Tech Skills

Cybersecurity

Ethical hacking, penetration testing, network security, CTFs and defensive security

6354
lessons
Your "Secret" Folders Aren't Secret
🔐 Cybersecurity
Your "Secret" Folders Aren't Secret
The Cyber Mentor Beginner 4y ago
Hacking Routers with Python // Fake route injection to BLACK HOLE networks
🔐 Cybersecurity
Hacking Routers with Python // Fake route injection to BLACK HOLE networks
David Bombal Beginner 4y ago
Why proofing impact for every XSS is "dumb" - Bug Bounty Reports
🔐 Cybersecurity
Why proofing impact for every XSS is "dumb" - Bug Bounty Reports
LiveUnderflow Advanced 4y ago
HackTheBox - Crossfit2
🔐 Cybersecurity
HackTheBox - Crossfit2
IppSec Beginner 4y ago
Hiring a Hacker to Hack My Facebook
🔐 Cybersecurity
Hiring a Hacker to Hack My Facebook
The Cyber Mentor Beginner 4y ago
Hack your LinkedIn PROFILE to get a job
🔐 Cybersecurity
Hack your LinkedIn PROFILE to get a job
David Bombal Beginner 4y ago
SANS+HBCU | Black Leaders in Cyber with Dr. Kimberly Young-McLear, Fellow at CISA
🔐 Cybersecurity
SANS+HBCU | Black Leaders in Cyber with Dr. Kimberly Young-McLear, Fellow at CISA
SANS Institute Beginner 4y ago
AWS Systems Manager Incident Manager - AWS Virtual Workshops
🔐 Cybersecurity
AWS Systems Manager Incident Manager - AWS Virtual Workshops
AWS Developers Intermediate 4y ago
Learning Binary Exploitation in 2021?
🔐 Cybersecurity
Learning Binary Exploitation in 2021?
LiveUnderflow Beginner 4y ago
Vulnerability Management Water Cooler Chat
🔐 Cybersecurity
Vulnerability Management Water Cooler Chat
SANS Institute Beginner 4y ago
AES-CFB Cryptography Mistakes - HackTheBox Business CTF "Domain Controller"
🔐 Cybersecurity
AES-CFB Cryptography Mistakes - HackTheBox Business CTF "Domain Controller"
John Hammond Beginner 4y ago
Build 5 Projects With HTML, CSS & JavaScript
🔐 Cybersecurity
Build 5 Projects With HTML, CSS & JavaScript
Traversy Media Intermediate 4y ago
Changing the Brain’s Pain Perception as First-Line Treatment for Pain: Acupuncture Class
🔐 Cybersecurity
Changing the Brain’s Pain Perception as First-Line Treatment for Pain: Acupuncture Class
TCM Academy Beginner 4y ago
XLM Macros & Unhiding Excel Worksheets - HackTheBox Biz CTF "OldSchool"
🔐 Cybersecurity
XLM Macros & Unhiding Excel Worksheets - HackTheBox Biz CTF "OldSchool"
John Hammond Intermediate 4y ago
HackTheBox - TheNotebook
🔐 Cybersecurity
HackTheBox - TheNotebook
IppSec Beginner 4y ago
Cybertalk - EP10 - Interview With GhostSec
🔐 Cybersecurity
Cybertalk - EP10 - Interview With GhostSec
HackerSploit Intermediate 4y ago
DEF CON DC9111 - Docker For Pentesting & Bug Bounty Hunting
🔐 Cybersecurity
DEF CON DC9111 - Docker For Pentesting & Bug Bounty Hunting
HackerSploit Intermediate 4y ago
Roger Reaves: Smuggling Drugs for Pablo Escobar and the Medellin Cartel | Lex Fridman Podcast #199
🔐 Cybersecurity
Roger Reaves: Smuggling Drugs for Pablo Escobar and the Medellin Cartel | Lex Fridman Podcast #199
Lex Fridman Beginner 4y ago
Why "advertisement" in my videos? (regulations and transparency)
🔐 Cybersecurity
Why "advertisement" in my videos? (regulations and transparency)
LiveUnderflow Intermediate 4y ago
Hacking LinkedIn to get the JOB you want
🔐 Cybersecurity
Hacking LinkedIn to get the JOB you want
David Bombal Beginner 4y ago
Why Don't Use alert(1) for XSS? | Watch Together + Q&A
🔐 Cybersecurity
Why Don't Use alert(1) for XSS? | Watch Together + Q&A
LiveUnderflow Intermediate 4y ago
DHCP Starvation (DoS) Attack // Python Scapy Red Team Script
🔐 Cybersecurity
DHCP Starvation (DoS) Attack // Python Scapy Red Team Script
David Bombal Beginner 4y ago
Debugging C Pointer Logic in gdb | Watch Together & Q&A
🔐 Cybersecurity
Debugging C Pointer Logic in gdb | Watch Together & Q&A
LiveUnderflow Intermediate 4y ago
Domain Controller Domination
🔐 Cybersecurity
Domain Controller Domination
The Cyber Mentor Beginner 4y ago
VLANs: Am I a joke to you? // Python VLAN hacking.
🔐 Cybersecurity
VLANs: Am I a joke to you? // Python VLAN hacking.
David Bombal Beginner 4y ago
Beginner Issues when Debugging with gdb + gef or pwndbg, ...
🔐 Cybersecurity
Beginner Issues when Debugging with gdb + gef or pwndbg, ...
LiveUnderflow Beginner 4y ago
