Tech Skills

Cybersecurity

Ethical hacking, penetration testing, network security, CTFs and defensive security

6,815
lessons
Skills in this topic
View full skill map →
Security Basics
beginner
Fix OWASP top 10 vulnerabilities
AI Security
intermediate
Identify and patch prompt injection vulnerabilities
Network Security
intermediate
Configure a firewall with proper inbound/outbound rules
Ethical Hacking & Pen Testing
intermediate
Conduct a full pen test with Kali Linux
Cloud Security
intermediate
Implement IAM least-privilege policies on AWS/GCP
Incident Response
intermediate
Build an incident response playbook
Security Compliance
intermediate
Map controls for SOC 2 Type II compliance
Defensive AI
advanced
Build an AI-powered log anomaly detector
XSS Contexts and some Chrome XSS Auditor tricks - web 0x03
Cybersecurity
XSS Contexts and some Chrome XSS Auditor tricks - web 0x03
LiveOverflow Intermediate 9y ago
Homemade CTF Challenge: 06 "I lost my password!"
Cybersecurity
Homemade CTF Challenge: 06 "I lost my password!"
John Hammond Intermediate 9y ago
Capturing & Analyzing Packets with Saleae Logic Pro 8 - Reverse Engineering A/C Remote part 2
Cybersecurity ⚡ AI Lesson
Capturing & Analyzing Packets with Saleae Logic Pro 8 - Reverse Engineering A/C Remote part 2
LiveOverflow Intermediate 9y ago
Homemade CTF Challenge: 06 "A Brisk Stroll"
Cybersecurity
Homemade CTF Challenge: 06 "A Brisk Stroll"
John Hammond Intermediate 9y ago
How To Install Kali Linux 2.0 On Virtual Box
Cybersecurity ⚡ AI Lesson
How To Install Kali Linux 2.0 On Virtual Box
HackerSploit Intermediate 9y ago
SANS VetSuccess Academy: Hands-on Skills
Cybersecurity
SANS VetSuccess Academy: Hands-on Skills
SANS Institute Intermediate 10y ago
Privacy, Security, Society - Computer Science for Business Leaders 2016
Cybersecurity
Privacy, Security, Society - Computer Science for Business Leaders 2016
CS50 Intermediate 10y ago
Internet Technologies - Computer Science for Business Leaders 2016
Cybersecurity
Internet Technologies - Computer Science for Business Leaders 2016
CS50 Intermediate 10y ago
Running a Buffer Overflow Attack - Computerphile
Cybersecurity ⚡ AI Lesson
Running a Buffer Overflow Attack - Computerphile
Computerphile Intermediate 10y ago
Brain Scanner - Computerphile
Cybersecurity ⚡ AI Lesson
Brain Scanner - Computerphile
Computerphile Intermediate 10y ago
The 2015 SANS Holiday Hack Challenge
Cybersecurity ⚡ AI Lesson
The 2015 SANS Holiday Hack Challenge
SANS Institute Intermediate 10y ago
How to Read Your Textbooks More Efficiently - College Info Geek
Cybersecurity
How to Read Your Textbooks More Efficiently - College Info Geek
Thomas Frank Intermediate 11y ago
Do You Actually Need to Read Your Textbooks? - College Info Geek
Cybersecurity
Do You Actually Need to Read Your Textbooks? - College Info Geek
Thomas Frank Intermediate 11y ago
Behind the Great Firewall of China - Michael Anti
Cybersecurity
Behind the Great Firewall of China - Michael Anti
TED-Ed Intermediate 12y ago
Sandbox Bypass in Version 1.0.8 - XSS with AngularJS 0x1
Cybersecurity
Sandbox Bypass in Version 1.0.8 - XSS with AngularJS 0x1
LiveOverflow Intermediate 9y ago
Homemade CTF Challenge: 05 "The Assumption Song"
Cybersecurity
Homemade CTF Challenge: 05 "The Assumption Song"
John Hammond Intermediate 9y ago
Homemade CTF Challenge: 04 "UPX"
Cybersecurity
Homemade CTF Challenge: 04 "UPX"
John Hammond Intermediate 9y ago
Homemade CTF Challenge: 03 "Web Hunt"
Cybersecurity
Homemade CTF Challenge: 03 "Web Hunt"
John Hammond Intermediate 9y ago
Homemade CTF Challenge: 02 "Bae's Base"
Cybersecurity
Homemade CTF Challenge: 02 "Bae's Base"
John Hammond Intermediate 9y ago
Homemade CTF Challenge: 01 "Orchestra"
Cybersecurity
Homemade CTF Challenge: 01 "Orchestra"
John Hammond Intermediate 9y ago
Building Poor Man's Logic Analyzer with an Arduino - Reverse Engineering A/C Remote part 1
Cybersecurity
Building Poor Man's Logic Analyzer with an Arduino - Reverse Engineering A/C Remote part 1
LiveOverflow Intermediate 9y ago
Live Hacking - Internetwache CTF 2016 - crypto60, crypto70, crypto90
Cybersecurity
Live Hacking - Internetwache CTF 2016 - crypto60, crypto70, crypto90
LiveOverflow Intermediate 10y ago
Python Challenge! 17 COOKIES
Cybersecurity
Python Challenge! 17 COOKIES
John Hammond Intermediate 10y ago
Live Hacking - Internetwache CTF 2016 - web50, web60, web80
Cybersecurity
Live Hacking - Internetwache CTF 2016 - web50, web60, web80
LiveOverflow Intermediate 10y ago
