Tech Skills

Cybersecurity

Ethical hacking, penetration testing, network security, CTFs and defensive security

2558
lessons
How TOR Works- Computerphile
🔐 Cybersecurity
How TOR Works- Computerphile
Computerphile Intermediate 8y ago
Dealing With Depression & Anxiety In Programming
🔐 Cybersecurity
Dealing With Depression & Anxiety In Programming
Traversy Media Intermediate 8y ago
Breaking ECDSA (Elliptic Curve Cryptography) - rhme2 Secure Filesystem v1.92r1 (crypto 150)
🔐 Cybersecurity
Breaking ECDSA (Elliptic Curve Cryptography) - rhme2 Secure Filesystem v1.92r1 (crypto 150)
LiveOverflow Intermediate 8y ago
Reversing an unkown digital protocol with an Arduino - rhme2 Whac the mole (misc 200)
🔐 Cybersecurity
Reversing an unkown digital protocol with an Arduino - rhme2 Whac the mole (misc 200)
LiveOverflow Intermediate 8y ago
CCNA #085: MPLS Part 2: MPLS Labels and reasons to implement MPLS
🔐 Cybersecurity
CCNA #085: MPLS Part 2: MPLS Labels and reasons to implement MPLS
David Bombal Intermediate 8y ago
CCNA #083: IP Addressing and IP Subnetting for the CCNA Exam (Part 4). Practical IP Subnetting.
🔐 Cybersecurity
CCNA #083: IP Addressing and IP Subnetting for the CCNA Exam (Part 4). Practical IP Subnetting.
David Bombal Intermediate 8y ago
Insecurity - CS50 Live - S3E2
🔐 Cybersecurity
Insecurity - CS50 Live - S3E2
CS50 Intermediate 8y ago
How To Setup Proxychains In Kali Linux - #2 - Change Your IP
🔐 Cybersecurity
How To Setup Proxychains In Kali Linux - #2 - Change Your IP
HackerSploit Intermediate 9y ago
How To Setup Proxychains In Kali Linux - #1 - Stay Anonymous
🔐 Cybersecurity
How To Setup Proxychains In Kali Linux - #1 - Stay Anonymous
HackerSploit Intermediate 9y ago
The Blockchain & Bitcoin - Computerphile
🔐 Cybersecurity
The Blockchain & Bitcoin - Computerphile
Computerphile Intermediate 9y ago
GNS3 Talks: Vote for Videos - which videos should I create?
🔐 Cybersecurity
GNS3 Talks: Vote for Videos - which videos should I create?
David Bombal Intermediate 8y ago
Blind Buffer Overflow exploitation to leak secret data - rhme2 Animals (pwn 200)
🔐 Cybersecurity
Blind Buffer Overflow exploitation to leak secret data - rhme2 Animals (pwn 200)
LiveOverflow Intermediate 8y ago
CCNA #081: IP Addressing and IP Subnetting for the CCNA Exam (Part 3). Practical IP Subnetting.
🔐 Cybersecurity
CCNA #081: IP Addressing and IP Subnetting for the CCNA Exam (Part 3). Practical IP Subnetting.
David Bombal Intermediate 8y ago
CCNA #080: IP Addressing and IP Subnetting for the CCNA Exam (Part 2). Practical IP Subnetting.
🔐 Cybersecurity
CCNA #080: IP Addressing and IP Subnetting for the CCNA Exam (Part 2). Practical IP Subnetting.
David Bombal Intermediate 8y ago
CCNA #079: IP Addressing and IP Subnetting for the CCNA Exam (Part 1). Practical IP Subnetting.
🔐 Cybersecurity
CCNA #079: IP Addressing and IP Subnetting for the CCNA Exam (Part 1). Practical IP Subnetting.
