Tech Skills

Cybersecurity

Ethical hacking, penetration testing, network security, CTFs and defensive security

6,778
lessons
Skills in this topic
View full skill map →
Security Basics
beginner
Fix OWASP top 10 vulnerabilities
AI Security
intermediate
Identify and patch prompt injection vulnerabilities
Network Security
intermediate
Configure a firewall with proper inbound/outbound rules
Ethical Hacking & Pen Testing
intermediate
Conduct a full pen test with Kali Linux
Cloud Security
intermediate
Implement IAM least-privilege policies on AWS/GCP
Incident Response
intermediate
Build an incident response playbook
Security Compliance
intermediate
Map controls for SOC 2 Type II compliance
Defensive AI
advanced
Build an AI-powered log anomaly detector
Hacker Simulator Walkthrough - Episode 5 - Almost Getting Jailed
Cybersecurity ⚡ AI Lesson
Hacker Simulator Walkthrough - Episode 5 - Almost Getting Jailed
HackerSploit Intermediate 4y ago
HEK.SI 2022 - Bypassing UAC With UACMe
Cybersecurity ⚡ AI Lesson
HEK.SI 2022 - Bypassing UAC With UACMe
HackerSploit Intermediate 4y ago
SOC 2 TSCs
Cybersecurity ⚡ AI Lesson
SOC 2 TSCs
SANS Institute Intermediate 4y ago
Retrospectiva Cyber 2021 - Painel Principal como Presidente do Painel Rob T. Lee
Cybersecurity ⚡ AI Lesson
Retrospectiva Cyber 2021 - Painel Principal como Presidente do Painel Rob T. Lee
SANS Institute Intermediate 4y ago
How to get a Million YouTube Subscribers in 100 Seconds
Cybersecurity
How to get a Million YouTube Subscribers in 100 Seconds
Fireship Intermediate 4y ago
Don't Use innerHTML Unless You Want To Be Hacked
Cybersecurity
Don't Use innerHTML Unless You Want To Be Hacked
Web Dev Simplified Intermediate 4y ago
How I Deepfaked VTuber Gawr Gura with AI
Cybersecurity
How I Deepfaked VTuber Gawr Gura with AI
bycloud Intermediate 4y ago
Implementing Security Best Practices for Amazon WorkSpaces and Amazon AppStream 2.0
Cybersecurity
Implementing Security Best Practices for Amazon WorkSpaces and Amazon AppStream 2.0
AWS Developers Intermediate 4y ago
UHC - Spooktrol
Cybersecurity
UHC - Spooktrol
IppSec Intermediate 4y ago
Running Applications Across Elastic Beanstalk and AWS App Runner - AWS Online Tech Talk
Cybersecurity ⚡ AI Lesson
Running Applications Across Elastic Beanstalk and AWS App Runner - AWS Online Tech Talk
AWS Developers Intermediate 4y ago
Security in Software Development Process / PART 2: Hints for developers
Cybersecurity
Security in Software Development Process / PART 2: Hints for developers
Stepwise Intermediate 4y ago
SnykCon CTF - "Random Flag Generator" Weak PRNG Seed
Cybersecurity ⚡ AI Lesson
SnykCon CTF - "Random Flag Generator" Weak PRNG Seed
John Hammond Intermediate 4y ago
SnykCon CTF - "Invisible Ink" Prototype Pollution
Cybersecurity ⚡ AI Lesson
SnykCon CTF - "Invisible Ink" Prototype Pollution
John Hammond Intermediate 4y ago
EternalBlue - MS17-010 - Manual Exploitation
Cybersecurity ⚡ AI Lesson
EternalBlue - MS17-010 - Manual Exploitation
HackerSploit Intermediate 4y ago
Windows Post Exploitation - Dumping & Cracking NTLM Hashes
Cybersecurity ⚡ AI Lesson
Windows Post Exploitation - Dumping & Cracking NTLM Hashes
HackerSploit Intermediate 4y ago
Windows Privilege Escalation - Using Stored Credentials
Cybersecurity ⚡ AI Lesson
Windows Privilege Escalation - Using Stored Credentials
HackerSploit Intermediate 4y ago
Hacker Simulator Walkthrough - Episode 4 - Joining CloudSec!
