Tech Skills

Cybersecurity

Ethical hacking, penetration testing, network security, CTFs and defensive security

6,790
lessons
Skills in this topic
View full skill map →
Security Basics
beginner
Fix OWASP top 10 vulnerabilities
AI Security
intermediate
Identify and patch prompt injection vulnerabilities
Network Security
intermediate
Configure a firewall with proper inbound/outbound rules
Ethical Hacking & Pen Testing
intermediate
Conduct a full pen test with Kali Linux
Cloud Security
intermediate
Implement IAM least-privilege policies on AWS/GCP
Incident Response
intermediate
Build an incident response playbook
Security Compliance
intermediate
Map controls for SOC 2 Type II compliance
Defensive AI
advanced
Build an AI-powered log anomaly detector
RiceTeaCatPanda CTF - Wrong Way, Lots of Stuff
Cybersecurity
RiceTeaCatPanda CTF - Wrong Way, Lots of Stuff
John Hammond Intermediate 6y ago
Making a PARTICLE SYSTEM in ONE HOUR! (NO ENGINES)
Cybersecurity
Making a PARTICLE SYSTEM in ONE HOUR! (NO ENGINES)
The Cherno Intermediate 6y ago
Cybertalk - EP5 - Is The CEH Worth It?
Cybersecurity ⚡ AI Lesson
Cybertalk - EP5 - Is The CEH Worth It?
HackerSploit Intermediate 6y ago
The State of Cloud Security: How Does Your Organization Compare? | SANS Cloud Security Summit 2019
Cybersecurity
The State of Cloud Security: How Does Your Organization Compare? | SANS Cloud Security Summit 2019
SANS Institute Intermediate 6y ago
Bypass Windows Authentication With Kon-Boot
Cybersecurity ⚡ AI Lesson
Bypass Windows Authentication With Kon-Boot
HackerSploit Intermediate 6y ago
Recognizing Base85 - RiceTeaCatPanda CTF
Cybersecurity
Recognizing Base85 - RiceTeaCatPanda CTF
John Hammond Intermediate 6y ago
SANS Institute & Trace Labs partner on an OSINT Missing Persons CTF challenge at SANS CDI 2019
Cybersecurity
SANS Institute & Trace Labs partner on an OSINT Missing Persons CTF challenge at SANS CDI 2019
SANS Institute Intermediate 6y ago
VirtualBox nested Intel virtualization is here!
Cybersecurity
VirtualBox nested Intel virtualization is here!
David Bombal Intermediate 6y ago
Hacking My Instagram Account
Cybersecurity
Hacking My Instagram Account
LiveOverflow Intermediate 6y ago
Race Condition Trick /proc/self/fd
Cybersecurity
Race Condition Trick /proc/self/fd
LiveOverflow Intermediate 6y ago
Christmas Giveaway Day 3: CCNA, CCNA Cyber Ops, Amazon eGift and more!
Cybersecurity
Christmas Giveaway Day 3: CCNA, CCNA Cyber Ops, Amazon eGift and more!
David Bombal Intermediate 6y ago
Chef and Rezilion Team Up to Automate Resilience
Cybersecurity
Chef and Rezilion Team Up to Automate Resilience
The New Stack Intermediate 6y ago
HackTheBox - Heist
Cybersecurity ⚡ AI Lesson
HackTheBox - Heist
IppSec Intermediate 6y ago
How Tor Works?  (The Onion Router)
Cybersecurity
How Tor Works? (The Onion Router)
Hussein Nasser Intermediate 6y ago
Rubik's Cube Encryption Demo
Cybersecurity
Rubik's Cube Encryption Demo
Dwarkesh Patel Intermediate 6y ago
Recon-ng V5 - Web Interface
Cybersecurity ⚡ AI Lesson
Recon-ng V5 - Web Interface
HackerSploit Intermediate 6y ago
Google Dorks For Penetration Testing
Cybersecurity ⚡ AI Lesson
Google Dorks For Penetration Testing
HackerSploit Intermediate 6y ago
HackTheBox Walkthrough - Popcorn
Cybersecurity ⚡ AI Lesson
HackTheBox Walkthrough - Popcorn
HackerSploit Intermediate 6y ago
HackTheBox Walkthrough - Devel
Cybersecurity ⚡ AI Lesson
HackTheBox Walkthrough - Devel
HackerSploit Intermediate 6y ago
HackTheBox Walkthrough - Legacy
Cybersecurity ⚡ AI Lesson
HackTheBox Walkthrough - Legacy
HackerSploit Intermediate 6y ago
Hosting My Own CTF - BsidesDE 2019
Cybersecurity
Hosting My Own CTF - BsidesDE 2019
John Hammond Intermediate 6y ago
OverTheWire Natas Walkthrough - Level 5 - 10 (LFI & Command Injection)
Cybersecurity ⚡ AI Lesson
OverTheWire Natas Walkthrough - Level 5 - 10 (LFI & Command Injection)
HackerSploit Intermediate 6y ago
OverTheWire Natas Walkthrough - Level 0 - 4
Cybersecurity ⚡ AI Lesson
OverTheWire Natas Walkthrough - Level 0 - 4
HackerSploit Intermediate 6y ago
OverTheWire Bandit Walkthrough - Level 27 - 31
Cybersecurity ⚡ AI Lesson
OverTheWire Bandit Walkthrough - Level 27 - 31
HackerSploit Intermediate 6y ago
OverTheWire Bandit Walkthrough - Level 24 - 26
Cybersecurity ⚡ AI Lesson
OverTheWire Bandit Walkthrough - Level 24 - 26
HackerSploit Intermediate 6y ago
OverTheWire Bandit Walkthrough - Level 19 - 20
Cybersecurity ⚡ AI Lesson
