Tech Skills

Cybersecurity

Ethical hacking, penetration testing, network security, CTFs and defensive security

2558
lessons
The Top Ten Reasons It’s GREAT to Be a Pen Tester - SANS Pen Test HackFest Summit 2018
🔐 Cybersecurity
The Top Ten Reasons It’s GREAT to Be a Pen Tester - SANS Pen Test HackFest Summit 2018
SANS Institute Intermediate 7y ago
The Clouds Are Out to Get Me! - SANS Pen Test HackFest Summit 2018
🔐 Cybersecurity
The Clouds Are Out to Get Me! - SANS Pen Test HackFest Summit 2018
SANS Institute Intermediate 7y ago
Nano Editor Fundamentals
🔐 Cybersecurity
Nano Editor Fundamentals
HackerSploit Intermediate 7y ago
XS-Search abusing the Chrome XSS Auditor - filemanager 35c3ctf
🔐 Cybersecurity
XS-Search abusing the Chrome XSS Auditor - filemanager 35c3ctf
LiveOverflow Intermediate 7y ago
[Live] Making-of a LiveOverflow CTF video write-up 2019 (35c3ctf)
🔐 Cybersecurity
[Live] Making-of a LiveOverflow CTF video write-up 2019 (35c3ctf)
LiveOverflow Intermediate 7y ago
Python3 For Pentesting - Developing An Nmap Scanner
🔐 Cybersecurity
Python3 For Pentesting - Developing An Nmap Scanner
HackerSploit Intermediate 7y ago
HackTheBox - SecNotes
🔐 Cybersecurity
HackTheBox - SecNotes
IppSec Intermediate 7y ago
ACTIVE DIRECTORY PRIVILEGES [05] Kringlecon: SANS Holiday Hack Challenge
🔐 Cybersecurity
ACTIVE DIRECTORY PRIVILEGES [05] Kringlecon: SANS Holiday Hack Challenge
John Hammond Intermediate 7y ago
GIT REPOSITORY ANALYSIS [05] Kringlecon: SANS Holiday Hack Challenge
🔐 Cybersecurity
GIT REPOSITORY ANALYSIS [05] Kringlecon: SANS Holiday Hack Challenge
John Hammond Intermediate 7y ago
CCNA Quiz Questions: Life of a packet: Can you answer the questions?
🔐 Cybersecurity
CCNA Quiz Questions: Life of a packet: Can you answer the questions?
David Bombal Intermediate 7y ago
CCNA Quiz Questions: Can you answers these CCNA Questions?
🔐 Cybersecurity
CCNA Quiz Questions: Can you answers these CCNA Questions?
David Bombal Intermediate 7y ago
HackTheBox - Mischief
🔐 Cybersecurity
HackTheBox - Mischief
IppSec Intermediate 7y ago
a16z Podcast | Changing the Conversation about Cybersecurity
🔐 Cybersecurity
a16z Podcast | Changing the Conversation about Cybersecurity
a16z Intermediate 7y ago
HackTheBox Discord - HackerSploit AMA
🔐 Cybersecurity
HackTheBox Discord - HackerSploit AMA
HackerSploit Intermediate 7y ago
DE BRUJIN SEQUENCE [04] Kringlecon: SANS Holiday Hack Challenge
🔐 Cybersecurity
DE BRUJIN SEQUENCE [04] Kringlecon: SANS Holiday Hack Challenge
John Hammond Intermediate 7y ago
Unicornscan - Port Scanning
🔐 Cybersecurity
Unicornscan - Port Scanning
HackerSploit Intermediate 7y ago
DIRECTORY TRAVERSAL [03] Kringlecon: SANS Holiday Hack Challenge
🔐 Cybersecurity
DIRECTORY TRAVERSAL [03] Kringlecon: SANS Holiday Hack Challenge
John Hammond Intermediate 7y ago
ORIENTATION CHALLENGE [02] Kringlecon: SANS Holiday Hack Challenge
🔐 Cybersecurity
ORIENTATION CHALLENGE [02] Kringlecon: SANS Holiday Hack Challenge
John Hammond Intermediate 7y ago
HackTheBox - Arctic - Walkthrough
🔐 Cybersecurity
HackTheBox - Arctic - Walkthrough
HackerSploit Intermediate 7y ago
How To Install Xfce4 & MATE Desktop Environments On Kali Linux
🔐 Cybersecurity
How To Install Xfce4 & MATE Desktop Environments On Kali Linux
HackerSploit Intermediate 7y ago
C Programming Fundamentals - Variable Scope
🔐 Cybersecurity
C Programming Fundamentals - Variable Scope
HackerSploit Intermediate 7y ago
GNS3 Custom 3D Symbols and Templates like Cisco icons: CCNA | Python | Networking
🔐 Cybersecurity
GNS3 Custom 3D Symbols and Templates like Cisco icons: CCNA | Python | Networking
David Bombal Intermediate 7y ago
C Programming Fundamentals - Loops
🔐 Cybersecurity
C Programming Fundamentals - Loops
HackerSploit Intermediate 7y ago
C Programming Fundamentals - If Statements
🔐 Cybersecurity
C Programming Fundamentals - If Statements
HackerSploit Intermediate 7y ago
C Programming Fundamentals - Input
🔐 Cybersecurity
C Programming Fundamentals - Input
HackerSploit Intermediate 7y ago
C Programming Fundamentals - Functions And Variables
🔐 Cybersecurity
C Programming Fundamentals - Functions And Variables
HackerSploit Intermediate 7y ago
XMAS CTF HIGHLIGHTS
🔐 Cybersecurity
XMAS CTF HIGHLIGHTS
John Hammond Intermediate 7y ago
Kali Linux Quick Tips - How To Setup SSH On Kali
🔐 Cybersecurity
Kali Linux Quick Tips - How To Setup SSH On Kali
