Tech Skills

Cybersecurity

Ethical hacking, penetration testing, network security, CTFs and defensive security

6,783
lessons
Skills in this topic
View full skill map →
Security Basics
beginner
Fix OWASP top 10 vulnerabilities
AI Security
intermediate
Identify and patch prompt injection vulnerabilities
Network Security
intermediate
Configure a firewall with proper inbound/outbound rules
Ethical Hacking & Pen Testing
intermediate
Conduct a full pen test with Kali Linux
Cloud Security
intermediate
Implement IAM least-privilege policies on AWS/GCP
Incident Response
intermediate
Build an incident response playbook
Security Compliance
intermediate
Map controls for SOC 2 Type II compliance
Defensive AI
advanced
Build an AI-powered log anomaly detector
Linux Essentials For Hackers - #11 - Disk Usage
Cybersecurity ⚡ AI Lesson
Linux Essentials For Hackers - #11 - Disk Usage
HackerSploit Intermediate 6y ago
Linux Essentials For Hackers - #10 - Shells & Bash Configuration
Cybersecurity ⚡ AI Lesson
Linux Essentials For Hackers - #10 - Shells & Bash Configuration
HackerSploit Intermediate 6y ago
A Poor Man's Pentest: Automating the Manual - BsidesDE 2019
Cybersecurity
A Poor Man's Pentest: Automating the Manual - BsidesDE 2019
John Hammond Intermediate 6y ago
Do you REALLY need a VPN?
Cybersecurity ⚡ AI Lesson
Do you REALLY need a VPN?
Hussein Nasser Intermediate 6y ago
HackTheBox - Safe
Cybersecurity ⚡ AI Lesson
HackTheBox - Safe
IppSec Intermediate 6y ago
HackTheBox - Ellingson
Cybersecurity
HackTheBox - Ellingson
IppSec Intermediate 6y ago
PicoCTF 2019 [02] Inspector (HTML, CSS, JavaScript)
Cybersecurity
PicoCTF 2019 [02] Inspector (HTML, CSS, JavaScript)
John Hammond Intermediate 6y ago
How The Cult of The Dead Cow Helped Shape Modern Cybersecurity | Joseph Menn | Talks at Google
Cybersecurity
How The Cult of The Dead Cow Helped Shape Modern Cybersecurity | Joseph Menn | Talks at Google
Talks at Google Intermediate 6y ago
10x Engineer: What? You can do this on Cisco IOS?
Cybersecurity
10x Engineer: What? You can do this on Cisco IOS?
David Bombal Intermediate 6y ago
GNS3: Docker containers vs Virtual Machines
Cybersecurity
GNS3: Docker containers vs Virtual Machines
David Bombal Intermediate 6y ago
Web App Testing: Episode 3 - XSS, SQL Injection, and Broken Access Control
Cybersecurity ⚡ AI Lesson
Web App Testing: Episode 3 - XSS, SQL Injection, and Broken Access Control
The Cyber Mentor Intermediate 6y ago
How Speedrunners Use Game Hacking Tools
Cybersecurity ⚡ AI Lesson
How Speedrunners Use Game Hacking Tools
LiveOverflow Intermediate 6y ago
The TOP 3 uses for a Raspberry Pi!!
Cybersecurity ⚡ AI Lesson
The TOP 3 uses for a Raspberry Pi!!
NetworkChuck Intermediate 6y ago
ATT&CKing Your Enterprise: Adversary Detection Pipelines & Adversary Simulation
Cybersecurity
ATT&CKing Your Enterprise: Adversary Detection Pipelines & Adversary Simulation
SANS Institute Intermediate 6y ago
Almost All Web Encryption Works Like This (SP Networks) - Computerphile
Cybersecurity ⚡ AI Lesson
Almost All Web Encryption Works Like This (SP Networks) - Computerphile
Computerphile Intermediate 6y ago
Preventing Your Physical Access Control System from Being Used Against You - SANS ICS Summit 2019
Cybersecurity
Preventing Your Physical Access Control System from Being Used Against You - SANS ICS Summit 2019
SANS Institute Intermediate 6y ago
How public WIFI can be sniffed?
