Tech Skills

Cybersecurity

Ethical hacking, penetration testing, network security, CTFs and defensive security

6,795
lessons
Skills in this topic
View full skill map →
Security Basics
beginner
Fix OWASP top 10 vulnerabilities
AI Security
intermediate
Identify and patch prompt injection vulnerabilities
Network Security
intermediate
Configure a firewall with proper inbound/outbound rules
Ethical Hacking & Pen Testing
intermediate
Conduct a full pen test with Kali Linux
Cloud Security
intermediate
Implement IAM least-privilege policies on AWS/GCP
Incident Response
intermediate
Build an incident response playbook
Security Compliance
intermediate
Map controls for SOC 2 Type II compliance
Defensive AI
advanced
Build an AI-powered log anomaly detector
MITRE CTF 2019 HIGHLIGHTS
Cybersecurity ⚡ AI Lesson
MITRE CTF 2019 HIGHLIGHTS
John Hammond Intermediate 6y ago
How public WIFI can be sniffed?
Cybersecurity ⚡ AI Lesson
How public WIFI can be sniffed?
Hussein Nasser Intermediate 6y ago
Pivoting And Persistence With Armitage
Cybersecurity ⚡ AI Lesson
Pivoting And Persistence With Armitage
HackerSploit Intermediate 6y ago
Chatting about Cryptography and Exploit Regulations
Cybersecurity
Chatting about Cryptography and Exploit Regulations
LiveUnderflow Intermediate 6y ago
To Blue with ATT&CK-Flavored Love - SANS Blue Team Summit
Cybersecurity
To Blue with ATT&CK-Flavored Love - SANS Blue Team Summit
SANS Institute Intermediate 6y ago
Hacking Skills Perspective
Cybersecurity
Hacking Skills Perspective
LiveUnderflow Intermediate 6y ago
Post Exploitation With Windows Credentials Editor (WCE) - Dump Windows Password Hashes
Cybersecurity ⚡ AI Lesson
Post Exploitation With Windows Credentials Editor (WCE) - Dump Windows Password Hashes
HackerSploit Intermediate 6y ago
Defeating Attackers with Preventative Security
Cybersecurity
Defeating Attackers with Preventative Security
SANS Institute Intermediate 6y ago
Wireshark: Packet Analysis and Ethical Hacking Course
Cybersecurity
Wireshark: Packet Analysis and Ethical Hacking Course
David Bombal Intermediate 6y ago
HSCTF - RSA Cryptography (Reverse Search Algorithm)
Cybersecurity ⚡ AI Lesson
HSCTF - RSA Cryptography (Reverse Search Algorithm)
John Hammond Intermediate 6y ago
Hacking Browsers - Setup and Debug JavaScriptCore / WebKit
Cybersecurity
Hacking Browsers - Setup and Debug JavaScriptCore / WebKit
LiveOverflow Intermediate 6y ago
HackTheBox - LightWeight
Cybersecurity
HackTheBox - LightWeight
IppSec Intermediate 7y ago
HackTheBox - Bighead
Cybersecurity
HackTheBox - Bighead
IppSec Intermediate 7y ago
CCNA Dynamic Trunking Protocol (DTP) Quiz: Can you answer the ccna quiz questions?
Cybersecurity
CCNA Dynamic Trunking Protocol (DTP) Quiz: Can you answer the ccna quiz questions?
