Tech Skills

Cybersecurity

Ethical hacking, penetration testing, network security, CTFs and defensive security

6,996
lessons
Skills in this topic
View full skill map →
Security Basics
beginner
Fix OWASP top 10 vulnerabilities
AI Security
intermediate
Identify and patch prompt injection vulnerabilities
Network Security
intermediate
Configure a firewall with proper inbound/outbound rules
Ethical Hacking & Pen Testing
intermediate
Conduct a full pen test with Kali Linux
Cloud Security
intermediate
Implement IAM least-privilege policies on AWS/GCP
Incident Response
intermediate
Build an incident response playbook
Security Compliance
intermediate
Map controls for SOC 2 Type II compliance
Defensive AI
advanced
Build an AI-powered log anomaly detector
Command Injection | Ryan's CTF [12] Input Validation
Cybersecurity
Command Injection | Ryan's CTF [12] Input Validation
John Hammond Intermediate 7y ago
ALIAS Commands | Ryan's CTF [11] Find Flag Again
Cybersecurity
ALIAS Commands | Ryan's CTF [11] Find Flag Again
John Hammond Intermediate 7y ago
Analyzing the Blocky Logic Puzzle  - Pwn Adventure 3
Cybersecurity
Analyzing the Blocky Logic Puzzle - Pwn Adventure 3
LiveOverflow Beginner 7y ago
The PenTesters Framework - Install Penetration Testing Tools On Any Distribution
Cybersecurity ⚡ AI Lesson
The PenTesters Framework - Install Penetration Testing Tools On Any Distribution
HackerSploit Intermediate 7y ago
Web App Penetration Testing With Zap - #11 - Configuring The Proxy
Cybersecurity ⚡ AI Lesson
Web App Penetration Testing With Zap - #11 - Configuring The Proxy
HackerSploit Intermediate 7y ago
†: Signed and Unsigned Integers - Integer Overflows - Pwn Adventure 3
Cybersecurity ⚡ AI Lesson
†: Signed and Unsigned Integers - Integer Overflows - Pwn Adventure 3
LiveOverflow Intermediate 7y ago
Moving my HOME NETWORK to a DATA CENTER w/ DMVPN - CCNA | CCNP
Cybersecurity ⚡ AI Lesson
Moving my HOME NETWORK to a DATA CENTER w/ DMVPN - CCNA | CCNP
NetworkChuck Beginner 7y ago
HackTheBox - Bart
Cybersecurity ⚡ AI Lesson
HackTheBox - Bart
IppSec Beginner 7y ago
HackTheBox - Nightmarev2  - Speed Run/Unintended Solutions
Cybersecurity
HackTheBox - Nightmarev2 - Speed Run/Unintended Solutions
IppSec Beginner 7y ago
Reversing Android APK | Ryan's CTF [10] These are not the droids
Cybersecurity
Reversing Android APK | Ryan's CTF [10] These are not the droids
John Hammond Intermediate 7y ago
Binary ltrace | Ryan's CTF [08] What's the password?
Cybersecurity
Binary ltrace | Ryan's CTF [08] What's the password?