David Bombal Intermediate 8y ago
Format string exploit on an arduino - rhme2 Casino (pwn 150)
🔐 Cybersecurity
Format string exploit on an arduino - rhme2 Casino (pwn 150)
LiveOverflow Intermediate 8y ago
GNS3 Talks: Ostinato Wireshark Captures Part 5: Capture and generate GNS3 switch CDP messages
🔐 Cybersecurity
GNS3 Talks: Ostinato Wireshark Captures Part 5: Capture and generate GNS3 switch CDP messages
David Bombal Intermediate 8y ago
GNS3 Talks: Ostinato Wireshark Captures Part 4: Generate packets with COS and DSCP settings
🔐 Cybersecurity
GNS3 Talks: Ostinato Wireshark Captures Part 4: Generate packets with COS and DSCP settings
David Bombal Intermediate 8y ago
GNS3 Talks: Ostinato Wireshark Captures Part 3: Capture IP Phone CDP messages & craft your own
🔐 Cybersecurity
GNS3 Talks: Ostinato Wireshark Captures Part 3: Capture IP Phone CDP messages & craft your own
David Bombal Intermediate 8y ago
GNS3 Talks: Ostinato Wireshark Captures Part 2: Capture IP Phone CDP messages & craft your own
🔐 Cybersecurity
GNS3 Talks: Ostinato Wireshark Captures Part 2: Capture IP Phone CDP messages & craft your own
David Bombal Intermediate 8y ago
GNS3 Talks: Ostinato Wireshark Captures Part 1: Capture STP BPDUs & craft own (Ostinato Part 10)
🔐 Cybersecurity
GNS3 Talks: Ostinato Wireshark Captures Part 1: Capture STP BPDUs & craft own (Ostinato Part 10)
David Bombal Intermediate 8y ago
Recover RSA private key from public keys - rhme2 Key Server (crypto 200)
🔐 Cybersecurity
Recover RSA private key from public keys - rhme2 Key Server (crypto 200)
LiveOverflow Intermediate 8y ago
Defeat a stack cookie with bruteforce - rhme2 Photo manager (pwn 100)
🔐 Cybersecurity
Defeat a stack cookie with bruteforce - rhme2 Photo manager (pwn 100)
LiveOverflow Intermediate 8y ago
GNS3 Talks: Fast IOSv boot
🔐 Cybersecurity
GNS3 Talks: Fast IOSv boot
David Bombal Intermediate 8y ago
GNS3 Talks: Stop BPDUs from Ostinato breaking STP using STP Root Guard (Ostinato Part 9)
🔐 Cybersecurity
GNS3 Talks: Stop BPDUs from Ostinato breaking STP using STP Root Guard (Ostinato Part 9)
David Bombal Intermediate 8y ago
GNS3 Talks: Make your PC the Spanning Tree Root by crafting BPDUs with Ostinato (Ostinato Part 8)
🔐 Cybersecurity
GNS3 Talks: Make your PC the Spanning Tree Root by crafting BPDUs with Ostinato (Ostinato Part 8)
David Bombal Intermediate 8y ago
GNS3 Talks: OpenFlow FLOW MOD, PACKET IN, PACKET OUT and more captures using Wireshark and GNS3
🔐 Cybersecurity
GNS3 Talks: OpenFlow FLOW MOD, PACKET IN, PACKET OUT and more captures using Wireshark and GNS3
David Bombal Intermediate 9y ago
GNS3 Talks: Ostinato Packet Generator - double tag 802.1Q frames for VLAN hopping (Ostinato Part 7)
🔐 Cybersecurity
GNS3 Talks: Ostinato Packet Generator - double tag 802.1Q frames for VLAN hopping (Ostinato Part 7)
David Bombal Intermediate 9y ago
GNS3 Talks: Ostinato Packet Generator - Inject 802.1Q frames for VLAN hopping (Ostinato Part 6)
🔐 Cybersecurity
GNS3 Talks: Ostinato Packet Generator - Inject 802.1Q frames for VLAN hopping (Ostinato Part 6)
David Bombal Intermediate 9y ago
GNS3 Talks: Ostinato Packet Generator - Craft packets to hack network devices (Ostinato Part 5)
🔐 Cybersecurity
GNS3 Talks: Ostinato Packet Generator - Craft packets to hack network devices (Ostinato Part 5)
David Bombal Intermediate 9y ago
CCNA #051 CCNA IP addressing and subnetting: Can these hosts ping each other?
🔐 Cybersecurity
CCNA #051 CCNA IP addressing and subnetting: Can these hosts ping each other?
David Bombal Intermediate 9y ago
GNS3 Talks: Ostinato Packet Generator - Broadcast traffic: What happens? (Ostinato Part 4)
🔐 Cybersecurity
GNS3 Talks: Ostinato Packet Generator - Broadcast traffic: What happens? (Ostinato Part 4)
David Bombal Intermediate 9y ago
GNS3 Talks: Ostinato Packet Generator - Multicast traffic: what happens? (Ostinato Part 3)
🔐 Cybersecurity
GNS3 Talks: Ostinato Packet Generator - Multicast traffic: what happens? (Ostinato Part 3)
David Bombal Intermediate 9y ago
GNS3 Talks: Ostinato Packet Generator - what happens to Unknown Unicast traffic? (Ostinato Part 2)
🔐 Cybersecurity
GNS3 Talks: Ostinato Packet Generator - what happens to Unknown Unicast traffic? (Ostinato Part 2)
David Bombal Intermediate 9y ago
GNS3 Talks: Ostinato Packet Generator and GNS3 - download, install and configure (Ostinato Part 1)
🔐 Cybersecurity
GNS3 Talks: Ostinato Packet Generator and GNS3 - download, install and configure (Ostinato Part 1)
David Bombal Intermediate 9y ago
Solving AVR reverse engineering challenge with radare2 - rhme2 Jumpy (reversing 100)
🔐 Cybersecurity
Solving AVR reverse engineering challenge with radare2 - rhme2 Jumpy (reversing 100)
LiveOverflow Intermediate 9y ago
Katoolin | How To Install Pentesting Tools On Any Linux Distro
🔐 Cybersecurity
Katoolin | How To Install Pentesting Tools On Any Linux Distro
HackerSploit Intermediate 9y ago
GNS3 Talks: Multiple clients sharing projects in real time, plus console session shadowing!
