Tech Skills

Cybersecurity

Ethical hacking, penetration testing, network security, CTFs and defensive security

7,049
lessons
Skills in this topic
View full skill map →
Security Basics
beginner
Fix OWASP top 10 vulnerabilities
AI Security
intermediate
Identify and patch prompt injection vulnerabilities
Network Security
intermediate
Configure a firewall with proper inbound/outbound rules
Ethical Hacking & Pen Testing
intermediate
Conduct a full pen test with Kali Linux
Cloud Security
intermediate
Implement IAM least-privilege policies on AWS/GCP
Incident Response
intermediate
Build an incident response playbook
Security Compliance
intermediate
Map controls for SOC 2 Type II compliance
Defensive AI
advanced
Build an AI-powered log anomaly detector
HackTheBox - Arctic
Cybersecurity
HackTheBox - Arctic
IppSec Beginner 8y ago
CCIEPython: If Else logic: Learn Python, Netmiko, NAPALM, pyntc and more!
Cybersecurity
CCIEPython: If Else logic: Learn Python, Netmiko, NAPALM, pyntc and more!
David Bombal Beginner 8y ago
GNS3 Talks: Packet.net and GNS3 (Part 5): Integrate the GNS3 GUI with Packet.net server
Cybersecurity
GNS3 Talks: Packet.net and GNS3 (Part 5): Integrate the GNS3 GUI with Packet.net server
David Bombal Intermediate 8y ago
Hardware Power Glitch Attack (Fault Injection) - rhme2 Fiesta (FI 100)
Cybersecurity ⚡ AI Lesson
Hardware Power Glitch Attack (Fault Injection) - rhme2 Fiesta (FI 100)
LiveOverflow Intermediate 8y ago
Graduation Day - SANS HM Gov Cyber Retraining Academy
Cybersecurity
Graduation Day - SANS HM Gov Cyber Retraining Academy
SANS Institute Beginner 8y ago
How TOR Works- Computerphile
Cybersecurity ⚡ AI Lesson
How TOR Works- Computerphile
Computerphile Intermediate 8y ago
VPN And DNS For Beginners | Kali Linux
Cybersecurity ⚡ AI Lesson
VPN And DNS For Beginners | Kali Linux
HackerSploit Beginner 9y ago
Dealing With Depression & Anxiety In Programming
Cybersecurity ⚡ AI Lesson
Dealing With Depression & Anxiety In Programming
Traversy Media Intermediate 9y ago
Breaking ECDSA (Elliptic Curve Cryptography) - rhme2 Secure Filesystem v1.92r1 (crypto 150)
Cybersecurity ⚡ AI Lesson
Breaking ECDSA (Elliptic Curve Cryptography) - rhme2 Secure Filesystem v1.92r1 (crypto 150)
LiveOverflow Intermediate 9y ago
Learn Web Security with Google (Google I/O '17)
Cybersecurity
Learn Web Security with Google (Google I/O '17)
Chrome for Developers Beginner 9y ago
Multiple Comparisons and Conversion Optimization
Cybersecurity ⚡ AI Lesson
Multiple Comparisons and Conversion Optimization
Data Skeptic Advanced 9y ago
Insecurity - CS50 Live - S3E2
Cybersecurity
Insecurity - CS50 Live - S3E2
CS50 Intermediate 9y ago
Freelance Pricing Strategies
Cybersecurity
Freelance Pricing Strategies
Flux Academy Beginner 9y ago
How To Setup And Use anonsurf On Kali Linux | Stay Anonymous
Cybersecurity ⚡ AI Lesson
How To Setup And Use anonsurf On Kali Linux | Stay Anonymous
HackerSploit Beginner 9y ago
GNS3 Talks: Packet.net and GNS3 (Part 4): Deploy Server and setup VPN
Cybersecurity
GNS3 Talks: Packet.net and GNS3 (Part 4): Deploy Server and setup VPN
David Bombal Intermediate 8y ago
GNS3 Talks: Packet.net and GNS3 (Part 3): SSH Keys (Generate with PuttyGen)
Cybersecurity
GNS3 Talks: Packet.net and GNS3 (Part 3): SSH Keys (Generate with PuttyGen)
David Bombal Intermediate 8y ago
GNS3 Talks: Packet.net and GNS3 (Part 2): Documentation, Discounts and signup
Cybersecurity
GNS3 Talks: Packet.net and GNS3 (Part 2): Documentation, Discounts and signup
David Bombal Intermediate 8y ago
GNS3 Talks: Packet.net and GNS3 (Part 1): Overview
Cybersecurity
GNS3 Talks: Packet.net and GNS3 (Part 1): Overview
David Bombal Beginner 8y ago
CCIEPython: pyntc: Automate Legacy Devices easily! Python, Netmiko, NAPALM, pyntc, SSH, NETCONF
Cybersecurity
CCIEPython: pyntc: Automate Legacy Devices easily! Python, Netmiko, NAPALM, pyntc, SSH, NETCONF
David Bombal Beginner 8y ago
CCIEPython: NAPALM: Network Automation, Programmability, Abstraction & Multivendor Python
Cybersecurity
CCIEPython: NAPALM: Network Automation, Programmability, Abstraction & Multivendor Python
David Bombal Beginner 8y ago
CCIEPython: What should I learn? Network Automation?
