Tech Skills

Cybersecurity

Ethical hacking, penetration testing, network security, CTFs and defensive security

6,995
lessons
Skills in this topic
View full skill map →
Security Basics
beginner
Fix OWASP top 10 vulnerabilities
AI Security
intermediate
Identify and patch prompt injection vulnerabilities
Network Security
intermediate
Configure a firewall with proper inbound/outbound rules
Ethical Hacking & Pen Testing
intermediate
Conduct a full pen test with Kali Linux
Cloud Security
intermediate
Implement IAM least-privilege policies on AWS/GCP
Incident Response
intermediate
Build an incident response playbook
Security Compliance
intermediate
Map controls for SOC 2 Type II compliance
Defensive AI
advanced
Build an AI-powered log anomaly detector
RSA Implemented in JavaScript (Keygen part 5) - Pwn Adventure 3
Cybersecurity ⚡ AI Lesson
RSA Implemented in JavaScript (Keygen part 5) - Pwn Adventure 3
LiveOverflow Intermediate 7y ago
ECB Encryption / Python Web Hacking | Natas: OverTheWire (Level 28)
Cybersecurity
ECB Encryption / Python Web Hacking | Natas: OverTheWire (Level 28)
John Hammond Intermediate 7y ago
YANG, NETCONF, RESTCONF Demos and Free labs (Part 2)
Cybersecurity
YANG, NETCONF, RESTCONF Demos and Free labs (Part 2)
David Bombal Beginner 7y ago
EditThisCookie | CodefestCTF 2018: "Fortune Cookie"
Cybersecurity
EditThisCookie | CodefestCTF 2018: "Fortune Cookie"
John Hammond Intermediate 7y ago
YANG, NETCONF, RESTCONF Demos. Which Cisco devices are supported? (Part 1)
Cybersecurity
YANG, NETCONF, RESTCONF Demos. Which Cisco devices are supported? (Part 1)
David Bombal Beginner 7y ago
HackTheBox - Stratosphere
Cybersecurity ⚡ AI Lesson
HackTheBox - Stratosphere
IppSec Beginner 7y ago
RSA Implemented in Assembler (Keygen part 4) - Pwn Adventure 3
Cybersecurity
RSA Implemented in Assembler (Keygen part 4) - Pwn Adventure 3
LiveOverflow Intermediate 7y ago
You’re Probably Not Red Teaming (And Usually I’m Not, Either) Webcast by Deviant Ollam
Cybersecurity ⚡ AI Lesson
You’re Probably Not Red Teaming (And Usually I’m Not, Either) Webcast by Deviant Ollam
SANS Institute Beginner 7y ago
Service Website Hacks for Fast, Lasting Success
Cybersecurity
Service Website Hacks for Fast, Lasting Success
Wes McDowell Beginner 7y ago
HackTheBox - Rabbit
Cybersecurity
HackTheBox - Rabbit
IppSec Intermediate 7y ago
Introduction to Malware Analysis
Cybersecurity
Introduction to Malware Analysis
SANS Institute Beginner 7y ago
The FUTURE of Information Security Engineers - Cisco Security Automation (DNA CENTER)
Cybersecurity ⚡ AI Lesson
The FUTURE of Information Security Engineers - Cisco Security Automation (DNA CENTER)
NetworkChuck Beginner 7y ago
HTTPS and Web Security - The State of the Web
Cybersecurity
HTTPS and Web Security - The State of the Web
Chrome for Developers Intermediate 7y ago
Web App Penetration Testing - #14 - Cookie Collection & Reverse Engineering
Cybersecurity ⚡ AI Lesson
Web App Penetration Testing - #14 - Cookie Collection & Reverse Engineering
HackerSploit Intermediate 7y ago