Cybersecurity ⚡ AI Lesson
Hacker Simulator Walkthrough - Episode 4 - Joining CloudSec!
HackerSploit Intermediate 4y ago
Windows Privilege Escalation - Searching For Passwords In Windows Registry
Cybersecurity ⚡ AI Lesson
Windows Privilege Escalation - Searching For Passwords In Windows Registry
HackerSploit Intermediate 4y ago
Windows Privilege Escalation - Exploiting AlwaysInstallElevated
Cybersecurity ⚡ AI Lesson
Windows Privilege Escalation - Exploiting AlwaysInstallElevated
HackerSploit Intermediate 4y ago
Windows Privilege Escalation - Exploiting AutoRun Programs
Cybersecurity ⚡ AI Lesson
Windows Privilege Escalation - Exploiting AutoRun Programs
HackerSploit Intermediate 4y ago
Revisiting Parrot OS
Cybersecurity ⚡ AI Lesson
Revisiting Parrot OS
HackerSploit Intermediate 4y ago
Hacker Simulator Walkthrough - Episode 3 - Phi$hing Frenzy!
Cybersecurity ⚡ AI Lesson
Hacker Simulator Walkthrough - Episode 3 - Phi$hing Frenzy!
HackerSploit Intermediate 4y ago
Windows Privilege Escalation - Insecure Service Executables
Cybersecurity ⚡ AI Lesson
Windows Privilege Escalation - Insecure Service Executables
HackerSploit Intermediate 4y ago
Hacker Simulator Walkthrough - Episode 2 - Leveling Up
Cybersecurity ⚡ AI Lesson
Hacker Simulator Walkthrough - Episode 2 - Leveling Up
HackerSploit Intermediate 4y ago
Hacker Simulator Walkthrough - Episode 1 - The Journey Begins
Cybersecurity ⚡ AI Lesson
Hacker Simulator Walkthrough - Episode 1 - The Journey Begins
HackerSploit Intermediate 4y ago
Windows Privilege Escalation - Weak Registry Permissions
Cybersecurity ⚡ AI Lesson
Windows Privilege Escalation - Weak Registry Permissions
HackerSploit Intermediate 4y ago
Windows Privilege Escalation - Unquoted Service Paths
Cybersecurity ⚡ AI Lesson
Windows Privilege Escalation - Unquoted Service Paths
HackerSploit Intermediate 4y ago
Windows Privilege Escalation - Exploiting Insecure Service Permissions
Cybersecurity ⚡ AI Lesson
Windows Privilege Escalation - Exploiting Insecure Service Permissions
HackerSploit Intermediate 4y ago
Windows Enumeration With winPEAS
Cybersecurity ⚡ AI Lesson
Windows Enumeration With winPEAS
HackerSploit Intermediate 4y ago
What do you need to know about the log4j (Log4Shell) vulnerability?
Cybersecurity ⚡ AI Lesson
What do you need to know about the log4j (Log4Shell) vulnerability?
SANS Institute Intermediate 4y ago
What Keeps You Up At Night?
Cybersecurity ⚡ AI Lesson
What Keeps You Up At Night?
