Tech Skills

Cybersecurity

Ethical hacking, penetration testing, network security, CTFs and defensive security

6,795
lessons
Skills in this topic
View full skill map →
Security Basics
beginner
Fix OWASP top 10 vulnerabilities
AI Security
intermediate
Identify and patch prompt injection vulnerabilities
Network Security
intermediate
Configure a firewall with proper inbound/outbound rules
Ethical Hacking & Pen Testing
intermediate
Conduct a full pen test with Kali Linux
Cloud Security
intermediate
Implement IAM least-privilege policies on AWS/GCP
Incident Response
intermediate
Build an incident response playbook
Security Compliance
intermediate
Map controls for SOC 2 Type II compliance
Defensive AI
advanced
Build an AI-powered log anomaly detector
GNS3 Talks: Ostinato Packet Generator - Broadcast traffic: What happens? (Ostinato Part 4)
Cybersecurity
GNS3 Talks: Ostinato Packet Generator - Broadcast traffic: What happens? (Ostinato Part 4)
David Bombal Intermediate 9y ago
How To Setup Proxychains In Kali Linux - #1 - Stay Anonymous
Cybersecurity ⚡ AI Lesson
How To Setup Proxychains In Kali Linux - #1 - Stay Anonymous
HackerSploit Intermediate 9y ago
GNS3 Talks: Ostinato Packet Generator - Multicast traffic: what happens? (Ostinato Part 3)
Cybersecurity
GNS3 Talks: Ostinato Packet Generator - Multicast traffic: what happens? (Ostinato Part 3)
David Bombal Intermediate 9y ago
The Blockchain & Bitcoin - Computerphile
Cybersecurity ⚡ AI Lesson
The Blockchain & Bitcoin - Computerphile
Computerphile Intermediate 9y ago
Solving AVR reverse engineering challenge with radare2 - rhme2 Jumpy (reversing 100)
Cybersecurity ⚡ AI Lesson
Solving AVR reverse engineering challenge with radare2 - rhme2 Jumpy (reversing 100)
LiveOverflow Intermediate 9y ago
Katoolin | How To Install Pentesting Tools On Any Linux Distro
Cybersecurity ⚡ AI Lesson
Katoolin | How To Install Pentesting Tools On Any Linux Distro
HackerSploit Intermediate 9y ago
Using UART / Serial to interact with an embedded device - rhme2 Setup
Cybersecurity
Using UART / Serial to interact with an embedded device - rhme2 Setup
LiveOverflow Intermediate 9y ago
Where Does Success Come From - A Tony Robbins Knowledge Bomb From Funnel Hacking Live 2017
Cybersecurity
Where Does Success Come From - A Tony Robbins Knowledge Bomb From Funnel Hacking Live 2017
Miles Beckler Intermediate 9y ago
The 3 Phases Of A Successful Online Business - Powerful Concept From Funnel Hacking Live 2017
Cybersecurity
The 3 Phases Of A Successful Online Business - Powerful Concept From Funnel Hacking Live 2017
Miles Beckler Intermediate 9y ago
CS50 VR 2016 - Week 9 - SQL
Cybersecurity
CS50 VR 2016 - Week 9 - SQL
CS50 Intermediate 9y ago
Juniors CTF 2016 :: Oh SSH!
Cybersecurity
Juniors CTF 2016 :: Oh SSH!
John Hammond Intermediate 9y ago
Juniors CTF 2016 :: Restriced Area
Cybersecurity
Juniors CTF 2016 :: Restriced Area
John Hammond Intermediate 9y ago
Hacking Without Being a Hack (Polymer Summit 2016)
Cybersecurity
Hacking Without Being a Hack (Polymer Summit 2016)
Chrome for Developers Intermediate 9y ago
CS50 VR 2016 - Week 6 - HTTP
Cybersecurity
CS50 VR 2016 - Week 6 - HTTP
CS50 Intermediate 9y ago
GNS3 Talks: Ostinato Packet Generator - what happens to Unknown Unicast traffic? (Ostinato Part 2)
Cybersecurity
GNS3 Talks: Ostinato Packet Generator - what happens to Unknown Unicast traffic? (Ostinato Part 2)
David Bombal Intermediate 9y ago
GNS3 Talks: Ostinato Packet Generator and GNS3 - download, install and configure (Ostinato Part 1)
Cybersecurity
GNS3 Talks: Ostinato Packet Generator and GNS3 - download, install and configure (Ostinato Part 1)
David Bombal Intermediate 9y ago
GNS3 Talks: Multiple clients sharing projects in real time, plus console session shadowing!
