Tech Skills

Cybersecurity

Ethical hacking, penetration testing, network security, CTFs and defensive security

6,782
lessons
Skills in this topic
View full skill map →
Security Basics
beginner
Fix OWASP top 10 vulnerabilities
AI Security
intermediate
Identify and patch prompt injection vulnerabilities
Network Security
intermediate
Configure a firewall with proper inbound/outbound rules
Ethical Hacking & Pen Testing
intermediate
Conduct a full pen test with Kali Linux
Cloud Security
intermediate
Implement IAM least-privilege policies on AWS/GCP
Incident Response
intermediate
Build an incident response playbook
Security Compliance
intermediate
Map controls for SOC 2 Type II compliance
Defensive AI
advanced
Build an AI-powered log anomaly detector
How To Automatically Embed Payloads In APK's - Evil-Droid, Thefatrat & Apkinjector
Cybersecurity ⚡ AI Lesson
How To Automatically Embed Payloads In APK's - Evil-Droid, Thefatrat & Apkinjector
HackerSploit Intermediate 7y ago
How To Manually Sign APK's with Jarsigner & Zipalign
Cybersecurity ⚡ AI Lesson
How To Manually Sign APK's with Jarsigner & Zipalign
HackerSploit Intermediate 7y ago
SANS Security Operations Summit & Training 2019: Sneak Peek
Cybersecurity
SANS Security Operations Summit & Training 2019: Sneak Peek
SANS Institute Intermediate 7y ago
LIVE CTF! PART 1! - CS50 on Twitch, EP. 46
Cybersecurity
LIVE CTF! PART 1! - CS50 on Twitch, EP. 46
CS50 Intermediate 7y ago
Ethereum Smart Contract Backdoored Using Malicious Constructor
Cybersecurity
Ethereum Smart Contract Backdoored Using Malicious Constructor
LiveOverflow Intermediate 7y ago
RED TEAM HACKING | CyberForce 2018
Cybersecurity
RED TEAM HACKING | CyberForce 2018
John Hammond Intermediate 7y ago
[Live] GHIDRA HYPE!! - NSA Reverse Engineering Tool
Cybersecurity
[Live] GHIDRA HYPE!! - NSA Reverse Engineering Tool
LiveOverflow Intermediate 7y ago
Code Faster With Custom VS Code Snippets
Cybersecurity ⚡ AI Lesson
Code Faster With Custom VS Code Snippets
Traversy Media Intermediate 7y ago
MITRE CTF 2019 - Web [150] Accessible Bazaar Repositories
Cybersecurity
MITRE CTF 2019 - Web [150] Accessible Bazaar Repositories
John Hammond Intermediate 7y ago
CCNA Quiz: Spanning Tree Answers: Root ports, designated ports, blocking ports? CCNA | CCNP
Cybersecurity
CCNA Quiz: Spanning Tree Answers: Root ports, designated ports, blocking ports? CCNA | CCNP
David Bombal Intermediate 7y ago
CCNA can change your life! Hit the books and put in the hours! And use social media to get known!
Cybersecurity
CCNA can change your life! Hit the books and put in the hours! And use social media to get known!
