
b00t2root19 CTF: Treasure [GameBoy ROMs]
John Hammond Intermediate 7y ago
Zero to Hero Pentesting: Episode 3 - Python 102, Building a Terrible Port Scanner, and a Giveaway
Cybersecurity ⚡ AI Lesson
Zero to Hero Pentesting: Episode 3 - Python 102, Building a Terrible Port Scanner, and a Giveaway
The Cyber Mentor Beginner 7y ago
b00t2root19 CTF: Can You Read Me [Esoteric Languages]
Cybersecurity
b00t2root19 CTF: Can You Read Me [Esoteric Languages]
John Hammond Intermediate 7y ago
CommandoVM Installation - Windows-based Penetration Testing Distribution
Cybersecurity ⚡ AI Lesson
CommandoVM Installation - Windows-based Penetration Testing Distribution
HackerSploit Intermediate 7y ago
b00t2root19 CTF: Genetics [DNA Cryptography]
Cybersecurity
b00t2root19 CTF: Genetics [DNA Cryptography]
John Hammond Intermediate 7y ago
b00t2root19 CTF: Scatter Me [3D Scatter Plots]
Cybersecurity
b00t2root19 CTF: Scatter Me [3D Scatter Plots]
John Hammond Intermediate 7y ago
b00t2root CTF: cuz rsa is lub [RSA Cryptography]
Cybersecurity ⚡ AI Lesson
b00t2root CTF: cuz rsa is lub [RSA Cryptography]
John Hammond Intermediate 7y ago
b00t2root19 CTF: Groot (3/3) [LINUX Post-Exploitation]
Cybersecurity
b00t2root19 CTF: Groot (3/3) [LINUX Post-Exploitation]
John Hammond Intermediate 7y ago
b00t2root19 CTF: Tony Stank (2/3) [LINUX Privilege Escalation]
Cybersecurity
b00t2root19 CTF: Tony Stank (2/3) [LINUX Privilege Escalation]
John Hammond Intermediate 7y ago
GitHub demonstration for network engineers: Hank Preston Explains: Part 2
Cybersecurity
GitHub demonstration for network engineers: Hank Preston Explains: Part 2
David Bombal Intermediate 7y ago
b00t2root19 CTF: Steve Rogers (1/3) [LINUX Enumeration]
Cybersecurity
b00t2root19 CTF: Steve Rogers (1/3) [LINUX Enumeration]
John Hammond Intermediate 7y ago
Zero to Hero Pentesting: Episode 2 - Python 101
Cybersecurity ⚡ AI Lesson
Zero to Hero Pentesting: Episode 2 - Python 101
The Cyber Mentor Beginner 7y ago
How To Automatically Embed Payloads In APK's - Evil-Droid, Thefatrat & Apkinjector
Cybersecurity ⚡ AI Lesson
How To Automatically Embed Payloads In APK's - Evil-Droid, Thefatrat & Apkinjector
HackerSploit Intermediate 7y ago
How To Manually Sign APK's with Jarsigner & Zipalign
Cybersecurity ⚡ AI Lesson
How To Manually Sign APK's with Jarsigner & Zipalign
HackerSploit Intermediate 7y ago
Manually Embedding Msfvenom Payloads In APK's - Proof Of Concept
Cybersecurity ⚡ AI Lesson
Manually Embedding Msfvenom Payloads In APK's - Proof Of Concept
HackerSploit Beginner 7y ago
Git, GitHub and source control: Is this even for network engineers? Hank Preston Explains: Part 1
Cybersecurity
Git, GitHub and source control: Is this even for network engineers? Hank Preston Explains: Part 1
David Bombal Beginner 7y ago
Zero to Hero Pentesting: Episode 1 - Course Introduction, Notekeeping, Introductory Linux, and AMA
Cybersecurity ⚡ AI Lesson
Zero to Hero Pentesting: Episode 1 - Course Introduction, Notekeeping, Introductory Linux, and AMA
The Cyber Mentor Beginner 7y ago
DNS Enumeration Tutorial - Dig, Nslookup & Host
Cybersecurity ⚡ AI Lesson
DNS Enumeration Tutorial - Dig, Nslookup & Host
HackerSploit Beginner 7y ago
New Zero to Hero Pentest Course, New Website, and 2K Subs?!
Cybersecurity ⚡ AI Lesson
New Zero to Hero Pentest Course, New Website, and 2K Subs?!
The Cyber Mentor Beginner 7y ago
Hacking Live Stream: Episode 3 - Hack The Box Blue, Devel, and Career Q&A / AMA
Cybersecurity ⚡ AI Lesson
Hacking Live Stream: Episode 3 - Hack The Box Blue, Devel, and Career Q&A / AMA
The Cyber Mentor Beginner 7y ago
The Complete VeraCrypt Encryption Tutorial
Cybersecurity ⚡ AI Lesson
The Complete VeraCrypt Encryption Tutorial
HackerSploit Beginner 7y ago
Free CCNA VIRL Labs! Free VIRL Server from DevNet! Labs for CCNA | CCNP | Python | Ansible
Cybersecurity
Free CCNA VIRL Labs! Free VIRL Server from DevNet! Labs for CCNA | CCNP | Python | Ansible
David Bombal Beginner 7y ago
LIVE CTF! PART 1! - CS50 on Twitch, EP. 46
Cybersecurity
LIVE CTF! PART 1! - CS50 on Twitch, EP. 46
CS50 Intermediate 7y ago
Malware Analysis With Ghidra - Stuxnet Analysis
Cybersecurity ⚡ AI Lesson
Malware Analysis With Ghidra - Stuxnet Analysis
HackerSploit Intermediate 7y ago
RED TEAM HACKING | CyberForce 2018
Cybersecurity
RED TEAM HACKING | CyberForce 2018
John Hammond Intermediate 7y ago
Hacking Live Stream: Episode 2 - HackTheBox Active, Vulnserver Buffer Overflow, and Career Q&A / AMA
Cybersecurity ⚡ AI Lesson
Hacking Live Stream: Episode 2 - HackTheBox Active, Vulnserver Buffer Overflow, and Career Q&A / AMA
The Cyber Mentor Beginner 7y ago
The Complete PGP Encryption Tutorial | Gpg4win & GnuPG
Cybersecurity ⚡ AI Lesson
The Complete PGP Encryption Tutorial | Gpg4win & GnuPG
HackerSploit Beginner 7y ago
📚 Coursera Courses Opens on Coursera · Free to audit
1 / 3 View all →
Cybersecurity Foundations: Threats Networks, and IoT Protection
📚 Coursera Course ↗
Self-paced
Cybersecurity Foundations: Threats Networks, and IoT Protection
Opens on Coursera ↗
Offensive Cyber Operations
📚 Coursera Course ↗
Self-paced
Offensive Cyber Operations
Opens on Coursera ↗
CompTIA Tech+
📚 Coursera Course ↗
Self-paced
CompTIA Tech+
Opens on Coursera ↗
Keamanan IT: Pertahanan terhadap Kejahatan Digital
📚 Coursera Course ↗
Self-paced
Keamanan IT: Pertahanan terhadap Kejahatan Digital
Opens on Coursera ↗
Introduction to Networking and Cloud Computing
📚 Coursera Course ↗
Self-paced
Introduction to Networking and Cloud Computing
Opens on Coursera ↗
Master the Fundamentals of Branding Training
📚 Coursera Course ↗
Self-paced
Master the Fundamentals of Branding Training
Opens on Coursera ↗