Cybersecurity
GNS3 Talks: Multiple clients sharing projects in real time, plus console session shadowing!
David Bombal Intermediate 9y ago
riscure embedded hardware CTF is over - loopback 0x03
Cybersecurity ⚡ AI Lesson
riscure embedded hardware CTF is over - loopback 0x03
LiveOverflow Intermediate 9y ago
GynvaelEN Hacking Livestreams and how stack cookies work
Cybersecurity
GynvaelEN Hacking Livestreams and how stack cookies work
LiveOverflow Intermediate 9y ago
GNS3 : How to download Cisco IOS images and VIRL images. Which is the best? How do you get them?
Cybersecurity
GNS3 : How to download Cisco IOS images and VIRL images. Which is the best? How do you get them?
David Bombal Intermediate 9y ago
Bash injection without letters or numbers - 33c3ctf hohoho (misc 350)
Cybersecurity
Bash injection without letters or numbers - 33c3ctf hohoho (misc 350)
LiveOverflow Intermediate 9y ago
Format String to dump binary and gain RCE - 33c3ctf ESPR (pwn 150)
Cybersecurity
Format String to dump binary and gain RCE - 33c3ctf ESPR (pwn 150)
LiveOverflow Intermediate 9y ago
Rooting a CTF server to get all the flags with Dirty COW - CVE-2016-5195
Cybersecurity
Rooting a CTF server to get all the flags with Dirty COW - CVE-2016-5195
LiveOverflow Intermediate 9y ago
GNS3 Talks: GNS3 version 1.5.X Appliance Tips
Cybersecurity
GNS3 Talks: GNS3 version 1.5.X Appliance Tips
David Bombal Intermediate 9y ago
Juniors CTF 2016 :: Stop Thief!
Cybersecurity
Juniors CTF 2016 :: Stop Thief!
John Hammond Intermediate 9y ago
Juniors CTF 2016 :: ROFL
Cybersecurity
Juniors CTF 2016 :: ROFL
John Hammond Intermediate 9y ago
Juniors CTF 2016 :: The Good, The Bad and The Junkman
Cybersecurity
Juniors CTF 2016 :: The Good, The Bad and The Junkman
John Hammond Intermediate 9y ago
Juniors CTF 2016 :: Voting!!!
Cybersecurity
Juniors CTF 2016 :: Voting!!!
John Hammond Intermediate 9y ago
Juniors CTF 2016 :: Hackers Blog
Cybersecurity
Juniors CTF 2016 :: Hackers Blog
John Hammond Intermediate 9y ago
Juniors CTF 2016 :: Dirty Repo
Cybersecurity
Juniors CTF 2016 :: Dirty Repo
John Hammond Intermediate 9y ago
Juniors CTF 2016 :: Clone Attack
Cybersecurity
Juniors CTF 2016 :: Clone Attack
John Hammond Intermediate 9y ago
Juniors CTF 2016 :: Southern Cross
Cybersecurity
Juniors CTF 2016 :: Southern Cross
John Hammond Intermediate 9y ago
Juniors CTF 2016 :: Here Goes!
Cybersecurity
Juniors CTF 2016 :: Here Goes!
