Tech Skills

Cybersecurity

Ethical hacking, penetration testing, network security, CTFs and defensive security

7,050
lessons
Skills in this topic
View full skill map →
Security Basics
beginner
Fix OWASP top 10 vulnerabilities
AI Security
intermediate
Identify and patch prompt injection vulnerabilities
Network Security
intermediate
Configure a firewall with proper inbound/outbound rules
Ethical Hacking & Pen Testing
intermediate
Conduct a full pen test with Kali Linux
Cloud Security
intermediate
Implement IAM least-privilege policies on AWS/GCP
Incident Response
intermediate
Build an incident response playbook
Security Compliance
intermediate
Map controls for SOC 2 Type II compliance
Defensive AI
advanced
Build an AI-powered log anomaly detector
Simple reversing challenge and gaming the system - BruCON CTF part 1
Cybersecurity
Simple reversing challenge and gaming the system - BruCON CTF part 1
LiveOverflow Beginner 9y ago
Hack The Vote 2016 CTF Warpspeed [forensics150]
Cybersecurity
Hack The Vote 2016 CTF Warpspeed [forensics150]
John Hammond Intermediate 9y ago
Hack The Vote 2016 CTF: Sander's Fan Club [web100]
Cybersecurity
Hack The Vote 2016 CTF: Sander's Fan Club [web100]
John Hammond Intermediate 9y ago
What is CTF? An introduction to security Capture The Flag competitions
Cybersecurity
What is CTF? An introduction to security Capture The Flag competitions
LiveOverflow Beginner 9y ago
Abundant Circle Day 4 - Luxury Mastermind For Location Independent Entrepreneurs
Cybersecurity
Abundant Circle Day 4 - Luxury Mastermind For Location Independent Entrepreneurs
Miles Beckler Intermediate 9y ago
Hacking Without Being a Hack (Polymer Summit 2016)
Cybersecurity
Hacking Without Being a Hack (Polymer Summit 2016)
Chrome for Developers Intermediate 9y ago
CS50 VR 2016 - Week 6 - HTTP
Cybersecurity
CS50 VR 2016 - Week 6 - HTTP
CS50 Intermediate 9y ago
Getting Started with Metasploit
Cybersecurity ⚡ AI Lesson
Getting Started with Metasploit
Jack Rhysider Beginner 9y ago
CS50 2016 - Week 6 - HTTP
Cybersecurity
CS50 2016 - Week 6 - HTTP
CS50 Beginner 9y ago
New Ideas During My Time Off
Cybersecurity
New Ideas During My Time Off
Flux Academy Beginner 9y ago
My Productivity Hack for Productivity Hacking - Masterminding
Cybersecurity
My Productivity Hack for Productivity Hacking - Masterminding
Miles Beckler Beginner 9y ago
100 Subscriber Q&A! - How I Learned Ethical Hacking
Cybersecurity ⚡ AI Lesson
100 Subscriber Q&A! - How I Learned Ethical Hacking
HackerSploit Beginner 9y ago
How To Install Kali Linux 2.0 On Virtual Box
Cybersecurity ⚡ AI Lesson
How To Install Kali Linux 2.0 On Virtual Box
HackerSploit Intermediate 10y ago
SANS VetSuccess Academy Overview
Cybersecurity ⚡ AI Lesson
SANS VetSuccess Academy Overview
SANS Institute Advanced 10y ago
SANS VetSuccess Academy: Hands-on Skills
Cybersecurity
SANS VetSuccess Academy: Hands-on Skills
SANS Institute Intermediate 10y ago
Diamond Model of Intrusion Analysis - An Overview
Cybersecurity
Diamond Model of Intrusion Analysis - An Overview
Jack Rhysider Beginner 10y ago
