Tech Skills

Cybersecurity

Ethical hacking, penetration testing, network security, CTFs and defensive security

6,785
lessons
Skills in this topic
View full skill map →
Security Basics
beginner
Fix OWASP top 10 vulnerabilities
AI Security
intermediate
Identify and patch prompt injection vulnerabilities
Network Security
intermediate
Configure a firewall with proper inbound/outbound rules
Ethical Hacking & Pen Testing
intermediate
Conduct a full pen test with Kali Linux
Cloud Security
intermediate
Implement IAM least-privilege policies on AWS/GCP
Incident Response
intermediate
Build an incident response playbook
Security Compliance
intermediate
Map controls for SOC 2 Type II compliance
Defensive AI
advanced
Build an AI-powered log anomaly detector
Understanding the Key Verification Algorithm (Keygen part 3) - Pwn Adventure 3
Cybersecurity ⚡ AI Lesson
Understanding the Key Verification Algorithm (Keygen part 3) - Pwn Adventure 3
LiveOverflow Intermediate 7y ago
Ethereum Blockchain | "EtherHide" (Hackcon2018 CTF)
Cybersecurity
Ethereum Blockchain | "EtherHide" (Hackcon2018 CTF)
John Hammond Intermediate 7y ago
Stupid Superman Recon | "Ethical Hacker" (HackconCTF 2018)
Cybersecurity
Stupid Superman Recon | "Ethical Hacker" (HackconCTF 2018)
John Hammond Intermediate 7y ago
HackTheBox - Rabbit
Cybersecurity
HackTheBox - Rabbit
IppSec Intermediate 7y ago
Reversing Custom Encoding (Keygen part 2) - Pwn Adventure 3
Cybersecurity
Reversing Custom Encoding (Keygen part 2) - Pwn Adventure 3
LiveOverflow Intermediate 7y ago
HTTPS and Web Security - The State of the Web
Cybersecurity
HTTPS and Web Security - The State of the Web
Chrome for Developers Intermediate 7y ago
Web App Penetration Testing - #14 - Cookie Collection & Reverse Engineering
Cybersecurity ⚡ AI Lesson
Web App Penetration Testing - #14 - Cookie Collection & Reverse Engineering
HackerSploit Intermediate 7y ago
How To Install OWASP Juice Shop
Cybersecurity ⚡ AI Lesson
How To Install OWASP Juice Shop
HackerSploit Intermediate 7y ago
ASCII & Regular Expressions | "Find Me ASAP" (Hackcon2018 CTF)
Cybersecurity
ASCII & Regular Expressions | "Find Me ASAP" (Hackcon2018 CTF)
John Hammond Intermediate 7y ago
Vignere Cipher | "Salad Upgrade" (Hackcon2018 CTF)
Cybersecurity
Vignere Cipher | "Salad Upgrade" (Hackcon2018 CTF)
John Hammond Intermediate 7y ago
Caesar Cipher | "Caesar Salad" (Hackcon2018 CTF)
Cybersecurity
Caesar Cipher | "Caesar Salad" (Hackcon2018 CTF)
John Hammond Intermediate 7y ago
Wireshark Decrypting SSL | "Ssleepy" TJCTF 2018
Cybersecurity
Wireshark Decrypting SSL | "Ssleepy" TJCTF 2018
John Hammond Intermediate 7y ago
HTTP Cookies | "Cookie Monster" TJCTF 2018
Cybersecurity
HTTP Cookies | "Cookie Monster" TJCTF 2018
John Hammond Intermediate 7y ago
HTML Source Code | "Blank" TJCTF 2018
Cybersecurity
HTML Source Code | "Blank" TJCTF 2018
John Hammond Intermediate 7y ago
Infinite JavaScript Scrolling | "Moar Horses" TJCTF 2018
Cybersecurity
Infinite JavaScript Scrolling | "Moar Horses" TJCTF 2018
John Hammond Intermediate 7y ago
Uncommon SQL Injection | "Ess Kyoo Ell" TJCTF 2018
Cybersecurity
Uncommon SQL Injection | "Ess Kyoo Ell" TJCTF 2018
John Hammond Intermediate 7y ago
RSA Cryptography | "Classic" TJCTF 2018
Cybersecurity
RSA Cryptography | "Classic" TJCTF 2018
John Hammond Intermediate 7y ago
PicoCTF 2017 [33] A Thing Called the Stack
Cybersecurity
PicoCTF 2017 [33] A Thing Called the Stack
John Hammond Intermediate 7y ago
Web App Penetration Testing  - #13 - CSRF (Cross Site Request Forgery)
Cybersecurity ⚡ AI Lesson
Web App Penetration Testing - #13 - CSRF (Cross Site Request Forgery)
HackerSploit Intermediate 7y ago
How Did You Get Into Programming?
