Tech Skills

Cybersecurity

Ethical hacking, penetration testing, network security, CTFs and defensive security

7,103
lessons
Skills in this topic
View full skill map →
Security Basics
beginner
Fix OWASP top 10 vulnerabilities
AI Security
intermediate
Identify and patch prompt injection vulnerabilities
Network Security
intermediate
Configure a firewall with proper inbound/outbound rules
Ethical Hacking & Pen Testing
intermediate
Conduct a full pen test with Kali Linux
Cloud Security
intermediate
Implement IAM least-privilege policies on AWS/GCP
Incident Response
intermediate
Build an incident response playbook
Security Compliance
intermediate
Map controls for SOC 2 Type II compliance
Defensive AI
advanced
Build an AI-powered log anomaly detector
Buffer Overflows Made Easy - Part 8: Generating Shellcode and Gaining Shells
Cybersecurity ⚡ AI Lesson
Buffer Overflows Made Easy - Part 8: Generating Shellcode and Gaining Shells
The Cyber Mentor Beginner 7y ago
Buffer Overflows Made Easy - Part 7: Finding the Right Module
Cybersecurity ⚡ AI Lesson
Buffer Overflows Made Easy - Part 7: Finding the Right Module
The Cyber Mentor Beginner 7y ago
Burning Down the Haystack - SANS Security Operations Summit 2018
Cybersecurity ⚡ AI Lesson
Burning Down the Haystack - SANS Security Operations Summit 2018
SANS Institute Intermediate 7y ago
What's the future? Do I have to learn network automation today? Which language? @bigevilbeard shares
Cybersecurity
What's the future? Do I have to learn network automation today? Which language? @bigevilbeard shares
David Bombal Beginner 7y ago
BSIDES LONG ISLAND 2019 CTF
Cybersecurity
BSIDES LONG ISLAND 2019 CTF
John Hammond Intermediate 7y ago
Vim Editor Fundamentals
Cybersecurity ⚡ AI Lesson
Vim Editor Fundamentals
HackerSploit Intermediate 7y ago
Netstat Commands - Network Administration Tutorial
Cybersecurity ⚡ AI Lesson
Netstat Commands - Network Administration Tutorial
HackerSploit Beginner 7y ago
Build it Once, Build it Right: Architecting for Detection - SANS Tactical Detection Summit 2018
Cybersecurity
Build it Once, Build it Right: Architecting for Detection - SANS Tactical Detection Summit 2018
SANS Institute Intermediate 7y ago
Reality Check: Is Network Automation hype? Is this stuff actually real?
Cybersecurity
Reality Check: Is Network Automation hype? Is this stuff actually real?
David Bombal Intermediate 7y ago
Growth Design Workshop (Hacking Growth + Design Sprint)
Cybersecurity
Growth Design Workshop (Hacking Growth + Design Sprint)
AJ&Smart Beginner 7y ago
Website Photos 101: The Photos You SHOULD Be Using & Where to Get Them
Cybersecurity ⚡ AI Lesson
Website Photos 101: The Photos You SHOULD Be Using & Where to Get Them
Wes McDowell Beginner 7y ago
XS-Search abusing the Chrome XSS Auditor - filemanager 35c3ctf
Cybersecurity
XS-Search abusing the Chrome XSS Auditor - filemanager 35c3ctf
LiveOverflow Intermediate 7y ago
[Live] Making-of a LiveOverflow CTF video write-up 2019 (35c3ctf)
Cybersecurity
[Live] Making-of a LiveOverflow CTF video write-up 2019 (35c3ctf)
LiveOverflow Intermediate 7y ago
HackTheBox - SecNotes
Cybersecurity ⚡ AI Lesson
HackTheBox - SecNotes
IppSec Intermediate 7y ago
Improve Cybersecurity Skills with CTFs - PicoCTF Walkthrough (2018)
Cybersecurity
Improve Cybersecurity Skills with CTFs - PicoCTF Walkthrough (2018)
freeCodeCamp.org Beginner 7y ago
Big Brother: China Edition!
Cybersecurity ⚡ AI Lesson
Big Brother: China Edition!
ColdFusion Beginner 7y ago
HackTheBox - Oz
Cybersecurity
HackTheBox - Oz
IppSec Beginner 7y ago
a16z Podcast | Changing the Conversation about Cybersecurity
Cybersecurity ⚡ AI Lesson
a16z Podcast | Changing the Conversation about Cybersecurity
a16z Intermediate 7y ago
a16z Podcast | The Law (and Tech) of Warfare
Cybersecurity ⚡ AI Lesson
a16z Podcast | The Law (and Tech) of Warfare
a16z Beginner 7y ago
XMAS CTF HIGHLIGHTS
Cybersecurity
XMAS CTF HIGHLIGHTS
John Hammond Intermediate 7y ago
Buffer Overflows Made Easy - Part 6: Finding Bad Characters
Cybersecurity ⚡ AI Lesson
Buffer Overflows Made Easy - Part 6: Finding Bad Characters
The Cyber Mentor Beginner 7y ago
Buffer Overflows Made Easy - Part 5: Overwriting the EIP
Cybersecurity ⚡ AI Lesson
Buffer Overflows Made Easy - Part 5: Overwriting the EIP
The Cyber Mentor Beginner 7y ago
Buffer Overflows Made Easy - Part 4: Finding the Offset
Cybersecurity ⚡ AI Lesson
Buffer Overflows Made Easy - Part 4: Finding the Offset
The Cyber Mentor Beginner 7y ago
Buffer Overflows Made Easy - Part 3: Fuzzing
Cybersecurity ⚡ AI Lesson
Buffer Overflows Made Easy - Part 3: Fuzzing
The Cyber Mentor Beginner 7y ago
Buffer Overflows Made Easy - Part 2: Spiking
