Tech Skills

Cybersecurity

Ethical hacking, penetration testing, network security, CTFs and defensive security

6,783
lessons
Skills in this topic
View full skill map →
Security Basics
beginner
Fix OWASP top 10 vulnerabilities
AI Security
intermediate
Identify and patch prompt injection vulnerabilities
Network Security
intermediate
Configure a firewall with proper inbound/outbound rules
Ethical Hacking & Pen Testing
intermediate
Conduct a full pen test with Kali Linux
Cloud Security
intermediate
Implement IAM least-privilege policies on AWS/GCP
Incident Response
intermediate
Build an incident response playbook
Security Compliance
intermediate
Map controls for SOC 2 Type II compliance
Defensive AI
advanced
Build an AI-powered log anomaly detector
To Blue with ATT&CK-Flavored Love - SANS Blue Team Summit
Cybersecurity
To Blue with ATT&CK-Flavored Love - SANS Blue Team Summit
SANS Institute Intermediate 6y ago
Hacking Skills Perspective
Cybersecurity
Hacking Skills Perspective
LiveUnderflow Intermediate 6y ago
Post Exploitation With Windows Credentials Editor (WCE) - Dump Windows Password Hashes
Cybersecurity ⚡ AI Lesson
Post Exploitation With Windows Credentials Editor (WCE) - Dump Windows Password Hashes
HackerSploit Intermediate 6y ago
Information Gathering With Shodan
Cybersecurity ⚡ AI Lesson
Information Gathering With Shodan
HackerSploit Intermediate 6y ago
Defeating Attackers with Preventative Security
Cybersecurity
Defeating Attackers with Preventative Security
SANS Institute Intermediate 6y ago
Wireshark: Packet Analysis and Ethical Hacking Course
Cybersecurity
Wireshark: Packet Analysis and Ethical Hacking Course
David Bombal Intermediate 6y ago
HSCTF - RSA Cryptography (Reverse Search Algorithm)
Cybersecurity ⚡ AI Lesson
HSCTF - RSA Cryptography (Reverse Search Algorithm)
John Hammond Intermediate 6y ago
BUILDING AN 8-BIT COMPUTER FROM SCRATCH #2 (Full Stream)
Cybersecurity
BUILDING AN 8-BIT COMPUTER FROM SCRATCH #2 (Full Stream)
LiveUnderflow Intermediate 6y ago
HSCTF - Hidden UTF-8 Encoding (Real Reversal)
Cybersecurity
HSCTF - Hidden UTF-8 Encoding (Real Reversal)
John Hammond Intermediate 6y ago
Hacking Browsers - Setup and Debug JavaScriptCore / WebKit
Cybersecurity
Hacking Browsers - Setup and Debug JavaScriptCore / WebKit
LiveOverflow Intermediate 6y ago
HackTheBox - LightWeight
Cybersecurity
HackTheBox - LightWeight
IppSec Intermediate 7y ago
HackTheBox - Bighead
Cybersecurity
HackTheBox - Bighead
IppSec Intermediate 7y ago
CCNA Dynamic Trunking Protocol (DTP) Quiz: Can you answer the ccna quiz questions?
Cybersecurity
CCNA Dynamic Trunking Protocol (DTP) Quiz: Can you answer the ccna quiz questions?
David Bombal Intermediate 7y ago
KALI LINUX! - CS50 Live, EP. 51
Cybersecurity
KALI LINUX! - CS50 Live, EP. 51
CS50 Intermediate 7y ago
Why You Should Take SEC660: Advanced Penetration Testing, Exploit Writing, and Ethical Hacking
Cybersecurity
Why You Should Take SEC660: Advanced Penetration Testing, Exploit Writing, and Ethical Hacking
SANS Institute Intermediate 6y ago
Why You Should Take AUD507: Auditing & Monitoring Networks, Perimeters & Systems
Cybersecurity
Why You Should Take AUD507: Auditing & Monitoring Networks, Perimeters & Systems
SANS Institute Intermediate 6y ago
Why You Should Take SEC504: Hacker Tools, Techniques, Exploits, and Incident Handling
Cybersecurity
Why You Should Take SEC504: Hacker Tools, Techniques, Exploits, and Incident Handling
SANS Institute Intermediate 6y ago
What Do You Need To Know About SANS SEC760: Advanced Exploit Development for Penetration Testers?
