Tech Skills

Cybersecurity

Ethical hacking, penetration testing, network security, CTFs and defensive security

3537
lessons
Dealing with Burnout
🔐 Cybersecurity
Dealing with Burnout
The Cyber Mentor Beginner 4y ago
Problem while debugging a simple buffer overflow
🔐 Cybersecurity
Problem while debugging a simple buffer overflow
LiveUnderflow Beginner 4y ago
HackTheBox - Tentacle
🔐 Cybersecurity
HackTheBox - Tentacle
IppSec Beginner 4y ago
burp suite
🔐 Cybersecurity
burp suite
David Bombal Beginner 4y ago
Charles Buck: Cell Biology & Qi Mechanism from Thunderfire Miraculous Needling. Using Moxa Sticks
🔐 Cybersecurity
Charles Buck: Cell Biology & Qi Mechanism from Thunderfire Miraculous Needling. Using Moxa Sticks
TCM Academy Beginner 4y ago
Charles Hoskinson: Cardano | Lex Fridman Podcast #192
🔐 Cybersecurity
Charles Hoskinson: Cardano | Lex Fridman Podcast #192
Lex Fridman Beginner 4y ago
Slow the Revolving Door of Talent. Creative Ways to Keep Your Existing Cyber Talent in Your Org
🔐 Cybersecurity
Slow the Revolving Door of Talent. Creative Ways to Keep Your Existing Cyber Talent in Your Org
SANS Institute Beginner 4y ago
HackTheBox - Tenet
🔐 Cybersecurity
HackTheBox - Tenet
IppSec Beginner 4y ago
Information Stealer - Malware Analysis (PowerShell to .NET)
🔐 Cybersecurity
Information Stealer - Malware Analysis (PowerShell to .NET)
John Hammond Beginner 4y ago
Kali Linux 2021.2 zero to WiFi (Free install)
🔐 Cybersecurity
Kali Linux 2021.2 zero to WiFi (Free install)
David Bombal Beginner 4y ago
AES-CTR Cryptography: Reused Key Weakness - HackTheBox Cyber Apocalypse CTF
🔐 Cybersecurity
AES-CTR Cryptography: Reused Key Weakness - HackTheBox Cyber Apocalypse CTF
John Hammond Beginner 4y ago
Ransomware - Do You Pay It Or Not? - Experts debate the costs ethics around paying ransomware - SANS
🔐 Cybersecurity
Ransomware - Do You Pay It Or Not? - Experts debate the costs ethics around paying ransomware - SANS
SANS Institute Beginner 4y ago
Heavenly Moxibustion: The Medicinal Qualities of Common Herbs & Spices
🔐 Cybersecurity
Heavenly Moxibustion: The Medicinal Qualities of Common Herbs & Spices
TCM Academy Beginner 4y ago
Frank Wilczek: Physics of Quarks, Dark Matter, Complexity, Life & Aliens | Lex Fridman Podcast #187
🔐 Cybersecurity
Frank Wilczek: Physics of Quarks, Dark Matter, Complexity, Life & Aliens | Lex Fridman Podcast #187
Lex Fridman Beginner 4y ago
Advanced Growth Tactics - Steal The Top-Performing Tech Companies' Best-Kept Secrets
🔐 Cybersecurity
Advanced Growth Tactics - Steal The Top-Performing Tech Companies' Best-Kept Secrets
Neil Patel Beginner 4y ago
Windows Privilege Escalation Tutorial For Beginners
🔐 Cybersecurity
Windows Privilege Escalation Tutorial For Beginners
HackerSploit Beginner 4y ago
Pentesting vs. Bug Bounty vs. Pentesting ???
🔐 Cybersecurity
Pentesting vs. Bug Bounty vs. Pentesting ???
LiveOverflow Beginner 4y ago
Twitter OSiNT (Ethical Hacking)
🔐 Cybersecurity
Twitter OSiNT (Ethical Hacking)
NetworkChuck Beginner 4y ago
FaceTiming Funnel Hacking Live Speakers (Reactions!) 🤯😱😭
🔐 Cybersecurity
FaceTiming Funnel Hacking Live Speakers (Reactions!) 🤯😱😭
Russell Brunson Beginner 4y ago
HELP!! (for when you suck at Linux) // Linux for Hackers // EP3
🔐 Cybersecurity
HELP!! (for when you suck at Linux) // Linux for Hackers // EP3
NetworkChuck Beginner 4y ago
Security Myths: Your locked laptop keeps you safe // hak5 Bash Bunny
🔐 Cybersecurity
Security Myths: Your locked laptop keeps you safe // hak5 Bash Bunny
David Bombal Beginner 4y ago
Mark Morowczynski & Thomas Detzner: Microsoft Incident Response Playbooks
🔐 Cybersecurity
Mark Morowczynski & Thomas Detzner: Microsoft Incident Response Playbooks
SANS Institute Beginner 4y ago
HackTheBox - Cereal
🔐 Cybersecurity
HackTheBox - Cereal
IppSec Beginner 4y ago
Cloudflare CDN CSP - XSS Bypass / HackTheBox Cyber Apocalypse CTF
🔐 Cybersecurity
Cloudflare CDN CSP - XSS Bypass / HackTheBox Cyber Apocalypse CTF
John Hammond Beginner 4y ago
The Effects of Laser Acupuncture for Chronic Central Type Facial Paralysis, Part 1: Introduction
🔐 Cybersecurity
The Effects of Laser Acupuncture for Chronic Central Type Facial Paralysis, Part 1: Introduction
TCM Academy Beginner 4y ago
AJ Yawn: Cloud, Compliance and Automating Security
🔐 Cybersecurity
