Tech Skills

Cybersecurity

Ethical hacking, penetration testing, network security, CTFs and defensive security

6357
lessons
Diamond Model of Intrusion Analysis - An Overview
🔐 Cybersecurity
Diamond Model of Intrusion Analysis - An Overview
Jack Rhysider Beginner 9y ago
A simple Format String exploit example - bin 0x11
🔐 Cybersecurity
A simple Format String exploit example - bin 0x11
LiveOverflow Beginner 9y ago
LASACTF: "Postman" Challenge
🔐 Cybersecurity
LASACTF: "Postman" Challenge
John Hammond Intermediate 10y ago
LASACTF: "Pixels" Challenge
🔐 Cybersecurity
LASACTF: "Pixels" Challenge
John Hammond Intermediate 10y ago
Privacy, Security, Society - Computer Science for Business Leaders 2016
🔐 Cybersecurity
Privacy, Security, Society - Computer Science for Business Leaders 2016
CS50 Intermediate 10y ago
Internet Technologies - Computer Science for Business Leaders 2016
🔐 Cybersecurity
Internet Technologies - Computer Science for Business Leaders 2016
CS50 Intermediate 10y ago
Live Hacking - Internetwache CTF 2016 - crypto60, crypto70, crypto90
🔐 Cybersecurity
Live Hacking - Internetwache CTF 2016 - crypto60, crypto70, crypto90
LiveOverflow Intermediate 10y ago
SEJ Summit SEO/SEM Conference
🔐 Cybersecurity
SEJ Summit SEO/SEM Conference
Search Engine Journal Beginner 10y ago
Running a Buffer Overflow Attack - Computerphile
🔐 Cybersecurity
Running a Buffer Overflow Attack - Computerphile
Computerphile Intermediate 10y ago
SANS VetSuccess Academy: War for Cyber Talent
🔐 Cybersecurity
SANS VetSuccess Academy: War for Cyber Talent
SANS Institute Advanced 10y ago
LASACTF: "Client Side" Challenge
🔐 Cybersecurity
LASACTF: "Client Side" Challenge
John Hammond Intermediate 10y ago
LASACTF: "Lost Extensions" Challenge
🔐 Cybersecurity
LASACTF: "Lost Extensions" Challenge
John Hammond Intermediate 10y ago
Python Challenge! 18 What's the difference?!
🔐 Cybersecurity
Python Challenge! 18 What's the difference?!
John Hammond Intermediate 10y ago
LASACTF: "Easy Symbols" (Script)
🔐 Cybersecurity
LASACTF: "Easy Symbols" (Script)
John Hammond Beginner 10y ago
LASACTF: "Easy Symbols" Challenge
🔐 Cybersecurity
LASACTF: "Easy Symbols" Challenge
John Hammond Beginner 10y ago
LASACTF: "Grep Request" (Script)
🔐 Cybersecurity
LASACTF: "Grep Request" (Script)
John Hammond Intermediate 10y ago
Python Challenge! 17 COOKIES
🔐 Cybersecurity
Python Challenge! 17 COOKIES
John Hammond Intermediate 10y ago
LASACTF: "Grep Request" Challenge
🔐 Cybersecurity
LASACTF: "Grep Request" Challenge
John Hammond Intermediate 10y ago
LASACTF: "Four Oh Four" Challenge
🔐 Cybersecurity
LASACTF: "Four Oh Four" Challenge
John Hammond Intermediate 10y ago
Python Challenge! 16: MOZART
🔐 Cybersecurity
Python Challenge! 16: MOZART
John Hammond Intermediate 10y ago
LASACTF: "R3ndom Eye" Challenge
🔐 Cybersecurity
LASACTF: "R3ndom Eye" Challenge
John Hammond Intermediate 10y ago
LASACTF: "Shifty Letters" Challenge
🔐 Cybersecurity
LASACTF: "Shifty Letters" Challenge
John Hammond Intermediate 10y ago
LASACTF: "Easy" Challenge
🔐 Cybersecurity
LASACTF: "Easy" Challenge
John Hammond Beginner 10y ago
05 SOLUTION: Hazy Days
🔐 Cybersecurity
05 SOLUTION: Hazy Days
John Hammond Intermediate 10y ago
05 CHALLENGE: Hazy Days
🔐 Cybersecurity
05 CHALLENGE: Hazy Days
John Hammond Intermediate 10y ago
04 SOLUTION: Spelling States
🔐 Cybersecurity
04 SOLUTION: Spelling States
John Hammond Intermediate 10y ago
04 CHALLENGE: Spelling States
🔐 Cybersecurity
04 CHALLENGE: Spelling States