Cybersecurity ⚡ AI Lesson
How public WIFI can be sniffed?
Hussein Nasser Intermediate 6y ago
Chatting about Cryptography and Exploit Regulations
Cybersecurity
Chatting about Cryptography and Exploit Regulations
LiveUnderflow Intermediate 6y ago
Linux Essentials For Hackers - #9 - Find + OverTheWire Bandit Challenge
Cybersecurity ⚡ AI Lesson
Linux Essentials For Hackers - #9 - Find + OverTheWire Bandit Challenge
HackerSploit Intermediate 6y ago
Cybertalk Clips | How To Improve Your CTF Skills
Cybersecurity ⚡ AI Lesson
Cybertalk Clips | How To Improve Your CTF Skills
HackerSploit Intermediate 6y ago
Linux Essentials For Hackers - #8 - Enumerating Distribution & Kernel Information
Cybersecurity ⚡ AI Lesson
Linux Essentials For Hackers - #8 - Enumerating Distribution & Kernel Information
HackerSploit Intermediate 6y ago
Linux Essentials For Hackers - #7 - Finding Files With Locate
Cybersecurity ⚡ AI Lesson
Linux Essentials For Hackers - #7 - Finding Files With Locate
HackerSploit Intermediate 6y ago
Linux Essentials For Hackers - #6 - grep & piping
Cybersecurity ⚡ AI Lesson
Linux Essentials For Hackers - #6 - grep & piping
HackerSploit Intermediate 6y ago
Cybertalk - EP2 -  CEH vs CISSP, Cybersecurity Degrees & CTFs vs Penetration Tests
Cybersecurity ⚡ AI Lesson
Cybertalk - EP2 - CEH vs CISSP, Cybersecurity Degrees & CTFs vs Penetration Tests
HackerSploit Intermediate 6y ago
Cybertalk Clips | Importance Of Secure Coding For Developers
Cybersecurity ⚡ AI Lesson
Cybertalk Clips | Importance Of Secure Coding For Developers
HackerSploit Intermediate 6y ago
Linux Essentials For Hackers - #5 - File & Directory Ownership
Cybersecurity ⚡ AI Lesson
Linux Essentials For Hackers - #5 - File & Directory Ownership
HackerSploit Intermediate 6y ago
Linux Essentials For Hackers - #4 - File & Directory Permissions
Cybersecurity ⚡ AI Lesson
Linux Essentials For Hackers - #4 - File & Directory Permissions
HackerSploit Intermediate 6y ago
Linux Essentials For Hackers - #3 - File Management & Manipulation
Cybersecurity ⚡ AI Lesson
Linux Essentials For Hackers - #3 - File Management & Manipulation
HackerSploit Intermediate 6y ago
Linux Essentials For Hackers - #2 - Useful keyboard Shortcuts
Cybersecurity ⚡ AI Lesson
Linux Essentials For Hackers - #2 - Useful keyboard Shortcuts
HackerSploit Intermediate 6y ago
FristiLeaks1.3 - CTF Walkthrough - Boot-To-Root
Cybersecurity ⚡ AI Lesson
FristiLeaks1.3 - CTF Walkthrough - Boot-To-Root
HackerSploit Intermediate 6y ago
Cybertalk - EP1 -  Secure Coding, HackTheBox & Web App Penetration Testing
Cybersecurity ⚡ AI Lesson
Cybertalk - EP1 - Secure Coding, HackTheBox & Web App Penetration Testing
HackerSploit Intermediate 6y ago
SUDO Security Policy Bypass Vulnerability - CVE-2019-14287
Cybersecurity ⚡ AI Lesson
SUDO Security Policy Bypass Vulnerability - CVE-2019-14287
HackerSploit Intermediate 6y ago
OSCP - Taking Notes & Resources
Cybersecurity ⚡ AI Lesson
OSCP - Taking Notes & Resources
John Hammond Intermediate 6y ago
Python3 For Pentesting - Developing A Banner Grabbing Script
Cybersecurity ⚡ AI Lesson
Python3 For Pentesting - Developing A Banner Grabbing Script
HackerSploit Intermediate 6y ago
How To Upgrade Linux Kernel On Ubuntu
Cybersecurity ⚡ AI Lesson
How To Upgrade Linux Kernel On Ubuntu
HackerSploit Intermediate 6y ago
BCACTF "For the NIght is Dark" (with SInisterMatrix!)