Cybersecurity
CCIEPython: What should I learn? Network Automation?
David Bombal Beginner 8y ago
CCIEPython: Learn Python programming with David Bombal: Python 2 or Python 3?
Cybersecurity
CCIEPython: Learn Python programming with David Bombal: Python 2 or Python 3?
David Bombal Beginner 8y ago
CCIEPython: Learn Python programming with David Bombal: Python Dictionaries and Netmiko (Part 2)
Cybersecurity
CCIEPython: Learn Python programming with David Bombal: Python Dictionaries and Netmiko (Part 2)
David Bombal Beginner 8y ago
CCIEPython: Learn Python programming with David Bombal: Python Dictionaries and Netmiko (Part 1)
Cybersecurity
CCIEPython: Learn Python programming with David Bombal: Python Dictionaries and Netmiko (Part 1)
David Bombal Beginner 8y ago
GNS3 Talks: How to import Docker containers into GNS3: your own or others available on Docker Hub.
Cybersecurity
GNS3 Talks: How to import Docker containers into GNS3: your own or others available on Docker Hub.
David Bombal Beginner 8y ago
GNS3 Talks: WordPress Docker appliance now available! Add web servers to your GNS3 Topologies.
Cybersecurity
GNS3 Talks: WordPress Docker appliance now available! Add web servers to your GNS3 Topologies.
David Bombal Beginner 8y ago
GNS3 Talks: Docker Ubuntu container not getting DHCP IP address (Part 2 - Windows). Troubleshooting.
Cybersecurity
GNS3 Talks: Docker Ubuntu container not getting DHCP IP address (Part 2 - Windows). Troubleshooting.
David Bombal Beginner 8y ago
GNS3 Talks: Docker Ubuntu container not getting DHCP IP address (Part 1 - MAC). Troubleshooting GNS3
Cybersecurity
GNS3 Talks: Docker Ubuntu container not getting DHCP IP address (Part 1 - MAC). Troubleshooting GNS3
David Bombal Beginner 8y ago
Reversing an unkown digital protocol with an Arduino - rhme2 Whac the mole (misc 200)
Cybersecurity
Reversing an unkown digital protocol with an Arduino - rhme2 Whac the mole (misc 200)
LiveOverflow Intermediate 9y ago
CCNA #087: MPLS Part 4: Core MPLS Labels - CEF, forwarding tables, Wireshark captures, tracing
Cybersecurity
CCNA #087: MPLS Part 4: Core MPLS Labels - CEF, forwarding tables, Wireshark captures, tracing
David Bombal Beginner 9y ago
Blind Buffer Overflow exploitation to leak secret data - rhme2 Animals (pwn 200)
Cybersecurity ⚡ AI Lesson
Blind Buffer Overflow exploitation to leak secret data - rhme2 Animals (pwn 200)
LiveOverflow Intermediate 9y ago
Format string exploit on an arduino - rhme2 Casino (pwn 150)
Cybersecurity ⚡ AI Lesson
Format string exploit on an arduino - rhme2 Casino (pwn 150)
LiveOverflow Intermediate 9y ago
GNS3 Talks: Ostinato Wireshark Captures Part 5: Capture and generate GNS3 switch CDP messages
Cybersecurity
GNS3 Talks: Ostinato Wireshark Captures Part 5: Capture and generate GNS3 switch CDP messages
David Bombal Intermediate 9y ago
GNS3 Talks: Ostinato Wireshark Captures Part 4: Generate packets with COS and DSCP settings
Cybersecurity
GNS3 Talks: Ostinato Wireshark Captures Part 4: Generate packets with COS and DSCP settings
David Bombal Intermediate 9y ago
GNS3 Talks: Ostinato Wireshark Captures Part 3: Capture IP Phone CDP messages & craft your own
Cybersecurity
GNS3 Talks: Ostinato Wireshark Captures Part 3: Capture IP Phone CDP messages & craft your own
David Bombal Intermediate 9y ago
GNS3 Talks: Ostinato Wireshark Captures Part 2: Capture IP Phone CDP messages & craft your own
Cybersecurity
GNS3 Talks: Ostinato Wireshark Captures Part 2: Capture IP Phone CDP messages & craft your own
David Bombal Intermediate 9y ago
GNS3 Talks: Ostinato Wireshark Captures Part 1: Capture STP BPDUs & craft own (Ostinato Part 10)
Cybersecurity
GNS3 Talks: Ostinato Wireshark Captures Part 1: Capture STP BPDUs & craft own (Ostinato Part 10)
David Bombal Intermediate 9y ago
Recover RSA private key from public keys - rhme2 Key Server (crypto 200)
Cybersecurity
Recover RSA private key from public keys - rhme2 Key Server (crypto 200)
LiveOverflow Intermediate 9y ago
CCNA #069 MAC Address troubleshooting scenario 1: Can you find the issue?
