Tech Skills

Cybersecurity

Ethical hacking, penetration testing, network security, CTFs and defensive security

6,967
lessons
Skills in this topic
View full skill map →
Security Basics
beginner
Fix OWASP top 10 vulnerabilities
AI Security
intermediate
Identify and patch prompt injection vulnerabilities
Network Security
intermediate
Configure a firewall with proper inbound/outbound rules
Ethical Hacking & Pen Testing
intermediate
Conduct a full pen test with Kali Linux
Cloud Security
intermediate
Implement IAM least-privilege policies on AWS/GCP
Incident Response
intermediate
Build an incident response playbook
Security Compliance
intermediate
Map controls for SOC 2 Type II compliance
Defensive AI
advanced
Build an AI-powered log anomaly detector
Penetration Testing Bootcamp - The CIA Triad
Cybersecurity ⚡ AI Lesson
Penetration Testing Bootcamp - The CIA Triad
HackerSploit Intermediate 6y ago
Penetration Testing Bootcamp - Infosec Terminology
Cybersecurity ⚡ AI Lesson
Penetration Testing Bootcamp - Infosec Terminology
HackerSploit Intermediate 6y ago
The Latest in Cyber Attacks
Cybersecurity ⚡ AI Lesson
The Latest in Cyber Attacks
a16z Beginner 6y ago
Beginner Malware Analysis Course - GIVEAWAY
Cybersecurity
Beginner Malware Analysis Course - GIVEAWAY
John Hammond Beginner 6y ago
CCNA Lab BATTLE!! // GNS3 vs Physical - ft. Jeremy Cioara
Cybersecurity ⚡ AI Lesson
CCNA Lab BATTLE!! // GNS3 vs Physical - ft. Jeremy Cioara
NetworkChuck Beginner 6y ago
Subnetting Made Easy
Cybersecurity ⚡ AI Lesson
Subnetting Made Easy
The Cyber Mentor Beginner 6y ago
7 Security risks you should never take as a developer
Cybersecurity ⚡ AI Lesson
7 Security risks you should never take as a developer
Fireship Intermediate 6y ago
UniFi Dream Machine - the BEST WiFi router (Review and Advanced Setup)
Cybersecurity ⚡ AI Lesson
UniFi Dream Machine - the BEST WiFi router (Review and Advanced Setup)
NetworkChuck Advanced 6y ago
Troubleshooting Kali Linux Installation Issues
Cybersecurity
Troubleshooting Kali Linux Installation Issues
David Bombal Beginner 6y ago
Cyber Threats to Electric Industry - What You Need to Know | STAR Webcast
Cybersecurity
Cyber Threats to Electric Industry - What You Need to Know | STAR Webcast
SANS Institute Advanced 6y ago
Think ClickFunnels in 2019 Was Epic? You Will Never Guess What’s Coming Next!
Cybersecurity ⚡ AI Lesson
Think ClickFunnels in 2019 Was Epic? You Will Never Guess What’s Coming Next!
Russell Brunson Beginner 6y ago
Dynamic ARP Inspection: Stop Kali Linux ARP poisoning attacks
Cybersecurity
Dynamic ARP Inspection: Stop Kali Linux ARP poisoning attacks
David Bombal Intermediate 6y ago
ALL NEW OSCP - REVAMPED 2020
Cybersecurity ⚡ AI Lesson
ALL NEW OSCP - REVAMPED 2020
John Hammond Intermediate 6y ago
Making a PARTICLE SYSTEM in ONE HOUR! (NO ENGINES)
Cybersecurity
Making a PARTICLE SYSTEM in ONE HOUR! (NO ENGINES)
The Cherno Intermediate 6y ago
Build Effective Cybersecurity Team Skills | SANS Team-Based Training
Cybersecurity
Build Effective Cybersecurity Team Skills | SANS Team-Based Training
SANS Institute Advanced 6y ago
HackTheBox - Player
Cybersecurity
HackTheBox - Player
IppSec Beginner 6y ago
Perfect Forward Secrecy in TLS Explained
Cybersecurity ⚡ AI Lesson
Perfect Forward Secrecy in TLS Explained
Hussein Nasser Beginner 6y ago
How I Made $100,000 in a Month
Cybersecurity ⚡ AI Lesson
How I Made $100,000 in a Month
The Cyber Mentor Beginner 6y ago
How HTTPS Work?
Cybersecurity
How HTTPS Work?
Hussein Nasser Advanced 6y ago
Penetration Testing Bootcamp - Introduction
Cybersecurity ⚡ AI Lesson
Penetration Testing Bootcamp - Introduction
HackerSploit Beginner 6y ago
How to Study for IT Certifications (and KILL IT!!)
Cybersecurity ⚡ AI Lesson
How to Study for IT Certifications (and KILL IT!!)
NetworkChuck Beginner 6y ago
Block ALL online Ads with Pi-Hole and the Brave Browser (bonus Tor)
Cybersecurity
Block ALL online Ads with Pi-Hole and the Brave Browser (bonus Tor)
David Bombal Intermediate 6y ago
OVERWHELMED with technology (IT)....what can I do?
Cybersecurity ⚡ AI Lesson
OVERWHELMED with technology (IT)....what can I do?
NetworkChuck Beginner 6y ago
RiceTeaCatPanda CTF - Wrong Way, Lots of Stuff
Cybersecurity
RiceTeaCatPanda CTF - Wrong Way, Lots of Stuff
John Hammond Intermediate 6y ago
How to change Windows 10 MAC Addresses - WiFi and Ethernet
Cybersecurity
How to change Windows 10 MAC Addresses - WiFi and Ethernet