Cybersecurity
BCACTF "For the NIght is Dark" (with SInisterMatrix!)
John Hammond Intermediate 6y ago
100% OSCP: Offensive Security Certified Professional
Cybersecurity
100% OSCP: Offensive Security Certified Professional
John Hammond Intermediate 6y ago
BCACTF - Bruteforcing "Basic Pass" (with SinisterMatrix!)
Cybersecurity
BCACTF - Bruteforcing "Basic Pass" (with SinisterMatrix!)
John Hammond Intermediate 6y ago
BCACTF - LISP "Thspeaking" (with SinisterMatrix!)
Cybersecurity
BCACTF - LISP "Thspeaking" (with SinisterMatrix!)
John Hammond Intermediate 6y ago
Kioptrix 1.1 Walkthrough - Boot-To-Root
Cybersecurity ⚡ AI Lesson
Kioptrix 1.1 Walkthrough - Boot-To-Root
HackerSploit Intermediate 6y ago
HACKERS REACT: Bad Hollywood Hacking Scenes
Cybersecurity
HACKERS REACT: Bad Hollywood Hacking Scenes
John Hammond Intermediate 6y ago
How To Install VMware Tools On BlackArch Linux
Cybersecurity ⚡ AI Lesson
How To Install VMware Tools On BlackArch Linux
HackerSploit Intermediate 6y ago
How To Install Desktop Environments And Change Screen Resolution With xrandr
Cybersecurity ⚡ AI Lesson
How To Install Desktop Environments And Change Screen Resolution With xrandr
HackerSploit Intermediate 6y ago
How To Install BlackArch Linux
Cybersecurity ⚡ AI Lesson
How To Install BlackArch Linux
HackerSploit Intermediate 6y ago
Zero-Trust Networks: The Future Is Here - SANS Blue Team Summit 2019
Cybersecurity
Zero-Trust Networks: The Future Is Here - SANS Blue Team Summit 2019
SANS Institute Intermediate 6y ago
How To Setup A Virtualization Server With Proxmox
Cybersecurity ⚡ AI Lesson
How To Setup A Virtualization Server With Proxmox
HackerSploit Intermediate 6y ago
MITRE CTF 2019 HIGHLIGHTS
Cybersecurity ⚡ AI Lesson
MITRE CTF 2019 HIGHLIGHTS
John Hammond Intermediate 6y ago
Pivoting And Persistence With Armitage
Cybersecurity ⚡ AI Lesson
Pivoting And Persistence With Armitage
HackerSploit Intermediate 6y ago
📚 Coursera Courses Opens on Coursera · Free to audit
1 / 3 View all →
PenTest Planning & Information Gathering
📚 Coursera Course ↗
Self-paced
PenTest Planning & Information Gathering
Opens on Coursera ↗
Cybersecurity Policy for Aviation and Internet Infrastructures
📚 Coursera Course ↗
Self-paced
Cybersecurity Policy for Aviation and Internet Infrastructures
Opens on Coursera ↗
Encryption and Decryption using C++
📚 Coursera Course ↗
Self-paced
Encryption and Decryption using C++
Opens on Coursera ↗
Ethical Hacking Parte 2
📚 Coursera Course ↗
Self-paced
Ethical Hacking Parte 2
Opens on Coursera ↗
Web Application Security Testing with Google Hacking
📚 Coursera Course ↗
Self-paced
Web Application Security Testing with Google Hacking
Opens on Coursera ↗
Cybersecurity: What to Do When You Are a Victim
📚 Coursera Course ↗
Self-paced
Cybersecurity: What to Do When You Are a Victim
Opens on Coursera ↗