HackerSploit Intermediate 7y ago
DotDotPwn - Directory Traversal Fuzzing
🔐 Cybersecurity
DotDotPwn - Directory Traversal Fuzzing
HackerSploit Intermediate 7y ago
Coordinates to IMAGE & Back w/ PYTHON PIL
🔐 Cybersecurity
Coordinates to IMAGE & Back w/ PYTHON PIL
John Hammond Intermediate 7y ago
Jump Oriented Programming: Ethereum Smart Contract #2 - Real World CTF 2018
🔐 Cybersecurity
Jump Oriented Programming: Ethereum Smart Contract #2 - Real World CTF 2018
LiveOverflow Intermediate 7y ago
Server-Side Template Injection w/ Flask | Flaskcards [34] picoCTF 2018
🔐 Cybersecurity
Server-Side Template Injection w/ Flask | Flaskcards [34] picoCTF 2018
John Hammond Intermediate 7y ago
Going to Chinese Hacking Competition - Real World CTF Finals
🔐 Cybersecurity
Going to Chinese Hacking Competition - Real World CTF Finals
LiveOverflow Intermediate 7y ago
Free Python Course! David Bombal's Christmas giveway! CCNA | Python | Cisco
🔐 Cybersecurity
Free Python Course! David Bombal's Christmas giveway! CCNA | Python | Cisco
David Bombal Intermediate 7y ago
Leaking the Stack / Printf Format Vulnerability | echooo [32] picoCTF 2018
🔐 Cybersecurity
Leaking the Stack / Printf Format Vulnerability | echooo [32] picoCTF 2018
John Hammond Intermediate 7y ago
Registry Carving & Network Connections w/ Volatility [02] OtterCTF
🔐 Cybersecurity
Registry Carving & Network Connections w/ Volatility [02] OtterCTF
John Hammond Intermediate 7y ago
Manual HTTP Requests | Artisinal Handcrafted HTTP 3 [31] picoCTF 2018
🔐 Cybersecurity
Manual HTTP Requests | Artisinal Handcrafted HTTP 3 [31] picoCTF 2018
John Hammond Intermediate 7y ago
LSADump: Dumping Passwords w/ Volatility [01] OtterCTF
🔐 Cybersecurity
LSADump: Dumping Passwords w/ Volatility [01] OtterCTF
John Hammond Intermediate 7y ago
Setting Up An Exploit Development Lab
🔐 Cybersecurity
Setting Up An Exploit Development Lab
HackerSploit Intermediate 7y ago
Piping Stdin & Redirecting Stderr | in out error [30] picoCTF 2018
🔐 Cybersecurity
Piping Stdin & Redirecting Stderr | in out error [30] picoCTF 2018
John Hammond Intermediate 7y ago
Patching Binaries with Pwntools | BE QUICK OR BE DEAD 2 [29] picoCTF 2018
🔐 Cybersecurity
Patching Binaries with Pwntools | BE QUICK OR BE DEAD 2 [29] picoCTF 2018
John Hammond Intermediate 7y ago
Part 3 – SANS Institute and Tenable talk about OT/IT convergence and security
🔐 Cybersecurity
Part 3 – SANS Institute and Tenable talk about OT/IT convergence and security
SANS Institute Intermediate 7y ago
Part 1 – SANS Institute and Tenable talk about cloud security
🔐 Cybersecurity
Part 1 – SANS Institute and Tenable talk about cloud security
SANS Institute Intermediate 7y ago
Part 2 – SANS Institute and Tenable talk about cloud security
🔐 Cybersecurity
Part 2 – SANS Institute and Tenable talk about cloud security
SANS Institute Intermediate 7y ago
Part 3 – SANS Institute and Tenable talk about cloud security
🔐 Cybersecurity
Part 3 – SANS Institute and Tenable talk about cloud security
SANS Institute Intermediate 7y ago
Part 1 – SANS Institute and Tenable talk about OT/IT convergence and security
🔐 Cybersecurity
Part 1 – SANS Institute and Tenable talk about OT/IT convergence and security
SANS Institute Intermediate 7y ago
Part 2 – SANS Institute and Tenable talk about OT/IT convergence and security
🔐 Cybersecurity
Part 2 – SANS Institute and Tenable talk about OT/IT convergence and security
SANS Institute Intermediate 7y ago
HackTheBox - Lame - Walkthrough
🔐 Cybersecurity
HackTheBox - Lame - Walkthrough
HackerSploit Intermediate 7y ago
📚 Coursera Courses Opens on Coursera · Free to audit
1 / 3 View all →
Practical Cyber Hacking Skills for Beginners
📚 Coursera Course ↗
Self-paced
Practical Cyber Hacking Skills for Beginners
Opens on Coursera ↗
Incident Response and Cyber Forensics
📚 Coursera Course ↗
Self-paced
Incident Response and Cyber Forensics
Opens on Coursera ↗
Security Governance & Compliance
📚 Coursera Course ↗
Self-paced
Security Governance & Compliance
Opens on Coursera ↗
Introduction to Cloud Next Generation Firewall
📚 Coursera Course ↗
Self-paced
Introduction to Cloud Next Generation Firewall
Opens on Coursera ↗
Incident Response and Defense with OpenVAS
📚 Coursera Course ↗
Self-paced
Incident Response and Defense with OpenVAS
Opens on Coursera ↗
Deception As a Defense
📚 Coursera Course ↗
Self-paced
Deception As a Defense
Opens on Coursera ↗