Tech Skills

Cybersecurity

Ethical hacking, penetration testing, network security, CTFs and defensive security

6343
lessons
Fuzz Faster with Turbo Intruder
🔐 Cybersecurity
Fuzz Faster with Turbo Intruder
The Cyber Mentor Beginner 1y ago
1000 Players - One Game of Doom
🔐 Cybersecurity
1000 Players - One Game of Doom
ThePrimeagen Intermediate 1y ago
How North Korea led the largest crypto heist in history
🔐 Cybersecurity
How North Korea led the largest crypto heist in history
Jack Rhysider Intermediate 1y ago
Stealing Computer Passwords on Login
🔐 Cybersecurity
Stealing Computer Passwords on Login
John Hammond Beginner 1y ago
Dr. Ullrich on Today’s Cyber Threats: SANSFIRE 2024 Insights
🔐 Cybersecurity
Dr. Ullrich on Today’s Cyber Threats: SANSFIRE 2024 Insights
SANS Institute Advanced 1y ago
3 Tips to Pass Your Next Pentesting Exam | Cybersecurity and Hacking
🔐 Cybersecurity
3 Tips to Pass Your Next Pentesting Exam | Cybersecurity and Hacking
The Cyber Mentor Beginner 1y ago
Will AI replace Cybersecurity professionals? Tom from Spunk replies. #shorts #AI #cybersecurity
🔐 Cybersecurity
Will AI replace Cybersecurity professionals? Tom from Spunk replies. #shorts #AI #cybersecurity
David Bombal Intermediate 1y ago
The cheat device that snuck onto Nintendo's platform
🔐 Cybersecurity
The cheat device that snuck onto Nintendo's platform
Jack Rhysider Intermediate 1y ago
HackTheBox - POV
🔐 Cybersecurity
HackTheBox - POV
IppSec Beginner 1y ago
The Future of Cybersecurity with Cisco & Splunk's $28 billion investment!
🔐 Cybersecurity
The Future of Cybersecurity with Cisco & Splunk's $28 billion investment!
David Bombal Beginner 1y ago
For the Win: Aligning Security Initiatives with the Business
🔐 Cybersecurity
For the Win: Aligning Security Initiatives with the Business
SANS Institute Beginner 1y ago
FBI Stops World's Largest Botnet
🔐 Cybersecurity
FBI Stops World's Largest Botnet
John Hammond Beginner 1y ago
Kevin Spacey: Power, Controversy, Betrayal, Truth & Love in Film and Life | Lex Fridman Podcast #432
🔐 Cybersecurity
Kevin Spacey: Power, Controversy, Betrayal, Truth & Love in Film and Life | Lex Fridman Podcast #432
Lex Fridman Beginner 1y ago
HackTheBox - Analysis
🔐 Cybersecurity
HackTheBox - Analysis
IppSec Beginner 1y ago
Insomnia, A Call for Inner Change? #acupuncture #chinesemedicine
🔐 Cybersecurity
Insomnia, A Call for Inner Change? #acupuncture #chinesemedicine
TCM Academy Intermediate 1y ago
Dartmouth's Meet Alexis Abramson, Dean of the Thayer School of Engineering at Dartmouth 5.23.24
🔐 Cybersecurity
Dartmouth's Meet Alexis Abramson, Dean of the Thayer School of Engineering at Dartmouth 5.23.24
Coursera Beginner 1y ago
HackerSploit Channel Update 2024
🔐 Cybersecurity
HackerSploit Channel Update 2024
HackerSploit Beginner 1y ago
What to Know About IT Certifications
🔐 Cybersecurity
What to Know About IT Certifications
The Cyber Mentor Beginner 1y ago
$25 million lost to AI impersonation scam
🔐 Cybersecurity
$25 million lost to AI impersonation scam
Jack Rhysider Intermediate 1y ago
Three Mental Models for Cybersecurity
🔐 Cybersecurity
Three Mental Models for Cybersecurity
The Cyber Mentor Beginner 1y ago
Keynote | Challenges and Opportunities for Modern CISOs
🔐 Cybersecurity
Keynote | Challenges and Opportunities for Modern CISOs
SANS Institute Intermediate 1y ago
Leading Without Authority: Leadership Beyond Titles
🔐 Cybersecurity
Leading Without Authority: Leadership Beyond Titles
SANS Institute Intermediate 1y ago
Navigating the AI Security Horizon: A CISO’s Guide to Sustaining Cyber Resilience
🔐 Cybersecurity
Navigating the AI Security Horizon: A CISO’s Guide to Sustaining Cyber Resilience
SANS Institute Beginner 1y ago
"For criminals, by criminals:" How the FBI Tried to Wire Tap the World🎙Darknet Diaries Ep 146: ANOM
🔐 Cybersecurity
"For criminals, by criminals:" How the FBI Tried to Wire Tap the World🎙Darknet Diaries Ep 146: ANOM
Jack Rhysider Intermediate 1y ago
The destructive Iranian cyber attacks
🔐 Cybersecurity
The destructive Iranian cyber attacks
Jack Rhysider Intermediate 1y ago
Fileless Malware Analysis & PowerShell Deobfuscation
🔐 Cybersecurity
Fileless Malware Analysis & PowerShell Deobfuscation