John Hammond Intermediate 10y ago
03 SOLUTION: Dog Showdown
🔐 Cybersecurity
03 SOLUTION: Dog Showdown
John Hammond Intermediate 10y ago
03 CHALLENGE: Dog Showdown
🔐 Cybersecurity
03 CHALLENGE: Dog Showdown
John Hammond Intermediate 10y ago
02 SOLUTION: Missing Numbers
🔐 Cybersecurity
02 SOLUTION: Missing Numbers
John Hammond Intermediate 10y ago
02 CHALLENGE: Missing Numbers
🔐 Cybersecurity
02 CHALLENGE: Missing Numbers
John Hammond Intermediate 10y ago
01 SOLUTION: Word Find
🔐 Cybersecurity
01 SOLUTION: Word Find
John Hammond Intermediate 10y ago
Live Hacking - Internetwache CTF 2016 - web50, web60, web80
🔐 Cybersecurity
Live Hacking - Internetwache CTF 2016 - web50, web60, web80
LiveOverflow Intermediate 10y ago
01 CHALLENGE: Word Find
🔐 Cybersecurity
01 CHALLENGE: Word Find
John Hammond Intermediate 10y ago
Template BASH Script
🔐 Cybersecurity
Template BASH Script
John Hammond Intermediate 10y ago
Creating a BitBucket Repository
🔐 Cybersecurity
Creating a BitBucket Repository
John Hammond Intermediate 10y ago
LaTeX 01: Text Formatting
🔐 Cybersecurity
LaTeX 01: Text Formatting
John Hammond Intermediate 10y ago
EASY Caesar Cipher in Python
🔐 Cybersecurity
EASY Caesar Cipher in Python
John Hammond Beginner 10y ago
LaTeX 00: Hello World!
🔐 Cybersecurity
LaTeX 00: Hello World!
John Hammond Intermediate 10y ago
Python 04: PEP8 Coding
🔐 Cybersecurity
Python 04: PEP8 Coding
John Hammond Intermediate 10y ago
Arbitrary write with House of Force (heap exploit) - BKPCTF cookbook (pwn 6) part 3
🔐 Cybersecurity
Arbitrary write with House of Force (heap exploit) - BKPCTF cookbook (pwn 6) part 3
LiveOverflow Intermediate 10y ago
Leaking Heap and Libc address - BKPCTF cookbook (pwn 6) part 2
🔐 Cybersecurity
Leaking Heap and Libc address - BKPCTF cookbook (pwn 6) part 2
LiveOverflow Intermediate 10y ago
Python 03: Variables and Input
🔐 Cybersecurity
Python 03: Variables and Input
John Hammond Intermediate 10y ago
Python 01: Hello, World!
🔐 Cybersecurity
Python 01: Hello, World!
John Hammond Intermediate 10y ago
Python 02: Data Types
🔐 Cybersecurity
Python 02: Data Types
John Hammond Intermediate 10y ago
Sublime Text 2: PPA Install
🔐 Cybersecurity
Sublime Text 2: PPA Install
John Hammond Intermediate 10y ago
Reverse Engineering and identifying Bugs - BKPCTF cookbook (pwn 6) part 1
🔐 Cybersecurity
Reverse Engineering and identifying Bugs - BKPCTF cookbook (pwn 6) part 1
LiveOverflow Intermediate 10y ago
wget in Python!
🔐 Cybersecurity
wget in Python!
John Hammond Intermediate 10y ago
📚 Coursera Courses Opens on Coursera · Free to audit
1 / 3 View all →
Advanced Cybersecurity Topics
📚 Coursera Course ↗
Self-paced
Advanced Cybersecurity Topics
Opens on Coursera ↗
Design security solutions for applications and data
📚 Coursera Course ↗
Self-paced
Design security solutions for applications and data
Opens on Coursera ↗
Cybersecurity: What to Do When You Are a Victim
📚 Coursera Course ↗
Self-paced
Cybersecurity: What to Do When You Are a Victim
Opens on Coursera ↗
Getting Started in Port Scanning Using Nmap and Kali Linux
📚 Coursera Course ↗
Self-paced
Getting Started in Port Scanning Using Nmap and Kali Linux
Opens on Coursera ↗
Introduction to Automotive Cybersecurity & Vehicle Networks
📚 Coursera Course ↗
Self-paced
Introduction to Automotive Cybersecurity & Vehicle Networks
Opens on Coursera ↗
The Foundations of Cybersecurity
📚 Coursera Course ↗
Self-paced
The Foundations of Cybersecurity
Opens on Coursera ↗