David Bombal Intermediate 7y ago
The Changing Landscape of Offense - SANS Pen Test HackFest 2018
Cybersecurity ⚡ AI Lesson
The Changing Landscape of Offense - SANS Pen Test HackFest 2018
SANS Institute Intermediate 7y ago
HackTheBox - Ypuffy
Cybersecurity
HackTheBox - Ypuffy
IppSec Intermediate 7y ago
HackTheBox - SecNotes
Cybersecurity ⚡ AI Lesson
HackTheBox - SecNotes
IppSec Intermediate 7y ago
Malware Analysis With Ghidra - Stuxnet Analysis
Cybersecurity ⚡ AI Lesson
Malware Analysis With Ghidra - Stuxnet Analysis
HackerSploit Intermediate 7y ago
pfSense 2.4 - Enabling SSH Access
Cybersecurity ⚡ AI Lesson
pfSense 2.4 - Enabling SSH Access
HackerSploit Intermediate 7y ago
How To Clear Tracks & Logs On Linux
Cybersecurity ⚡ AI Lesson
How To Clear Tracks & Logs On Linux
HackerSploit Intermediate 7y ago
MITRE CTF 2019 - Web [100] Googling Alan Turing
Cybersecurity
MITRE CTF 2019 - Web [100] Googling Alan Turing
John Hammond Intermediate 7y ago
Analysing a Firefox Malware browserassist.dll - FLARE-On 2018
Cybersecurity
Analysing a Firefox Malware browserassist.dll - FLARE-On 2018
LiveOverflow Intermediate 7y ago
MITRE CTF 2019 - Web [50] HTTPS Certificate Valid Addresses
Cybersecurity
MITRE CTF 2019 - Web [50] HTTPS Certificate Valid Addresses
John Hammond Intermediate 7y ago
MITRE CTF 2019 - JOURNEY TO THE CENTER OF THE FILE | ZIP Archive Matryoshka Doll
Cybersecurity
MITRE CTF 2019 - JOURNEY TO THE CENTER OF THE FILE | ZIP Archive Matryoshka Doll
John Hammond Intermediate 7y ago
MITRE CTF 2019 - Grab Bag [100] Rick Roll, Nomination & Strings
Cybersecurity
MITRE CTF 2019 - Grab Bag [100] Rick Roll, Nomination & Strings
John Hammond Intermediate 7y ago
MITRE CTF 2019 - Grab Bag [50] Filtering Nyan Cat
Cybersecurity
MITRE CTF 2019 - Grab Bag [50] Filtering Nyan Cat
John Hammond Intermediate 7y ago
MITRE CTF 2019 - Linux [200] Race Conditions with BASH
Cybersecurity
MITRE CTF 2019 - Linux [200] Race Conditions with BASH
John Hammond Intermediate 7y ago
MITRE CTF 2019 - Linux [150] Understanding Processes with /proc
Cybersecurity
MITRE CTF 2019 - Linux [150] Understanding Processes with /proc
John Hammond Intermediate 7y ago
MITRE CTF 2019 - Linux [100] Calling Shell commands with VIM
Cybersecurity
MITRE CTF 2019 - Linux [100] Calling Shell commands with VIM
John Hammond Intermediate 7y ago
MITRE CTF 2019 - Linux [100] Replacing Binaries in the PATH
Cybersecurity
MITRE CTF 2019 - Linux [100] Replacing Binaries in the PATH
John Hammond Intermediate 7y ago
MITRE CTF 2019 - Linux [50] Escaping RBASH with SSH
Cybersecurity
MITRE CTF 2019 - Linux [50] Escaping RBASH with SSH
John Hammond Intermediate 7y ago
Sucuri Web Application Firewall Review
Cybersecurity ⚡ AI Lesson
Sucuri Web Application Firewall Review
HackerSploit Intermediate 7y ago
How To Fully Anonymize Kali With Whonix
Cybersecurity ⚡ AI Lesson
How To Fully Anonymize Kali With Whonix
HackerSploit Intermediate 7y ago
pfSense 2.4 - Installation & Configuration
Cybersecurity ⚡ AI Lesson
pfSense 2.4 - Installation & Configuration
HackerSploit Intermediate 7y ago
Burning Down the Haystack - SANS Security Operations Summit 2018
Cybersecurity ⚡ AI Lesson
Burning Down the Haystack - SANS Security Operations Summit 2018
SANS Institute Intermediate 7y ago
BSIDES LONG ISLAND 2019 CTF
Cybersecurity
BSIDES LONG ISLAND 2019 CTF
John Hammond Intermediate 7y ago
Vim Editor Fundamentals
Cybersecurity ⚡ AI Lesson
Vim Editor Fundamentals
HackerSploit Intermediate 7y ago
Build it Once, Build it Right: Architecting for Detection - SANS Tactical Detection Summit 2018
Cybersecurity
Build it Once, Build it Right: Architecting for Detection - SANS Tactical Detection Summit 2018
SANS Institute Intermediate 7y ago
Reality Check: Is Network Automation hype? Is this stuff actually real?
