Tech Skills

Cybersecurity

Ethical hacking, penetration testing, network security, CTFs and defensive security

6,782
lessons
Skills in this topic
View full skill map →
Security Basics
beginner
Fix OWASP top 10 vulnerabilities
AI Security
intermediate
Identify and patch prompt injection vulnerabilities
Network Security
intermediate
Configure a firewall with proper inbound/outbound rules
Ethical Hacking & Pen Testing
intermediate
Conduct a full pen test with Kali Linux
Cloud Security
intermediate
Implement IAM least-privilege policies on AWS/GCP
Incident Response
intermediate
Build an incident response playbook
Security Compliance
intermediate
Map controls for SOC 2 Type II compliance
Defensive AI
advanced
Build an AI-powered log anomaly detector
C Programming Fundamentals - Input
Cybersecurity ⚡ AI Lesson
C Programming Fundamentals - Input
HackerSploit Intermediate 7y ago
C Programming Fundamentals - Functions And Variables
Cybersecurity ⚡ AI Lesson
C Programming Fundamentals - Functions And Variables
HackerSploit Intermediate 7y ago
a16z Podcast | Changing the Conversation about Cybersecurity
Cybersecurity ⚡ AI Lesson
a16z Podcast | Changing the Conversation about Cybersecurity
a16z Intermediate 7y ago
XMAS CTF HIGHLIGHTS
Cybersecurity
XMAS CTF HIGHLIGHTS
John Hammond Intermediate 7y ago
Jump Oriented Programming: Ethereum Smart Contract #2 - Real World CTF 2018
Cybersecurity
Jump Oriented Programming: Ethereum Smart Contract #2 - Real World CTF 2018
LiveOverflow Intermediate 7y ago
Server-Side Template Injection w/ Flask | Flaskcards [34] picoCTF 2018
Cybersecurity
Server-Side Template Injection w/ Flask | Flaskcards [34] picoCTF 2018
John Hammond Intermediate 7y ago
Going to Chinese Hacking Competition - Real World CTF Finals
Cybersecurity
Going to Chinese Hacking Competition - Real World CTF Finals
LiveOverflow Intermediate 7y ago
Part 1 – SANS Institute and Tenable talk about cloud security
Cybersecurity
Part 1 – SANS Institute and Tenable talk about cloud security
SANS Institute Intermediate 7y ago
Chat to your switches using Slack/Webex and Docker containers plus other Docker use cases.
Cybersecurity
Chat to your switches using Slack/Webex and Docker containers plus other Docker use cases.
David Bombal Intermediate 7y ago
Node.js Rest API With Restify, Mongoose, JWT - Part 2
Cybersecurity ⚡ AI Lesson
Node.js Rest API With Restify, Mongoose, JWT - Part 2
Traversy Media Intermediate 7y ago
Hardware Hacking - Computerphile
Cybersecurity ⚡ AI Lesson
Hardware Hacking - Computerphile
Computerphile Intermediate 7y ago
HackTheBox - Olympus
Cybersecurity
HackTheBox - Olympus
IppSec Intermediate 7y ago
Kali Linux Quick Tips - How To Setup SSH On Kali
Cybersecurity ⚡ AI Lesson
Kali Linux Quick Tips - How To Setup SSH On Kali
HackerSploit Intermediate 7y ago
DotDotPwn - Directory Traversal Fuzzing
Cybersecurity ⚡ AI Lesson
DotDotPwn - Directory Traversal Fuzzing
HackerSploit Intermediate 7y ago
Leaking the Stack / Printf Format Vulnerability | echooo [32] picoCTF 2018
Cybersecurity
Leaking the Stack / Printf Format Vulnerability | echooo [32] picoCTF 2018