How To Install OWASP Juice Shop
Cybersecurity ⚡ AI Lesson
How To Install OWASP Juice Shop
HackerSploit Intermediate 7y ago
"Introduction to Linux" [05] JSON Lesson Book
Cybersecurity
"Introduction to Linux" [05] JSON Lesson Book
John Hammond Beginner 7y ago
"Introduction to Linux" [04] Shell Source Code
Cybersecurity
"Introduction to Linux" [04] Shell Source Code
John Hammond Beginner 7y ago
Basic SQL Injection | PicoCTF 2017 [35] My First SQL
Cybersecurity
Basic SQL Injection | PicoCTF 2017 [35] My First SQL
John Hammond Intermediate 7y ago
Introduction to Linux [03] BASH Training Wheels Shell
Cybersecurity
Introduction to Linux [03] BASH Training Wheels Shell
John Hammond Beginner 7y ago
Reverse Engineering Assembly | PicoCTF 2017 [34] Programmer's Assemble
Cybersecurity
Reverse Engineering Assembly | PicoCTF 2017 [34] Programmer's Assemble
John Hammond Intermediate 7y ago
"Introduction To Linux" [02] Raspberry Pi & Git
Cybersecurity
"Introduction To Linux" [02] Raspberry Pi & Git
John Hammond Beginner 7y ago
ERROR-Based BLIND SQL Injection | "TRY HARDER" (HackconCTF 2018)
Cybersecurity
ERROR-Based BLIND SQL Injection | "TRY HARDER" (HackconCTF 2018)
John Hammond Intermediate 7y ago
Understanding the Key Verification Algorithm (Keygen part 3) - Pwn Adventure 3
Cybersecurity ⚡ AI Lesson
Understanding the Key Verification Algorithm (Keygen part 3) - Pwn Adventure 3
LiveOverflow Intermediate 7y ago
Ethereum Blockchain | "EtherHide" (Hackcon2018 CTF)
Cybersecurity
Ethereum Blockchain | "EtherHide" (Hackcon2018 CTF)
John Hammond Intermediate 7y ago
Stupid Superman Recon | "Ethical Hacker" (HackconCTF 2018)
Cybersecurity
Stupid Superman Recon | "Ethical Hacker" (HackconCTF 2018)
John Hammond Intermediate 7y ago
ASCII & Regular Expressions | "Find Me ASAP" (Hackcon2018 CTF)
Cybersecurity
ASCII & Regular Expressions | "Find Me ASAP" (Hackcon2018 CTF)
John Hammond Intermediate 7y ago
Vignere Cipher | "Salad Upgrade" (Hackcon2018 CTF)
Cybersecurity
Vignere Cipher | "Salad Upgrade" (Hackcon2018 CTF)
John Hammond Intermediate 7y ago
Simple Strings | "Hoaxes & Hexes" (Hackcon2018 CTF)
Cybersecurity
Simple Strings | "Hoaxes & Hexes" (Hackcon2018 CTF)
John Hammond Beginner 7y ago
Caesar Cipher | "Caesar Salad" (Hackcon2018 CTF)
Cybersecurity
Caesar Cipher | "Caesar Salad" (Hackcon2018 CTF)
John Hammond Intermediate 7y ago
Introduction to Linux
Cybersecurity ⚡ AI Lesson
Introduction to Linux
SANS Institute Beginner 7y ago
Reversing Custom Encoding (Keygen part 2) - Pwn Adventure 3
Cybersecurity
Reversing Custom Encoding (Keygen part 2) - Pwn Adventure 3
LiveOverflow Intermediate 7y ago
Wireshark Decrypting SSL | "Ssleepy" TJCTF 2018
Cybersecurity
Wireshark Decrypting SSL | "Ssleepy" TJCTF 2018
John Hammond Intermediate 7y ago
HTTP Cookies | "Cookie Monster" TJCTF 2018
Cybersecurity
HTTP Cookies | "Cookie Monster" TJCTF 2018
John Hammond Intermediate 7y ago
HTML Source Code | "Blank" TJCTF 2018
Cybersecurity
HTML Source Code | "Blank" TJCTF 2018
John Hammond Intermediate 7y ago
