Tech Skills

Cybersecurity

Ethical hacking, penetration testing, network security, CTFs and defensive security

6353
lessons
HackTheBox Walkthrough - Optimum
🔐 Cybersecurity
HackTheBox Walkthrough - Optimum
HackerSploit Intermediate 5y ago
Arcane Web and Mobile Application Vulnerabilities | SANS@MIC Talk
🔐 Cybersecurity
Arcane Web and Mobile Application Vulnerabilities | SANS@MIC Talk
SANS Institute Beginner 5y ago
A Walk Through Logs Hell | SANS@MIC Talk
🔐 Cybersecurity
A Walk Through Logs Hell | SANS@MIC Talk
SANS Institute Beginner 5y ago
what am i doing?? (aws...security+.....ccna?)
🔐 Cybersecurity
what am i doing?? (aws...security+.....ccna?)
NetworkChuck Intermediate 5y ago
Joscha Bach: Artificial Consciousness and the Nature of Reality | Lex Fridman Podcast #101
🔐 Cybersecurity
Joscha Bach: Artificial Consciousness and the Nature of Reality | Lex Fridman Podcast #101
Lex Fridman Beginner 5y ago
Learn Git
🔐 Cybersecurity
Learn Git
HackerSploit Beginner 5y ago
NahamCon CTF starts TOMORROW!
🔐 Cybersecurity
NahamCon CTF starts TOMORROW!
John Hammond Beginner 5y ago
Acupuncture Point Combinations: The Master-Key to Great Clinical Results
🔐 Cybersecurity
Acupuncture Point Combinations: The Master-Key to Great Clinical Results
TCM Academy Beginner 5y ago
HackTheBox - Nest
🔐 Cybersecurity
HackTheBox - Nest
IppSec Beginner 5y ago
I PASSED the Linux+ (how to pass the CompTIA Linux+ Exam)
🔐 Cybersecurity
I PASSED the Linux+ (how to pass the CompTIA Linux+ Exam)
NetworkChuck Beginner 5y ago
When Learning Backend Engineering Ask Why, not What (Minute Engineering)
🔐 Cybersecurity
When Learning Backend Engineering Ask Why, not What (Minute Engineering)
Hussein Nasser Beginner 5y ago
Carnegie Mellon University Advanced Database Course Is a GREAT resource for Backend Engineers!
🔐 Cybersecurity
Carnegie Mellon University Advanced Database Course Is a GREAT resource for Backend Engineers!
Hussein Nasser Beginner 5y ago
CML FAQs: Wireshark, passwords, Docker and more.
🔐 Cybersecurity
CML FAQs: Wireshark, passwords, Docker and more.
David Bombal Beginner 5y ago
CML FAQs: How to connect to external networks?
🔐 Cybersecurity
CML FAQs: How to connect to external networks?
David Bombal Beginner 5y ago
CTFs are AWESOME!
🔐 Cybersecurity
CTFs are AWESOME!
LiveOverflow Beginner 5y ago
CTFs are TERRIBLE!
🔐 Cybersecurity
CTFs are TERRIBLE!
LiveOverflow Beginner 5y ago
HackTheBox - Resolute
🔐 Cybersecurity
HackTheBox - Resolute
IppSec Intermediate 5y ago
Keeping Your Phone and Laptop Secure
🔐 Cybersecurity
Keeping Your Phone and Laptop Secure
CS50 Beginner 5y ago
Running CTFs with Docker (VirSecCon CTF Recap)
🔐 Cybersecurity
Running CTFs with Docker (VirSecCon CTF Recap)
John Hammond Intermediate 5y ago
Shock to the System: Re-Evaluating Your Security Operations
🔐 Cybersecurity
Shock to the System: Re-Evaluating Your Security Operations
SANS Institute Intermediate 5y ago
The Art of Blue Teaming
🔐 Cybersecurity
The Art of Blue Teaming
SANS Institute Intermediate 5y ago
Shellcode Analysis 101 | SANS@MIC Talk
🔐 Cybersecurity
Shellcode Analysis 101 | SANS@MIC Talk
SANS Institute Advanced 5y ago
SANS Live Online Interactive Local Lab Demo – FOR508: Advanced Incident Response
🔐 Cybersecurity
SANS Live Online Interactive Local Lab Demo – FOR508: Advanced Incident Response
SANS Institute Advanced 5y ago
CYA by Using CIA -- Correctly For a Change | SANS@MIC Talk
🔐 Cybersecurity
CYA by Using CIA -- Correctly For a Change | SANS@MIC Talk
SANS Institute Intermediate 5y ago
Remote Forensic Investigations in the Context of COVID-19 | SANS@MIC Talk
🔐 Cybersecurity
Remote Forensic Investigations in the Context of COVID-19 | SANS@MIC Talk
SANS Institute Intermediate 5y ago
Introducing Blueprint
🔐 Cybersecurity
Introducing Blueprint
SANS Institute Beginner 5y ago
Cybertalk - EP6 - Don't Dual Boot
🔐 Cybersecurity
Cybertalk - EP6 - Don't Dual Boot
HackerSploit Intermediate 5y ago
Waiting for a cyber range exercise is not enough | SANS@MIC Talk
🔐 Cybersecurity
