Tech Skills

Cybersecurity

Ethical hacking, penetration testing, network security, CTFs and defensive security

7,050
lessons
Skills in this topic
View full skill map →
Security Basics
beginner
Fix OWASP top 10 vulnerabilities
AI Security
intermediate
Identify and patch prompt injection vulnerabilities
Network Security
intermediate
Configure a firewall with proper inbound/outbound rules
Ethical Hacking & Pen Testing
intermediate
Conduct a full pen test with Kali Linux
Cloud Security
intermediate
Implement IAM least-privilege policies on AWS/GCP
Incident Response
intermediate
Build an incident response playbook
Security Compliance
intermediate
Map controls for SOC 2 Type II compliance
Defensive AI
advanced
Build an AI-powered log anomaly detector
GNS3 Talks: Use the NAT node to connect GNS3 to the Internet easily!
Cybersecurity
GNS3 Talks: Use the NAT node to connect GNS3 to the Internet easily!
David Bombal Beginner 9y ago
GNS3 Cisco CSR 1000v setup and configuration Part 2: GNS3 NFV
Cybersecurity
GNS3 Cisco CSR 1000v setup and configuration Part 2: GNS3 NFV
David Bombal Beginner 9y ago
The 3 Phases Of A Successful Online Business - Powerful Concept From Funnel Hacking Live 2017
Cybersecurity
The 3 Phases Of A Successful Online Business - Powerful Concept From Funnel Hacking Live 2017
Miles Beckler Intermediate 9y ago
Complete Ethical Hacking Course #2 - Installing Kali Linux
Cybersecurity ⚡ AI Lesson
Complete Ethical Hacking Course #2 - Installing Kali Linux
HackerSploit Beginner 9y ago
Complete Ethical Hacking Course - Become a Hacker Today - #1 Hacking Terminology
Cybersecurity ⚡ AI Lesson
Complete Ethical Hacking Course - Become a Hacker Today - #1 Hacking Terminology
HackerSploit Beginner 9y ago
GynvaelEN Hacking Livestreams and how stack cookies work
Cybersecurity
GynvaelEN Hacking Livestreams and how stack cookies work
LiveOverflow Intermediate 9y ago
Bash injection without letters or numbers - 33c3ctf hohoho (misc 350)
Cybersecurity
Bash injection without letters or numbers - 33c3ctf hohoho (misc 350)
LiveOverflow Intermediate 9y ago
CS50 VR 2016 - Week 9 - SQL
Cybersecurity
CS50 VR 2016 - Week 9 - SQL
CS50 Intermediate 9y ago
Juniors CTF 2016 :: Oh SSH!
Cybersecurity
Juniors CTF 2016 :: Oh SSH!
John Hammond Intermediate 9y ago
Juniors CTF 2016 :: Restriced Area
Cybersecurity
Juniors CTF 2016 :: Restriced Area
John Hammond Intermediate 9y ago
GNS3 Cisco CSR 1000v setup and configuration Part 1: GNS3 NFV
Cybersecurity
GNS3 Cisco CSR 1000v setup and configuration Part 1: GNS3 NFV
David Bombal Beginner 9y ago
GNS3 Nexus (NX-OSv) switch setup and configuration Part 2: GNS3 switching options Part 13
Cybersecurity
GNS3 Nexus (NX-OSv) switch setup and configuration Part 2: GNS3 switching options Part 13
David Bombal Beginner 9y ago
GNS3 Nexus (NX-OSv) switch setup and configuration Part 1: GNS3 switching options Part 12
Cybersecurity
GNS3 Nexus (NX-OSv) switch setup and configuration Part 1: GNS3 switching options Part 12
David Bombal Beginner 9y ago
GNS3 switching setup and options Part 6: Etherswitch, Wireshark, 802.1Q, InterVLAN routing
Cybersecurity
GNS3 switching setup and options Part 6: Etherswitch, Wireshark, 802.1Q, InterVLAN routing
David Bombal Beginner 9y ago
GNS3 switching setup and options Part 5: Etherswitch Router for Cisco Dynamips Part 2
Cybersecurity
GNS3 switching setup and options Part 5: Etherswitch Router for Cisco Dynamips Part 2
David Bombal Beginner 9y ago
GNS3 switching setup and options Part 4: Etherswitch Router for Cisco Dynamips Part 1
Cybersecurity
GNS3 switching setup and options Part 4: Etherswitch Router for Cisco Dynamips Part 1
David Bombal Beginner 9y ago
GNS3 switching setup and options Part 3: Router on a sick with GNS3 unmanaged built-in switch
Cybersecurity
GNS3 switching setup and options Part 3: Router on a sick with GNS3 unmanaged built-in switch
David Bombal Beginner 9y ago
GNS3 switching setup and options Part 2: GNS3 unmanaged built-in switch
Cybersecurity
GNS3 switching setup and options Part 2: GNS3 unmanaged built-in switch
David Bombal Beginner 9y ago
GNS3 switching setup and options: Cisco and other switching options in GNS3
Cybersecurity
GNS3 switching setup and options: Cisco and other switching options in GNS3
David Bombal Beginner 9y ago
GNS3 : How to download Cisco IOS images and VIRL images. Which is the best? How do you get them?
