Tech Skills

Cybersecurity

Ethical hacking, penetration testing, network security, CTFs and defensive security

3538
lessons
XSS a Paste Service - Pasteurize (web) Google CTF 2020
🔐 Cybersecurity
XSS a Paste Service - Pasteurize (web) Google CTF 2020
LiveOverflow Beginner 5y ago
David Fravor: UFOs, Aliens, Fighter Jets, and Aerospace Engineering | Lex Fridman Podcast #122
🔐 Cybersecurity
David Fravor: UFOs, Aliens, Fighter Jets, and Aerospace Engineering | Lex Fridman Podcast #122
Lex Fridman Beginner 5y ago
3 More Unique and Impactful Projects to get a Data Science Job
🔐 Cybersecurity
3 More Unique and Impactful Projects to get a Data Science Job
Tina Huang Beginner 5y ago
Binary IP Conversions  | Free CCNA 200-301 Course | Video #14
🔐 Cybersecurity
Binary IP Conversions | Free CCNA 200-301 Course | Video #14
David Bombal Beginner 5y ago
HackTheBox - Remote
🔐 Cybersecurity
HackTheBox - Remote
IppSec Beginner 5y ago
Too much Wireshark?! | Free Wireshark and Ethical Hacking Course: Video #5
🔐 Cybersecurity
Too much Wireshark?! | Free Wireshark and Ethical Hacking Course: Video #5
David Bombal Beginner 5y ago
setup a FREE VPN server in the cloud (AWS)
🔐 Cybersecurity
setup a FREE VPN server in the cloud (AWS)
NetworkChuck Beginner 5y ago
Google CTF - BEGINNER Reverse Engineering w/ ANGR
🔐 Cybersecurity
Google CTF - BEGINNER Reverse Engineering w/ ANGR
John Hammond Beginner 5y ago
The 20 Critical Security Controls: From Framework to Operational to Implementation
🔐 Cybersecurity
The 20 Critical Security Controls: From Framework to Operational to Implementation
SANS Institute Beginner 5y ago
HackTheBox Walkthrough Using Pwnbox - Traceback
🔐 Cybersecurity
HackTheBox Walkthrough Using Pwnbox - Traceback
HackerSploit Beginner 5y ago
SANS Security Awareness Learning Management System - Litmos
🔐 Cybersecurity
SANS Security Awareness Learning Management System - Litmos
SANS Institute Beginner 5y ago
FPGA simulated on a GPU - GPURTL Google CTF Finals 2019 (reversing)
🔐 Cybersecurity
FPGA simulated on a GPU - GPURTL Google CTF Finals 2019 (reversing)
LiveOverflow Beginner 5y ago
REST API has a major limitation and Vulcain solves it, Let us discuss
🔐 Cybersecurity
REST API has a major limitation and Vulcain solves it, Let us discuss
Hussein Nasser Beginner 5y ago
HackTheBox - Magic
🔐 Cybersecurity
HackTheBox - Magic
IppSec Beginner 5y ago
Best hidden feature of Python | Chaining comparison operators
🔐 Cybersecurity
Best hidden feature of Python | Chaining comparison operators
Lex Fridman Beginner 5y ago
how to HACK a password // password cracking with Kali Linux and HashCat
🔐 Cybersecurity
how to HACK a password // password cracking with Kali Linux and HashCat
NetworkChuck Beginner 5y ago
What caused the cold start performance “dip” in MariaDB .. Let us discuss (@percona Article)
🔐 Cybersecurity
What caused the cold start performance “dip” in MariaDB .. Let us discuss (@percona Article)
Hussein Nasser Beginner 5y ago
Interview with a Cybersecurity Recruiter
🔐 Cybersecurity
Interview with a Cybersecurity Recruiter
The Cyber Mentor Beginner 5y ago
Introduction To The Nmap Scripting Engine (NSE)
🔐 Cybersecurity
Introduction To The Nmap Scripting Engine (NSE)
HackerSploit Beginner 5y ago
Pentest Story Time: My Favorite Hacks
🔐 Cybersecurity
Pentest Story Time: My Favorite Hacks
The Cyber Mentor Beginner 5y ago
HacktivityCon CTF is in TWO DAYS!
🔐 Cybersecurity
HacktivityCon CTF is in TWO DAYS!
John Hammond Beginner 5y ago
Wireshark Display Filters | Free Wireshark and Ethical Hacking Course: Video #4
🔐 Cybersecurity
Wireshark Display Filters | Free Wireshark and Ethical Hacking Course: Video #4
David Bombal Beginner 5y ago
Practical protocols: SMTP and POP3 | Free CCNA 200-301 Course | Video #12
🔐 Cybersecurity
Practical protocols: SMTP and POP3 | Free CCNA 200-301 Course | Video #12
David Bombal Beginner 5y ago
Cleaning Up Our Cyber Hygiene
🔐 Cybersecurity
Cleaning Up Our Cyber Hygiene
SANS Institute Beginner 5y ago
Free Wireshark and Ethical Hacking Course: Video #3
🔐 Cybersecurity
Free Wireshark and Ethical Hacking Course: Video #3
David Bombal Beginner 5y ago
Sheldon Solomon: Death and Meaning | Lex Fridman Podcast #117
🔐 Cybersecurity
Sheldon Solomon: Death and Meaning | Lex Fridman Podcast #117
Lex Fridman Beginner 5y ago
new Kali Linux GUI on Windows 10 (WSL 2) // 2020.3 Release
🔐 Cybersecurity
new Kali Linux GUI on Windows 10 (WSL 2) // 2020.3 Release
NetworkChuck Beginner 5y ago
Free Wireshark and Ethical Hacking Course: Video #2
