Tech Skills

Cybersecurity

Ethical hacking, penetration testing, network security, CTFs and defensive security

6,989
lessons
Skills in this topic
View full skill map →
Security Basics
beginner
Fix OWASP top 10 vulnerabilities
AI Security
intermediate
Identify and patch prompt injection vulnerabilities
Network Security
intermediate
Configure a firewall with proper inbound/outbound rules
Ethical Hacking & Pen Testing
intermediate
Conduct a full pen test with Kali Linux
Cloud Security
intermediate
Implement IAM least-privilege policies on AWS/GCP
Incident Response
intermediate
Build an incident response playbook
Security Compliance
intermediate
Map controls for SOC 2 Type II compliance
Defensive AI
advanced
Build an AI-powered log anomaly detector
Writing a Pentest Report
Cybersecurity ⚡ AI Lesson
Writing a Pentest Report
The Cyber Mentor Beginner 6y ago
Including Details Most Readers Don’t Read - Common Cybersecurity Writing Mistakes
Cybersecurity
Including Details Most Readers Don’t Read - Common Cybersecurity Writing Mistakes
SANS Institute Beginner 6y ago
What is Wi-Fi 6? Fundamentals of 802.11ax / wifi 6
Cybersecurity
What is Wi-Fi 6? Fundamentals of 802.11ax / wifi 6
David Bombal Beginner 6y ago
Hacking Browsers - Setup and Debug JavaScriptCore / WebKit
Cybersecurity
Hacking Browsers - Setup and Debug JavaScriptCore / WebKit
LiveOverflow Intermediate 6y ago
HackTheBox - Chaos
Cybersecurity
HackTheBox - Chaos
IppSec Beginner 6y ago
Post Exploitation With Empire And LaZagne
Cybersecurity ⚡ AI Lesson
Post Exploitation With Empire And LaZagne
HackerSploit Intermediate 6y ago
Escalating Tensions in Difficult Situations - Common Cybersecurity Writing Mistakes
Cybersecurity
Escalating Tensions in Difficult Situations - Common Cybersecurity Writing Mistakes
SANS Institute Beginner 6y ago
Wi-Fi 6 Augmented Reality Demo: 802.11ax wifi 6 changes the game!
Cybersecurity
Wi-Fi 6 Augmented Reality Demo: 802.11ax wifi 6 changes the game!
David Bombal Beginner 6y ago
Zero to Hero: Episode 10 - MS17-010/EternalBlue, GPP/cPasswords, and Kerberoasting
Cybersecurity ⚡ AI Lesson
Zero to Hero: Episode 10 - MS17-010/EternalBlue, GPP/cPasswords, and Kerberoasting
The Cyber Mentor Beginner 6y ago
bWAPP - Server-Side Include (SSI) Injection
Cybersecurity ⚡ AI Lesson
bWAPP - Server-Side Include (SSI) Injection
HackerSploit Intermediate 7y ago
HackTheBox - Conceal
Cybersecurity
HackTheBox - Conceal
IppSec Beginner 7y ago
SunshineCTF 2019: Wrestler Book (Explicit SQL Injection)
Cybersecurity ⚡ AI Lesson
SunshineCTF 2019: Wrestler Book (Explicit SQL Injection)
John Hammond Intermediate 7y ago
Using FUD to Cause Anxiety - Common Cybersecurity Writing Mistakes
Cybersecurity
Using FUD to Cause Anxiety - Common Cybersecurity Writing Mistakes
SANS Institute Beginner 6y ago
Not Using Parallel Structure - Common Cybersecurity Writing Mistakes
Cybersecurity
Not Using Parallel Structure - Common Cybersecurity Writing Mistakes
SANS Institute Beginner 6y ago
Using More Words Than Necessary - Common Cybersecurity Writing Mistakes
Cybersecurity ⚡ AI Lesson
Using More Words Than Necessary - Common Cybersecurity Writing Mistakes
SANS Institute Beginner 7y ago
Applying Inconsistent Formatting - Common Cybersecurity Writing Mistakes
Cybersecurity
Applying Inconsistent Formatting - Common Cybersecurity Writing Mistakes
SANS Institute Beginner 7y ago
Wi-Fi 6 Demo: Samsung S10 and Cisco AP: 802.11ax / wifi 6 smashes it!