David Bombal Intermediate 7y ago
KALI LINUX! - CS50 Live, EP. 51
Cybersecurity
KALI LINUX! - CS50 Live, EP. 51
CS50 Intermediate 7y ago
Information Gathering With Shodan
Cybersecurity ⚡ AI Lesson
Information Gathering With Shodan
HackerSploit Intermediate 6y ago
Why You Should Take SEC660: Advanced Penetration Testing, Exploit Writing, and Ethical Hacking
Cybersecurity
Why You Should Take SEC660: Advanced Penetration Testing, Exploit Writing, and Ethical Hacking
SANS Institute Intermediate 6y ago
Why You Should Take AUD507: Auditing & Monitoring Networks, Perimeters & Systems
Cybersecurity
Why You Should Take AUD507: Auditing & Monitoring Networks, Perimeters & Systems
SANS Institute Intermediate 6y ago
Why You Should Take SEC504: Hacker Tools, Techniques, Exploits, and Incident Handling
Cybersecurity
Why You Should Take SEC504: Hacker Tools, Techniques, Exploits, and Incident Handling
SANS Institute Intermediate 6y ago
BUILDING AN 8-BIT COMPUTER FROM SCRATCH #2 (Full Stream)
Cybersecurity
BUILDING AN 8-BIT COMPUTER FROM SCRATCH #2 (Full Stream)
LiveUnderflow Intermediate 6y ago
HSCTF - Hidden UTF-8 Encoding (Real Reversal)
Cybersecurity
HSCTF - Hidden UTF-8 Encoding (Real Reversal)
John Hammond Intermediate 6y ago
What Do You Need To Know About SANS SEC760: Advanced Exploit Development for Penetration Testers?
Cybersecurity
What Do You Need To Know About SANS SEC760: Advanced Exploit Development for Penetration Testers?
SANS Institute Intermediate 6y ago
HSCTF - Obfuscated JavaScript (JSF**k) [Verbose]
Cybersecurity
HSCTF - Obfuscated JavaScript (JSF**k) [Verbose]
John Hammond Intermediate 6y ago
How To Setup A Sandbox Environment For Malware Analysis
Cybersecurity ⚡ AI Lesson
How To Setup A Sandbox Environment For Malware Analysis
HackerSploit Intermediate 6y ago
Crypto: Classic RSA with a Twist (ParsonsCTF)
Cybersecurity ⚡ AI Lesson
Crypto: Classic RSA with a Twist (ParsonsCTF)
John Hammond Intermediate 6y ago
Linux Essentials: Curl Fundamentals
Cybersecurity ⚡ AI Lesson
Linux Essentials: Curl Fundamentals
HackerSploit Intermediate 6y ago
Facebook CTF - SQL Injection with Spaces (Products Manager)
Cybersecurity
Facebook CTF - SQL Injection with Spaces (Products Manager)
John Hammond Intermediate 6y ago
Post Exploitation With Empire And LaZagne
Cybersecurity ⚡ AI Lesson
Post Exploitation With Empire And LaZagne
HackerSploit Intermediate 6y ago
bWAPP - Server-Side Include (SSI) Injection
Cybersecurity ⚡ AI Lesson
bWAPP - Server-Side Include (SSI) Injection
HackerSploit Intermediate 6y ago
bWAPP - OS Command Injection With Commix (All levels)
Cybersecurity ⚡ AI Lesson
bWAPP - OS Command Injection With Commix (All levels)
HackerSploit Intermediate 7y ago
bWAPP - HTML Injection - Stored (Blog)
Cybersecurity ⚡ AI Lesson
bWAPP - HTML Injection - Stored (Blog)
HackerSploit Intermediate 7y ago
bWAPP - HTML Injection - Reflected POST
Cybersecurity ⚡ AI Lesson
bWAPP - HTML Injection - Reflected POST
HackerSploit Intermediate 7y ago
CrunchBangPlusPlus - #!++ - Installation & Review
Cybersecurity ⚡ AI Lesson
CrunchBangPlusPlus - #!++ - Installation & Review
HackerSploit Intermediate 7y ago
Bug Bounty Hunting - PHP Code Injection
Cybersecurity ⚡ AI Lesson
Bug Bounty Hunting - PHP Code Injection
HackerSploit Intermediate 7y ago
Heartbleed Exploit - Discovery & Exploitation
Cybersecurity ⚡ AI Lesson
Heartbleed Exploit - Discovery & Exploitation
HackerSploit Intermediate 7y ago
How To Backup Linux Systems With Grsync
Cybersecurity ⚡ AI Lesson
How To Backup Linux Systems With Grsync
HackerSploit Intermediate 7y ago
Bug Bounty Hunting - iframe Injection & HTML Injection
Cybersecurity ⚡ AI Lesson
Bug Bounty Hunting - iframe Injection & HTML Injection
HackerSploit Intermediate 7y ago
How To Setup VSCode In The Cloud - code-server
Cybersecurity ⚡ AI Lesson
How To Setup VSCode In The Cloud - code-server
HackerSploit Intermediate 7y ago
Securing Vendor Webapps - A Vulnerability Assessment on HELK
Cybersecurity
Securing Vendor Webapps - A Vulnerability Assessment on HELK
IppSec Intermediate 7y ago
CCNA Quiz: The OSI model with Wireshark captures. Can you answer these quiz questions?