SEJ Summit SEO/SEM Conference
Cybersecurity
SEJ Summit SEO/SEM Conference
Search Engine Journal Beginner 10y ago
Running a Buffer Overflow Attack - Computerphile
Cybersecurity ⚡ AI Lesson
Running a Buffer Overflow Attack - Computerphile
Computerphile Intermediate 10y ago
misc50 : Hidden inside EKO :: EKOPARTY CTF 2016
Cybersecurity
misc50 : Hidden inside EKO :: EKOPARTY CTF 2016
John Hammond Intermediate 9y ago
web50 : RFC 7230 :: EKOPARTY CTF 2016
Cybersecurity
web50 : RFC 7230 :: EKOPARTY CTF 2016
John Hammond Intermediate 9y ago
web25 :: Mr. Robot : EKOPARTY CTF 2016
Cybersecurity
web25 :: Mr. Robot : EKOPARTY CTF 2016
John Hammond Intermediate 9y ago
Live Hacking - Internetwache CTF 2016 - exp50, exp70, exp80
Cybersecurity ⚡ AI Lesson
Live Hacking - Internetwache CTF 2016 - exp50, exp70, exp80
LiveOverflow Intermediate 9y ago
Scripting radare2 with python for dynamic analysis - TUMCTF 2016 Zwiebel part 2
Cybersecurity
Scripting radare2 with python for dynamic analysis - TUMCTF 2016 Zwiebel part 2
LiveOverflow Intermediate 9y ago
Reverse Engineering with Binary Ninja and gdb a key checking algorithm - TUMCTF 2016 Zwiebel part 1
Cybersecurity
Reverse Engineering with Binary Ninja and gdb a key checking algorithm - TUMCTF 2016 Zwiebel part 1
LiveOverflow Intermediate 9y ago
New Sandbox Bypass in 1.4.7 - XSS with AngularJS 0x3
Cybersecurity
New Sandbox Bypass in 1.4.7 - XSS with AngularJS 0x3
LiveOverflow Intermediate 9y ago
Previous Bypass is now fixed in version 1.4.7 - XSS with AngularJS 0x2
Cybersecurity ⚡ AI Lesson
Previous Bypass is now fixed in version 1.4.7 - XSS with AngularJS 0x2
LiveOverflow Intermediate 9y ago
XSS Contexts and some Chrome XSS Auditor tricks - web 0x03
Cybersecurity
XSS Contexts and some Chrome XSS Auditor tricks - web 0x03
LiveOverflow Intermediate 9y ago
Homemade CTF Challenge: 06 "I lost my password!"
Cybersecurity
Homemade CTF Challenge: 06 "I lost my password!"
John Hammond Intermediate 9y ago
Capturing & Analyzing Packets with Saleae Logic Pro 8 - Reverse Engineering A/C Remote part 2
Cybersecurity ⚡ AI Lesson
Capturing & Analyzing Packets with Saleae Logic Pro 8 - Reverse Engineering A/C Remote part 2
LiveOverflow Intermediate 9y ago
Homemade CTF Challenge: 06 "A Brisk Stroll"
Cybersecurity
Homemade CTF Challenge: 06 "A Brisk Stroll"
John Hammond Intermediate 9y ago
Sandbox Bypass in Version 1.0.8 - XSS with AngularJS 0x1
Cybersecurity
Sandbox Bypass in Version 1.0.8 - XSS with AngularJS 0x1
LiveOverflow Intermediate 9y ago
Homemade CTF Challenge: 05 "The Assumption Song"
Cybersecurity
Homemade CTF Challenge: 05 "The Assumption Song"
John Hammond Intermediate 9y ago
Homemade CTF Challenge: 04 "UPX"
Cybersecurity
Homemade CTF Challenge: 04 "UPX"
John Hammond Intermediate 9y ago
Homemade CTF Challenge: 03 "Web Hunt"
Cybersecurity
Homemade CTF Challenge: 03 "Web Hunt"
John Hammond Intermediate 9y ago
Introducing the AngularJS Javascript Framework - XSS with AngularJS 0x00
Cybersecurity
Introducing the AngularJS Javascript Framework - XSS with AngularJS 0x00
LiveOverflow Beginner 9y ago