AJ Yawn: Cloud, Compliance and Automating Security
SANS Institute Beginner 4y ago
Bryan Johnson: Kernel Brain-Computer Interfaces | Lex Fridman Podcast #186
🔐 Cybersecurity
Bryan Johnson: Kernel Brain-Computer Interfaces | Lex Fridman Podcast #186
Lex Fridman Beginner 4y ago
Passwords: Am i a joke to you?
🔐 Cybersecurity
Passwords: Am i a joke to you?
David Bombal Beginner 4y ago
IFrame Parent XSS - HackTheBox Cyber Apocalypse CTF
🔐 Cybersecurity
IFrame Parent XSS - HackTheBox Cyber Apocalypse CTF
John Hammond Beginner 4y ago
HackTheBox - Ready
🔐 Cybersecurity
HackTheBox - Ready
IppSec Beginner 4y ago
HackTheBox CA CTF - Using Snyk to Find & Fix Vulnerabilities
🔐 Cybersecurity
HackTheBox CA CTF - Using Snyk to Find & Fix Vulnerabilities
John Hammond Beginner 4y ago
XML Object Exfiltration - HackTheBox Cyber Apocalypse CTF "E. Tree"
🔐 Cybersecurity
XML Object Exfiltration - HackTheBox Cyber Apocalypse CTF "E. Tree"
John Hammond Beginner 4y ago
SQLite Blind SQL Injection - HackTheBox Cyber Apocalypse CTF
🔐 Cybersecurity
SQLite Blind SQL Injection - HackTheBox Cyber Apocalypse CTF
John Hammond Beginner 4y ago
Sharing the Wisdom of TCM: Women's Health, TCM and Integration, With Karin Kedar
🔐 Cybersecurity
Sharing the Wisdom of TCM: Women's Health, TCM and Integration, With Karin Kedar
TCM Academy Beginner 4y ago
Metasploit
🔐 Cybersecurity
Metasploit
David Bombal Beginner 4y ago
HTB Cyber Apocalypse - cURL As a Service
🔐 Cybersecurity
HTB Cyber Apocalypse - cURL As a Service
John Hammond Beginner 4y ago
CTF Walkthrough with John Hammond
🔐 Cybersecurity
CTF Walkthrough with John Hammond
David Bombal Beginner 4y ago
HackTheBox - Sharp
🔐 Cybersecurity
HackTheBox - Sharp
IppSec Beginner 4y ago
Are CTFs even real? Featuring John Hammond.
🔐 Cybersecurity
Are CTFs even real? Featuring John Hammond.
David Bombal Beginner 4y ago
HackTheBox - Bucket
🔐 Cybersecurity
HackTheBox - Bucket
IppSec Beginner 4y ago
Chinese Facial Diagnosis & Gynecology with Lillian Pearl Bridges
🔐 Cybersecurity
Chinese Facial Diagnosis & Gynecology with Lillian Pearl Bridges
TCM Academy Beginner 4y ago
Cybersecurity hacking path
🔐 Cybersecurity
Cybersecurity hacking path
David Bombal Beginner 4y ago
The Foundation of Accelerating your Cybersecurity Career - SANS@Mic Keynote w/ James Lyne
🔐 Cybersecurity
The Foundation of Accelerating your Cybersecurity Career - SANS@Mic Keynote w/ James Lyne
SANS Institute Beginner 4y ago
Do you need a Cybersecurity home lab?
🔐 Cybersecurity
Do you need a Cybersecurity home lab?
David Bombal Beginner 4y ago
BEGINNER Capture The Flag - PicoCTF 2021 001 "Obedient Cat"
🔐 Cybersecurity
BEGINNER Capture The Flag - PicoCTF 2021 001 "Obedient Cat"
John Hammond Beginner 4y ago
Knowing Your Applicants. How to Stay Current to Best Assess your Cyber Applicants w/ Kevin Garvey
🔐 Cybersecurity
Knowing Your Applicants. How to Stay Current to Best Assess your Cyber Applicants w/ Kevin Garvey
SANS Institute Beginner 4y ago
Heart and Stomach: Fire in the Digestive System, TCM Course with Izabela Mietka
🔐 Cybersecurity
Heart and Stomach: Fire in the Digestive System, TCM Course with Izabela Mietka
TCM Academy Beginner 4y ago
How Does Acupuncture Works, Sharing the Wisdom of TCM with Dr. John McDonald, PhD
🔐 Cybersecurity
How Does Acupuncture Works, Sharing the Wisdom of TCM with Dr. John McDonald, PhD
TCM Academy Beginner 4y ago
📚 Coursera Courses Opens on Coursera · Free to audit
1 / 3 View all →
AWS: Data Protection and Security Governance
📚 Coursera Course ↗
Self-paced
AWS: Data Protection and Security Governance
Opens on Coursera ↗
Security Hardening
📚 Coursera Course ↗
Self-paced
Security Hardening
Opens on Coursera ↗
Digital Forensics for Pentesters - Hands-On Learning
📚 Coursera Course ↗
Self-paced
Digital Forensics for Pentesters - Hands-On Learning
Opens on Coursera ↗
Communication and Network Security
📚 Coursera Course ↗
Self-paced
Communication and Network Security
Opens on Coursera ↗
Azure Cybersecurity Solutions And Microsoft Defender
📚 Coursera Course ↗
Self-paced
Azure Cybersecurity Solutions And Microsoft Defender
Opens on Coursera ↗
Hacking COVID-19: Metabolic Pathway Analysis Yields SARS-CoV-2 Drug Targets
📚 Coursera Course ↗
Self-paced
Hacking COVID-19: Metabolic Pathway Analysis Yields SARS-CoV-2 Drug Targets
Opens on Coursera ↗