Tech Skills

Cybersecurity

Ethical hacking, penetration testing, network security, CTFs and defensive security

6349
lessons
Integrating Suricata With Wazuh For Log Processing
🔐 Cybersecurity
Integrating Suricata With Wazuh For Log Processing
HackerSploit Beginner 3y ago
My channel changes today
🔐 Cybersecurity
My channel changes today
David Bombal Advanced 3y ago
【Nintendo Switch Sports】 Strap in your joycons, it's switch sports time
🔐 Cybersecurity
【Nintendo Switch Sports】 Strap in your joycons, it's switch sports time
Ceres Fauna Ch. hololive-EN Beginner 3y ago
Installing & Configuring Suricata
🔐 Cybersecurity
Installing & Configuring Suricata
HackerSploit Beginner 3y ago
Hacking JavaScript: ELECTRON Applications w/ 7ASecurity
🔐 Cybersecurity
Hacking JavaScript: ELECTRON Applications w/ 7ASecurity
John Hammond Intermediate 3y ago
Heap BINARY EXPLOITATION w/ Matt E!
🔐 Cybersecurity
Heap BINARY EXPLOITATION w/ Matt E!
John Hammond Beginner 3y ago
Why an Innocent Man Confessed to Medical Extortion Hacking🎙Darknet Diaries Ep. 25: Alberto
🔐 Cybersecurity
Why an Innocent Man Confessed to Medical Extortion Hacking🎙Darknet Diaries Ep. 25: Alberto
Jack Rhysider Intermediate 3y ago
【PEGLIN】 I'm already addicted to this peggle inspired roguelite
🔐 Cybersecurity
【PEGLIN】 I'm already addicted to this peggle inspired roguelite
Ceres Fauna Ch. hololive-EN Beginner 3y ago
How to Pass Any SANS / GIAC Certification on Your First Try
🔐 Cybersecurity
How to Pass Any SANS / GIAC Certification on Your First Try
The Cyber Mentor Beginner 3y ago
Stephen Kotkin: Putin, Stalin, Hitler, Zelenskyy, and War in Ukraine | Lex Fridman Podcast #289
🔐 Cybersecurity
Stephen Kotkin: Putin, Stalin, Hitler, Zelenskyy, and War in Ukraine | Lex Fridman Podcast #289
Lex Fridman Beginner 3y ago
10 Programmer Stereotypes
🔐 Cybersecurity
10 Programmer Stereotypes
Fireship Beginner 3y ago
Hiring & Getting Hired in Cybersecurity
🔐 Cybersecurity
Hiring & Getting Hired in Cybersecurity
The Cyber Mentor Beginner 3y ago
The Dark Web's Richest Drug Lord Made 1 Fatal Mistake🎙Darknet Diaries Ep. 24: Operation Bayonet
🔐 Cybersecurity
The Dark Web's Richest Drug Lord Made 1 Fatal Mistake🎙Darknet Diaries Ep. 24: Operation Bayonet
Jack Rhysider Intermediate 3y ago
Oliver Stone: Vladimir Putin and War in Ukraine | Lex Fridman Podcast #286
🔐 Cybersecurity
Oliver Stone: Vladimir Putin and War in Ukraine | Lex Fridman Podcast #286
Lex Fridman Beginner 3y ago
HackTheBox - Fingerprint
🔐 Cybersecurity
HackTheBox - Fingerprint
IppSec Intermediate 3y ago
They said this doesn't work 🤣 Hacking networks with VLAN hopping and Python
🔐 Cybersecurity
They said this doesn't work 🤣 Hacking networks with VLAN hopping and Python
David Bombal Beginner 3y ago
Introduction To Suricata IDS
🔐 Cybersecurity
Introduction To Suricata IDS
HackerSploit Beginner 3y ago
Creating Content HELPS the JOB HUNT (w/ @shenetworks !)
🔐 Cybersecurity
Creating Content HELPS the JOB HUNT (w/ @shenetworks !)
John Hammond Beginner 3y ago
【Catch Up & Catch Up】 Saying hi & reading supas!
🔐 Cybersecurity
【Catch Up & Catch Up】 Saying hi & reading supas!
Ceres Fauna Ch. hololive-EN Beginner 3y ago
INDUSTRY Penetration Testing & Training w/ Jean-François Maes
🔐 Cybersecurity
INDUSTRY Penetration Testing & Training w/ Jean-François Maes
John Hammond Beginner 3y ago
Threat Detection & Active Response With Wazuh
🔐 Cybersecurity
Threat Detection & Active Response With Wazuh
HackerSploit Beginner 3y ago
Installing & Configuring Wazuh
🔐 Cybersecurity
Installing & Configuring Wazuh
HackerSploit Beginner 3y ago
WIRESHARK for CYBERSECURITY w/ Chris Greer!
🔐 Cybersecurity
WIRESHARK for CYBERSECURITY w/ Chris Greer!
John Hammond Beginner 3y ago
Introduction To Wazuh SIEM
🔐 Cybersecurity
Introduction To Wazuh SIEM
HackerSploit Beginner 3y ago
【NOT ASMR】 yes collab #kronfaumei
🔐 Cybersecurity
【NOT ASMR】 yes collab #kronfaumei
Ceres Fauna Ch. hololive-EN Beginner 3y ago
Intrusion Detection With Snort
🔐 Cybersecurity
Intrusion Detection With Snort
HackerSploit Beginner 3y ago
Unpacking UPX Binaries (PicoCTF 2022 #51 'unpackme')
🔐 Cybersecurity
Unpacking UPX Binaries (PicoCTF 2022 #51 'unpackme')
