Tech Skills

Cybersecurity

Ethical hacking, penetration testing, network security, CTFs and defensive security

6,783
lessons
Skills in this topic
View full skill map →
Security Basics
beginner
Fix OWASP top 10 vulnerabilities
AI Security
intermediate
Identify and patch prompt injection vulnerabilities
Network Security
intermediate
Configure a firewall with proper inbound/outbound rules
Ethical Hacking & Pen Testing
intermediate
Conduct a full pen test with Kali Linux
Cloud Security
intermediate
Implement IAM least-privilege policies on AWS/GCP
Incident Response
intermediate
Build an incident response playbook
Security Compliance
intermediate
Map controls for SOC 2 Type II compliance
Defensive AI
advanced
Build an AI-powered log anomaly detector
SnykCon CTF - "Invisible Ink" Prototype Pollution
Cybersecurity ⚡ AI Lesson
SnykCon CTF - "Invisible Ink" Prototype Pollution
John Hammond Intermediate 4y ago
What Keeps You Up At Night? with James Beeson
Cybersecurity ⚡ AI Lesson
What Keeps You Up At Night? with James Beeson
SANS Institute Intermediate 4y ago
How To Install & Configure Nessus
Cybersecurity ⚡ AI Lesson
How To Install & Configure Nessus
HackerSploit Intermediate 4y ago
Hidden keylogger // Bypass Linux & macOS logon screens! Rubber Ducky scripts for Hak5 OMG cable
Cybersecurity
Hidden keylogger // Bypass Linux & macOS logon screens! Rubber Ducky scripts for Hak5 OMG cable
David Bombal Intermediate 4y ago
Fuzzing & Directory Brute-Force With ffuf
Cybersecurity ⚡ AI Lesson
Fuzzing & Directory Brute-Force With ffuf
HackerSploit Intermediate 4y ago
Identifying & Countering Cognitive Bias
Cybersecurity ⚡ AI Lesson
Identifying & Countering Cognitive Bias
SANS Institute Intermediate 4y ago
Migrate mainframe applications to AWS using automated code refactoring - AWS Virtual Workshop
Cybersecurity ⚡ AI Lesson
Migrate mainframe applications to AWS using automated code refactoring - AWS Virtual Workshop
AWS Developers Intermediate 4y ago
UHC - Jarmis
Cybersecurity
UHC - Jarmis
IppSec Intermediate 4y ago
Creating a secure foundation for SAP on AWS - AWS Virtual Workshop
Cybersecurity ⚡ AI Lesson
Creating a secure foundation for SAP on AWS - AWS Virtual Workshop
AWS Developers Intermediate 4y ago
VOD - TryHackMe! Attacking Kerberos
Cybersecurity
VOD - TryHackMe! Attacking Kerberos
John Hammond Intermediate 4y ago
Thumbnail A/B Test Experiment for CTR
Cybersecurity
Thumbnail A/B Test Experiment for CTR
LiveUnderflow Intermediate 4y ago
Better than Stack Overflow for Development
Cybersecurity
Better than Stack Overflow for Development
LiveUnderflow Intermediate 4y ago
"Controversial Security" // BSides Berlin 2021
Cybersecurity
"Controversial Security" // BSides Berlin 2021
LiveOverflow Intermediate 4y ago
Hacking Out of a Network - Computerphile
Cybersecurity ⚡ AI Lesson
Hacking Out of a Network - Computerphile
Computerphile Intermediate 4y ago
using z3 to reverse a custom hash during a CTF be like #shorts
Cybersecurity
using z3 to reverse a custom hash during a CTF be like #shorts
LiveOverflow Intermediate 4y ago
Build 5 Projects With HTML, CSS & JavaScript
Cybersecurity ⚡ AI Lesson
Build 5 Projects With HTML, CSS & JavaScript
Traversy Media Intermediate 4y ago
Insane $100,000 home lab!
Cybersecurity
Insane $100,000 home lab!