Cybersecurity
Wi-Fi 6 Demo: Samsung S10 and Cisco AP: 802.11ax / wifi 6 smashes it!
David Bombal Beginner 7y ago
Including Indecipherable Graphics - Common Cybersecurity Writing Mistakes
Cybersecurity ⚡ AI Lesson
Including Indecipherable Graphics - Common Cybersecurity Writing Mistakes
SANS Institute Beginner 7y ago
Overstuffing the Paragraphs - Common Cybersecurity Writing Mistakes
Cybersecurity ⚡ AI Lesson
Overstuffing the Paragraphs - Common Cybersecurity Writing Mistakes
SANS Institute Beginner 7y ago
Burying the Main Point - Common Cybersecurity Writing Mistakes
Cybersecurity
Burying the Main Point - Common Cybersecurity Writing Mistakes
SANS Institute Beginner 7y ago
bWAPP - OS Command Injection With Commix (All levels)
Cybersecurity ⚡ AI Lesson
bWAPP - OS Command Injection With Commix (All levels)
HackerSploit Intermediate 7y ago
bWAPP - HTML Injection - Stored (Blog)
Cybersecurity ⚡ AI Lesson
bWAPP - HTML Injection - Stored (Blog)
HackerSploit Intermediate 7y ago
bWAPP - HTML Injection - Reflected POST
Cybersecurity ⚡ AI Lesson
bWAPP - HTML Injection - Reflected POST
HackerSploit Intermediate 7y ago
Zero to Hero: Week 9 - NTLM Relay, Token Impersonation, Pass the Hash, PsExec, and more
Cybersecurity ⚡ AI Lesson
Zero to Hero: Week 9 - NTLM Relay, Token Impersonation, Pass the Hash, PsExec, and more
The Cyber Mentor Beginner 7y ago
Active Directory Exploitation - LLMNR/NBT-NS Poisoning
Cybersecurity ⚡ AI Lesson
Active Directory Exploitation - LLMNR/NBT-NS Poisoning
The Cyber Mentor Beginner 7y ago
CrunchBangPlusPlus - #!++ - Installation & Review
Cybersecurity ⚡ AI Lesson
CrunchBangPlusPlus - #!++ - Installation & Review
HackerSploit Intermediate 7y ago
Bug Bounty Hunting - PHP Code Injection
Cybersecurity ⚡ AI Lesson
Bug Bounty Hunting - PHP Code Injection
HackerSploit Intermediate 7y ago
HackTheBox - LightWeight
Cybersecurity
HackTheBox - LightWeight
IppSec Intermediate 7y ago
Heartbleed Exploit - Discovery & Exploitation
Cybersecurity ⚡ AI Lesson
Heartbleed Exploit - Discovery & Exploitation
HackerSploit Intermediate 7y ago
A Day in the Life of an Ethical Hacker / Penetration Tester
Cybersecurity ⚡ AI Lesson
A Day in the Life of an Ethical Hacker / Penetration Tester
The Cyber Mentor Beginner 7y ago
Zero to Hero: Week 8 - Building an AD Lab, LLMNR Poisoning, and NTLMv2 Cracking with Hashcat
Cybersecurity ⚡ AI Lesson
Zero to Hero: Week 8 - Building an AD Lab, LLMNR Poisoning, and NTLMv2 Cracking with Hashcat
The Cyber Mentor Beginner 7y ago
Installing Windows Server 2016 on VMWare in 5 Minutes
Cybersecurity ⚡ AI Lesson
Installing Windows Server 2016 on VMWare in 5 Minutes
The Cyber Mentor Beginner 7y ago
How To Backup Linux Systems With Grsync
Cybersecurity ⚡ AI Lesson
How To Backup Linux Systems With Grsync
HackerSploit Intermediate 7y ago
HackTheBox - Bighead
Cybersecurity
HackTheBox - Bighead
IppSec Intermediate 7y ago
Bug Bounty Hunting - iframe Injection & HTML Injection
Cybersecurity ⚡ AI Lesson
Bug Bounty Hunting - iframe Injection & HTML Injection
HackerSploit Intermediate 7y ago
Zero to Hero Pentesting: Episode 7 - Exploitation, Shells, and Some Credential Stuffing
Cybersecurity ⚡ AI Lesson
Zero to Hero Pentesting: Episode 7 - Exploitation, Shells, and Some Credential Stuffing
The Cyber Mentor Beginner 7y ago
CCNA Dynamic Trunking Protocol (DTP) Quiz: Can you answer the ccna quiz questions?
