Tech Skills

Cybersecurity

Ethical hacking, penetration testing, network security, CTFs and defensive security

6,997
lessons
Skills in this topic
View full skill map →
Security Basics
beginner
Fix OWASP top 10 vulnerabilities
AI Security
intermediate
Identify and patch prompt injection vulnerabilities
Network Security
intermediate
Configure a firewall with proper inbound/outbound rules
Ethical Hacking & Pen Testing
intermediate
Conduct a full pen test with Kali Linux
Cloud Security
intermediate
Implement IAM least-privilege policies on AWS/GCP
Incident Response
intermediate
Build an incident response playbook
Security Compliance
intermediate
Map controls for SOC 2 Type II compliance
Defensive AI
advanced
Build an AI-powered log anomaly detector
GNS3 Talks: Packet.net and GNS3 (Part 1): Overview
Cybersecurity
GNS3 Talks: Packet.net and GNS3 (Part 1): Overview
David Bombal Beginner 8y ago
CCIEPython: pyntc: Automate Legacy Devices easily! Python, Netmiko, NAPALM, pyntc, SSH, NETCONF
Cybersecurity
CCIEPython: pyntc: Automate Legacy Devices easily! Python, Netmiko, NAPALM, pyntc, SSH, NETCONF
David Bombal Beginner 8y ago
Hardware Power Glitch Attack (Fault Injection) - rhme2 Fiesta (FI 100)
Cybersecurity ⚡ AI Lesson
Hardware Power Glitch Attack (Fault Injection) - rhme2 Fiesta (FI 100)
LiveOverflow Intermediate 8y ago
Graduation Day - SANS HM Gov Cyber Retraining Academy
Cybersecurity
Graduation Day - SANS HM Gov Cyber Retraining Academy
SANS Institute Beginner 8y ago
How TOR Works- Computerphile
Cybersecurity ⚡ AI Lesson
How TOR Works- Computerphile
Computerphile Intermediate 8y ago
VPN And DNS For Beginners | Kali Linux
Cybersecurity ⚡ AI Lesson
VPN And DNS For Beginners | Kali Linux
HackerSploit Beginner 8y ago
Dealing With Depression & Anxiety In Programming
Cybersecurity ⚡ AI Lesson
Dealing With Depression & Anxiety In Programming
Traversy Media Intermediate 8y ago
Breaking ECDSA (Elliptic Curve Cryptography) - rhme2 Secure Filesystem v1.92r1 (crypto 150)
Cybersecurity ⚡ AI Lesson
Breaking ECDSA (Elliptic Curve Cryptography) - rhme2 Secure Filesystem v1.92r1 (crypto 150)
LiveOverflow Intermediate 9y ago
Learn Web Security with Google (Google I/O '17)
Cybersecurity
Learn Web Security with Google (Google I/O '17)
Chrome for Developers Beginner 9y ago
Multiple Comparisons and Conversion Optimization
Cybersecurity ⚡ AI Lesson
Multiple Comparisons and Conversion Optimization
Data Skeptic Advanced 9y ago
Insecurity - CS50 Live - S3E2
Cybersecurity
Insecurity - CS50 Live - S3E2
CS50 Intermediate 9y ago
Freelance Pricing Strategies
Cybersecurity
Freelance Pricing Strategies
Flux Academy Beginner 9y ago
How To Setup And Use anonsurf On Kali Linux | Stay Anonymous
Cybersecurity ⚡ AI Lesson
How To Setup And Use anonsurf On Kali Linux | Stay Anonymous
HackerSploit Beginner 9y ago
End to End Encryption (E2EE) - Computerphile
Cybersecurity ⚡ AI Lesson
End to End Encryption (E2EE) - Computerphile
Computerphile Beginner 9y ago
CCIEPython: NAPALM: Network Automation, Programmability, Abstraction & Multivendor Python
Cybersecurity
CCIEPython: NAPALM: Network Automation, Programmability, Abstraction & Multivendor Python
David Bombal Beginner 8y ago
CCIEPython: What should I learn? Network Automation?
Cybersecurity
CCIEPython: What should I learn? Network Automation?
David Bombal Beginner 8y ago
CCIEPython: Learn Python programming with David Bombal: Python 2 or Python 3?
Cybersecurity
CCIEPython: Learn Python programming with David Bombal: Python 2 or Python 3?
David Bombal Beginner 8y ago
CCIEPython: Learn Python programming with David Bombal: Python Dictionaries and Netmiko (Part 2)
Cybersecurity
CCIEPython: Learn Python programming with David Bombal: Python Dictionaries and Netmiko (Part 2)
David Bombal Beginner 8y ago
CCIEPython: Learn Python programming with David Bombal: Python Dictionaries and Netmiko (Part 1)
Cybersecurity
CCIEPython: Learn Python programming with David Bombal: Python Dictionaries and Netmiko (Part 1)
David Bombal Beginner 8y ago
GNS3 Talks: How to import Docker containers into GNS3: your own or others available on Docker Hub.
