Tech Skills

Cybersecurity

Ethical hacking, penetration testing, network security, CTFs and defensive security

6,997
lessons
Skills in this topic
View full skill map →
Security Basics
beginner
Fix OWASP top 10 vulnerabilities
AI Security
intermediate
Identify and patch prompt injection vulnerabilities
Network Security
intermediate
Configure a firewall with proper inbound/outbound rules
Ethical Hacking & Pen Testing
intermediate
Conduct a full pen test with Kali Linux
Cloud Security
intermediate
Implement IAM least-privilege policies on AWS/GCP
Incident Response
intermediate
Build an incident response playbook
Security Compliance
intermediate
Map controls for SOC 2 Type II compliance
Defensive AI
advanced
Build an AI-powered log anomaly detector
What is CTF? An introduction to security Capture The Flag competitions
Cybersecurity
What is CTF? An introduction to security Capture The Flag competitions
LiveOverflow Beginner 9y ago
Abundant Circle Day 4 - Luxury Mastermind For Location Independent Entrepreneurs
Cybersecurity
Abundant Circle Day 4 - Luxury Mastermind For Location Independent Entrepreneurs
Miles Beckler Intermediate 9y ago
Hacking Without Being a Hack (Polymer Summit 2016)
Cybersecurity
Hacking Without Being a Hack (Polymer Summit 2016)
Chrome for Developers Intermediate 9y ago
CS50 VR 2016 - Week 6 - HTTP
Cybersecurity
CS50 VR 2016 - Week 6 - HTTP
CS50 Intermediate 9y ago
Live Hacking - Internetwache CTF 2016 - exp50, exp70, exp80
Cybersecurity ⚡ AI Lesson
Live Hacking - Internetwache CTF 2016 - exp50, exp70, exp80
LiveOverflow Intermediate 9y ago
Getting Started with Metasploit
Cybersecurity ⚡ AI Lesson
Getting Started with Metasploit
Jack Rhysider Beginner 9y ago
CS50 2016 - Week 6 - HTTP
Cybersecurity
CS50 2016 - Week 6 - HTTP
CS50 Beginner 9y ago
New Ideas During My Time Off
Cybersecurity
New Ideas During My Time Off
Flux Academy Beginner 9y ago
My Productivity Hack for Productivity Hacking - Masterminding
Cybersecurity
My Productivity Hack for Productivity Hacking - Masterminding
Miles Beckler Beginner 9y ago
Homemade CTF Challenge: 06 "I lost my password!"
Cybersecurity
Homemade CTF Challenge: 06 "I lost my password!"
John Hammond Intermediate 9y ago
Homemade CTF Challenge: 06 "A Brisk Stroll"
Cybersecurity
Homemade CTF Challenge: 06 "A Brisk Stroll"
John Hammond Intermediate 9y ago
100 Subscriber Q&A! - How I Learned Ethical Hacking
Cybersecurity ⚡ AI Lesson
100 Subscriber Q&A! - How I Learned Ethical Hacking
HackerSploit Beginner 9y ago
How To Install Kali Linux 2.0 On Virtual Box
Cybersecurity ⚡ AI Lesson
How To Install Kali Linux 2.0 On Virtual Box
HackerSploit Intermediate 9y ago
SANS VetSuccess Academy Overview
Cybersecurity ⚡ AI Lesson
SANS VetSuccess Academy Overview
SANS Institute Advanced 10y ago
SANS VetSuccess Academy: Hands-on Skills
Cybersecurity
SANS VetSuccess Academy: Hands-on Skills
SANS Institute Intermediate 10y ago
Diamond Model of Intrusion Analysis - An Overview
Cybersecurity
Diamond Model of Intrusion Analysis - An Overview
Jack Rhysider Beginner 10y ago
SEJ Summit SEO/SEM Conference
Cybersecurity
SEJ Summit SEO/SEM Conference