Cybersecurity
What Do You Need To Know About SANS SEC760: Advanced Exploit Development for Penetration Testers?
SANS Institute Intermediate 6y ago
HSCTF - Obfuscated JavaScript (JSF**k) [Verbose]
Cybersecurity
HSCTF - Obfuscated JavaScript (JSF**k) [Verbose]
John Hammond Intermediate 6y ago
How To Setup A Sandbox Environment For Malware Analysis
Cybersecurity ⚡ AI Lesson
How To Setup A Sandbox Environment For Malware Analysis
HackerSploit Intermediate 6y ago
Crypto: Classic RSA with a Twist (ParsonsCTF)
Cybersecurity ⚡ AI Lesson
Crypto: Classic RSA with a Twist (ParsonsCTF)
John Hammond Intermediate 6y ago
Linux Essentials: Curl Fundamentals
Cybersecurity ⚡ AI Lesson
Linux Essentials: Curl Fundamentals
HackerSploit Intermediate 6y ago
Facebook CTF - SQL Injection with Spaces (Products Manager)
Cybersecurity
Facebook CTF - SQL Injection with Spaces (Products Manager)
John Hammond Intermediate 6y ago
Post Exploitation With Empire And LaZagne
Cybersecurity ⚡ AI Lesson
Post Exploitation With Empire And LaZagne
HackerSploit Intermediate 6y ago
bWAPP - Server-Side Include (SSI) Injection
Cybersecurity ⚡ AI Lesson
bWAPP - Server-Side Include (SSI) Injection
HackerSploit Intermediate 6y ago
bWAPP - OS Command Injection With Commix (All levels)
Cybersecurity ⚡ AI Lesson
bWAPP - OS Command Injection With Commix (All levels)
HackerSploit Intermediate 7y ago
bWAPP - HTML Injection - Stored (Blog)
Cybersecurity ⚡ AI Lesson
bWAPP - HTML Injection - Stored (Blog)
HackerSploit Intermediate 7y ago
bWAPP - HTML Injection - Reflected POST
Cybersecurity ⚡ AI Lesson
bWAPP - HTML Injection - Reflected POST
HackerSploit Intermediate 7y ago
CrunchBangPlusPlus - #!++ - Installation & Review
Cybersecurity ⚡ AI Lesson
CrunchBangPlusPlus - #!++ - Installation & Review
HackerSploit Intermediate 7y ago
Bug Bounty Hunting - PHP Code Injection
Cybersecurity ⚡ AI Lesson
Bug Bounty Hunting - PHP Code Injection
HackerSploit Intermediate 7y ago
Heartbleed Exploit - Discovery & Exploitation
Cybersecurity ⚡ AI Lesson
Heartbleed Exploit - Discovery & Exploitation
HackerSploit Intermediate 7y ago
How To Backup Linux Systems With Grsync
Cybersecurity ⚡ AI Lesson
How To Backup Linux Systems With Grsync
HackerSploit Intermediate 7y ago
Bug Bounty Hunting - iframe Injection & HTML Injection
Cybersecurity ⚡ AI Lesson
Bug Bounty Hunting - iframe Injection & HTML Injection
HackerSploit Intermediate 7y ago
How To Setup VSCode In The Cloud - code-server
Cybersecurity ⚡ AI Lesson
How To Setup VSCode In The Cloud - code-server
HackerSploit Intermediate 7y ago
Securing Vendor Webapps - A Vulnerability Assessment on HELK
Cybersecurity
Securing Vendor Webapps - A Vulnerability Assessment on HELK
IppSec Intermediate 7y ago
CCNA Quiz: The OSI model with Wireshark captures. Can you answer these quiz questions?
