Tech Skills

Cybersecurity

Ethical hacking, penetration testing, network security, CTFs and defensive security

6354
lessons
The Ins and Outs of Bug Bounties
🔐 Cybersecurity
The Ins and Outs of Bug Bounties
The Cyber Mentor Beginner 5y ago
massive TWITTER HACK! (Elon Musk, Bill Gates, Mr. Beast, Kanye)
🔐 Cybersecurity
massive TWITTER HACK! (Elon Musk, Bill Gates, Mr. Beast, Kanye)
NetworkChuck Beginner 5y ago
Introducing Pwncat: Automating Linux Red Team Operations
🔐 Cybersecurity
Introducing Pwncat: Automating Linux Red Team Operations
John Hammond Beginner 5y ago
What is the Largest POST Request the Server can Process?
🔐 Cybersecurity
What is the Largest POST Request the Server can Process?
Hussein Nasser Beginner 5y ago
Real Bugs - API Information Disclosure
🔐 Cybersecurity
Real Bugs - API Information Disclosure
The Cyber Mentor Beginner 5y ago
Wiresharking HTTP/2 - Decrypting Traffic with Wireshark And peeking at Naked HTTP/2 Traffic
🔐 Cybersecurity
Wiresharking HTTP/2 - Decrypting Traffic with Wireshark And peeking at Naked HTTP/2 Traffic
Hussein Nasser Beginner 5y ago
HackTheBox - Book
🔐 Cybersecurity
HackTheBox - Book
IppSec Beginner 5y ago
Cybertalk - EP7 - OPSEC & Personal Security Guide
🔐 Cybersecurity
Cybertalk - EP7 - OPSEC & Personal Security Guide
HackerSploit Beginner 5y ago
Nmap Tutorial to find Network Vulnerabilities
🔐 Cybersecurity
Nmap Tutorial to find Network Vulnerabilities
NetworkChuck Beginner 5y ago
My First Virtual Event...My Biggest Fear...
🔐 Cybersecurity
My First Virtual Event...My Biggest Fear...
Russell Brunson Beginner 5y ago
Welcome to SANS Community CTF - Services Challenges
🔐 Cybersecurity
Welcome to SANS Community CTF - Services Challenges
SANS Institute Beginner 5y ago
The 14 Absolute Truths of Security | SANS@MIC Talk
🔐 Cybersecurity
The 14 Absolute Truths of Security | SANS@MIC Talk
SANS Institute Advanced 5y ago
How To Reset Linux Root Password
🔐 Cybersecurity
How To Reset Linux Root Password
HackerSploit Intermediate 5y ago
HackTheBox - ForwardSlash
🔐 Cybersecurity
HackTheBox - ForwardSlash
IppSec Beginner 5y ago
Our First Ever Virtual Conference...and This Happened.
🔐 Cybersecurity
Our First Ever Virtual Conference...and This Happened.
Russell Brunson Beginner 5y ago
How To Take Product Photography At Home With A Smartphone
🔐 Cybersecurity
How To Take Product Photography At Home With A Smartphone
Learn With Shopify Beginner 5y ago
Igniting Creativity for a (Hacking) Game - Game Devlog #2
🔐 Cybersecurity
Igniting Creativity for a (Hacking) Game - Game Devlog #2
LiveOverflow Beginner 5y ago
Cross-Site Scripting Explained with Examples and How to Prevent XSS with Content Security Policy
🔐 Cybersecurity
Cross-Site Scripting Explained with Examples and How to Prevent XSS with Content Security Policy
Hussein Nasser Beginner 5y ago
Wiresharking RabbitMQ - What Happens when you create a Queue in RabbitMQ behind the scenes ?
🔐 Cybersecurity
Wiresharking RabbitMQ - What Happens when you create a Queue in RabbitMQ behind the scenes ?
Hussein Nasser Beginner 5y ago
Expose Local WebSocket, HTTP and HTTPS WebServers to the Public Internet with Ngrok
🔐 Cybersecurity
Expose Local WebSocket, HTTP and HTTPS WebServers to the Public Internet with Ngrok
Hussein Nasser Beginner 5y ago
What is a DDOS Mitigating Reverse Proxy and is it Worth It? (Commenting on a Security Now Video)
🔐 Cybersecurity
What is a DDOS Mitigating Reverse Proxy and is it Worth It? (Commenting on a Security Now Video)
Hussein Nasser Beginner 5y ago
HOW Would TikTok Be Blocked in the US (Technical Details)
🔐 Cybersecurity
HOW Would TikTok Be Blocked in the US (Technical Details)
Hussein Nasser Beginner 5y ago
Understanding and Applying Threat Intelligence
🔐 Cybersecurity
Understanding and Applying Threat Intelligence
SANS Institute Intermediate 5y ago
A Database User for each REST Route - Best Practices for Backend Application with Postgres
🔐 Cybersecurity
A Database User for each REST Route - Best Practices for Backend Application with Postgres
Hussein Nasser Intermediate 5y ago
What is TCP Fast Open and how can it speeds up your Backend Application?
🔐 Cybersecurity
What is TCP Fast Open and how can it speeds up your Backend Application?
Hussein Nasser Beginner 5y ago
Spinning a lightweight RabbitMQ instance and Consume it with NodeJS
🔐 Cybersecurity
Spinning a lightweight RabbitMQ instance and Consume it with NodeJS
