Tech Skills

Cybersecurity

Ethical hacking, penetration testing, network security, CTFs and defensive security

6355
lessons
C Programming Fundamentals - Variable Scope
🔐 Cybersecurity
C Programming Fundamentals - Variable Scope
HackerSploit Intermediate 7y ago
GNS3 Custom 3D Symbols and Templates like Cisco icons: CCNA | Python | Networking
🔐 Cybersecurity
GNS3 Custom 3D Symbols and Templates like Cisco icons: CCNA | Python | Networking
David Bombal Intermediate 7y ago
GNS3 Custom Symbols: Modern, clean, crisp network topologies! CCNA | Python | Networking
🔐 Cybersecurity
GNS3 Custom Symbols: Modern, clean, crisp network topologies! CCNA | Python | Networking
David Bombal Beginner 7y ago
HackTheBox - Mischief
🔐 Cybersecurity
HackTheBox - Mischief
IppSec Intermediate 7y ago
C Programming Fundamentals - Loops
🔐 Cybersecurity
C Programming Fundamentals - Loops
HackerSploit Intermediate 7y ago
a16z Podcast | Changing the Conversation about Cybersecurity
🔐 Cybersecurity
a16z Podcast | Changing the Conversation about Cybersecurity
a16z Intermediate 7y ago
a16z Podcast | The Law (and Tech) of Warfare
🔐 Cybersecurity
a16z Podcast | The Law (and Tech) of Warfare
a16z Beginner 7y ago
XMAS CTF HIGHLIGHTS
🔐 Cybersecurity
XMAS CTF HIGHLIGHTS
John Hammond Intermediate 7y ago
Coordinates to IMAGE & Back w/ PYTHON PIL
🔐 Cybersecurity
Coordinates to IMAGE & Back w/ PYTHON PIL
John Hammond Intermediate 7y ago
Jump Oriented Programming: Ethereum Smart Contract #2 - Real World CTF 2018
🔐 Cybersecurity
Jump Oriented Programming: Ethereum Smart Contract #2 - Real World CTF 2018
LiveOverflow Intermediate 7y ago
Ethereum Smart Contract Hacking - Real World CTF 2018
🔐 Cybersecurity
Ethereum Smart Contract Hacking - Real World CTF 2018
LiveOverflow Beginner 7y ago
HackTheBox - Waldo
🔐 Cybersecurity
HackTheBox - Waldo
IppSec Beginner 7y ago
Fast Forward: Reflecting on a Life of Watching Movies and a Career in Cybersecurity
🔐 Cybersecurity
Fast Forward: Reflecting on a Life of Watching Movies and a Career in Cybersecurity
SANS Institute Beginner 7y ago
Hamid Montakab MD: Introduction to Management of Physical & Psychological Trauma with Acupuncture
🔐 Cybersecurity
Hamid Montakab MD: Introduction to Management of Physical & Psychological Trauma with Acupuncture
TCM Academy Beginner 7y ago
Part 3 – SANS Institute and Tenable talk about OT/IT convergence and security
🔐 Cybersecurity
Part 3 – SANS Institute and Tenable talk about OT/IT convergence and security
SANS Institute Intermediate 7y ago
GNS3, VirtualBox and Cisco IOS: Download, install and configure Cisco IOS with GNS3 and Virtualbox
🔐 Cybersecurity
GNS3, VirtualBox and Cisco IOS: Download, install and configure Cisco IOS with GNS3 and Virtualbox
David Bombal Beginner 7y ago
C Programming Fundamentals - If Statements
🔐 Cybersecurity
C Programming Fundamentals - If Statements
HackerSploit Intermediate 7y ago
C Programming Fundamentals - Input
🔐 Cybersecurity
C Programming Fundamentals - Input
HackerSploit Intermediate 7y ago
VirtualBox nested virtualization: Now supported with version 6.0 on AMD processors! Great for GNS3!
🔐 Cybersecurity
VirtualBox nested virtualization: Now supported with version 6.0 on AMD processors! Great for GNS3!
David Bombal Beginner 7y ago
C Programming Fundamentals - Functions And Variables
🔐 Cybersecurity
C Programming Fundamentals - Functions And Variables
HackerSploit Intermediate 7y ago
a16z Podcast | On Wearables, Quantified Self, and Biohacking
🔐 Cybersecurity
a16z Podcast | On Wearables, Quantified Self, and Biohacking
a16z Beginner 7y ago
Kali Linux Quick Tips - How To Setup SSH On Kali
🔐 Cybersecurity
Kali Linux Quick Tips - How To Setup SSH On Kali
HackerSploit Intermediate 7y ago
DotDotPwn - Directory Traversal Fuzzing
🔐 Cybersecurity
DotDotPwn - Directory Traversal Fuzzing
HackerSploit Intermediate 7y ago
Experience is overrated! Learn the new technologies and change your life in 2019! Career Advice
🔐 Cybersecurity
Experience is overrated! Learn the new technologies and change your life in 2019! Career Advice
David Bombal Beginner 7y ago
2019 career advice for IT professionals: Ride waves and 80/20 rule. Christmas Giveaway! Amazon!
🔐 Cybersecurity
2019 career advice for IT professionals: Ride waves and 80/20 rule. Christmas Giveaway! Amazon!
David Bombal Beginner 7y ago
The ONE Skill you need in IT - Information Technology. You need this to succeed!
🔐 Cybersecurity
The ONE Skill you need in IT - Information Technology. You need this to succeed!
David Bombal Beginner 7y ago
Server-Side Template Injection w/ Flask | Flaskcards [34] picoCTF 2018