Cybersecurity
CCNA Quiz: The OSI model with Wireshark captures. Can you answer these quiz questions?
David Bombal Intermediate 7y ago
SunshineCTF 2019: Wrestler Book (Explicit SQL Injection)
Cybersecurity ⚡ AI Lesson
SunshineCTF 2019: Wrestler Book (Explicit SQL Injection)
John Hammond Intermediate 7y ago
SunshineCTF 2019: WelcomeCrypto [ROT47]
Cybersecurity
SunshineCTF 2019: WelcomeCrypto [ROT47]
John Hammond Intermediate 7y ago
b00t2root19 CTF: Loopback [PCAP Forensics]
Cybersecurity
b00t2root19 CTF: Loopback [PCAP Forensics]
John Hammond Intermediate 7y ago
b00t2root19 CTF: Treasure [GameBoy ROMs]
Cybersecurity
b00t2root19 CTF: Treasure [GameBoy ROMs]
John Hammond Intermediate 7y ago
b00t2root19 CTF: Can You Read Me [Esoteric Languages]
Cybersecurity
b00t2root19 CTF: Can You Read Me [Esoteric Languages]
John Hammond Intermediate 7y ago
CommandoVM Installation - Windows-based Penetration Testing Distribution
Cybersecurity ⚡ AI Lesson
CommandoVM Installation - Windows-based Penetration Testing Distribution
HackerSploit Intermediate 7y ago
b00t2root19 CTF: Genetics [DNA Cryptography]
Cybersecurity
b00t2root19 CTF: Genetics [DNA Cryptography]
John Hammond Intermediate 7y ago
b00t2root19 CTF: Scatter Me [3D Scatter Plots]
Cybersecurity
b00t2root19 CTF: Scatter Me [3D Scatter Plots]
John Hammond Intermediate 7y ago
b00t2root CTF: cuz rsa is lub [RSA Cryptography]
Cybersecurity ⚡ AI Lesson
b00t2root CTF: cuz rsa is lub [RSA Cryptography]
John Hammond Intermediate 7y ago
b00t2root19 CTF: Groot (3/3) [LINUX Post-Exploitation]
Cybersecurity
b00t2root19 CTF: Groot (3/3) [LINUX Post-Exploitation]
John Hammond Intermediate 7y ago
b00t2root19 CTF: Tony Stank (2/3) [LINUX Privilege Escalation]
Cybersecurity
b00t2root19 CTF: Tony Stank (2/3) [LINUX Privilege Escalation]
John Hammond Intermediate 7y ago
GitHub demonstration for network engineers: Hank Preston Explains: Part 2
Cybersecurity
GitHub demonstration for network engineers: Hank Preston Explains: Part 2
David Bombal Intermediate 7y ago
📚 Coursera Courses Opens on Coursera · Free to audit
1 / 3 View all →
Execution, persistence, privilege escalation and evasion
📚 Coursera Course ↗
Self-paced
Execution, persistence, privilege escalation and evasion
Opens on Coursera ↗
CompTIA Security+ 701
📚 Coursera Course ↗
Self-paced
CompTIA Security+ 701
Opens on Coursera ↗
The Cybersecurity Culture Blueprint: A Proactive Approach
📚 Coursera Course ↗
Self-paced
The Cybersecurity Culture Blueprint: A Proactive Approach
Opens on Coursera ↗
Cyber Security: Applied Cryptography
📚 Coursera Course ↗
Self-paced
Cyber Security: Applied Cryptography
Opens on Coursera ↗
Security Foundations, Threats, and Network Protection
📚 Coursera Course ↗
Self-paced
Security Foundations, Threats, and Network Protection
Opens on Coursera ↗
Cybersecurity Awareness For Everyone: Final Assessment
📚 Coursera Course ↗
Self-paced
Cybersecurity Awareness For Everyone: Final Assessment
Opens on Coursera ↗