David Bombal Beginner 6y ago
how AWS is messing up the Super Bowl (and all other sports)
Cybersecurity ⚡ AI Lesson
how AWS is messing up the Super Bowl (and all other sports)
NetworkChuck Beginner 6y ago
Cybertalk - EP5 - Is The CEH Worth It?
Cybersecurity ⚡ AI Lesson
Cybertalk - EP5 - Is The CEH Worth It?
HackerSploit Intermediate 6y ago
The State of Cloud Security: How Does Your Organization Compare? | SANS Cloud Security Summit 2019
Cybersecurity
The State of Cloud Security: How Does Your Organization Compare? | SANS Cloud Security Summit 2019
SANS Institute Intermediate 6y ago
Can I really become an Ethical Hacker?
Cybersecurity ⚡ AI Lesson
Can I really become an Ethical Hacker?
NetworkChuck Beginner 6y ago
Bypass Windows Authentication With Kon-Boot
Cybersecurity ⚡ AI Lesson
Bypass Windows Authentication With Kon-Boot
HackerSploit Intermediate 6y ago
WiFi 6 put to the test! 802.11ax iPhone 11 any good?
Cybersecurity
WiFi 6 put to the test! 802.11ax iPhone 11 any good?
David Bombal Beginner 6y ago
Recon-ng V5 - Web Interface
Cybersecurity ⚡ AI Lesson
Recon-ng V5 - Web Interface
HackerSploit Intermediate 6y ago
this year....I'm going to become a HACKER!!
Cybersecurity ⚡ AI Lesson
this year....I'm going to become a HACKER!!
NetworkChuck Beginner 6y ago
Recognizing Base85 - RiceTeaCatPanda CTF
Cybersecurity
Recognizing Base85 - RiceTeaCatPanda CTF
John Hammond Intermediate 6y ago
DHCP Snooping: Stop Kali DHCP Hacks and MITM
Cybersecurity
DHCP Snooping: Stop Kali DHCP Hacks and MITM
David Bombal Beginner 6y ago
Google Dorks For Penetration Testing
Cybersecurity ⚡ AI Lesson
Google Dorks For Penetration Testing
HackerSploit Intermediate 6y ago
Our Content Is Now On LBRY
Cybersecurity ⚡ AI Lesson
Our Content Is Now On LBRY
HackerSploit Beginner 6y ago
SANS Institute & Trace Labs partner on an OSINT Missing Persons CTF challenge at SANS CDI 2019
Cybersecurity
SANS Institute & Trace Labs partner on an OSINT Missing Persons CTF challenge at SANS CDI 2019
SANS Institute Intermediate 6y ago
HackTheBox Walkthrough - Popcorn
Cybersecurity ⚡ AI Lesson
HackTheBox Walkthrough - Popcorn
HackerSploit Intermediate 6y ago
HackTheBox Walkthrough - Devel
Cybersecurity ⚡ AI Lesson
HackTheBox Walkthrough - Devel
HackerSploit Intermediate 6y ago
HackTheBox Walkthrough - Legacy
Cybersecurity ⚡ AI Lesson
HackTheBox Walkthrough - Legacy
HackerSploit Intermediate 6y ago
SPECIAL WEBCAST: What you need to know about the Crypt32.dll / CryptoAPI Flaw
Cybersecurity
SPECIAL WEBCAST: What you need to know about the Crypt32.dll / CryptoAPI Flaw
SANS Institute Advanced 6y ago
Hosting My Own CTF - BsidesDE 2019
Cybersecurity
Hosting My Own CTF - BsidesDE 2019
John Hammond Intermediate 6y ago
OverTheWire Natas Walkthrough - Level 5 - 10 (LFI & Command Injection)
Cybersecurity ⚡ AI Lesson
OverTheWire Natas Walkthrough - Level 5 - 10 (LFI & Command Injection)
HackerSploit Intermediate 6y ago
VirtualBox nested Intel virtualization is here!
Cybersecurity
VirtualBox nested Intel virtualization is here!
David Bombal Intermediate 6y ago
OverTheWire Natas Walkthrough - Level 0 - 4
Cybersecurity ⚡ AI Lesson
OverTheWire Natas Walkthrough - Level 0 - 4
HackerSploit Intermediate 6y ago
What Is The Best Linux Distribution?
Cybersecurity ⚡ AI Lesson
What Is The Best Linux Distribution?
HackerSploit Beginner 6y ago
OverTheWire Bandit Walkthrough - Level 32 - 33
Cybersecurity ⚡ AI Lesson
OverTheWire Bandit Walkthrough - Level 32 - 33
HackerSploit Beginner 6y ago
📚 Coursera Courses Opens on Coursera · Free to audit
1 / 3 View all →
Introduction to Detection and Incident Response
📚 Coursera Course ↗
Self-paced
Introduction to Detection and Incident Response
Opens on Coursera ↗
Microsoft Security Solutions Capabilities
📚 Coursera Course ↗
Self-paced
Microsoft Security Solutions Capabilities
Opens on Coursera ↗
Introduction to Cybersecurity Tools & Cyberattacks
📚 Coursera Course ↗
Self-paced
Introduction to Cybersecurity Tools & Cyberattacks
Opens on Coursera ↗
Check Point Jump Start: Quantum Spark Network Security
📚 Coursera Course ↗
Self-paced
Check Point Jump Start: Quantum Spark Network Security
Opens on Coursera ↗
Network Traffic Analysis with Wireshark
📚 Coursera Course ↗
Self-paced
Network Traffic Analysis with Wireshark
Opens on Coursera ↗
The Pearson Complete Course for CISM Certification: Unit 3
📚 Coursera Course ↗
Self-paced
The Pearson Complete Course for CISM Certification: Unit 3
Opens on Coursera ↗