John Hammond Beginner 3y ago
【Knightfall】 The Only Battle Royale with Horse Drifting (ft MUMEI)
🔐 Cybersecurity
【Knightfall】 The Only Battle Royale with Horse Drifting (ft MUMEI)
Ceres Fauna Ch. hololive-EN Beginner 3y ago
Least Bit Steganography w/ zsteg (PicoCTF 2022 #50 'st3g0')
🔐 Cybersecurity
Least Bit Steganography w/ zsteg (PicoCTF 2022 #50 'st3g0')
John Hammond Beginner 3y ago
【Nintendo Switch Sports】 playing sports to fuel my virtual clothing gacha addiction
🔐 Cybersecurity
【Nintendo Switch Sports】 playing sports to fuel my virtual clothing gacha addiction
Ceres Fauna Ch. hololive-EN Beginner 3y ago
Installing & Configuring Snort
🔐 Cybersecurity
Installing & Configuring Snort
HackerSploit Beginner 3y ago
Introduction To Snort IDS
🔐 Cybersecurity
Introduction To Snort IDS
HackerSploit Beginner 3y ago
Introduction To Intrusion Detection Systems (IDS)
🔐 Cybersecurity
Introduction To Intrusion Detection Systems (IDS)
HackerSploit Beginner 3y ago
BEGINNER SQL INJECTION (PicoCTF 2022 #49 'sqlilite')
🔐 Cybersecurity
BEGINNER SQL INJECTION (PicoCTF 2022 #49 'sqlilite')
John Hammond Beginner 3y ago
Return Oriented Programming (PicoCTF 2022 #48 'ropfu')
🔐 Cybersecurity
Return Oriented Programming (PicoCTF 2022 #48 'ropfu')
John Hammond Beginner 3y ago
Decrypting HTTPS Traffic With Wireshark
🔐 Cybersecurity
Decrypting HTTPS Traffic With Wireshark
HackerSploit Beginner 3y ago
Wireshark Display & Capture Filters
🔐 Cybersecurity
Wireshark Display & Capture Filters
HackerSploit Beginner 3y ago
Installing & Configuring Wireshark For Traffic Analysis
🔐 Cybersecurity
Installing & Configuring Wireshark For Traffic Analysis
HackerSploit Beginner 3y ago
Wireshark For Blue Teams
🔐 Cybersecurity
Wireshark For Blue Teams
HackerSploit Beginner 3y ago
Introduction To Blue Team Operations
🔐 Cybersecurity
Introduction To Blue Team Operations
HackerSploit Beginner 3y ago
Blue Team Training Course - Introduction
🔐 Cybersecurity
Blue Team Training Course - Introduction
HackerSploit Beginner 3y ago
RECOVERING FILES with Autopsy (PicoCTF 2022 #47 'operation-oni')
🔐 Cybersecurity
RECOVERING FILES with Autopsy (PicoCTF 2022 #47 'operation-oni')
John Hammond Beginner 3y ago
Format String printf Vulnerabilities (PicoCTF 2022 #46 'flag-leak')
🔐 Cybersecurity
Format String printf Vulnerabilities (PicoCTF 2022 #46 'flag-leak')
John Hammond Beginner 3y ago
Making My Definitive Desserts Tier List
🔐 Cybersecurity
Making My Definitive Desserts Tier List
Ceres Fauna Ch. hololive-EN Beginner 3y ago
Restructuring PCAP Network Packets (PicoCTF 2022 #45 'eavesdrop')
🔐 Cybersecurity
Restructuring PCAP Network Packets (PicoCTF 2022 #45 'eavesdrop')
John Hammond Beginner 3y ago
How the FBI Investigated the First Bank Robbing Hacker | Darknet Diaries Ep. 23: Vladimir Levin
🔐 Cybersecurity
How the FBI Investigated the First Bank Robbing Hacker | Darknet Diaries Ep. 23: Vladimir Levin
Jack Rhysider Beginner 3y ago
【Nintendo Switch Sports】 SPORTS KIRIN
🔐 Cybersecurity
【Nintendo Switch Sports】 SPORTS KIRIN
Ceres Fauna Ch. hololive-EN Beginner 3y ago
PWN - Bruteforcing Stack Canaries (PicoCTF 2022 #44 'buffer-overflow3')
🔐 Cybersecurity
PWN - Bruteforcing Stack Canaries (PicoCTF 2022 #44 'buffer-overflow3')
John Hammond Beginner 3y ago
📚 Coursera Courses Opens on Coursera · Free to audit
1 / 3 View all →
Cybersecurity and Secure Software Design
📚 Coursera Course ↗
Self-paced
Cybersecurity and Secure Software Design
Opens on Coursera ↗
Web Security, Social Engineering & External Attacks
📚 Coursera Course ↗
Self-paced
Web Security, Social Engineering & External Attacks
Opens on Coursera ↗
CFR: Incident Analysis, Response, and Forensics
📚 Coursera Course ↗
Self-paced
CFR: Incident Analysis, Response, and Forensics
Opens on Coursera ↗
Cybersecurity Strategies for AI-Driven Organizations
📚 Coursera Course ↗
Self-paced
Cybersecurity Strategies for AI-Driven Organizations
Opens on Coursera ↗
Cloud Data & Application Security
📚 Coursera Course ↗
Self-paced
Cloud Data & Application Security
Opens on Coursera ↗
Systems and Cybersecurity Fundamentals Part 1
📚 Coursera Course ↗
Self-paced
Systems and Cybersecurity Fundamentals Part 1
Opens on Coursera ↗