Cybersecurity
How Did You Get Into Programming?
John Hammond Intermediate 7y ago
USB Devices in Wireshark | PicoCTF 2017 [29] Just Keyp Trying
Cybersecurity
USB Devices in Wireshark | PicoCTF 2017 [29] Just Keyp Trying
John Hammond Intermediate 7y ago
Port Knocking Attack | Ryan's CTF [17] Knock-Knock FINALE
Cybersecurity
Port Knocking Attack | Ryan's CTF [17] Knock-Knock FINALE
John Hammond Intermediate 7y ago
PCAP Manipulation | Ryan's CTF [16] Custom Encoded Data
Cybersecurity
PCAP Manipulation | Ryan's CTF [16] Custom Encoded Data
John Hammond Intermediate 7y ago
Sudo ltrace | Ryan's CTF [15] Strings wont help you
Cybersecurity
Sudo ltrace | Ryan's CTF [15] Strings wont help you
John Hammond Intermediate 7y ago
Embedded GZIP | Ryan's CTF [14] Mystery File
Cybersecurity
Embedded GZIP | Ryan's CTF [14] Mystery File
John Hammond Intermediate 7y ago
BASIC Buffer Overflow | Ryan's CTF [13] Everyday I'm Bufferin
Cybersecurity
BASIC Buffer Overflow | Ryan's CTF [13] Everyday I'm Bufferin
John Hammond Intermediate 7y ago
Command Injection | Ryan's CTF [12] Input Validation
Cybersecurity
Command Injection | Ryan's CTF [12] Input Validation
John Hammond Intermediate 7y ago
ALIAS Commands | Ryan's CTF [11] Find Flag Again
Cybersecurity
ALIAS Commands | Ryan's CTF [11] Find Flag Again
John Hammond Intermediate 7y ago
Reversing Android APK | Ryan's CTF [10] These are not the droids
Cybersecurity
Reversing Android APK | Ryan's CTF [10] These are not the droids
John Hammond Intermediate 7y ago
Binary ltrace | Ryan's CTF [08] What's the password?
Cybersecurity
Binary ltrace | Ryan's CTF [08] What's the password?