Cybersecurity
Reality Check: Is Network Automation hype? Is this stuff actually real?
David Bombal Intermediate 7y ago
Nano Editor Fundamentals
Cybersecurity ⚡ AI Lesson
Nano Editor Fundamentals
HackerSploit Intermediate 7y ago
XS-Search abusing the Chrome XSS Auditor - filemanager 35c3ctf
Cybersecurity
XS-Search abusing the Chrome XSS Auditor - filemanager 35c3ctf
LiveOverflow Intermediate 7y ago
[Live] Making-of a LiveOverflow CTF video write-up 2019 (35c3ctf)
Cybersecurity
[Live] Making-of a LiveOverflow CTF video write-up 2019 (35c3ctf)
LiveOverflow Intermediate 7y ago
Python3 For Pentesting - Developing An Nmap Scanner
Cybersecurity ⚡ AI Lesson
Python3 For Pentesting - Developing An Nmap Scanner
HackerSploit Intermediate 7y ago
HackTheBox Discord - HackerSploit AMA
Cybersecurity ⚡ AI Lesson
HackTheBox Discord - HackerSploit AMA
HackerSploit Intermediate 7y ago
Unicornscan - Port Scanning
Cybersecurity ⚡ AI Lesson
Unicornscan - Port Scanning
HackerSploit Intermediate 7y ago
HackTheBox - Arctic - Walkthrough
Cybersecurity ⚡ AI Lesson
HackTheBox - Arctic - Walkthrough
HackerSploit Intermediate 7y ago
How To Install Xfce4 & MATE Desktop Environments On Kali Linux
Cybersecurity ⚡ AI Lesson
How To Install Xfce4 & MATE Desktop Environments On Kali Linux
HackerSploit Intermediate 7y ago
C Programming Fundamentals - Variable Scope
Cybersecurity ⚡ AI Lesson
C Programming Fundamentals - Variable Scope
HackerSploit Intermediate 7y ago
HackTheBox - Mischief
Cybersecurity
HackTheBox - Mischief
IppSec Intermediate 7y ago
C Programming Fundamentals - Loops
Cybersecurity ⚡ AI Lesson
C Programming Fundamentals - Loops
HackerSploit Intermediate 7y ago
C Programming Fundamentals - If Statements
Cybersecurity ⚡ AI Lesson
C Programming Fundamentals - If Statements
HackerSploit Intermediate 7y ago
📚 Coursera Courses Opens on Coursera · Free to audit
1 / 3 View all →
Introduction to reCAPTCHA
📚 Coursera Course ↗
Self-paced
Introduction to reCAPTCHA
Opens on Coursera ↗
Mastering Endpoint Security & Threat Defense
📚 Coursera Course ↗
Self-paced
Mastering Endpoint Security & Threat Defense
Opens on Coursera ↗
Connect and Protect: Networks and Network Security
📚 Coursera Course ↗
Self-paced
Connect and Protect: Networks and Network Security
Opens on Coursera ↗
Practical Cyber Hacking Skills for Beginners
📚 Coursera Course ↗
Self-paced
Practical Cyber Hacking Skills for Beginners
Opens on Coursera ↗
Practice Exam for ISC2 Certified in Cybersecurity (CC)
📚 Coursera Course ↗
Self-paced
Practice Exam for ISC2 Certified in Cybersecurity (CC)
Opens on Coursera ↗
AI Security Fundamentals – LLM Threats & OWASP 2026
📚 Coursera Course ↗
Self-paced
AI Security Fundamentals – LLM Threats & OWASP 2026
Opens on Coursera ↗