🔐 Cybersecurity
Server-Side Template Injection w/ Flask | Flaskcards [34] picoCTF 2018
John Hammond Intermediate 7y ago
Examining Variables in GDB | learn gdb [33] picoCTF 2018
🔐 Cybersecurity
Examining Variables in GDB | learn gdb [33] picoCTF 2018
John Hammond Beginner 7y ago
Going to Chinese Hacking Competition - Real World CTF Finals
🔐 Cybersecurity
Going to Chinese Hacking Competition - Real World CTF Finals
LiveOverflow Intermediate 7y ago
Free Python Course! David Bombal's Christmas giveway! CCNA | Python | Cisco
🔐 Cybersecurity
Free Python Course! David Bombal's Christmas giveway! CCNA | Python | Cisco
David Bombal Intermediate 7y ago
Leaking the Stack / Printf Format Vulnerability | echooo [32] picoCTF 2018
🔐 Cybersecurity
Leaking the Stack / Printf Format Vulnerability | echooo [32] picoCTF 2018
John Hammond Intermediate 7y ago
Registry Carving & Network Connections w/ Volatility [02] OtterCTF
🔐 Cybersecurity
Registry Carving & Network Connections w/ Volatility [02] OtterCTF
John Hammond Intermediate 7y ago
Manual HTTP Requests | Artisinal Handcrafted HTTP 3 [31] picoCTF 2018
🔐 Cybersecurity
Manual HTTP Requests | Artisinal Handcrafted HTTP 3 [31] picoCTF 2018
John Hammond Intermediate 7y ago
LSADump: Dumping Passwords w/ Volatility [01] OtterCTF
🔐 Cybersecurity
LSADump: Dumping Passwords w/ Volatility [01] OtterCTF
John Hammond Intermediate 7y ago
Setting Up An Exploit Development Lab
🔐 Cybersecurity
Setting Up An Exploit Development Lab
HackerSploit Intermediate 7y ago
Piping Stdin & Redirecting Stderr | in out error [30] picoCTF 2018
🔐 Cybersecurity
Piping Stdin & Redirecting Stderr | in out error [30] picoCTF 2018
John Hammond Intermediate 7y ago
Patching Binaries with Pwntools | BE QUICK OR BE DEAD 2 [29] picoCTF 2018
🔐 Cybersecurity
Patching Binaries with Pwntools | BE QUICK OR BE DEAD 2 [29] picoCTF 2018
John Hammond Intermediate 7y ago
Best Python books for Network Engineers! Learn Python and Network Automation: CCNA | Python
🔐 Cybersecurity
Best Python books for Network Engineers! Learn Python and Network Automation: CCNA | Python
David Bombal Beginner 7y ago
Part 1 – SANS Institute and Tenable talk about cloud security
🔐 Cybersecurity
Part 1 – SANS Institute and Tenable talk about cloud security
SANS Institute Intermediate 7y ago
Part 2 – SANS Institute and Tenable talk about cloud security
🔐 Cybersecurity
Part 2 – SANS Institute and Tenable talk about cloud security
SANS Institute Intermediate 7y ago
Part 3 – SANS Institute and Tenable talk about cloud security
🔐 Cybersecurity
Part 3 – SANS Institute and Tenable talk about cloud security
SANS Institute Intermediate 7y ago
Part 1 – SANS Institute and Tenable talk about OT/IT convergence and security
🔐 Cybersecurity
Part 1 – SANS Institute and Tenable talk about OT/IT convergence and security
SANS Institute Intermediate 7y ago
Part 2 – SANS Institute and Tenable talk about OT/IT convergence and security
🔐 Cybersecurity
Part 2 – SANS Institute and Tenable talk about OT/IT convergence and security
SANS Institute Intermediate 7y ago
SANS STX Cyber Range
🔐 Cybersecurity
SANS STX Cyber Range
SANS Institute Advanced 7y ago
HackTheBox - Lame - Walkthrough
🔐 Cybersecurity
HackTheBox - Lame - Walkthrough
HackerSploit Intermediate 7y ago
Kolide & OSQuery: How to Build Solid Queries and Packs for Detection and Threat Hunting
🔐 Cybersecurity
Kolide & OSQuery: How to Build Solid Queries and Packs for Detection and Threat Hunting
SANS Institute Beginner 7y ago
SANS Webcast - Consuming OSINT: Watching You Eat, Drink, and Sleep
🔐 Cybersecurity
SANS Webcast - Consuming OSINT: Watching You Eat, Drink, and Sleep
SANS Institute Beginner 7y ago
tcpdump - Traffic Capture & Analysis
🔐 Cybersecurity
tcpdump - Traffic Capture & Analysis
HackerSploit Intermediate 7y ago
📚 Coursera Courses Opens on Coursera · Free to audit
1 / 3 View all →
Wireshark for Beginners: Capture Packets
📚 Coursera Course ↗
Self-paced
Wireshark for Beginners: Capture Packets
Opens on Coursera ↗
CISSP Domain 4: Communication and Network Security
📚 Coursera Course ↗
Self-paced
CISSP Domain 4: Communication and Network Security
Opens on Coursera ↗
Secure Mobile AI Models Against Attacks
📚 Coursera Course ↗
Self-paced
Secure Mobile AI Models Against Attacks
Opens on Coursera ↗
Network Security
📚 Coursera Course ↗
Self-paced
Network Security
Opens on Coursera ↗
Python Cryptography: Build & Explore Classical Ciphers
📚 Coursera Course ↗
Self-paced
Python Cryptography: Build & Explore Classical Ciphers
Opens on Coursera ↗
Network Security
📚 Coursera Course ↗
Self-paced
Network Security
Opens on Coursera ↗