Homemade CTF Challenge: 02 "Bae's Base"
Cybersecurity
Homemade CTF Challenge: 02 "Bae's Base"
John Hammond Intermediate 9y ago
Homemade CTF Challenge: 01 "Orchestra"
Cybersecurity
Homemade CTF Challenge: 01 "Orchestra"
John Hammond Intermediate 9y ago
Building Poor Man's Logic Analyzer with an Arduino - Reverse Engineering A/C Remote part 1
Cybersecurity
Building Poor Man's Logic Analyzer with an Arduino - Reverse Engineering A/C Remote part 1
LiveOverflow Intermediate 9y ago
A simple Format String exploit example - bin 0x11
Cybersecurity
A simple Format String exploit example - bin 0x11
LiveOverflow Beginner 10y ago
Privacy, Security, Society - Computer Science for Business Leaders 2016
Cybersecurity
Privacy, Security, Society - Computer Science for Business Leaders 2016
CS50 Intermediate 10y ago
Internet Technologies - Computer Science for Business Leaders 2016
Cybersecurity
Internet Technologies - Computer Science for Business Leaders 2016
CS50 Intermediate 10y ago
Live Hacking - Internetwache CTF 2016 - crypto60, crypto70, crypto90
Cybersecurity
Live Hacking - Internetwache CTF 2016 - crypto60, crypto70, crypto90
LiveOverflow Intermediate 10y ago
Python Challenge! 17 COOKIES
Cybersecurity
Python Challenge! 17 COOKIES
John Hammond Intermediate 10y ago
Live Hacking - Internetwache CTF 2016 - web50, web60, web80
Cybersecurity
Live Hacking - Internetwache CTF 2016 - web50, web60, web80
LiveOverflow Intermediate 10y ago
Python 04: PEP8 Coding
Cybersecurity
Python 04: PEP8 Coding
John Hammond Intermediate 10y ago
Arbitrary write with House of Force (heap exploit) - BKPCTF cookbook (pwn 6) part 3
Cybersecurity
Arbitrary write with House of Force (heap exploit) - BKPCTF cookbook (pwn 6) part 3
LiveOverflow Intermediate 10y ago
Leaking Heap and Libc address - BKPCTF cookbook (pwn 6) part 2
Cybersecurity
Leaking Heap and Libc address - BKPCTF cookbook (pwn 6) part 2
LiveOverflow Intermediate 10y ago
Reverse Engineering and identifying Bugs - BKPCTF cookbook (pwn 6) part 1
Cybersecurity ⚡ AI Lesson
Reverse Engineering and identifying Bugs - BKPCTF cookbook (pwn 6) part 1
LiveOverflow Intermediate 10y ago
📚 Coursera Courses Opens on Coursera · Free to audit
1 / 3 View all →
Empower Patients: Autonomy Through Simulation and Role-Play
📚 Coursera Course ↗
Self-paced
Empower Patients: Autonomy Through Simulation and Role-Play
Opens on Coursera ↗
Physical Red Teaming
📚 Coursera Course ↗
Self-paced
Physical Red Teaming
Opens on Coursera ↗
Mastering BFSI Interviews: Resumes & Mock Interviews
📚 Coursera Course ↗
Self-paced
Mastering BFSI Interviews: Resumes & Mock Interviews
Opens on Coursera ↗
Malware Analysis and Introduction to Assembly Language
📚 Coursera Course ↗
Self-paced
Malware Analysis and Introduction to Assembly Language
Opens on Coursera ↗
Identifying Security Vulnerabilities
📚 Coursera Course ↗
Self-paced
Identifying Security Vulnerabilities
Opens on Coursera ↗
Web Application Security Testing with Google Hacking
📚 Coursera Course ↗
Self-paced
Web Application Security Testing with Google Hacking
Opens on Coursera ↗