🔐 Cybersecurity
GNS3 Talks: Multiple clients sharing projects in real time, plus console session shadowing!
David Bombal Intermediate 9y ago
GNS3 Talks: GNS3 2.0 Profiles = multiple settings for different scenarios
🔐 Cybersecurity
GNS3 Talks: GNS3 2.0 Profiles = multiple settings for different scenarios
David Bombal Intermediate 9y ago
GNS3 Talks: Firefox appliance - add a Web browser to your GNS3 topologies
🔐 Cybersecurity
GNS3 Talks: Firefox appliance - add a Web browser to your GNS3 topologies
David Bombal Intermediate 9y ago
GNS3 Talks: Cisco IOS-XRv import and configuration Part 3: OSPF IOS-XRv and IOSv
🔐 Cybersecurity
GNS3 Talks: Cisco IOS-XRv import and configuration Part 3: OSPF IOS-XRv and IOSv
David Bombal Intermediate 9y ago
GNS3 Talks: Cisco IOS-XRv import and configuration Part 2: Don't forget to commit your changes!
🔐 Cybersecurity
GNS3 Talks: Cisco IOS-XRv import and configuration Part 2: Don't forget to commit your changes!
David Bombal Intermediate 9y ago
GNS3 Talks: Cisco IOS-XRv import and configuration Part 1: Don't forget to commit your changes!
🔐 Cybersecurity
GNS3 Talks: Cisco IOS-XRv import and configuration Part 1: Don't forget to commit your changes!
David Bombal Intermediate 9y ago
GNS3 Talks: Mac OS X, HPE VSR, Chicken of the VNC, Cisco CSR Part 2
🔐 Cybersecurity
GNS3 Talks: Mac OS X, HPE VSR, Chicken of the VNC, Cisco CSR Part 2
David Bombal Intermediate 9y ago
GNS3 Talks: Mac OS X, HPE VSR, Chicken of the VNC, Cisco CSR Part 1
🔐 Cybersecurity
GNS3 Talks: Mac OS X, HPE VSR, Chicken of the VNC, Cisco CSR Part 1
David Bombal Intermediate 9y ago
Using UART / Serial to interact with an embedded device - rhme2 Setup
🔐 Cybersecurity
Using UART / Serial to interact with an embedded device - rhme2 Setup
LiveOverflow Intermediate 9y ago
GNS3 Talks: HPE VSR, VNC Console and Cisco integration Part 2 (Cisco IOSv + HPE)
🔐 Cybersecurity
GNS3 Talks: HPE VSR, VNC Console and Cisco integration Part 2 (Cisco IOSv + HPE)
David Bombal Intermediate 9y ago
GNS3 Talks: HPE VSR, VNC Console and Cisco integration Part 1 (Cisco IOSv + HPE)
🔐 Cybersecurity
GNS3 Talks: HPE VSR, VNC Console and Cisco integration Part 1 (Cisco IOSv + HPE)
David Bombal Intermediate 9y ago
📚 Coursera Courses Opens on Coursera · Free to audit
1 / 3 View all →
CISSP Domain 5: Identity and Access Management (IAM)
📚 Coursera Course ↗
Self-paced
CISSP Domain 5: Identity and Access Management (IAM)
Opens on Coursera ↗
Wireshark 101: Packet Analysis Essentials
📚 Coursera Course ↗
Self-paced
Wireshark 101: Packet Analysis Essentials
Opens on Coursera ↗
Cryptography I
📚 Coursera Course ↗
Self-paced
Cryptography I
Opens on Coursera ↗
Introduction à Cloud Next Generation Firewall
📚 Coursera Course ↗
Self-paced
Introduction à Cloud Next Generation Firewall
Opens on Coursera ↗
Automated Cyber Security Incident Response
📚 Coursera Course ↗
Self-paced
Automated Cyber Security Incident Response
Opens on Coursera ↗
Data Privacy and Protection
📚 Coursera Course ↗
Self-paced
Data Privacy and Protection
Opens on Coursera ↗