John Hammond Intermediate 7y ago
Image Strings | Ryan's CTF [07] "Stenography"
Cybersecurity
Image Strings | Ryan's CTF [07] "Stenography"
John Hammond Intermediate 7y ago
VIM Shell | Ryan's CTF [06] Escape the Jail
Cybersecurity
VIM Shell | Ryan's CTF [06] Escape the Jail
John Hammond Intermediate 7y ago
HTTP Authentication | Ryan's CTF [04] Encoded Credentials
Cybersecurity
HTTP Authentication | Ryan's CTF [04] Encoded Credentials
John Hammond Intermediate 7y ago
PATH Environment Variable | Ryan's CTF [09] Find the Flag
Cybersecurity
PATH Environment Variable | Ryan's CTF [09] Find the Flag
John Hammond Intermediate 7y ago
Simple MD5 Hash Cracking | Ryan's CTF [03] Crack That Hash
Cybersecurity
Simple MD5 Hash Cracking | Ryan's CTF [03] Crack That Hash
John Hammond Beginner 7y ago
Ryan's CTF [02] FTP File Transfer
Cybersecurity
Ryan's CTF [02] FTP File Transfer
John Hammond Intermediate 7y ago
Ryan's CTF [01] Hidden Web Flag
Cybersecurity
Ryan's CTF [01] Hidden Web Flag
John Hammond Intermediate 7y ago
FULL 2 HOUR Ryan's CTF
Cybersecurity
FULL 2 HOUR Ryan's CTF
John Hammond Intermediate 7y ago
Ryan's CTF TIMELAPSE
Cybersecurity
Ryan's CTF TIMELAPSE
John Hammond Intermediate 7y ago
Git/Linux Hacking | Bandit: OverTheWire (Level 32)
Cybersecurity
Git/Linux Hacking | Bandit: OverTheWire (Level 32)
John Hammond Intermediate 7y ago
Git/Linux Hacking | Bandit: OverTheWire (Level 31)
Cybersecurity
Git/Linux Hacking | Bandit: OverTheWire (Level 31)
John Hammond Intermediate 7y ago
Git/Linux Hacking | Bandit: OverTheWire (Level 30)
Cybersecurity
Git/Linux Hacking | Bandit: OverTheWire (Level 30)
John Hammond Intermediate 7y ago
Git/Linux Hacking | Bandit: OverTheWire (Level 29)
Cybersecurity
Git/Linux Hacking | Bandit: OverTheWire (Level 29)
John Hammond Intermediate 7y ago
NEW LEVELS [Git Hacking] Bandit: OverTheWire (Levels 26-28)
Cybersecurity
NEW LEVELS [Git Hacking] Bandit: OverTheWire (Levels 26-28)
John Hammond Intermediate 7y ago
Learning Cryptography: PicoCTF 2017 [16] Substitution
Cybersecurity
Learning Cryptography: PicoCTF 2017 [16] Substitution
John Hammond Beginner 7y ago
Python Flask WebDev [04] Static Files
Cybersecurity
Python Flask WebDev [04] Static Files
John Hammond Intermediate 7y ago
Exploiting an Integer Overflow (Fire and Ice) - Pwn Adventure 3
Cybersecurity
Exploiting an Integer Overflow (Fire and Ice) - Pwn Adventure 3
LiveOverflow Intermediate 7y ago
Jinja2 Templates | Python Flask WebDev [03]
Cybersecurity
Jinja2 Templates | Python Flask WebDev [03]
John Hammond Intermediate 7y ago
Web App Penetration Testing - #10 - XSS(Reflected, Stored & DOM)
Cybersecurity ⚡ AI Lesson
Web App Penetration Testing - #10 - XSS(Reflected, Stored & DOM)
HackerSploit Intermediate 7y ago
PicoCTF 2017 [13] What is Web (HTML, CSS, & JS)
Cybersecurity
PicoCTF 2017 [13] What is Web (HTML, CSS, & JS)
John Hammond Beginner 7y ago
Python Flask WebDev [02] URL Routing
Cybersecurity
Python Flask WebDev [02] URL Routing
John Hammond Intermediate 7y ago
Python Flask WebDev [01] Installing & Introduction
Cybersecurity
Python Flask WebDev [01] Installing & Introduction
John Hammond Beginner 7y ago
Capture the Flag: PicoCTF 2017 [10] Leaf of the Forest
Cybersecurity
Capture the Flag: PicoCTF 2017 [10] Leaf of the Forest
John Hammond Intermediate 7y ago