🔐 Cybersecurity
Free Wireshark and Ethical Hacking Course: Video #2
David Bombal Beginner 5y ago
My Struggle with the English Language in the US as an Arab Native Speaker and a Software Engineer
🔐 Cybersecurity
My Struggle with the English Language in the US as an Arab Native Speaker and a Software Engineer
Hussein Nasser Beginner 5y ago
Free Wireshark and Ethical Hacking Course: Video #1
🔐 Cybersecurity
Free Wireshark and Ethical Hacking Course: Video #1
David Bombal Beginner 5y ago
Wireshark Install Ubuntu 20.04
🔐 Cybersecurity
Wireshark Install Ubuntu 20.04
David Bombal Beginner 5y ago
Packet Tracer Install Ubuntu 20.04
🔐 Cybersecurity
Packet Tracer Install Ubuntu 20.04
David Bombal Beginner 5y ago
Content Security Policy Can be bypassed in Chrome?
🔐 Cybersecurity
Content Security Policy Can be bypassed in Chrome?
Hussein Nasser Beginner 5y ago
Free Wireshark and Ethical Hacking Course: Video #0
🔐 Cybersecurity
Free Wireshark and Ethical Hacking Course: Video #0
David Bombal Beginner 5y ago
WOW! China Blocks TLS 1.3 with ESNI - Let us discuss
🔐 Cybersecurity
WOW! China Blocks TLS 1.3 with ESNI - Let us discuss
Hussein Nasser Beginner 5y ago
Wiresharking MongoDB - Decrypting TLS traffic, mongo protocol, cursors and more
🔐 Cybersecurity
Wiresharking MongoDB - Decrypting TLS traffic, mongo protocol, cursors and more
Hussein Nasser Beginner 5y ago
FireFox Changes to SameSite Cookie Default Behavior Following Chrome’s footsteps - Great Change
🔐 Cybersecurity
FireFox Changes to SameSite Cookie Default Behavior Following Chrome’s footsteps - Great Change
Hussein Nasser Beginner 5y ago
Traefik is too complex and hard to understand... let us discuss
🔐 Cybersecurity
Traefik is too complex and hard to understand... let us discuss
Hussein Nasser Beginner 5y ago
How do networks actually work? | Free CCNA 200-301 Course | Video #10
🔐 Cybersecurity
How do networks actually work? | Free CCNA 200-301 Course | Video #10
David Bombal Beginner 5y ago
How the Twitter Hack really happened? How they got caught and can Homomorphic Encryption help?
🔐 Cybersecurity
How the Twitter Hack really happened? How they got caught and can Homomorphic Encryption help?
Hussein Nasser Beginner 5y ago
The OSI Model is a lie! | Free CCNA 200-301 Course | Video #8
🔐 Cybersecurity
The OSI Model is a lie! | Free CCNA 200-301 Course | Video #8
David Bombal Beginner 5y ago
learning hacking? DON'T make this mistake!! (hide yourself with Kali Linux and ProxyChains)
🔐 Cybersecurity
learning hacking? DON'T make this mistake!! (hide yourself with Kali Linux and ProxyChains)
NetworkChuck Beginner 5y ago
Network Devices Part 1 | Free CCNA 200-301 Course | Video #6
🔐 Cybersecurity
Network Devices Part 1 | Free CCNA 200-301 Course | Video #6
David Bombal Beginner 5y ago
Cisco Packet Tracer Networks | Free CCNA 200-301 Course | Video #5
🔐 Cybersecurity
Cisco Packet Tracer Networks | Free CCNA 200-301 Course | Video #5
David Bombal Beginner 5y ago
What are clients, servers, protocols and ports numbers? | Free CCNA 200-301 Course | Video #4
🔐 Cybersecurity
What are clients, servers, protocols and ports numbers? | Free CCNA 200-301 Course | Video #4
David Bombal Beginner 5y ago
Starting a Software Engineering YouTube Channel? This might help
🔐 Cybersecurity
Starting a Software Engineering YouTube Channel? This might help
Hussein Nasser Beginner 5y ago
HackTheBox - Cascade
🔐 Cybersecurity
HackTheBox - Cascade
IppSec Beginner 5y ago
The smallest network? | Free CCNA 200-301 Course | Video #2
🔐 Cybersecurity
The smallest network? | Free CCNA 200-301 Course | Video #2
David Bombal Beginner 5y ago
📚 Coursera Courses Opens on Coursera · Free to audit
1 / 3 View all →
Sustainability Reporting: From Regulation to Implementation
📚 Coursera Course ↗
Self-paced
Sustainability Reporting: From Regulation to Implementation
Opens on Coursera ↗
Advanced Network Security and Endpoint Strategies
📚 Coursera Course ↗
Self-paced
Advanced Network Security and Endpoint Strategies
Opens on Coursera ↗
Python Hacking: Apply, Implement & Analyze
📚 Coursera Course ↗
Self-paced
Python Hacking: Apply, Implement & Analyze
Opens on Coursera ↗
The Business of Cybersecurity Capstone
📚 Coursera Course ↗
Self-paced
The Business of Cybersecurity Capstone
Opens on Coursera ↗
AI Agents for Cybersecurity
📚 Coursera Course ↗
Self-paced
AI Agents for Cybersecurity
Opens on Coursera ↗
CompTIA Security+ 701
📚 Coursera Course ↗
Self-paced
CompTIA Security+ 701
Opens on Coursera ↗