Cybersecurity
GNS3 Talks: How to import Docker containers into GNS3: your own or others available on Docker Hub.
David Bombal Beginner 8y ago
GNS3 Talks: WordPress Docker appliance now available! Add web servers to your GNS3 Topologies.
Cybersecurity
GNS3 Talks: WordPress Docker appliance now available! Add web servers to your GNS3 Topologies.
David Bombal Beginner 8y ago
GNS3 Talks: Docker Ubuntu container not getting DHCP IP address (Part 2 - Windows). Troubleshooting.
Cybersecurity
GNS3 Talks: Docker Ubuntu container not getting DHCP IP address (Part 2 - Windows). Troubleshooting.
David Bombal Beginner 8y ago
GNS3 Talks: Docker Ubuntu container not getting DHCP IP address (Part 1 - MAC). Troubleshooting GNS3
Cybersecurity
GNS3 Talks: Docker Ubuntu container not getting DHCP IP address (Part 1 - MAC). Troubleshooting GNS3
David Bombal Beginner 8y ago
Reversing an unkown digital protocol with an Arduino - rhme2 Whac the mole (misc 200)
Cybersecurity
Reversing an unkown digital protocol with an Arduino - rhme2 Whac the mole (misc 200)
LiveOverflow Intermediate 9y ago
CCNA #087: MPLS Part 4: Core MPLS Labels - CEF, forwarding tables, Wireshark captures, tracing
Cybersecurity
CCNA #087: MPLS Part 4: Core MPLS Labels - CEF, forwarding tables, Wireshark captures, tracing
David Bombal Beginner 9y ago
Blind Buffer Overflow exploitation to leak secret data - rhme2 Animals (pwn 200)
Cybersecurity ⚡ AI Lesson
Blind Buffer Overflow exploitation to leak secret data - rhme2 Animals (pwn 200)
LiveOverflow Intermediate 9y ago
Format string exploit on an arduino - rhme2 Casino (pwn 150)
Cybersecurity ⚡ AI Lesson
Format string exploit on an arduino - rhme2 Casino (pwn 150)
LiveOverflow Intermediate 9y ago
GNS3 Talks: Ostinato Wireshark Captures Part 5: Capture and generate GNS3 switch CDP messages
Cybersecurity
GNS3 Talks: Ostinato Wireshark Captures Part 5: Capture and generate GNS3 switch CDP messages
David Bombal Intermediate 9y ago
GNS3 Talks: Ostinato Wireshark Captures Part 4: Generate packets with COS and DSCP settings
Cybersecurity
GNS3 Talks: Ostinato Wireshark Captures Part 4: Generate packets with COS and DSCP settings
David Bombal Intermediate 9y ago
GNS3 Talks: Ostinato Wireshark Captures Part 3: Capture IP Phone CDP messages & craft your own
Cybersecurity
GNS3 Talks: Ostinato Wireshark Captures Part 3: Capture IP Phone CDP messages & craft your own
David Bombal Intermediate 9y ago
GNS3 Talks: Ostinato Wireshark Captures Part 2: Capture IP Phone CDP messages & craft your own
Cybersecurity
GNS3 Talks: Ostinato Wireshark Captures Part 2: Capture IP Phone CDP messages & craft your own
David Bombal Intermediate 9y ago
GNS3 Talks: Ostinato Wireshark Captures Part 1: Capture STP BPDUs & craft own (Ostinato Part 10)
Cybersecurity
GNS3 Talks: Ostinato Wireshark Captures Part 1: Capture STP BPDUs & craft own (Ostinato Part 10)
David Bombal Intermediate 9y ago
Recover RSA private key from public keys - rhme2 Key Server (crypto 200)
Cybersecurity
Recover RSA private key from public keys - rhme2 Key Server (crypto 200)
LiveOverflow Intermediate 9y ago
CCNA #069 MAC Address troubleshooting scenario 1: Can you find the issue?
Cybersecurity
CCNA #069 MAC Address troubleshooting scenario 1: Can you find the issue?