Search Engine Journal Beginner 10y ago
Running a Buffer Overflow Attack - Computerphile
Cybersecurity ⚡ AI Lesson
Running a Buffer Overflow Attack - Computerphile
Computerphile Intermediate 10y ago
Crisper: Protecting your Polymer app with CSP -- Polycasts #40
Cybersecurity
Crisper: Protecting your Polymer app with CSP -- Polycasts #40
Chrome for Developers Beginner 10y ago
Brain Scanner - Computerphile
Cybersecurity ⚡ AI Lesson
Brain Scanner - Computerphile
Computerphile Intermediate 10y ago
Scripting radare2 with python for dynamic analysis - TUMCTF 2016 Zwiebel part 2
Cybersecurity
Scripting radare2 with python for dynamic analysis - TUMCTF 2016 Zwiebel part 2
LiveOverflow Intermediate 9y ago
Reverse Engineering with Binary Ninja and gdb a key checking algorithm - TUMCTF 2016 Zwiebel part 1
Cybersecurity
Reverse Engineering with Binary Ninja and gdb a key checking algorithm - TUMCTF 2016 Zwiebel part 1
LiveOverflow Intermediate 9y ago
New Sandbox Bypass in 1.4.7 - XSS with AngularJS 0x3
Cybersecurity
New Sandbox Bypass in 1.4.7 - XSS with AngularJS 0x3
LiveOverflow Intermediate 9y ago
Previous Bypass is now fixed in version 1.4.7 - XSS with AngularJS 0x2
Cybersecurity ⚡ AI Lesson
Previous Bypass is now fixed in version 1.4.7 - XSS with AngularJS 0x2
LiveOverflow Intermediate 9y ago
XSS Contexts and some Chrome XSS Auditor tricks - web 0x03
Cybersecurity
XSS Contexts and some Chrome XSS Auditor tricks - web 0x03
LiveOverflow Intermediate 9y ago
Capturing & Analyzing Packets with Saleae Logic Pro 8 - Reverse Engineering A/C Remote part 2
Cybersecurity ⚡ AI Lesson
Capturing & Analyzing Packets with Saleae Logic Pro 8 - Reverse Engineering A/C Remote part 2
LiveOverflow Intermediate 9y ago
Sandbox Bypass in Version 1.0.8 - XSS with AngularJS 0x1
Cybersecurity
Sandbox Bypass in Version 1.0.8 - XSS with AngularJS 0x1
LiveOverflow Intermediate 9y ago
Homemade CTF Challenge: 05 "The Assumption Song"
Cybersecurity
Homemade CTF Challenge: 05 "The Assumption Song"
John Hammond Intermediate 9y ago
Homemade CTF Challenge: 04 "UPX"
Cybersecurity
Homemade CTF Challenge: 04 "UPX"
John Hammond Intermediate 9y ago
Homemade CTF Challenge: 03 "Web Hunt"
Cybersecurity
Homemade CTF Challenge: 03 "Web Hunt"
John Hammond Intermediate 9y ago
Introducing the AngularJS Javascript Framework - XSS with AngularJS 0x00
Cybersecurity
Introducing the AngularJS Javascript Framework - XSS with AngularJS 0x00
LiveOverflow Beginner 9y ago
Homemade CTF Challenge: 02 "Bae's Base"
Cybersecurity
Homemade CTF Challenge: 02 "Bae's Base"
John Hammond Intermediate 9y ago
Homemade CTF Challenge: 01 "Orchestra"
Cybersecurity
Homemade CTF Challenge: 01 "Orchestra"
John Hammond Intermediate 9y ago
Building Poor Man's Logic Analyzer with an Arduino - Reverse Engineering A/C Remote part 1
Cybersecurity
Building Poor Man's Logic Analyzer with an Arduino - Reverse Engineering A/C Remote part 1
LiveOverflow Intermediate 9y ago
A simple Format String exploit example - bin 0x11
Cybersecurity
A simple Format String exploit example - bin 0x11
LiveOverflow Beginner 10y ago