John Hammond Intermediate 9y ago
Juniors CTF 2016 :: Lost Code
Cybersecurity
Juniors CTF 2016 :: Lost Code
John Hammond Intermediate 9y ago
Juniors CTF 2016 :: Six Strange Tales
Cybersecurity
Juniors CTF 2016 :: Six Strange Tales
John Hammond Intermediate 9y ago
Juniors CTF 2016 :: Black Suprematic Square
Cybersecurity
Juniors CTF 2016 :: Black Suprematic Square
John Hammond Intermediate 9y ago
int0x80 from DualCore lent me his lockpicking set and I'm a horse - BruCON CTF part 2
Cybersecurity
int0x80 from DualCore lent me his lockpicking set and I'm a horse - BruCON CTF part 2
LiveOverflow Intermediate 9y ago
Hack The Vote 2016 CTF Warpspeed [forensics150]
Cybersecurity
Hack The Vote 2016 CTF Warpspeed [forensics150]
John Hammond Intermediate 9y ago
Hack The Vote 2016 CTF: Sander's Fan Club [web100]
Cybersecurity
Hack The Vote 2016 CTF: Sander's Fan Club [web100]
John Hammond Intermediate 9y ago
misc50 : Hidden inside EKO :: EKOPARTY CTF 2016
Cybersecurity
misc50 : Hidden inside EKO :: EKOPARTY CTF 2016
John Hammond Intermediate 9y ago
web50 : RFC 7230 :: EKOPARTY CTF 2016
Cybersecurity
web50 : RFC 7230 :: EKOPARTY CTF 2016
John Hammond Intermediate 9y ago
web25 :: Mr. Robot : EKOPARTY CTF 2016
Cybersecurity
web25 :: Mr. Robot : EKOPARTY CTF 2016
John Hammond Intermediate 9y ago
Abundant Circle Day 4 - Luxury Mastermind For Location Independent Entrepreneurs
Cybersecurity
Abundant Circle Day 4 - Luxury Mastermind For Location Independent Entrepreneurs
Miles Beckler Intermediate 9y ago
Live Hacking - Internetwache CTF 2016 - exp50, exp70, exp80
Cybersecurity ⚡ AI Lesson
Live Hacking - Internetwache CTF 2016 - exp50, exp70, exp80
LiveOverflow Intermediate 9y ago
Scripting radare2 with python for dynamic analysis - TUMCTF 2016 Zwiebel part 2
Cybersecurity
Scripting radare2 with python for dynamic analysis - TUMCTF 2016 Zwiebel part 2
LiveOverflow Intermediate 9y ago
Reverse Engineering with Binary Ninja and gdb a key checking algorithm - TUMCTF 2016 Zwiebel part 1
Cybersecurity
Reverse Engineering with Binary Ninja and gdb a key checking algorithm - TUMCTF 2016 Zwiebel part 1
LiveOverflow Intermediate 9y ago
New Sandbox Bypass in 1.4.7 - XSS with AngularJS 0x3
Cybersecurity
New Sandbox Bypass in 1.4.7 - XSS with AngularJS 0x3
LiveOverflow Intermediate 9y ago
Previous Bypass is now fixed in version 1.4.7 - XSS with AngularJS 0x2
Cybersecurity ⚡ AI Lesson
Previous Bypass is now fixed in version 1.4.7 - XSS with AngularJS 0x2
LiveOverflow Intermediate 9y ago
📚 Coursera Courses Opens on Coursera · Free to audit
1 / 3 View all →
Cybersecurity Compliance Framework, Standards & Regulations
📚 Coursera Course ↗
Self-paced
Cybersecurity Compliance Framework, Standards & Regulations
Opens on Coursera ↗
Exploiting and Securing Vulnerabilities in Java Applications
📚 Coursera Course ↗
Self-paced
Exploiting and Securing Vulnerabilities in Java Applications
Opens on Coursera ↗
Designing Software-Defined Branch Infrastructures
📚 Coursera Course ↗
Self-paced
Designing Software-Defined Branch Infrastructures
Opens on Coursera ↗
TLS & HTTPS Explained – Visualizations & Localhost Setup
📚 Coursera Course ↗
Self-paced
TLS & HTTPS Explained – Visualizations & Localhost Setup
Opens on Coursera ↗
DevSecOps & Cloud Security
📚 Coursera Course ↗
Self-paced
DevSecOps & Cloud Security
Opens on Coursera ↗
Cybersecurity Operations and Controls
📚 Coursera Course ↗
Self-paced
Cybersecurity Operations and Controls
Opens on Coursera ↗