John Hammond Advanced 1y ago
Use This Code for Your Next Internal Penetration Test
🔐 Cybersecurity
Use This Code for Your Next Internal Penetration Test
The Cyber Mentor Beginner 1y ago
Linux Hackers Become Root with CURL & Sudo
🔐 Cybersecurity
Linux Hackers Become Root with CURL & Sudo
John Hammond Beginner 1y ago
Learn to Build a Web App
🔐 Cybersecurity
Learn to Build a Web App
The Cyber Mentor Beginner 1y ago
The US malware that sabotaged Iran's nuclear facility
🔐 Cybersecurity
The US malware that sabotaged Iran's nuclear facility
Jack Rhysider Intermediate 1y ago
WiFi Security Myths Demo: Don't believe that these will protect you!
🔐 Cybersecurity
WiFi Security Myths Demo: Don't believe that these will protect you!
David Bombal Intermediate 1y ago
The hacker who became a Web Design CEO
🔐 Cybersecurity
The hacker who became a Web Design CEO
Jack Rhysider Intermediate 1y ago
Exploiting the Front-End: Challenge Walkthrough
🔐 Cybersecurity
Exploiting the Front-End: Challenge Walkthrough
The Cyber Mentor Beginner 1y ago
Did you know this about Linux? // Linux for Hackers Ep 5
🔐 Cybersecurity
Did you know this about Linux? // Linux for Hackers Ep 5
David Bombal Beginner 1y ago
Start Your Hacking Journey as a Beginner
🔐 Cybersecurity
Start Your Hacking Journey as a Beginner
The Cyber Mentor Beginner 1y ago
Security Governance | The 8 Domains of the Cloud Security Maturity Model | Part 3
🔐 Cybersecurity
Security Governance | The 8 Domains of the Cloud Security Maturity Model | Part 3
SANS Institute Beginner 1y ago
Hacking The Davinci Code: WebDAV Cybersecurity
🔐 Cybersecurity
Hacking The Davinci Code: WebDAV Cybersecurity
John Hammond Beginner 1y ago
Capture The Flag! NahamCon 2024 CTF Warmups
🔐 Cybersecurity
Capture The Flag! NahamCon 2024 CTF Warmups
John Hammond Beginner 1y ago
Install Nessus for Free and scan for Vulnerabilities (New Way)
🔐 Cybersecurity
Install Nessus for Free and scan for Vulnerabilities (New Way)
David Bombal Beginner 1y ago
HackTheBox - Bizness
🔐 Cybersecurity
HackTheBox - Bizness
IppSec Beginner 1y ago
They're hunting your passwords? #shorts #passwords #cybersecurity  #ai
🔐 Cybersecurity
They're hunting your passwords? #shorts #passwords #cybersecurity #ai
David Bombal Intermediate 1y ago
How to Prevent, Detect, and Respond to Attacks with this Free Tool?
🔐 Cybersecurity
How to Prevent, Detect, and Respond to Attacks with this Free Tool?
The Cyber Mentor Beginner 1y ago
The coolest WiFi hacking device?
🔐 Cybersecurity
The coolest WiFi hacking device?
David Bombal Intermediate 1y ago
NahamCon 2024 CTF is LIVE Right Now
🔐 Cybersecurity
NahamCon 2024 CTF is LIVE Right Now
John Hammond Beginner 1y ago
A Quick Beginner's Guide to CTFs | Tips for Starting Your First CTF
🔐 Cybersecurity
A Quick Beginner's Guide to CTFs | Tips for Starting Your First CTF
The Cyber Mentor Beginner 1y ago
Expertise isn't all you need - Building an AI Red Team
🔐 Cybersecurity
Expertise isn't all you need - Building an AI Red Team
SANS Institute Beginner 1y ago
IAM | The 8 Domains of the Cloud Security Maturity Model | Part 2
🔐 Cybersecurity
IAM | The 8 Domains of the Cloud Security Maturity Model | Part 2
SANS Institute Beginner 1y ago
I Put a Vulnerable Server on The Internet
🔐 Cybersecurity
I Put a Vulnerable Server on The Internet
John Hammond Beginner 1y ago
📚 Coursera Courses Opens on Coursera · Free to audit
1 / 3 View all →
Advanced Practices in Application Security
📚 Coursera Course ↗
Self-paced
Advanced Practices in Application Security
Opens on Coursera ↗
Endpoint Detection and Response Essentials
📚 Coursera Course ↗
Self-paced
Endpoint Detection and Response Essentials
Opens on Coursera ↗
Introduction to Cybersecurity Essentials
📚 Coursera Course ↗
Self-paced
Introduction to Cybersecurity Essentials
Opens on Coursera ↗
Offensive Security Using Python
📚 Coursera Course ↗
Self-paced
Offensive Security Using Python
Opens on Coursera ↗
Advanced Network Services, Security, and Programmability
📚 Coursera Course ↗
Self-paced
Advanced Network Services, Security, and Programmability
Opens on Coursera ↗
Foundations of Cybersecurity Operations
📚 Coursera Course ↗
Self-paced
Foundations of Cybersecurity Operations
Opens on Coursera ↗