Cybersecurity
GNS3 : How to download Cisco IOS images and VIRL images. Which is the best? How do you get them?
David Bombal Intermediate 9y ago
CCNA #023 EIGRP Neighbor Troubleshooting (DUAL Issues) for the CCNA 200-125 Exam
Cybersecurity
CCNA #023 EIGRP Neighbor Troubleshooting (DUAL Issues) for the CCNA 200-125 Exam
David Bombal Beginner 9y ago
[Live] A basic Heap Feng Shui intro - 33c3ctf babyfengshui (pwn 150)
Cybersecurity
[Live] A basic Heap Feng Shui intro - 33c3ctf babyfengshui (pwn 150)
LiveOverflow Beginner 9y ago
CCNA #019: Spanning Tree CCNA Exam Questions: Root Bridge, Root Port and more: CCNA 200-125 exam
Cybersecurity
CCNA #019: Spanning Tree CCNA Exam Questions: Root Bridge, Root Port and more: CCNA 200-125 exam
David Bombal Beginner 9y ago
PHP include and bypass SSRF protection with two DNS A records - 33c3ctf list0r (web 400)
Cybersecurity
PHP include and bypass SSRF protection with two DNS A records - 33c3ctf list0r (web 400)
LiveOverflow Beginner 9y ago
CCNA #013: Spanning Tree CCNA Exam Questions: Know the answer? CCNA 200-125 exam
Cybersecurity
CCNA #013: Spanning Tree CCNA Exam Questions: Know the answer? CCNA 200-125 exam
David Bombal Beginner 9y ago
CCNA #012: Learn SNMP with GNS3, Wireshark and Solarwinds NPM - CCNA 200-125 exam
Cybersecurity
CCNA #012: Learn SNMP with GNS3, Wireshark and Solarwinds NPM - CCNA 200-125 exam
David Bombal Beginner 9y ago
Format String to dump binary and gain RCE - 33c3ctf ESPR (pwn 150)
Cybersecurity
Format String to dump binary and gain RCE - 33c3ctf ESPR (pwn 150)
LiveOverflow Intermediate 9y ago
How to learn hacking? ft. Rubber Ducky
Cybersecurity
How to learn hacking? ft. Rubber Ducky
LiveOverflow Beginner 9y ago
How to Access the Deep Web Safely | Deep Web Starter Guide 1.0
Cybersecurity ⚡ AI Lesson
How to Access the Deep Web Safely | Deep Web Starter Guide 1.0
HackerSploit Beginner 9y ago
Rooting a CTF server to get all the flags with Dirty COW - CVE-2016-5195
Cybersecurity
Rooting a CTF server to get all the flags with Dirty COW - CVE-2016-5195
LiveOverflow Intermediate 9y ago
GNS3 Talks: GNS3 version 1.5.X Appliance Tips
Cybersecurity
GNS3 Talks: GNS3 version 1.5.X Appliance Tips
David Bombal Intermediate 9y ago
Riscure Embedded Hardware CTF setup and introduction - rhme2 Soldering
Cybersecurity
Riscure Embedded Hardware CTF setup and introduction - rhme2 Soldering
LiveOverflow Beginner 9y ago
Juniors CTF 2016 :: Stop Thief!