Hussein Nasser Beginner 5y ago
Building a Deno HTTPS Web Server with Self-Signed Certificate
🔐 Cybersecurity
Building a Deno HTTPS Web Server with Self-Signed Certificate
Hussein Nasser Intermediate 5y ago
How To Convert Linux Packages With Alien
🔐 Cybersecurity
How To Convert Linux Packages With Alien
HackerSploit Intermediate 5y ago
How much can you learn about the Backend from its API?
🔐 Cybersecurity
How much can you learn about the Backend from its API?
Hussein Nasser Intermediate 5y ago
Defending Lift and Shift Cloud Applications | SANS@MIC Talk
🔐 Cybersecurity
Defending Lift and Shift Cloud Applications | SANS@MIC Talk
SANS Institute Beginner 5y ago
#LevelUpLabs | SANS@MIC Talk
🔐 Cybersecurity
#LevelUpLabs | SANS@MIC Talk
SANS Institute Advanced 5y ago
They Turned on HTTP/2 and Regretted it, Let us discuss the Lucidchart Article
🔐 Cybersecurity
They Turned on HTTP/2 and Regretted it, Let us discuss the Lucidchart Article
Hussein Nasser Beginner 5y ago
Wiresharking TLS - What happens during TLS 1.2 and TLS 1.3 Handshake
🔐 Cybersecurity
Wiresharking TLS - What happens during TLS 1.2 and TLS 1.3 Handshake
Hussein Nasser Beginner 5y ago
What are SSL/TLS Certificates? Why do we Need them? and How do they Work?
🔐 Cybersecurity
What are SSL/TLS Certificates? Why do we Need them? and How do they Work?
Hussein Nasser Intermediate 5y ago
What is a Request?
🔐 Cybersecurity
What is a Request?
Hussein Nasser Beginner 5y ago
HackTheBox - Player2
🔐 Cybersecurity
HackTheBox - Player2
IppSec Beginner 5y ago
SEC510: Multicloud Security Assessment and Defense | SANS@MIC Talk
🔐 Cybersecurity
SEC510: Multicloud Security Assessment and Defense | SANS@MIC Talk
SANS Institute Advanced 5y ago
Threat Hunting via DNS | SANS@MIC Talk
🔐 Cybersecurity
Threat Hunting via DNS | SANS@MIC Talk
SANS Institute Advanced 5y ago
No SQL Injection in MongoDB Applications | SANS@MIC Talk
🔐 Cybersecurity
No SQL Injection in MongoDB Applications | SANS@MIC Talk
SANS Institute Advanced 5y ago
Untapped Potential - SANS Blue Team Summit 2020
🔐 Cybersecurity
Untapped Potential - SANS Blue Team Summit 2020
SANS Institute Beginner 5y ago
What Really Happens During a WebSockets Connection - Wiresharking WebSockets
🔐 Cybersecurity
What Really Happens During a WebSockets Connection - Wiresharking WebSockets
Hussein Nasser Intermediate 5y ago
Wiresharking CURL - How a single GET request translates to 10 TCP Packets
🔐 Cybersecurity
Wiresharking CURL - How a single GET request translates to 10 TCP Packets
Hussein Nasser Advanced 5y ago
you need to learn HACKING RIGHT NOW!! // CEH (ethical hacking)
🔐 Cybersecurity
you need to learn HACKING RIGHT NOW!! // CEH (ethical hacking)
NetworkChuck Beginner 5y ago
HackTheBox - ServMon
🔐 Cybersecurity
HackTheBox - ServMon
IppSec Beginner 5y ago
The Only Constant is Change: Tracking Adversary Trends | STAR Webcast
🔐 Cybersecurity
The Only Constant is Change: Tracking Adversary Trends | STAR Webcast
SANS Institute Advanced 5y ago
What Recruiters really look for in a Backend Engineer? (Unpopular opinion)
🔐 Cybersecurity
What Recruiters really look for in a Backend Engineer? (Unpopular opinion)
Hussein Nasser Intermediate 5y ago
Maldocs: A Bit of Blue, A Bit of Red | SANS@MIC Talk
🔐 Cybersecurity
Maldocs: A Bit of Blue, A Bit of Red | SANS@MIC Talk
SANS Institute Intermediate 5y ago
Catch and Release: Phishing Techniques for the Good Guys | SANS@MIC Talk
🔐 Cybersecurity
Catch and Release: Phishing Techniques for the Good Guys | SANS@MIC Talk
SANS Institute Intermediate 5y ago
📚 Coursera Courses Opens on Coursera · Free to audit
1 / 3 View all →
Systems and Application Security
📚 Coursera Course ↗
Self-paced
Systems and Application Security
Opens on Coursera ↗
Ethical Hacking Parte 2
📚 Coursera Course ↗
Self-paced
Ethical Hacking Parte 2
Opens on Coursera ↗
Kaizen Event: Become a Certified Kaizen Event Specialist
📚 Coursera Course ↗
Self-paced
Kaizen Event: Become a Certified Kaizen Event Specialist
Opens on Coursera ↗
Gen AI in Cybersecurity
📚 Coursera Course ↗
Self-paced
Gen AI in Cybersecurity
Opens on Coursera ↗
Cybersecurity for Data Science
📚 Coursera Course ↗
Self-paced
Cybersecurity for Data Science
Opens on Coursera ↗
API Basics 2: Build a Blog (REST, URLs & HTTP Requests)
📚 Coursera Course ↗
Self-paced
API Basics 2: Build a Blog (REST, URLs & HTTP Requests)
Opens on Coursera ↗