Tech Skills

Cybersecurity

Ethical hacking, penetration testing, network security, CTFs and defensive security

6,989
lessons
Skills in this topic
View full skill map →
Security Basics
beginner
Fix OWASP top 10 vulnerabilities
AI Security
intermediate
Identify and patch prompt injection vulnerabilities
Network Security
intermediate
Configure a firewall with proper inbound/outbound rules
Ethical Hacking & Pen Testing
intermediate
Conduct a full pen test with Kali Linux
Cloud Security
intermediate
Implement IAM least-privilege policies on AWS/GCP
Incident Response
intermediate
Build an incident response playbook
Security Compliance
intermediate
Map controls for SOC 2 Type II compliance
Defensive AI
advanced
Build an AI-powered log anomaly detector
How To Install BlackArch Linux
Cybersecurity ⚡ AI Lesson
How To Install BlackArch Linux
HackerSploit Intermediate 6y ago
HackTheBox - LaCasaDePapel
Cybersecurity
HackTheBox - LaCasaDePapel
IppSec Beginner 6y ago
Zero-Trust Networks: The Future Is Here - SANS Blue Team Summit 2019
Cybersecurity
Zero-Trust Networks: The Future Is Here - SANS Blue Team Summit 2019
SANS Institute Intermediate 6y ago
How To Setup A Virtualization Server With Proxmox
Cybersecurity ⚡ AI Lesson
How To Setup A Virtualization Server With Proxmox
HackerSploit Intermediate 6y ago
MITRE CTF 2019 HIGHLIGHTS
Cybersecurity ⚡ AI Lesson
MITRE CTF 2019 HIGHLIGHTS
John Hammond Intermediate 6y ago
How public WIFI can be sniffed?
Cybersecurity ⚡ AI Lesson
How public WIFI can be sniffed?
Hussein Nasser Intermediate 6y ago
Chatting about Cryptography and Exploit Regulations
Cybersecurity
Chatting about Cryptography and Exploit Regulations
LiveUnderflow Intermediate 6y ago
To Blue with ATT&CK-Flavored Love - SANS Blue Team Summit
Cybersecurity
To Blue with ATT&CK-Flavored Love - SANS Blue Team Summit
SANS Institute Intermediate 6y ago
Full Ethical Hacking Course - Beginner Network Penetration Testing (2019)
Cybersecurity ⚡ AI Lesson
Full Ethical Hacking Course - Beginner Network Penetration Testing (2019)
The Cyber Mentor Beginner 6y ago
Hacking Skills Perspective
Cybersecurity
Hacking Skills Perspective
LiveUnderflow Intermediate 6y ago
tshark and Termshark tutorial: Capture and view wireshark captures in a console
Cybersecurity
tshark and Termshark tutorial: Capture and view wireshark captures in a console
David Bombal Beginner 6y ago
Speedrun Hacking Buffer Overflow - speedrun-001 DC27
Cybersecurity
Speedrun Hacking Buffer Overflow - speedrun-001 DC27
LiveOverflow Beginner 6y ago
Linux for Ethical Hackers (Kali Linux Tutorial)
Cybersecurity
Linux for Ethical Hackers (Kali Linux Tutorial)
freeCodeCamp.org Beginner 6y ago
YouTube BANNING Hacking Videos - Hot Take
Cybersecurity ⚡ AI Lesson
YouTube BANNING Hacking Videos - Hot Take
LiveOverflow Beginner 6y ago
Python, Genie and CSV Files = Easy Network Automation (DevNet)
Cybersecurity
Python, Genie and CSV Files = Easy Network Automation (DevNet)
David Bombal Beginner 6y ago
The Complete Linux for Ethical Hackers Course for 2019
Cybersecurity ⚡ AI Lesson
The Complete Linux for Ethical Hackers Course for 2019
The Cyber Mentor Beginner 6y ago
TCP Tunneling Applications Pros and Cons (Explained by Example)
Cybersecurity
TCP Tunneling Applications Pros and Cons (Explained by Example)
Hussein Nasser Beginner 6y ago
HSCTF - RSA Cryptography (Reverse Search Algorithm)
Cybersecurity ⚡ AI Lesson