Infinite JavaScript Scrolling | "Moar Horses" TJCTF 2018
Cybersecurity
Infinite JavaScript Scrolling | "Moar Horses" TJCTF 2018
John Hammond Intermediate 7y ago
Uncommon SQL Injection | "Ess Kyoo Ell" TJCTF 2018
Cybersecurity
Uncommon SQL Injection | "Ess Kyoo Ell" TJCTF 2018
John Hammond Intermediate 7y ago
RSA Cryptography | "Classic" TJCTF 2018
Cybersecurity
RSA Cryptography | "Classic" TJCTF 2018
John Hammond Intermediate 7y ago
Reversing Input Validation (Keygen part 1) - Pwn Adventure 3
Cybersecurity ⚡ AI Lesson
Reversing Input Validation (Keygen part 1) - Pwn Adventure 3
LiveOverflow Beginner 7y ago
PicoCTF 2017 [33] A Thing Called the Stack
Cybersecurity
PicoCTF 2017 [33] A Thing Called the Stack
John Hammond Intermediate 7y ago
Web App Penetration Testing  - #13 - CSRF (Cross Site Request Forgery)
Cybersecurity ⚡ AI Lesson
Web App Penetration Testing - #13 - CSRF (Cross Site Request Forgery)
HackerSploit Intermediate 7y ago
How Did You Get Into Programming?
Cybersecurity
How Did You Get Into Programming?
John Hammond Intermediate 7y ago
USB Devices in Wireshark | PicoCTF 2017 [29] Just Keyp Trying
Cybersecurity
USB Devices in Wireshark | PicoCTF 2017 [29] Just Keyp Trying
John Hammond Intermediate 7y ago
Port Knocking Attack | Ryan's CTF [17] Knock-Knock FINALE
Cybersecurity
Port Knocking Attack | Ryan's CTF [17] Knock-Knock FINALE
John Hammond Intermediate 7y ago
PCAP Manipulation | Ryan's CTF [16] Custom Encoded Data
Cybersecurity
PCAP Manipulation | Ryan's CTF [16] Custom Encoded Data
John Hammond Intermediate 7y ago
Sudo ltrace | Ryan's CTF [15] Strings wont help you
Cybersecurity
Sudo ltrace | Ryan's CTF [15] Strings wont help you
John Hammond Intermediate 7y ago
Embedded GZIP | Ryan's CTF [14] Mystery File
Cybersecurity
Embedded GZIP | Ryan's CTF [14] Mystery File
John Hammond Intermediate 7y ago
BASIC Buffer Overflow | Ryan's CTF [13] Everyday I'm Bufferin
Cybersecurity
BASIC Buffer Overflow | Ryan's CTF [13] Everyday I'm Bufferin
John Hammond Intermediate 7y ago
HackTheBox - Valentine
Cybersecurity
HackTheBox - Valentine
IppSec Beginner 7y ago
📚 Coursera Courses Opens on Coursera · Free to audit
1 / 3 View all →
Connect and Protect: Networks and Network Security
📚 Coursera Course ↗
Self-paced
Connect and Protect: Networks and Network Security
Opens on Coursera ↗
Introduction to Cybersecurity Foundations
📚 Coursera Course ↗
Self-paced
Introduction to Cybersecurity Foundations
Opens on Coursera ↗
How to Secure your Network Device using Cisco Packet Tracer
📚 Coursera Course ↗
Self-paced
How to Secure your Network Device using Cisco Packet Tracer
Opens on Coursera ↗
OWASP Web Application Security
📚 Coursera Course ↗
Self-paced
OWASP Web Application Security
Opens on Coursera ↗
Unveiling the NIST Risk Management Framework (RMF)
📚 Coursera Course ↗
Self-paced
Unveiling the NIST Risk Management Framework (RMF)
Opens on Coursera ↗
Communication Strategies for a Virtual Age
📚 Coursera Course ↗
Self-paced
Communication Strategies for a Virtual Age
Opens on Coursera ↗