Cybersecurity
CCNA #069 MAC Address troubleshooting scenario 1: Can you find the issue?
David Bombal Beginner 9y ago
Defeat a stack cookie with bruteforce - rhme2 Photo manager (pwn 100)
Cybersecurity
Defeat a stack cookie with bruteforce - rhme2 Photo manager (pwn 100)
LiveOverflow Intermediate 9y ago
GNS3 Talks: Stop BPDUs from Ostinato breaking STP using STP Root Guard (Ostinato Part 9)
Cybersecurity
GNS3 Talks: Stop BPDUs from Ostinato breaking STP using STP Root Guard (Ostinato Part 9)
David Bombal Intermediate 9y ago
GNS3 Talks: Make your PC the Spanning Tree Root by crafting BPDUs with Ostinato (Ostinato Part 8)
Cybersecurity
GNS3 Talks: Make your PC the Spanning Tree Root by crafting BPDUs with Ostinato (Ostinato Part 8)
David Bombal Intermediate 9y ago
GNS3 Talks: Learn Linux with Cumulus Linux and GNS3 (Part 3). Ideal for networkers to learn Linux.
Cybersecurity
GNS3 Talks: Learn Linux with Cumulus Linux and GNS3 (Part 3). Ideal for networkers to learn Linux.
David Bombal Beginner 9y ago
GNS3 Talks: Learn Linux with Cumulus Linux and GNS3 (Part 2). Ideal for networkers to learn Linux.
Cybersecurity
GNS3 Talks: Learn Linux with Cumulus Linux and GNS3 (Part 2). Ideal for networkers to learn Linux.
David Bombal Beginner 9y ago
How To Change Mac Address In Kali Linux | Macchanger
Cybersecurity ⚡ AI Lesson
How To Change Mac Address In Kali Linux | Macchanger
HackerSploit Beginner 9y ago
GNS3 Talks: Learn Linux with Cumulus Linux and GNS3 (Part 1). Ideal for networkers to learn Linux.
Cybersecurity
GNS3 Talks: Learn Linux with Cumulus Linux and GNS3 (Part 1). Ideal for networkers to learn Linux.
David Bombal Beginner 9y ago
CCNA #055 DHCP Troubleshooting Scenario 2 - Can you find the issue?
Cybersecurity
CCNA #055 DHCP Troubleshooting Scenario 2 - Can you find the issue?
David Bombal Beginner 9y ago
GNS3 Talks: OpenFlow FLOW MOD, PACKET IN, PACKET OUT and more captures using Wireshark and GNS3
Cybersecurity
GNS3 Talks: OpenFlow FLOW MOD, PACKET IN, PACKET OUT and more captures using Wireshark and GNS3
David Bombal Intermediate 9y ago
📚 Coursera Courses Opens on Coursera · Free to audit
1 / 3 View all →
pfSense 2.4.4: Open Source Firewall
📚 Coursera Course ↗
Self-paced
pfSense 2.4.4: Open Source Firewall
Opens on Coursera ↗
AWS Developer: Unit 2
📚 Coursera Course ↗
Self-paced
AWS Developer: Unit 2
Opens on Coursera ↗
Leaders Leap: Transformational Leadership Mindset
📚 Coursera Course ↗
Self-paced
Leaders Leap: Transformational Leadership Mindset
Opens on Coursera ↗
Cybersecurity: Protecting your Information on the Go
📚 Coursera Course ↗
Self-paced
Cybersecurity: Protecting your Information on the Go
Opens on Coursera ↗
CyberSec First Responder – Advanced (CFR-A): Attack
📚 Coursera Course ↗
Self-paced
CyberSec First Responder – Advanced (CFR-A): Attack
Opens on Coursera ↗
Cloud Network Security & Operations
📚 Coursera Course ↗
Self-paced
Cloud Network Security & Operations
Opens on Coursera ↗