HSCTF - RSA Cryptography (Reverse Search Algorithm)
John Hammond Intermediate 6y ago
RESET Your MINDSET - Motivational Speech For Finding Success Garret J. White
Cybersecurity
RESET Your MINDSET - Motivational Speech For Finding Success Garret J. White
Russell Brunson Beginner 6y ago
Pivoting And Persistence With Armitage
Cybersecurity ⚡ AI Lesson
Pivoting And Persistence With Armitage
HackerSploit Intermediate 6y ago
Post Exploitation With Windows Credentials Editor (WCE) - Dump Windows Password Hashes
Cybersecurity ⚡ AI Lesson
Post Exploitation With Windows Credentials Editor (WCE) - Dump Windows Password Hashes
HackerSploit Intermediate 6y ago
Information Gathering With Shodan
Cybersecurity ⚡ AI Lesson
Information Gathering With Shodan
HackerSploit Intermediate 6y ago
Discussing Hacking Videos - Community Guidelines YouTube
Cybersecurity
Discussing Hacking Videos - Community Guidelines YouTube
LiveUnderflow Beginner 6y ago
Defeating Attackers with Preventative Security
Cybersecurity
Defeating Attackers with Preventative Security
SANS Institute Intermediate 6y ago
Paste-Tastic! - Post Google CTF 2019 Stream
Cybersecurity
Paste-Tastic! - Post Google CTF 2019 Stream
LiveOverflow Beginner 6y ago
Wireshark: Packet Analysis and Ethical Hacking Course
Cybersecurity
Wireshark: Packet Analysis and Ethical Hacking Course
David Bombal Intermediate 6y ago
Transport Layer Security, TLS 1.2 and 1.3 (Explained by Example)
Cybersecurity
Transport Layer Security, TLS 1.2 and 1.3 (Explained by Example)
Hussein Nasser Beginner 6y ago
PowerShell Empire Complete Tutorial For Beginners - Mimikatz & Privilege Escalation
Cybersecurity ⚡ AI Lesson
PowerShell Empire Complete Tutorial For Beginners - Mimikatz & Privilege Escalation
HackerSploit Beginner 6y ago
Why You Should Take SEC560: Network Penetration Testing and Ethical Hacking
Cybersecurity
Why You Should Take SEC560: Network Penetration Testing and Ethical Hacking
SANS Institute Beginner 6y ago
Why You Should Take SEC660: Advanced Penetration Testing, Exploit Writing, and Ethical Hacking
Cybersecurity
Why You Should Take SEC660: Advanced Penetration Testing, Exploit Writing, and Ethical Hacking
SANS Institute Intermediate 6y ago
Why You Should Take AUD507: Auditing & Monitoring Networks, Perimeters & Systems
Cybersecurity
Why You Should Take AUD507: Auditing & Monitoring Networks, Perimeters & Systems
SANS Institute Intermediate 6y ago
Why You Should Take SEC504: Hacker Tools, Techniques, Exploits, and Incident Handling
Cybersecurity
Why You Should Take SEC504: Hacker Tools, Techniques, Exploits, and Incident Handling
SANS Institute Intermediate 6y ago
Key Take-Aways from SEC401: Security Essentials Bootcamp Style
Cybersecurity
Key Take-Aways from SEC401: Security Essentials Bootcamp Style
SANS Institute Beginner 6y ago
Key Take-Aways from SEC503: Intrusion Detection In-Depth
Cybersecurity ⚡ AI Lesson
Key Take-Aways from SEC503: Intrusion Detection In-Depth
SANS Institute Beginner 6y ago
BUILDING AN 8-BIT COMPUTER FROM SCRATCH #2 (Full Stream)
Cybersecurity
BUILDING AN 8-BIT COMPUTER FROM SCRATCH #2 (Full Stream)
LiveUnderflow Intermediate 6y ago
HSCTF - Hidden UTF-8 Encoding (Real Reversal)
Cybersecurity
HSCTF - Hidden UTF-8 Encoding (Real Reversal)
John Hammond Intermediate 6y ago
What Do You Need To Know About SANS SEC760: Advanced Exploit Development for Penetration Testers?