Waiting for a cyber range exercise is not enough | SANS@MIC Talk
SANS Institute Beginner 5y ago
CML FAQs: How to export and import labs & configs?
🔐 Cybersecurity
CML FAQs: How to export and import labs & configs?
David Bombal Beginner 5y ago
Nmap - Firewall Detection (ACK Probing)
🔐 Cybersecurity
Nmap - Firewall Detection (ACK Probing)
HackerSploit Intermediate 5y ago
Nmap - Inverse TCP Flag Scanning (FIN, XMAS & NULL)
🔐 Cybersecurity
Nmap - Inverse TCP Flag Scanning (FIN, XMAS & NULL)
HackerSploit Intermediate 5y ago
Nmap - Output And Verbosity
🔐 Cybersecurity
Nmap - Output And Verbosity
HackerSploit Intermediate 5y ago
Threat Hunting and the Rise of Targeted eCrime Intrusions | STAR Webcast
🔐 Cybersecurity
Threat Hunting and the Rise of Targeted eCrime Intrusions | STAR Webcast
SANS Institute Advanced 5y ago
STRESSED OUT!! (you need to learn EVERYTHING RIGHT NOW!!)
🔐 Cybersecurity
STRESSED OUT!! (you need to learn EVERYTHING RIGHT NOW!!)
NetworkChuck Beginner 5y ago
Nmap - UDP Scanning
🔐 Cybersecurity
Nmap - UDP Scanning
HackerSploit Intermediate 5y ago
Nmap - TCP Connect & Stealth (SYN) Scanning
🔐 Cybersecurity
Nmap - TCP Connect & Stealth (SYN) Scanning
HackerSploit Intermediate 5y ago
Nmap - OS And Service Version Scanning
🔐 Cybersecurity
Nmap - OS And Service Version Scanning
HackerSploit Intermediate 5y ago
Nmap - Host Discovery With Ping Sweep
🔐 Cybersecurity
Nmap - Host Discovery With Ping Sweep
HackerSploit Intermediate 5y ago
TCP-3 Way Handshake Explained
🔐 Cybersecurity
TCP-3 Way Handshake Explained
HackerSploit Beginner 5y ago
Network Scanning - TCP Flags & TCP 3-Way Handshake
🔐 Cybersecurity
Network Scanning - TCP Flags & TCP 3-Way Handshake
HackerSploit Intermediate 5y ago
Free CCNP 350-401 ENCOR Complete Course: 6.4: REST APIs Part 6
🔐 Cybersecurity
Free CCNP 350-401 ENCOR Complete Course: 6.4: REST APIs Part 6
David Bombal Intermediate 5y ago
Free CCNP 350-401 ENCOR Complete Course: 6.4: REST APIs Part 5
🔐 Cybersecurity
Free CCNP 350-401 ENCOR Complete Course: 6.4: REST APIs Part 5
David Bombal Intermediate 5y ago
Moving Past Just Googling It: Harvesting and Using OSINT | SANS@MIC Talk
🔐 Cybersecurity
Moving Past Just Googling It: Harvesting and Using OSINT | SANS@MIC Talk
SANS Institute Intermediate 5y ago
Free CCNP 350-401 ENCOR Complete Course: 6.4: REST APIs Part 4
🔐 Cybersecurity
Free CCNP 350-401 ENCOR Complete Course: 6.4: REST APIs Part 4
David Bombal Intermediate 5y ago
Puppet for Network Engineers (CCNA and CCNP Automation)
🔐 Cybersecurity
Puppet for Network Engineers (CCNA and CCNP Automation)
NetworkChuck Beginner 5y ago
Find_Evil - Threat Hunting | SANS@MIC Talk
🔐 Cybersecurity
Find_Evil - Threat Hunting | SANS@MIC Talk
SANS Institute Advanced 5y ago
TryHackMe! Buffer Overflow & Penetration Testing
🔐 Cybersecurity
TryHackMe! Buffer Overflow & Penetration Testing
John Hammond Intermediate 5y ago
Tricking modern endpoint security products | SANS@MIC Talk
🔐 Cybersecurity
Tricking modern endpoint security products | SANS@MIC Talk
SANS Institute Advanced 5y ago
📚 Coursera Courses Opens on Coursera · Free to audit
1 / 3 View all →
Case-Based Frameworks for Mastering Management Consulting
📚 Coursera Course ↗
Self-paced
Case-Based Frameworks for Mastering Management Consulting
Opens on Coursera ↗
Incident Response and Threat Mitigation
📚 Coursera Course ↗
Self-paced
Incident Response and Threat Mitigation
Opens on Coursera ↗
Advanced Networking, Virtualization, and Security
📚 Coursera Course ↗
Self-paced
Advanced Networking, Virtualization, and Security
Opens on Coursera ↗
Hardware and Operating System Foundations III
📚 Coursera Course ↗
Self-paced
Hardware and Operating System Foundations III
Opens on Coursera ↗
Network Security Principles
📚 Coursera Course ↗
Self-paced
Network Security Principles
Opens on Coursera ↗
Hacking COVID-19 — Course 1: Identifying a Deadly Pathogen
📚 Coursera Course ↗
Self-paced
Hacking COVID-19 — Course 1: Identifying a Deadly Pathogen
Opens on Coursera ↗