John Hammond Intermediate 7y ago
Image Strings | Ryan's CTF [07] "Stenography"
Cybersecurity
Image Strings | Ryan's CTF [07] "Stenography"
John Hammond Intermediate 7y ago
VIM Shell | Ryan's CTF [06] Escape the Jail
Cybersecurity
VIM Shell | Ryan's CTF [06] Escape the Jail
John Hammond Intermediate 7y ago
HTTP Authentication | Ryan's CTF [04] Encoded Credentials
Cybersecurity
HTTP Authentication | Ryan's CTF [04] Encoded Credentials
John Hammond Intermediate 7y ago
PATH Environment Variable | Ryan's CTF [09] Find the Flag
Cybersecurity
PATH Environment Variable | Ryan's CTF [09] Find the Flag
John Hammond Intermediate 7y ago
Ryan's CTF [02] FTP File Transfer
Cybersecurity
Ryan's CTF [02] FTP File Transfer
John Hammond Intermediate 7y ago
Ryan's CTF [01] Hidden Web Flag
Cybersecurity
Ryan's CTF [01] Hidden Web Flag
John Hammond Intermediate 7y ago
FULL 2 HOUR Ryan's CTF
Cybersecurity
FULL 2 HOUR Ryan's CTF
John Hammond Intermediate 7y ago
Ryan's CTF TIMELAPSE
Cybersecurity
Ryan's CTF TIMELAPSE
John Hammond Intermediate 7y ago
The PenTesters Framework - Install Penetration Testing Tools On Any Distribution
Cybersecurity ⚡ AI Lesson
The PenTesters Framework - Install Penetration Testing Tools On Any Distribution
HackerSploit Intermediate 7y ago
Git/Linux Hacking | Bandit: OverTheWire (Level 32)
Cybersecurity
Git/Linux Hacking | Bandit: OverTheWire (Level 32)
John Hammond Intermediate 7y ago
Git/Linux Hacking | Bandit: OverTheWire (Level 31)
Cybersecurity
Git/Linux Hacking | Bandit: OverTheWire (Level 31)
John Hammond Intermediate 7y ago
Web App Penetration Testing With Zap - #11 - Configuring The Proxy
Cybersecurity ⚡ AI Lesson
Web App Penetration Testing With Zap - #11 - Configuring The Proxy
HackerSploit Intermediate 7y ago
Git/Linux Hacking | Bandit: OverTheWire (Level 30)
Cybersecurity
Git/Linux Hacking | Bandit: OverTheWire (Level 30)
John Hammond Intermediate 7y ago
Git/Linux Hacking | Bandit: OverTheWire (Level 29)
Cybersecurity
Git/Linux Hacking | Bandit: OverTheWire (Level 29)
John Hammond Intermediate 7y ago
NEW LEVELS [Git Hacking] Bandit: OverTheWire (Levels 26-28)
Cybersecurity
NEW LEVELS [Git Hacking] Bandit: OverTheWire (Levels 26-28)
John Hammond Intermediate 7y ago
Python Flask WebDev [04] Static Files
Cybersecurity
Python Flask WebDev [04] Static Files
John Hammond Intermediate 7y ago
†: Signed and Unsigned Integers - Integer Overflows - Pwn Adventure 3
Cybersecurity ⚡ AI Lesson
†: Signed and Unsigned Integers - Integer Overflows - Pwn Adventure 3
LiveOverflow Intermediate 7y ago
Exploiting an Integer Overflow (Fire and Ice) - Pwn Adventure 3
Cybersecurity
Exploiting an Integer Overflow (Fire and Ice) - Pwn Adventure 3
LiveOverflow Intermediate 7y ago
📚 Coursera Courses Opens on Coursera · Free to audit
1 / 3 View all →
Ethical Hacking - Capture the Flag Walkthroughs - v2
📚 Coursera Course ↗
Self-paced
Ethical Hacking - Capture the Flag Walkthroughs - v2
Opens on Coursera ↗
Secure Against Network Intrusions
📚 Coursera Course ↗
Self-paced
Secure Against Network Intrusions
Opens on Coursera ↗
Malware Analysis and Introduction to Assembly Language
📚 Coursera Course ↗
Self-paced
Malware Analysis and Introduction to Assembly Language
Opens on Coursera ↗
Cybersecurity Foundations for Risk Management
📚 Coursera Course ↗
Self-paced
Cybersecurity Foundations for Risk Management
Opens on Coursera ↗
Cloud Network Security & Operations
📚 Coursera Course ↗
Self-paced
Cloud Network Security & Operations
Opens on Coursera ↗
IP Addressing and Core Protocols
📚 Coursera Course ↗
Self-paced
IP Addressing and Core Protocols
Opens on Coursera ↗