Cybersecurity
CCNA Quiz: The OSI model with Wireshark captures. Can you answer these quiz questions?
David Bombal Intermediate 7y ago
SunshineCTF 2019: Wrestler Book (Explicit SQL Injection)
Cybersecurity ⚡ AI Lesson
SunshineCTF 2019: Wrestler Book (Explicit SQL Injection)
John Hammond Intermediate 7y ago
SunshineCTF 2019: WelcomeCrypto [ROT47]
Cybersecurity
SunshineCTF 2019: WelcomeCrypto [ROT47]
John Hammond Intermediate 7y ago
b00t2root19 CTF: Loopback [PCAP Forensics]
Cybersecurity
b00t2root19 CTF: Loopback [PCAP Forensics]
John Hammond Intermediate 7y ago
b00t2root19 CTF: Treasure [GameBoy ROMs]
Cybersecurity
b00t2root19 CTF: Treasure [GameBoy ROMs]
John Hammond Intermediate 7y ago
b00t2root19 CTF: Can You Read Me [Esoteric Languages]
Cybersecurity
b00t2root19 CTF: Can You Read Me [Esoteric Languages]
John Hammond Intermediate 7y ago
CommandoVM Installation - Windows-based Penetration Testing Distribution
Cybersecurity ⚡ AI Lesson
CommandoVM Installation - Windows-based Penetration Testing Distribution
HackerSploit Intermediate 7y ago
b00t2root19 CTF: Genetics [DNA Cryptography]
Cybersecurity
b00t2root19 CTF: Genetics [DNA Cryptography]
John Hammond Intermediate 7y ago
b00t2root19 CTF: Scatter Me [3D Scatter Plots]
Cybersecurity
b00t2root19 CTF: Scatter Me [3D Scatter Plots]
John Hammond Intermediate 7y ago
📚 Coursera Courses Opens on Coursera · Free to audit
1 / 3 View all →
Case-Based Frameworks for Mastering Management Consulting
📚 Coursera Course ↗
Self-paced
Case-Based Frameworks for Mastering Management Consulting
Opens on Coursera ↗
Mastering BFSI Interviews: Resumes & Mock Interviews
📚 Coursera Course ↗
Self-paced
Mastering BFSI Interviews: Resumes & Mock Interviews
Opens on Coursera ↗
Introduction to Networking and Cloud Computing
📚 Coursera Course ↗
Self-paced
Introduction to Networking and Cloud Computing
Opens on Coursera ↗
(SSCP) Systems Security Certified Practitioner: Unit 6
📚 Coursera Course ↗
Self-paced
(SSCP) Systems Security Certified Practitioner: Unit 6
Opens on Coursera ↗
Ethical Hacking with Kali Linux: Analyze & Defend
📚 Coursera Course ↗
Self-paced
Ethical Hacking with Kali Linux: Analyze & Defend
Opens on Coursera ↗
Healthcare Data Management and Information Systems
📚 Coursera Course ↗
Self-paced
Healthcare Data Management and Information Systems
Opens on Coursera ↗