Python 04: PEP8 Coding
Cybersecurity
Python 04: PEP8 Coding
John Hammond Intermediate 10y ago
Arbitrary write with House of Force (heap exploit) - BKPCTF cookbook (pwn 6) part 3
Cybersecurity
Arbitrary write with House of Force (heap exploit) - BKPCTF cookbook (pwn 6) part 3
LiveOverflow Intermediate 10y ago
Leaking Heap and Libc address - BKPCTF cookbook (pwn 6) part 2
Cybersecurity
Leaking Heap and Libc address - BKPCTF cookbook (pwn 6) part 2
LiveOverflow Intermediate 10y ago
Reverse Engineering and identifying Bugs - BKPCTF cookbook (pwn 6) part 1
Cybersecurity ⚡ AI Lesson
Reverse Engineering and identifying Bugs - BKPCTF cookbook (pwn 6) part 1
LiveOverflow Intermediate 10y ago
pwnable.kr - Levels: fd, collision, bof, flag
Cybersecurity ⚡ AI Lesson
pwnable.kr - Levels: fd, collision, bof, flag
LiveOverflow Intermediate 10y ago
Live Hacking - EFF-CTF 2016 - Level 0-4 (Enigma Conference)
Cybersecurity
Live Hacking - EFF-CTF 2016 - Level 0-4 (Enigma Conference)
LiveOverflow Intermediate 10y ago
Live Hacking - Twitch Recording overthewire.org - Vortex 0x01-0x03 (3h)
Cybersecurity
Live Hacking - Twitch Recording overthewire.org - Vortex 0x01-0x03 (3h)
LiveOverflow Intermediate 10y ago
Man in the Middle Attacks & Superfish - Computerphile
Cybersecurity ⚡ AI Lesson
Man in the Middle Attacks & Superfish - Computerphile
Computerphile Intermediate 10y ago
Zig Zag Decryption - Computerphile
Cybersecurity ⚡ AI Lesson
Zig Zag Decryption - Computerphile
Computerphile Intermediate 10y ago
Inside a Data Centre - Computerphile
Cybersecurity ⚡ AI Lesson
Inside a Data Centre - Computerphile
Computerphile Intermediate 10y ago
Could We Ban Encryption? - Computerphile
Cybersecurity ⚡ AI Lesson
Could We Ban Encryption? - Computerphile
Computerphile Intermediate 10y ago
LiveOverflow - Trailer
Cybersecurity
LiveOverflow - Trailer
LiveOverflow Intermediate 11y ago
Wearables and Augmented Reality - Computerphile
Cybersecurity ⚡ AI Lesson
Wearables and Augmented Reality - Computerphile
Computerphile Intermediate 11y ago
SANS FOR610: Reverse Engineering Malware: Malware Analysis Tools & Techniques
Cybersecurity
SANS FOR610: Reverse Engineering Malware: Malware Analysis Tools & Techniques
SANS Institute Intermediate 11y ago
CS50 2014 - Week 10
Cybersecurity
CS50 2014 - Week 10
CS50 Intermediate 11y ago
Is College Worth It? Use the Tony Hawk Method to Find Out. - College Info Geek
Cybersecurity
Is College Worth It? Use the Tony Hawk Method to Find Out. - College Info Geek
Thomas Frank Intermediate 11y ago
Python [pygame] 12 Platforming Rectangular Collision Resolution
Cybersecurity
Python [pygame] 12 Platforming Rectangular Collision Resolution
John Hammond Intermediate 12y ago
Python [pygame] 11 Rectangular Collision Detection
Cybersecurity
Python [pygame] 11 Rectangular Collision Detection
John Hammond Intermediate 12y ago
Cross Site Request Forgery - Computerphile
Cybersecurity ⚡ AI Lesson
Cross Site Request Forgery - Computerphile
Computerphile Intermediate 12y ago
Hacking Websites with SQL Injection - Computerphile
Cybersecurity ⚡ AI Lesson
Hacking Websites with SQL Injection - Computerphile
Computerphile Intermediate 12y ago
Virtual Machines Power the Cloud - Computerphile
Cybersecurity ⚡ AI Lesson
Virtual Machines Power the Cloud - Computerphile
Computerphile Intermediate 12y ago
Python 00 Installing IDLE on Linux
Cybersecurity
Python 00 Installing IDLE on Linux
John Hammond Intermediate 13y ago
Python [hashlib] 02 Algorithms
Cybersecurity
Python [hashlib] 02 Algorithms
John Hammond Intermediate 13y ago
Batch 90 Array Reverse
Cybersecurity
Batch 90 Array Reverse
John Hammond Intermediate 13y ago
📚 Coursera Courses Opens on Coursera · Free to audit
1 / 3 View all →
Network Security Principles
📚 Coursera Course ↗
Self-paced
Network Security Principles
Opens on Coursera ↗
Foundations of Information Security and Incident Handling
📚 Coursera Course ↗
Self-paced
Foundations of Information Security and Incident Handling
Opens on Coursera ↗
Secure Mobile AI Models Against Attacks
📚 Coursera Course ↗
Self-paced
Secure Mobile AI Models Against Attacks
Opens on Coursera ↗
Industrial IoT Markets and Security
📚 Coursera Course ↗
Self-paced
Industrial IoT Markets and Security
Opens on Coursera ↗
Code of Conduct
📚 Coursera Course ↗
Self-paced
Code of Conduct
Opens on Coursera ↗
Red Hat Certified Engineer (RHCE) EX294: Unit 1
📚 Coursera Course ↗
Self-paced
Red Hat Certified Engineer (RHCE) EX294: Unit 1
Opens on Coursera ↗