Cybersecurity
Juniors CTF 2016 :: Stop Thief!
John Hammond Intermediate 9y ago
Juniors CTF 2016 :: ROFL
Cybersecurity
Juniors CTF 2016 :: ROFL
John Hammond Intermediate 9y ago
Juniors CTF 2016 :: The Good, The Bad and The Junkman
Cybersecurity
Juniors CTF 2016 :: The Good, The Bad and The Junkman
John Hammond Intermediate 9y ago
Juniors CTF 2016 :: Voting!!!
Cybersecurity
Juniors CTF 2016 :: Voting!!!
John Hammond Intermediate 9y ago
Juniors CTF 2016 :: Hackers Blog
Cybersecurity
Juniors CTF 2016 :: Hackers Blog
John Hammond Intermediate 9y ago
TCP Protocol introduction - bin 0x1A
Cybersecurity ⚡ AI Lesson
TCP Protocol introduction - bin 0x1A
LiveOverflow Beginner 9y ago
Juniors CTF 2016 :: Dirty Repo
Cybersecurity
Juniors CTF 2016 :: Dirty Repo
John Hammond Intermediate 9y ago
Juniors CTF 2016 :: Clone Attack
Cybersecurity
Juniors CTF 2016 :: Clone Attack
John Hammond Intermediate 9y ago
Juniors CTF 2016 :: Southern Cross
Cybersecurity
Juniors CTF 2016 :: Southern Cross
John Hammond Intermediate 9y ago
Juniors CTF 2016 :: Here Goes!
Cybersecurity
Juniors CTF 2016 :: Here Goes!
John Hammond Intermediate 9y ago
Juniors CTF 2016 :: Lost Code
Cybersecurity
Juniors CTF 2016 :: Lost Code
John Hammond Intermediate 9y ago
Juniors CTF 2016 :: Six Strange Tales
Cybersecurity
Juniors CTF 2016 :: Six Strange Tales
John Hammond Intermediate 9y ago
Juniors CTF 2016 :: Black Suprematic Square
Cybersecurity
Juniors CTF 2016 :: Black Suprematic Square
John Hammond Intermediate 9y ago
MD5 Length Extension and Blind SQL Injection - BruCON CTF part 3
Cybersecurity
MD5 Length Extension and Blind SQL Injection - BruCON CTF part 3
LiveOverflow Beginner 9y ago
int0x80 from DualCore lent me his lockpicking set and I'm a horse - BruCON CTF part 2
Cybersecurity
int0x80 from DualCore lent me his lockpicking set and I'm a horse - BruCON CTF part 2
LiveOverflow Intermediate 9y ago
BlackArch Linux Review - Better Than Kali Linux?
Cybersecurity ⚡ AI Lesson
BlackArch Linux Review - Better Than Kali Linux?
HackerSploit Beginner 9y ago
📚 Coursera Courses Opens on Coursera · Free to audit
1 / 3 View all →
Implementing a Risk Management Framework
📚 Coursera Course ↗
Self-paced
Implementing a Risk Management Framework
Opens on Coursera ↗
Python Cryptography: Build & Explore Classical Ciphers
📚 Coursera Course ↗
Self-paced
Python Cryptography: Build & Explore Classical Ciphers
Opens on Coursera ↗
Endpoint Detection and Response Essentials
📚 Coursera Course ↗
Self-paced
Endpoint Detection and Response Essentials
Opens on Coursera ↗
Cryptography
📚 Coursera Course ↗
Self-paced
Cryptography
Opens on Coursera ↗
Information Security Foundations
📚 Coursera Course ↗
Self-paced
Information Security Foundations
Opens on Coursera ↗
The Absolute Beginners Guide to Cyber Security - Part 4
📚 Coursera Course ↗
Self-paced
The Absolute Beginners Guide to Cyber Security - Part 4
Opens on Coursera ↗