David Bombal Intermediate 4y ago
BlockChain,Cloud,Devops,Data Science, Big Data, Cybersecurity- Which Technology To Select?😰😰😰😰😰
Cybersecurity
BlockChain,Cloud,Devops,Data Science, Big Data, Cybersecurity- Which Technology To Select?😰😰😰😰😰
Krish Naik Intermediate 4y ago
Redis in 100 Seconds
Cybersecurity ⚡ AI Lesson
Redis in 100 Seconds
Fireship Intermediate 4y ago
HackTheBox - ScriptKiddie
Cybersecurity ⚡ AI Lesson
HackTheBox - ScriptKiddie
IppSec Intermediate 4y ago
Data Visualization: Bridging the Gap Between Users and Information
Cybersecurity
Data Visualization: Bridging the Gap Between Users and Information
Microsoft Research Intermediate 4y ago
HackTheBox Mirai - Raspberry Pi Pentesting
Cybersecurity ⚡ AI Lesson
HackTheBox Mirai - Raspberry Pi Pentesting
HackerSploit Intermediate 4y ago
HackTheBox Nibbles - Exploiting Arbitrary File Upload
Cybersecurity ⚡ AI Lesson
HackTheBox Nibbles - Exploiting Arbitrary File Upload
HackerSploit Intermediate 4y ago
Not in Cyber Security? No Problem! Creative Ways to Gain Experience With No Experience
Cybersecurity ⚡ AI Lesson
Not in Cyber Security? No Problem! Creative Ways to Gain Experience With No Experience
SANS Institute Intermediate 4y ago
VOD - TryHackMe! Game Zone - Recreating a Metasploit Exploit in Python
Cybersecurity ⚡ AI Lesson
VOD - TryHackMe! Game Zone - Recreating a Metasploit Exploit in Python
John Hammond Intermediate 4y ago
VOD - TryHackMe! Steel Mountain with Metasploit
Cybersecurity ⚡ AI Lesson
VOD - TryHackMe! Steel Mountain with Metasploit
John Hammond Intermediate 4y ago
HackTheBox Knife - Linux Privilege Escalation With GTFOBins
Cybersecurity ⚡ AI Lesson
HackTheBox Knife - Linux Privilege Escalation With GTFOBins
HackerSploit Intermediate 4y ago
Post Exploitation - Transferring Files To Windows Targets
Cybersecurity ⚡ AI Lesson
Post Exploitation - Transferring Files To Windows Targets
HackerSploit Intermediate 4y ago
How To Setup Your Terminal For Penetration Testing
Cybersecurity ⚡ AI Lesson
How To Setup Your Terminal For Penetration Testing
HackerSploit Intermediate 4y ago
AWS Systems Manager Incident Manager - AWS Virtual Workshops
Cybersecurity ⚡ AI Lesson
AWS Systems Manager Incident Manager - AWS Virtual Workshops
AWS Developers Intermediate 4y ago
Why Don't Use alert(1) for XSS? | Watch Together + Q&A
Cybersecurity
Why Don't Use alert(1) for XSS? | Watch Together + Q&A
LiveUnderflow Intermediate 4y ago
XLM Macros & Unhiding Excel Worksheets - HackTheBox Biz CTF "OldSchool"
Cybersecurity
XLM Macros & Unhiding Excel Worksheets - HackTheBox Biz CTF "OldSchool"
John Hammond Intermediate 4y ago
BAD RANSOMWARE - HackTheBox Business CTF
Cybersecurity ⚡ AI Lesson
BAD RANSOMWARE - HackTheBox Business CTF
John Hammond Intermediate 4y ago
Reverse Engineering Loops - "Syncopation" HackTheBox Business CTF
Cybersecurity
Reverse Engineering Loops - "Syncopation" HackTheBox Business CTF
John Hammond Intermediate 4y ago
Laravel CVE / PHP Deserialization - "Larablog" HTB Business CTF
Cybersecurity