John Hammond Intermediate 7y ago
Setting Up An Exploit Development Lab
Cybersecurity ⚡ AI Lesson
Setting Up An Exploit Development Lab
HackerSploit Intermediate 7y ago
HackTheBox - Lame - Walkthrough
Cybersecurity ⚡ AI Lesson
HackTheBox - Lame - Walkthrough
HackerSploit Intermediate 7y ago
tcpdump - Traffic Capture & Analysis
Cybersecurity ⚡ AI Lesson
tcpdump - Traffic Capture & Analysis
HackerSploit Intermediate 7y ago
Maltego - Automated Information Gathering
Cybersecurity ⚡ AI Lesson
Maltego - Automated Information Gathering
HackerSploit Intermediate 7y ago
Pros vs. Joes CTF at BsidesDC 2018
Cybersecurity
Pros vs. Joes CTF at BsidesDC 2018
John Hammond Intermediate 7y ago
Raven1 VulnHub CTF Walkthrough - Boot-To-Root
Cybersecurity ⚡ AI Lesson
Raven1 VulnHub CTF Walkthrough - Boot-To-Root
HackerSploit Intermediate 7y ago
WebMap - A Dashboard For Nmap Scans
Cybersecurity ⚡ AI Lesson
WebMap - A Dashboard For Nmap Scans
HackerSploit Intermediate 7y ago
Multi-Exponent RSA Cryptography | Square CTF "Flipped Bits"
Cybersecurity
Multi-Exponent RSA Cryptography | Square CTF "Flipped Bits"
John Hammond Intermediate 7y ago
Wireshark - Display Filters
Cybersecurity ⚡ AI Lesson
Wireshark - Display Filters
HackerSploit Intermediate 7y ago
Wireshark - Capture Filters
Cybersecurity ⚡ AI Lesson
Wireshark - Capture Filters
HackerSploit Intermediate 7y ago
Wireshark - Interface & OSI Model
Cybersecurity ⚡ AI Lesson
Wireshark - Interface & OSI Model
HackerSploit Intermediate 7y ago
MORSE CODE Steganography (2/2) BsidesCT CTF 2018
Cybersecurity
MORSE CODE Steganography (2/2) BsidesCT CTF 2018
John Hammond Intermediate 7y ago
Steganography (1/2) BsidesCT CTF 2018
Cybersecurity
Steganography (1/2) BsidesCT CTF 2018
John Hammond Intermediate 7y ago
Basic Windows Reversing and Attacking Weak Crypto - FLARE-On 2018
Cybersecurity
Basic Windows Reversing and Attacking Weak Crypto - FLARE-On 2018
LiveOverflow Intermediate 7y ago
OWASP Juice Shop - SQL Injection
Cybersecurity ⚡ AI Lesson
OWASP Juice Shop - SQL Injection
HackerSploit Intermediate 7y ago
picoCTF 2018 [03]  Cryptography Warmups, grep & netcat
Cybersecurity
picoCTF 2018 [03] Cryptography Warmups, grep & netcat
John Hammond Intermediate 7y ago
Solving Equations with Sympy | CSAW CTF "Algebra"
Cybersecurity
Solving Equations with Sympy | CSAW CTF "Algebra"
John Hammond Intermediate 7y ago
Single-Byte XOR | CSAW CTF "babycrypto"
Cybersecurity
Single-Byte XOR | CSAW CTF "babycrypto"
John Hammond Intermediate 7y ago
LDAP Injection | CSAW CTF "ldab"
Cybersecurity
LDAP Injection | CSAW CTF "ldab"
John Hammond Intermediate 7y ago
x86 Assembly | CSAW CTF "A Tour of x86"
Cybersecurity
x86 Assembly | CSAW CTF "A Tour of x86"
John Hammond Intermediate 7y ago
PWN Overflow | CSAW CTF "BigBoy"
Cybersecurity
PWN Overflow | CSAW CTF "BigBoy"
John Hammond Intermediate 7y ago
GIF Split & Stack | IceCTF [05] "Modern Picasso"
Cybersecurity
GIF Split & Stack | IceCTF [05] "Modern Picasso"
John Hammond Intermediate 7y ago
Hiding Content with CSS | IceCTF [02] "Lights Out!"