BAD RANSOMWARE - HackTheBox Business CTF
🔐 Cybersecurity
BAD RANSOMWARE - HackTheBox Business CTF
John Hammond Intermediate 4y ago
Hacking Spanning Tree with Python, Scapy and Kali Linux  (Ep 2)  // STP Root Bridge attack! 😀
🔐 Cybersecurity
Hacking Spanning Tree with Python, Scapy and Kali Linux (Ep 2) // STP Root Bridge attack! 😀
David Bombal Beginner 4y ago
Reverse Engineering Loops - "Syncopation" HackTheBox Business CTF
🔐 Cybersecurity
Reverse Engineering Loops - "Syncopation" HackTheBox Business CTF
John Hammond Intermediate 4y ago
Laravel CVE / PHP Deserialization - "Larablog" HTB Business CTF
🔐 Cybersecurity
Laravel CVE / PHP Deserialization - "Larablog" HTB Business CTF
John Hammond Intermediate 4y ago
Let's Talk Phishing! | Watch Together & Q&A
🔐 Cybersecurity
Let's Talk Phishing! | Watch Together & Q&A
LiveUnderflow Intermediate 4y ago
JSON Web Keys (JWK & JWT) - "Emergency" - HackTheBox Business CTF
🔐 Cybersecurity
JSON Web Keys (JWK & JWT) - "Emergency" - HackTheBox Business CTF
John Hammond Intermediate 4y ago
GraphQL Introspection - HackTheBox "Business CTF" - NoteQL
🔐 Cybersecurity
GraphQL Introspection - HackTheBox "Business CTF" - NoteQL
John Hammond Beginner 4y ago
The Creepiest OSINT Tool to Date
🔐 Cybersecurity
The Creepiest OSINT Tool to Date
The Cyber Mentor Beginner 4y ago
Python Network Hacking with Kali Linux and Scapy = attack one! 😀
🔐 Cybersecurity
Python Network Hacking with Kali Linux and Scapy = attack one! 😀
David Bombal Beginner 4y ago
HackTheBox "Business CTF" - Time - Command Injection
🔐 Cybersecurity
HackTheBox "Business CTF" - Time - Command Injection
John Hammond Intermediate 4y ago
HackTheBox "Business CTF" - discordvm - Node.js Sandbox Escape
🔐 Cybersecurity
HackTheBox "Business CTF" - discordvm - Node.js Sandbox Escape
John Hammond Intermediate 4y ago
How To Be a Professional Streamer
🔐 Cybersecurity
How To Be a Professional Streamer
LiveUnderflow Intermediate 4y ago
How To Secure & Harden Docker Containers
🔐 Cybersecurity
How To Secure & Harden Docker Containers
HackerSploit Beginner 4y ago
Stealing Hashes with SeriousSam (CVE-2021–36934)
🔐 Cybersecurity
Stealing Hashes with SeriousSam (CVE-2021–36934)
The Cyber Mentor Beginner 4y ago
Securing The Docker Daemon
🔐 Cybersecurity
Securing The Docker Daemon
HackerSploit Intermediate 4y ago
Why Being a Destructive Architect is the Way Forward for Black in Tech
🔐 Cybersecurity
Why Being a Destructive Architect is the Way Forward for Black in Tech
SANS Institute Beginner 4y ago
Reading SECRET U.S. Air Force HACKING Document!!
🔐 Cybersecurity
Reading SECRET U.S. Air Force HACKING Document!!
LiveUnderflow Advanced 4y ago
Auditing Docker Security
🔐 Cybersecurity
Auditing Docker Security
HackerSploit Beginner 4y ago
Insane $100,000 home lab!
🔐 Cybersecurity
Insane $100,000 home lab!
David Bombal Intermediate 4y ago
HackTheBox - Breadcrumbs
🔐 Cybersecurity
HackTheBox - Breadcrumbs
IppSec Beginner 4y ago
Transition to Cyber Security From a Non-Cyber Role: Creative Ways to Land Your Dream Cyber Role
🔐 Cybersecurity
Transition to Cyber Security From a Non-Cyber Role: Creative Ways to Land Your Dream Cyber Role
SANS Institute Advanced 4y ago
JScript Deobfuscation - More WSHRAT (Malware Analysis)
🔐 Cybersecurity
JScript Deobfuscation - More WSHRAT (Malware Analysis)
John Hammond Intermediate 4y ago
📚 Coursera Courses Opens on Coursera · Free to audit
1 / 3 View all →
Penetration Testing and Vulnerability Scanning
📚 Coursera Course ↗
Self-paced
Penetration Testing and Vulnerability Scanning
Opens on Coursera ↗
Cyber Security Hashing Training for Beginners
📚 Coursera Course ↗
Self-paced
Cyber Security Hashing Training for Beginners
Opens on Coursera ↗
Cyber Risk Management Strategies
📚 Coursera Course ↗
Self-paced
Cyber Risk Management Strategies
Opens on Coursera ↗
Practical Cybersecurity Fundamentals: Unit 3
📚 Coursera Course ↗
Self-paced
Practical Cybersecurity Fundamentals: Unit 3
Opens on Coursera ↗
Implementing a Risk Management Framework
📚 Coursera Course ↗
Self-paced
Implementing a Risk Management Framework
Opens on Coursera ↗
Cybersecurity Capstone Project
📚 Coursera Course ↗
Self-paced
Cybersecurity Capstone Project
Opens on Coursera ↗