Tech Skills

Cybersecurity

Ethical hacking, penetration testing, network security, CTFs and defensive security

2555
lessons
OSINT Deep Dive: Decoding Location Data Hidden in Photos
🔐 Cybersecurity
OSINT Deep Dive: Decoding Location Data Hidden in Photos
The Cyber Mentor Beginner 1y ago
New Cybersecurity Certification?
🔐 Cybersecurity
New Cybersecurity Certification?
David Bombal Beginner 1y ago
He Passed CISSP At Age 23
🔐 Cybersecurity
He Passed CISSP At Age 23
John Hammond Beginner 1y ago
What Their Computer Looked Like Right As They Got Hacked
🔐 Cybersecurity
What Their Computer Looked Like Right As They Got Hacked
John Hammond Beginner 1y ago
Hack a Smart Safe at the DEF CON IoT Village!
🔐 Cybersecurity
Hack a Smart Safe at the DEF CON IoT Village!
The Cyber Mentor Beginner 1y ago
Supply Chain Compromises Pt. 2 | The Incident Commander Series Ep. 4
🔐 Cybersecurity
Supply Chain Compromises Pt. 2 | The Incident Commander Series Ep. 4
SANS Institute Beginner 1y ago
Real World OSINT and Cyber Threat Intelligence Tips and Tricks
🔐 Cybersecurity
Real World OSINT and Cyber Threat Intelligence Tips and Tricks
David Bombal Beginner 1y ago
Supporting Thinking outside The Box-Allyship for neurodiverse colleagues
🔐 Cybersecurity
Supporting Thinking outside The Box-Allyship for neurodiverse colleagues
SANS Institute Beginner 1y ago
I'm going to be a hacker
🔐 Cybersecurity
I'm going to be a hacker
NetworkChuck Beginner 1y ago
Planning Red Team Operations | Scope, ROE & Reporting
🔐 Cybersecurity
Planning Red Team Operations | Scope, ROE & Reporting
HackerSploit Beginner 1y ago
HackTheBox - Headless
🔐 Cybersecurity
HackTheBox - Headless
IppSec Beginner 1y ago
Mapping APT TTPs With MITRE ATT&CK Navigator
🔐 Cybersecurity
Mapping APT TTPs With MITRE ATT&CK Navigator
HackerSploit Beginner 1y ago
HackTheBox - Corporate (FIXED)
🔐 Cybersecurity
HackTheBox - Corporate (FIXED)
IppSec Beginner 1y ago
Linux on Windows......Windows on Linux
🔐 Cybersecurity
Linux on Windows......Windows on Linux
NetworkChuck Beginner 1y ago
Ivanka Trump: Politics, Family, Real Estate, Fashion, Music, and Life | Lex Fridman Podcast #436
🔐 Cybersecurity
Ivanka Trump: Politics, Family, Real Estate, Fashion, Music, and Life | Lex Fridman Podcast #436
Lex Fridman Beginner 1y ago
Clara Discovers an AI Powered Website Builder
🔐 Cybersecurity
Clara Discovers an AI Powered Website Builder
Shamsudeen Adeshokan Beginner 1y ago
Simon Sinek: "Strong Thigh Muscles = More friends", This Is Why You Can't Make Friends!
🔐 Cybersecurity
Simon Sinek: "Strong Thigh Muscles = More friends", This Is Why You Can't Make Friends!
The Diary Of A CEO Beginner 1y ago
Kevin Spacey: Power, Controversy, Betrayal, Truth & Love in Film and Life | Lex Fridman Podcast #432
🔐 Cybersecurity
Kevin Spacey: Power, Controversy, Betrayal, Truth & Love in Film and Life | Lex Fridman Podcast #432
Lex Fridman Beginner 1y ago
Hacking a Docker Container Registry
🔐 Cybersecurity
Hacking a Docker Container Registry
John Hammond Beginner 1y ago
What to Know About Becoming a Pentester
🔐 Cybersecurity
What to Know About Becoming a Pentester
The Cyber Mentor Beginner 1y ago
Introduction To The MITRE ATT&CK Framework
🔐 Cybersecurity
Introduction To The MITRE ATT&CK Framework
HackerSploit Beginner 1y ago
How to be Invisible Online using Expert OSINT techniques
🔐 Cybersecurity
How to be Invisible Online using Expert OSINT techniques
David Bombal Beginner 1y ago
HackTheBox - Perfection
🔐 Cybersecurity
HackTheBox - Perfection
IppSec Beginner 1y ago
For the Win: Aligning Security Initiatives with the Business
🔐 Cybersecurity
For the Win: Aligning Security Initiatives with the Business
SANS Institute Beginner 1y ago
📚 Coursera Courses Opens on Coursera · Free to audit
1 / 3 View all →
Into the Trenches: Security Operations Center
📚 Coursera Course ↗
Self-paced
Into the Trenches: Security Operations Center
Opens on Coursera ↗
Microsoft Copilot for Security
📚 Coursera Course ↗
Self-paced
Microsoft Copilot for Security
Opens on Coursera ↗
Hacking WEP/WPA/WPA2 Wi-Fi Networks Using Kali Linux
📚 Coursera Course ↗
Self-paced
Hacking WEP/WPA/WPA2 Wi-Fi Networks Using Kali Linux
Opens on Coursera ↗
Introduction to Cybersecurity Tools & Cyberattacks
📚 Coursera Course ↗
Self-paced
Introduction to Cybersecurity Tools & Cyberattacks
Opens on Coursera ↗
Cloud Next Generation Firewall: avaliação de requisitos
📚 Coursera Course ↗
Self-paced
Cloud Next Generation Firewall: avaliação de requisitos
Opens on Coursera ↗
Ethical Hacking Parte 2
📚 Coursera Course ↗
Self-paced
Ethical Hacking Parte 2
Opens on Coursera ↗