Laravel CVE / PHP Deserialization - "Larablog" HTB Business CTF
John Hammond Intermediate 4y ago
JSON Web Keys (JWK & JWT) - "Emergency" - HackTheBox Business CTF
Cybersecurity
JSON Web Keys (JWK & JWT) - "Emergency" - HackTheBox Business CTF
John Hammond Intermediate 4y ago
Cybertalk - EP10 - Interview With GhostSec
Cybersecurity ⚡ AI Lesson
Cybertalk - EP10 - Interview With GhostSec
HackerSploit Intermediate 4y ago
DEF CON DC9111 - Docker For Pentesting & Bug Bounty Hunting
Cybersecurity ⚡ AI Lesson
DEF CON DC9111 - Docker For Pentesting & Bug Bounty Hunting
HackerSploit Intermediate 4y ago
HackTheBox "Business CTF" - Time - Command Injection
Cybersecurity
HackTheBox "Business CTF" - Time - Command Injection
John Hammond Intermediate 4y ago
HackTheBox "Business CTF" - discordvm - Node.js Sandbox Escape
Cybersecurity ⚡ AI Lesson
HackTheBox "Business CTF" - discordvm - Node.js Sandbox Escape
John Hammond Intermediate 4y ago
Securing The Docker Daemon
Cybersecurity ⚡ AI Lesson
Securing The Docker Daemon
HackerSploit Intermediate 4y ago
JScript Deobfuscation - More WSHRAT (Malware Analysis)
Cybersecurity
JScript Deobfuscation - More WSHRAT (Malware Analysis)
John Hammond Intermediate 4y ago
HackTheBox Beep Walkthrough - LFI Exploitation
Cybersecurity ⚡ AI Lesson
HackTheBox Beep Walkthrough - LFI Exploitation
HackerSploit Intermediate 4y ago
Studying Cybersecurity in USA vs. Germany | ReHacked
Cybersecurity
Studying Cybersecurity in USA vs. Germany | ReHacked
LiveUnderflow Intermediate 4y ago
PowerPoint Phishing Malware Analysis - HackTheBox Cyber Apocalypse CTF
Cybersecurity ⚡ AI Lesson
PowerPoint Phishing Malware Analysis - HackTheBox Cyber Apocalypse CTF
John Hammond Intermediate 4y ago
Phishing Document "Invitation" - HackTheBox Cyber Apocalypse CTF
Cybersecurity
Phishing Document "Invitation" - HackTheBox Cyber Apocalypse CTF
John Hammond Intermediate 4y ago
Nodejs Nunjucks Template Injection - HackTheBox Cyber Apocalypse CTF
Cybersecurity
Nodejs Nunjucks Template Injection - HackTheBox Cyber Apocalypse CTF
John Hammond Intermediate 4y ago
TryHackMe - Vulnversity Walkthrough
Cybersecurity ⚡ AI Lesson
TryHackMe - Vulnversity Walkthrough
HackerSploit Intermediate 4y ago
📚 Coursera Courses Opens on Coursera · Free to audit
1 / 3 View all →
The Business of Cybersecurity Capstone
📚 Coursera Course ↗
Self-paced
The Business of Cybersecurity Capstone
Opens on Coursera ↗
Certified Kubernetes Security Specialist (CKS): Unit 2
📚 Coursera Course ↗
Self-paced
Certified Kubernetes Security Specialist (CKS): Unit 2
Opens on Coursera ↗
Security Operations
📚 Coursera Course ↗
Self-paced
Security Operations
Opens on Coursera ↗
Web Application Security
📚 Coursera Course ↗
Self-paced
Web Application Security
Opens on Coursera ↗
Introduction to Forensic Science
📚 Coursera Course ↗
Self-paced
Introduction to Forensic Science
Opens on Coursera ↗
Incident Response and Cyber Forensics
📚 Coursera Course ↗
Self-paced
Incident Response and Cyber Forensics
Opens on Coursera ↗