David Bombal Beginner 9y ago
Defeat a stack cookie with bruteforce - rhme2 Photo manager (pwn 100)
Cybersecurity
Defeat a stack cookie with bruteforce - rhme2 Photo manager (pwn 100)
LiveOverflow Intermediate 9y ago
GNS3 Talks: Stop BPDUs from Ostinato breaking STP using STP Root Guard (Ostinato Part 9)
Cybersecurity
GNS3 Talks: Stop BPDUs from Ostinato breaking STP using STP Root Guard (Ostinato Part 9)
David Bombal Intermediate 9y ago
GNS3 Talks: Make your PC the Spanning Tree Root by crafting BPDUs with Ostinato (Ostinato Part 8)
Cybersecurity
GNS3 Talks: Make your PC the Spanning Tree Root by crafting BPDUs with Ostinato (Ostinato Part 8)
David Bombal Intermediate 9y ago
GNS3 Talks: Learn Linux with Cumulus Linux and GNS3 (Part 3). Ideal for networkers to learn Linux.
Cybersecurity
GNS3 Talks: Learn Linux with Cumulus Linux and GNS3 (Part 3). Ideal for networkers to learn Linux.
David Bombal Beginner 9y ago
GNS3 Talks: Learn Linux with Cumulus Linux and GNS3 (Part 2). Ideal for networkers to learn Linux.
Cybersecurity
GNS3 Talks: Learn Linux with Cumulus Linux and GNS3 (Part 2). Ideal for networkers to learn Linux.
David Bombal Beginner 9y ago
How To Change Mac Address In Kali Linux | Macchanger
Cybersecurity ⚡ AI Lesson
How To Change Mac Address In Kali Linux | Macchanger
HackerSploit Beginner 9y ago
GNS3 Talks: Learn Linux with Cumulus Linux and GNS3 (Part 1). Ideal for networkers to learn Linux.
Cybersecurity
GNS3 Talks: Learn Linux with Cumulus Linux and GNS3 (Part 1). Ideal for networkers to learn Linux.
David Bombal Beginner 9y ago
CCNA #055 DHCP Troubleshooting Scenario 2 - Can you find the issue?
Cybersecurity
CCNA #055 DHCP Troubleshooting Scenario 2 - Can you find the issue?
David Bombal Beginner 9y ago
GNS3 Talks: OpenFlow FLOW MOD, PACKET IN, PACKET OUT and more captures using Wireshark and GNS3
Cybersecurity
GNS3 Talks: OpenFlow FLOW MOD, PACKET IN, PACKET OUT and more captures using Wireshark and GNS3
David Bombal Intermediate 9y ago
GNS3 Talks: OpenFlow captures using Wireshark, Docker containers, OpenDaylight, SDN
Cybersecurity
GNS3 Talks: OpenFlow captures using Wireshark, Docker containers, OpenDaylight, SDN
David Bombal Beginner 9y ago
GNS3 Talks: Ostinato Packet Generator - double tag 802.1Q frames for VLAN hopping (Ostinato Part 7)
Cybersecurity
GNS3 Talks: Ostinato Packet Generator - double tag 802.1Q frames for VLAN hopping (Ostinato Part 7)
David Bombal Intermediate 9y ago
GNS3 Talks: Ostinato Packet Generator - Inject 802.1Q frames for VLAN hopping (Ostinato Part 6)
Cybersecurity
GNS3 Talks: Ostinato Packet Generator - Inject 802.1Q frames for VLAN hopping (Ostinato Part 6)
David Bombal Intermediate 9y ago
CCNA #052 Campus troubleshooting scenario 3: Can you find the issue?
Cybersecurity
CCNA #052 Campus troubleshooting scenario 3: Can you find the issue?
David Bombal Beginner 9y ago
How To Setup Proxychains In Kali Linux - #2 - Change Your IP
Cybersecurity ⚡ AI Lesson
How To Setup Proxychains In Kali Linux - #2 - Change Your IP
HackerSploit Intermediate 9y ago
📚 Coursera Courses Opens on Coursera · Free to audit
1 / 3 View all →
Advanced Networking, Security, and IT Operations
📚 Coursera Course ↗
Self-paced
Advanced Networking, Security, and IT Operations
Opens on Coursera ↗
AWS: Infrastructure Security
📚 Coursera Course ↗
Self-paced
AWS: Infrastructure Security
Opens on Coursera ↗
Industrial IoT Markets and Security
📚 Coursera Course ↗
Self-paced
Industrial IoT Markets and Security
Opens on Coursera ↗
Palo Alto Networks Cybersecurity Fundamentals
📚 Coursera Course ↗
Self-paced
Palo Alto Networks Cybersecurity Fundamentals
Opens on Coursera ↗
Identifying Security Vulnerabilities
📚 Coursera Course ↗
Self-paced
Identifying Security Vulnerabilities
Opens on Coursera ↗
AWS: Threat Detection, Logging and Monitoring
📚 Coursera Course ↗
Self-paced
AWS: Threat Detection, Logging and Monitoring
Opens on Coursera ↗