Cybersecurity
What Do You Need To Know About SANS SEC760: Advanced Exploit Development for Penetration Testers?
SANS Institute Intermediate 6y ago
HSCTF - Obfuscated JavaScript (JSF**k) [Verbose]
Cybersecurity
HSCTF - Obfuscated JavaScript (JSF**k) [Verbose]
John Hammond Intermediate 6y ago
You can also code! Network Engineer programs Cisco Viptela SD-WAN using Python! DevNet demo
Cybersecurity
You can also code! Network Engineer programs Cisco Viptela SD-WAN using Python! DevNet demo
David Bombal Beginner 6y ago
How To Setup A Sandbox Environment For Malware Analysis
Cybersecurity ⚡ AI Lesson
How To Setup A Sandbox Environment For Malware Analysis
HackerSploit Intermediate 6y ago
Don't bury your head in the sand! Start Now! DevNet to the rescue.
Cybersecurity
Don't bury your head in the sand! Start Now! DevNet to the rescue.
David Bombal Beginner 6y ago
Remcos RAT Review - The Most Advanced Remote Access Tool
Cybersecurity ⚡ AI Lesson
Remcos RAT Review - The Most Advanced Remote Access Tool
HackerSploit Advanced 6y ago
Crypto: Classic RSA with a Twist (ParsonsCTF)
Cybersecurity ⚡ AI Lesson
Crypto: Classic RSA with a Twist (ParsonsCTF)
John Hammond Intermediate 6y ago
Linux Essentials: Curl Fundamentals
Cybersecurity ⚡ AI Lesson
Linux Essentials: Curl Fundamentals
HackerSploit Intermediate 6y ago
Facebook CTF - SQL Injection with Spaces (Products Manager)
Cybersecurity
Facebook CTF - SQL Injection with Spaces (Products Manager)
John Hammond Intermediate 6y ago
Will Network Engineers still have jobs? Or will Software Developers replace Network Engineers?
Cybersecurity
Will Network Engineers still have jobs? Or will Software Developers replace Network Engineers?
David Bombal Beginner 6y ago
Zero to Hero: Week 11 - File Transfers, Pivoting, and Reporting Writing
Cybersecurity ⚡ AI Lesson
Zero to Hero: Week 11 - File Transfers, Pivoting, and Reporting Writing
The Cyber Mentor Beginner 6y ago
Not Giving Credit Where Credit is Due - Common Cybersecurity Writing Mistakes
Cybersecurity ⚡ AI Lesson
Not Giving Credit Where Credit is Due - Common Cybersecurity Writing Mistakes
SANS Institute Beginner 6y ago
📚 Coursera Courses Opens on Coursera · Free to audit
1 / 3 View all →
CFR: Risk and Threat Analysis
📚 Coursera Course ↗
Self-paced
CFR: Risk and Threat Analysis
Opens on Coursera ↗
Security Fundamentals – Core Cybersecurity Essentials
📚 Coursera Course ↗
Self-paced
Security Fundamentals – Core Cybersecurity Essentials
Opens on Coursera ↗
Enabling Sensitive Data Protection Discovery for BigQuery
📚 Coursera Course ↗
Self-paced
Enabling Sensitive Data Protection Discovery for BigQuery
Opens on Coursera ↗
Evalúa tus necesidades con Cloud Next Generation Firewall
📚 Coursera Course ↗
Self-paced
Evalúa tus necesidades con Cloud Next Generation Firewall
Opens on Coursera ↗
Python Hacking: Apply, Implement & Analyze
📚 Coursera Course ↗
Self-paced
Python Hacking: Apply, Implement & Analyze
Opens on Coursera ↗
Secure Networked System with Firewall and IDS
📚 Coursera Course ↗
Self-paced
Secure Networked System with Firewall and IDS
Opens on Coursera ↗