OverTheWire Bandit Walkthrough - Level 19 - 20
HackerSploit Intermediate 6y ago
OverTheWire Bandit Walkthrough - Level 13 - 18
Cybersecurity ⚡ AI Lesson
OverTheWire Bandit Walkthrough - Level 13 - 18
HackerSploit Intermediate 6y ago
OverTheWire Bandit Walkthrough - Level 12
Cybersecurity ⚡ AI Lesson
OverTheWire Bandit Walkthrough - Level 12
HackerSploit Intermediate 6y ago
OverTheWire Bandit Walkthrough - Level 7 - 11
Cybersecurity ⚡ AI Lesson
OverTheWire Bandit Walkthrough - Level 7 - 11
HackerSploit Intermediate 6y ago
How To Install And Configure Arch Linux For Penetration Testing
Cybersecurity ⚡ AI Lesson
How To Install And Configure Arch Linux For Penetration Testing
HackerSploit Intermediate 6y ago
Christmas Giveaway Day 2: CISSP, CCNA, Python and more!
Cybersecurity
Christmas Giveaway Day 2: CISSP, CCNA, Python and more!
David Bombal Intermediate 6y ago
How To Install Metasploitable3 [Cybersecurity]
Cybersecurity ⚡ AI Lesson
How To Install Metasploitable3 [Cybersecurity]
HackerSploit Intermediate 6y ago
Christmas Giveaway Day 1: CEH, CCNA, Python and more!
Cybersecurity
Christmas Giveaway Day 1: CEH, CCNA, Python and more!
David Bombal Intermediate 6y ago
Docker For Pentesting On Windows [Cybersecurity]
Cybersecurity ⚡ AI Lesson
Docker For Pentesting On Windows [Cybersecurity]
HackerSploit Intermediate 6y ago
Cybertalk - EP4 - IDA Pro, Malware Analysis & Python Libraries
Cybersecurity ⚡ AI Lesson
Cybertalk - EP4 - IDA Pro, Malware Analysis & Python Libraries
HackerSploit Intermediate 6y ago
Docker For Pentesting And Bug Bounty Hunting
Cybersecurity ⚡ AI Lesson
Docker For Pentesting And Bug Bounty Hunting
HackerSploit Intermediate 6y ago
WHY YOUR HACKING QUESTIONS ARE FRUSTRATING!!!
Cybersecurity
WHY YOUR HACKING QUESTIONS ARE FRUSTRATING!!!
LiveOverflow Intermediate 6y ago
Best Operating Systems for Hacking?!
Cybersecurity
Best Operating Systems for Hacking?!
LiveOverflow Intermediate 6y ago
Stapler 1 - CTF Walkthrough - Boot-To-Root
Cybersecurity ⚡ AI Lesson
Stapler 1 - CTF Walkthrough - Boot-To-Root
HackerSploit Intermediate 6y ago
Cybertalk Clips | Best Web App Pentesting Tools
Cybersecurity ⚡ AI Lesson
Cybertalk Clips | Best Web App Pentesting Tools
HackerSploit Intermediate 6y ago
Kali Linux: Hacking ARP
Cybersecurity
Kali Linux: Hacking ARP
David Bombal Intermediate 6y ago
Recon-ng V5 - Generating Reports
Cybersecurity ⚡ AI Lesson
Recon-ng V5 - Generating Reports
HackerSploit Intermediate 6y ago
Recon-ng V5 - Working With The Database
Cybersecurity ⚡ AI Lesson
Recon-ng V5 - Working With The Database
HackerSploit Intermediate 6y ago
Recon-ng V5 - Adding API Keys (Shodan & BuiltWith)
Cybersecurity ⚡ AI Lesson
Recon-ng V5 - Adding API Keys (Shodan & BuiltWith)
HackerSploit Intermediate 6y ago
Recon-ng V5 - Marketplace & Installing Recon Modules (whois, subdomain enumeration)
Cybersecurity ⚡ AI Lesson
Recon-ng V5 - Marketplace & Installing Recon Modules (whois, subdomain enumeration)
HackerSploit Intermediate 6y ago
Recon-ng V5 - Syntax & Workspace Management
Cybersecurity ⚡ AI Lesson
Recon-ng V5 - Syntax & Workspace Management
HackerSploit Intermediate 6y ago
SSH Brute Force Protection With Fail2Ban
Cybersecurity ⚡ AI Lesson
SSH Brute Force Protection With Fail2Ban
HackerSploit Intermediate 6y ago
Linux Essentials For Hackers - #17 - SSH And SSH Security
Cybersecurity ⚡ AI Lesson
Linux Essentials For Hackers - #17 - SSH And SSH Security
HackerSploit Intermediate 6y ago
📚 Coursera Courses Opens on Coursera · Free to audit
1 / 3 View all →
Wireshark for Security:  Detect Network Anomalies
📚 Coursera Course ↗
Self-paced
Wireshark for Security: Detect Network Anomalies
Opens on Coursera ↗
Web Application Security Testing with Google Hacking
📚 Coursera Course ↗
Self-paced
Web Application Security Testing with Google Hacking
Opens on Coursera ↗
Network Security, Access Control, and Automation
📚 Coursera Course ↗
Self-paced
Network Security, Access Control, and Automation
Opens on Coursera ↗
ISAA: AI-Powered Saviynt Converged Identity Cloud
📚 Coursera Course ↗
Self-paced
ISAA: AI-Powered Saviynt Converged Identity Cloud
Opens on Coursera ↗
Introduction to Information Technology and AWS Cloud
📚 Coursera Course ↗
Self-paced
Introduction to Information Technology and AWS Cloud
Opens on Coursera ↗
Advanced Networking Services and Routing
📚 Coursera Course ↗
Self-paced
Advanced Networking Services and Routing
Opens on Coursera ↗