SANS Institute Intermediate 4y ago
Windows Post Exploitation - Persistence With Metasploit
Cybersecurity ⚡ AI Lesson
Windows Post Exploitation - Persistence With Metasploit
HackerSploit Intermediate 4y ago
Active Directory Enumeration With Server Manager
Cybersecurity ⚡ AI Lesson
Active Directory Enumeration With Server Manager
HackerSploit Intermediate 4y ago
Cybersecurity Career Roadmap
Cybersecurity ⚡ AI Lesson
Cybersecurity Career Roadmap
HackerSploit Intermediate 4y ago
Application Security: Web Apps, APIs & Microservices | #Replay
Cybersecurity ⚡ AI Lesson
Application Security: Web Apps, APIs & Microservices | #Replay
SANS Institute Intermediate 4y ago
Windows Red Team Credential Access Techniques | Mimikatz & WCE
Cybersecurity ⚡ AI Lesson
Windows Red Team Credential Access Techniques | Mimikatz & WCE
HackerSploit Intermediate 4y ago
Cleaning Up Our Cyber Hygiene
Cybersecurity ⚡ AI Lesson
Cleaning Up Our Cyber Hygiene
SANS Institute Intermediate 4y ago
What Keeps You Up At Night?
Cybersecurity ⚡ AI Lesson
What Keeps You Up At Night?
SANS Institute Intermediate 4y ago
Linux Red Team Exploitation Techniques | Exploiting WordPress & MySQL
Cybersecurity ⚡ AI Lesson
Linux Red Team Exploitation Techniques | Exploiting WordPress & MySQL
HackerSploit Intermediate 4y ago
Windows Red Team Exploitation Techniques | Luckystrike & PowerShell Empire
Cybersecurity ⚡ AI Lesson
Windows Red Team Exploitation Techniques | Luckystrike & PowerShell Empire
HackerSploit Intermediate 4y ago
Red Team Reconnaissance Techniques
Cybersecurity ⚡ AI Lesson
Red Team Reconnaissance Techniques
HackerSploit Intermediate 4y ago
Red Team Adversary Emulation With Caldera
Cybersecurity ⚡ AI Lesson
Red Team Adversary Emulation With Caldera
HackerSploit Intermediate 4y ago
Windows Post Exploitation - Dumping Hashes With Mimikatz
Cybersecurity ⚡ AI Lesson
Windows Post Exploitation - Dumping Hashes With Mimikatz
HackerSploit Intermediate 4y ago
Active Directory Enumeration With BloodHound
Cybersecurity ⚡ AI Lesson
Active Directory Enumeration With BloodHound
HackerSploit Intermediate 4y ago
Active Directory Enumeration With PowerView
Cybersecurity ⚡ AI Lesson
Active Directory Enumeration With PowerView
HackerSploit Intermediate 4y ago
Windows Post Exploitation - Local Enumeration
Cybersecurity ⚡ AI Lesson
Windows Post Exploitation - Local Enumeration
HackerSploit Intermediate 4y ago
TryHackMe - Steel Mountain Walkthrough - Manual Windows Exploitation
Cybersecurity ⚡ AI Lesson
TryHackMe - Steel Mountain Walkthrough - Manual Windows Exploitation
HackerSploit Intermediate 4y ago
Host Discovery & Vulnerability Scanning With Nessus
Cybersecurity ⚡ AI Lesson
Host Discovery & Vulnerability Scanning With Nessus
HackerSploit Intermediate 4y ago
📚 Coursera Courses Opens on Coursera · Free to audit
1 / 3 View all →
Encryption and Cryptography Essentials
📚 Coursera Course ↗
Self-paced
Encryption and Cryptography Essentials
Opens on Coursera ↗
Secure Networked System with Firewall and IDS
📚 Coursera Course ↗
Self-paced
Secure Networked System with Firewall and IDS
Opens on Coursera ↗
Cybersecurity Testing and Prevention
📚 Coursera Course ↗
Self-paced
Cybersecurity Testing and Prevention
Opens on Coursera ↗
Introduction to Ethical Hacking Principles
📚 Coursera Course ↗
Self-paced
Introduction to Ethical Hacking Principles
Opens on Coursera ↗
Vulnerability Types and Concepts
📚 Coursera Course ↗
Self-paced
Vulnerability Types and Concepts
Opens on Coursera ↗
Detecting and Mitigating Cyber Threats and Attacks
📚 Coursera Course ↗
Self-paced
Detecting and Mitigating Cyber Threats and Attacks
Opens on Coursera ↗