Cybersecurity ⚡ AI Lesson
Buffer Overflows Made Easy - Part 2: Spiking
The Cyber Mentor Beginner 7y ago
Buffer Overflows Made Easy - Part 1: Introduction
Cybersecurity ⚡ AI Lesson
Buffer Overflows Made Easy - Part 1: Introduction
The Cyber Mentor Beginner 7y ago
Everything New is Old Again - SANS Secure DevOps Summit 2018
Cybersecurity
Everything New is Old Again - SANS Secure DevOps Summit 2018
SANS Institute Beginner 7y ago
Nano Editor Fundamentals
Cybersecurity ⚡ AI Lesson
Nano Editor Fundamentals
HackerSploit Intermediate 7y ago
Python3 For Pentesting - Developing An Nmap Scanner
Cybersecurity ⚡ AI Lesson
Python3 For Pentesting - Developing An Nmap Scanner
HackerSploit Intermediate 7y ago
HackTheBox Discord - HackerSploit AMA
Cybersecurity ⚡ AI Lesson
HackTheBox Discord - HackerSploit AMA
HackerSploit Intermediate 7y ago
Unicornscan - Port Scanning
Cybersecurity ⚡ AI Lesson
Unicornscan - Port Scanning
HackerSploit Intermediate 7y ago
SANS ICS Security Summit & Training 2019
Cybersecurity
SANS ICS Security Summit & Training 2019
SANS Institute Advanced 7y ago
HackTheBox - Arctic - Walkthrough
Cybersecurity ⚡ AI Lesson
HackTheBox - Arctic - Walkthrough
HackerSploit Intermediate 7y ago
How To Install Xfce4 & MATE Desktop Environments On Kali Linux
Cybersecurity ⚡ AI Lesson
How To Install Xfce4 & MATE Desktop Environments On Kali Linux
HackerSploit Intermediate 7y ago
C Programming Fundamentals - Variable Scope
Cybersecurity ⚡ AI Lesson
C Programming Fundamentals - Variable Scope
HackerSploit Intermediate 7y ago
HackTheBox - Mischief
Cybersecurity
HackTheBox - Mischief
IppSec Intermediate 7y ago
C Programming Fundamentals - Loops
Cybersecurity ⚡ AI Lesson
C Programming Fundamentals - Loops
HackerSploit Intermediate 7y ago
C Programming Fundamentals - If Statements
Cybersecurity ⚡ AI Lesson
C Programming Fundamentals - If Statements
HackerSploit Intermediate 7y ago
C Programming Fundamentals - Input
Cybersecurity ⚡ AI Lesson
C Programming Fundamentals - Input
HackerSploit Intermediate 7y ago
VirtualBox nested virtualization: Now supported with version 6.0 on AMD processors! Great for GNS3!
Cybersecurity
VirtualBox nested virtualization: Now supported with version 6.0 on AMD processors! Great for GNS3!
David Bombal Beginner 7y ago
C Programming Fundamentals - Functions And Variables
Cybersecurity ⚡ AI Lesson
C Programming Fundamentals - Functions And Variables
HackerSploit Intermediate 7y ago
a16z Podcast | On Wearables, Quantified Self, and Biohacking
Cybersecurity ⚡ AI Lesson
a16z Podcast | On Wearables, Quantified Self, and Biohacking
a16z Beginner 7y ago
Kali Linux Quick Tips - How To Setup SSH On Kali
Cybersecurity ⚡ AI Lesson
Kali Linux Quick Tips - How To Setup SSH On Kali
HackerSploit Intermediate 7y ago
DotDotPwn - Directory Traversal Fuzzing
Cybersecurity ⚡ AI Lesson
DotDotPwn - Directory Traversal Fuzzing
HackerSploit Intermediate 7y ago
Jump Oriented Programming: Ethereum Smart Contract #2 - Real World CTF 2018
Cybersecurity
Jump Oriented Programming: Ethereum Smart Contract #2 - Real World CTF 2018
LiveOverflow Intermediate 7y ago
Experience is overrated! Learn the new technologies and change your life in 2019! Career Advice
Cybersecurity
Experience is overrated! Learn the new technologies and change your life in 2019! Career Advice
David Bombal Beginner 7y ago
2019 career advice for IT professionals: Ride waves and 80/20 rule. Christmas Giveaway! Amazon!
Cybersecurity
2019 career advice for IT professionals: Ride waves and 80/20 rule. Christmas Giveaway! Amazon!
David Bombal Beginner 7y ago
Ethereum Smart Contract Hacking - Real World CTF 2018
Cybersecurity
Ethereum Smart Contract Hacking - Real World CTF 2018
LiveOverflow Beginner 7y ago
📚 Coursera Courses Opens on Coursera · Free to audit
1 / 3 View all →
Foundations of AWS Security: Core Concepts and Threats
📚 Coursera Course ↗
Self-paced
Foundations of AWS Security: Core Concepts and Threats
Opens on Coursera ↗
Data Privacy, Security, Governance, Risk and Compliance
📚 Coursera Course ↗
Self-paced
Data Privacy, Security, Governance, Risk and Compliance
Opens on Coursera ↗
Encryption and Cryptography Essentials
📚 Coursera Course ↗
Self-paced
Encryption and Cryptography Essentials
Opens on Coursera ↗
 Cybersecurity and Privacy
📚 Coursera Course ↗
Self-paced
Cybersecurity and Privacy
Opens on Coursera ↗
Segurança de TI: defesa contra as artes negras digitais
📚 Coursera Course ↗
Self-paced
Segurança de TI: defesa contra as artes negras digitais
Opens on Coursera ↗
Security Assessment and Testing
📚 Coursera Course ↗
Self-paced
Security Assessment and Testing
Opens on Coursera ↗