Cybersecurity
Hiding Content with CSS | IceCTF [02] "Lights Out!"
John Hammond Intermediate 7y ago
The Last Flag (Overachiever) - Pwn Adventure 3
Cybersecurity
The Last Flag (Overachiever) - Pwn Adventure 3
LiveOverflow Intermediate 7y ago
Wakanda 1 CTF Walkthrough - Boot-To-Root
Cybersecurity ⚡ AI Lesson
Wakanda 1 CTF Walkthrough - Boot-To-Root
HackerSploit Intermediate 7y ago
RSA Implemented in JavaScript (Keygen part 5) - Pwn Adventure 3
Cybersecurity ⚡ AI Lesson
RSA Implemented in JavaScript (Keygen part 5) - Pwn Adventure 3
LiveOverflow Intermediate 7y ago
ECB Encryption / Python Web Hacking | Natas: OverTheWire (Level 28)
Cybersecurity
ECB Encryption / Python Web Hacking | Natas: OverTheWire (Level 28)
John Hammond Intermediate 7y ago
EditThisCookie | CodefestCTF 2018: "Fortune Cookie"
Cybersecurity
EditThisCookie | CodefestCTF 2018: "Fortune Cookie"
John Hammond Intermediate 7y ago
RSA Implemented in Assembler (Keygen part 4) - Pwn Adventure 3
Cybersecurity
RSA Implemented in Assembler (Keygen part 4) - Pwn Adventure 3
LiveOverflow Intermediate 7y ago
Basic SQL Injection | PicoCTF 2017 [35] My First SQL
Cybersecurity
Basic SQL Injection | PicoCTF 2017 [35] My First SQL
John Hammond Intermediate 7y ago
Reverse Engineering Assembly | PicoCTF 2017 [34] Programmer's Assemble
Cybersecurity
Reverse Engineering Assembly | PicoCTF 2017 [34] Programmer's Assemble
John Hammond Intermediate 7y ago
ERROR-Based BLIND SQL Injection | "TRY HARDER" (HackconCTF 2018)
Cybersecurity
ERROR-Based BLIND SQL Injection | "TRY HARDER" (HackconCTF 2018)
John Hammond Intermediate 7y ago
Understanding the Key Verification Algorithm (Keygen part 3) - Pwn Adventure 3
Cybersecurity ⚡ AI Lesson
Understanding the Key Verification Algorithm (Keygen part 3) - Pwn Adventure 3
LiveOverflow Intermediate 7y ago
📚 Coursera Courses Opens on Coursera · Free to audit
1 / 3 View all →
Microsoft Cybersecurity Architect Exam Ref SC-100
📚 Coursera Course ↗
Self-paced
Microsoft Cybersecurity Architect Exam Ref SC-100
Opens on Coursera ↗
Ethical Hacking Essentials: Hands-On Edition
📚 Coursera Course ↗
Self-paced
Ethical Hacking Essentials: Hands-On Edition
Opens on Coursera ↗
IT-Sicherheit: Grundlagen für Sicherheitsarchitektur
📚 Coursera Course ↗
Self-paced
IT-Sicherheit: Grundlagen für Sicherheitsarchitektur
Opens on Coursera ↗
CyberSec First Responder – Advanced (CFR-A): Address
📚 Coursera Course ↗
Self-paced
CyberSec First Responder – Advanced (CFR-A): Address
Opens on Coursera ↗
Introduction to Cybersecurity Tools & Cyberattacks
📚 Coursera Course ↗
Self-paced
Introduction to Cybersecurity Tools & Cyberattacks
Opens on Coursera ↗
Implementing Basic BGP
📚 Coursera Course ↗
Self-paced
Implementing Basic BGP
Opens on Coursera ↗