Privacy, Security, Society - Computer Science for Business Leaders 2016
Cybersecurity
Privacy, Security, Society - Computer Science for Business Leaders 2016
CS50 Intermediate 10y ago
Internet Technologies - Computer Science for Business Leaders 2016
Cybersecurity
Internet Technologies - Computer Science for Business Leaders 2016
CS50 Intermediate 10y ago
Live Hacking - Internetwache CTF 2016 - crypto60, crypto70, crypto90
Cybersecurity
Live Hacking - Internetwache CTF 2016 - crypto60, crypto70, crypto90
LiveOverflow Intermediate 10y ago
Python Challenge! 17 COOKIES
Cybersecurity
Python Challenge! 17 COOKIES
John Hammond Intermediate 10y ago
Live Hacking - Internetwache CTF 2016 - web50, web60, web80
Cybersecurity
Live Hacking - Internetwache CTF 2016 - web50, web60, web80
LiveOverflow Intermediate 10y ago
Python 04: PEP8 Coding
Cybersecurity
Python 04: PEP8 Coding
John Hammond Intermediate 10y ago
Arbitrary write with House of Force (heap exploit) - BKPCTF cookbook (pwn 6) part 3
Cybersecurity
Arbitrary write with House of Force (heap exploit) - BKPCTF cookbook (pwn 6) part 3
LiveOverflow Intermediate 10y ago
Leaking Heap and Libc address - BKPCTF cookbook (pwn 6) part 2
Cybersecurity
Leaking Heap and Libc address - BKPCTF cookbook (pwn 6) part 2
LiveOverflow Intermediate 10y ago
Reverse Engineering and identifying Bugs - BKPCTF cookbook (pwn 6) part 1
Cybersecurity ⚡ AI Lesson
Reverse Engineering and identifying Bugs - BKPCTF cookbook (pwn 6) part 1
LiveOverflow Intermediate 10y ago
pwnable.kr - Levels: fd, collision, bof, flag
Cybersecurity ⚡ AI Lesson
pwnable.kr - Levels: fd, collision, bof, flag
LiveOverflow Intermediate 10y ago
Reverse engineering C programs (64bit vs 32bit) - bin 0x10
Cybersecurity ⚡ AI Lesson
Reverse engineering C programs (64bit vs 32bit) - bin 0x10
LiveOverflow Beginner 10y ago
Live Hacking - EFF-CTF 2016 - Level 0-4 (Enigma Conference)
Cybersecurity
Live Hacking - EFF-CTF 2016 - Level 0-4 (Enigma Conference)
LiveOverflow Intermediate 10y ago
Live Hacking - Twitch Recording overthewire.org - Vortex 0x01-0x03 (3h)
Cybersecurity
Live Hacking - Twitch Recording overthewire.org - Vortex 0x01-0x03 (3h)
LiveOverflow Intermediate 10y ago
📚 Coursera Courses Opens on Coursera · Free to audit
1 / 3 View all →
Cloud Network Security & Operations
📚 Coursera Course ↗
Self-paced
Cloud Network Security & Operations
Opens on Coursera ↗
CCNA 200-301 Version 1.1: Unit 6
📚 Coursera Course ↗
Self-paced
CCNA 200-301 Version 1.1: Unit 6
Opens on Coursera ↗
Ethical Hacking and CompTIA PenTest+ V3 (PT0-003) Exam Prep
📚 Coursera Course ↗
Self-paced
Ethical Hacking and CompTIA PenTest+ V3 (PT0-003) Exam Prep
Opens on Coursera ↗
Cybersecurity in Healthcare (Hospitals & Care Centres)
📚 Coursera Course ↗
Self-paced
Cybersecurity in Healthcare (Hospitals & Care Centres)
Opens on Coursera ↗
Systems and Cybersecurity Fundamentals Part 1
📚 Coursera Course ↗
Self-paced
Systems and Cybersecurity Fundamentals Part 1
Opens on Coursera ↗
Introduction to Secure Coding and Input Validation in iOS
📚 Coursera Course ↗
Self-paced
Introduction to Secure Coding and Input Validation in iOS
Opens on Coursera ↗