Getting Started in CTF: PicoCTF 2017 [09] keyz (SSH)
Cybersecurity
Getting Started in CTF: PicoCTF 2017 [09] keyz (SSH)
John Hammond Beginner 7y ago
Learning CTF: PicoCTF 2017 [08] Loooong (Python Strings)
Cybersecurity
Learning CTF: PicoCTF 2017 [08] Loooong (Python Strings)
John Hammond Beginner 7y ago
PicoCTF 2017 [07] Getting a Linux VM
Cybersecurity
PicoCTF 2017 [07] Getting a Linux VM
John Hammond Intermediate 7y ago
How to Play CTF: PicoCTF 2017 [06| Leaf of the Tree
Cybersecurity
How to Play CTF: PicoCTF 2017 [06| Leaf of the Tree
John Hammond Intermediate 7y ago
CTF for Beginners: PicoCTF [05] Piazza (IRC & Help)
Cybersecurity
CTF for Beginners: PicoCTF [05] Piazza (IRC & Help)
John Hammond Beginner 7y ago
Beginner's Guide to CTF: PicoCTF [04] | Internet Kitties (Netcat)
Cybersecurity
Beginner's Guide to CTF: PicoCTF [04] | Internet Kitties (Netcat)
John Hammond Beginner 7y ago
Implementing Autoloot with the Proxy - Pwn Adventure 3
Cybersecurity ⚡ AI Lesson
Implementing Autoloot with the Proxy - Pwn Adventure 3
LiveOverflow Intermediate 7y ago
SQL SELECT Tricks & Truncation: Python Web Hacking | Natas: OverTheWire (Level 27)
Cybersecurity
SQL SELECT Tricks & Truncation: Python Web Hacking | Natas: OverTheWire (Level 27)
John Hammond Intermediate 7y ago
PHP Object Injection & Serialization: Python Web Hacking | Natas: OverTheWire (Level 26)
Cybersecurity
PHP Object Injection & Serialization: Python Web Hacking | Natas: OverTheWire (Level 26)
John Hammond Intermediate 7y ago
Splitting Video into Frames: FFmpeg (Homemade CTF)
Cybersecurity
Splitting Video into Frames: FFmpeg (Homemade CTF)
John Hammond Intermediate 7y ago
PHP strcmp Abuse: Python Web Hacking | Natas: OverTheWire (Level 24)
Cybersecurity
PHP strcmp Abuse: Python Web Hacking | Natas: OverTheWire (Level 24)
John Hammond Intermediate 7y ago
Filecarving with Binwalk: Homemade CTF: "A Brisk Stroll"
Cybersecurity
Filecarving with Binwalk: Homemade CTF: "A Brisk Stroll"
John Hammond Intermediate 7y ago
PHP Type Juggling: Python Web Hacking | Natas: OverTheWire (Level 23)
Cybersecurity
PHP Type Juggling: Python Web Hacking | Natas: OverTheWire (Level 23)
John Hammond Intermediate 7y ago
Analyzing the Game Network Protocol - Pwn Adventure 3
Cybersecurity
Analyzing the Game Network Protocol - Pwn Adventure 3
LiveOverflow Intermediate 7y ago
📚 Coursera Courses Opens on Coursera · Free to audit
1 / 3 View all →
ISAA: AI, Cybersecurity, and Identity Fundamentals
📚 Coursera Course ↗
Self-paced
ISAA: AI, Cybersecurity, and Identity Fundamentals
Opens on Coursera ↗
 Advanced Cybersecurity Techniques
📚 Coursera Course ↗
Self-paced
Advanced Cybersecurity Techniques
Opens on Coursera ↗
Cyber Security Hashing Training for Beginners
📚 Coursera Course ↗
Self-paced
Cyber Security Hashing Training for Beginners
Opens on Coursera ↗
Estrutura e Funcionamento das Redes de Computadores
📚 Coursera Course ↗
Self-paced
Estrutura e Funcionamento das Redes de Computadores
Opens on Coursera ↗
Advanced Security Practices: Risk & Endpoint Security
📚 Coursera Course ↗
Self-paced
Advanced Security Practices: Risk & Endpoint Security
Opens on Coursera ↗
Continuous Testing, Quality, Security, and Feedback
📚 Coursera Course ↗
Self-paced
Continuous Testing, Quality, Security, and Feedback
Opens on Coursera ↗