Cybersecurity
CCNA Dynamic Trunking Protocol (DTP) Quiz: Can you answer the ccna quiz questions?
David Bombal Intermediate 7y ago
HackTheBox - Irked
Cybersecurity ⚡ AI Lesson
HackTheBox - Irked
IppSec Beginner 7y ago
Zero to Hero Pentesting: Episode 6 - Enumeration (Kioptrix & Hack The Box)
Cybersecurity ⚡ AI Lesson
Zero to Hero Pentesting: Episode 6 - Enumeration (Kioptrix & Hack The Box)
The Cyber Mentor Beginner 7y ago
How To Setup VSCode In The Cloud - code-server
Cybersecurity ⚡ AI Lesson
How To Setup VSCode In The Cloud - code-server
HackerSploit Intermediate 7y ago
Zero to Hero Pentesting: Episode 5 - Scanning Tools (Nmap, Nessus, BurpSuite, etc.) & Tactics
Cybersecurity ⚡ AI Lesson
Zero to Hero Pentesting: Episode 5 - Scanning Tools (Nmap, Nessus, BurpSuite, etc.) & Tactics
The Cyber Mentor Beginner 7y ago
Bug Bounty Hunting - Wfuzz - Web Content Discovery & Form Manipulation
Cybersecurity ⚡ AI Lesson
Bug Bounty Hunting - Wfuzz - Web Content Discovery & Form Manipulation
HackerSploit Beginner 7y ago
Bug Bounty Hunting - Tools I Use
Cybersecurity ⚡ AI Lesson
Bug Bounty Hunting - Tools I Use
HackerSploit Beginner 7y ago
Securing Vendor Webapps - A Vulnerability Assessment on HELK
Cybersecurity
Securing Vendor Webapps - A Vulnerability Assessment on HELK
IppSec Intermediate 7y ago
CCNA Quiz: The OSI model with Wireshark captures. Can you answer these quiz questions?
Cybersecurity
CCNA Quiz: The OSI model with Wireshark captures. Can you answer these quiz questions?
David Bombal Intermediate 7y ago
HackTheBox - Redcross
Cybersecurity
HackTheBox - Redcross
IppSec Beginner 7y ago
No more excuses! Take ownership of your career. Your life. Your future. Your choice!
Cybersecurity
No more excuses! Take ownership of your career. Your life. Your future. Your choice!
David Bombal Advanced 7y ago
Zero to Hero Pentesting: Episode 4 - Five Phases of Hacking + Passive OSINT
Cybersecurity ⚡ AI Lesson
Zero to Hero Pentesting: Episode 4 - Five Phases of Hacking + Passive OSINT
The Cyber Mentor Beginner 7y ago
📚 Coursera Courses Opens on Coursera · Free to audit
1 / 3 View all →
IT-Sicherheit: Grundlagen für Sicherheitsarchitektur
📚 Coursera Course ↗
Self-paced
IT-Sicherheit: Grundlagen für Sicherheitsarchitektur
Opens on Coursera ↗
Cybersecurity Foundations: Threats Networks, and IoT Protection
📚 Coursera Course ↗
Self-paced
Cybersecurity Foundations: Threats Networks, and IoT Protection
Opens on Coursera ↗
Introduction to Google Security Operations: Unified SecOps
📚 Coursera Course ↗
Self-paced
Introduction to Google Security Operations: Unified SecOps
Opens on Coursera ↗
Security & Ethical Hacking: Attacking Unix and Windows
📚 Coursera Course ↗
Self-paced
Security & Ethical Hacking: Attacking Unix and Windows
Opens on Coursera ↗
AWS: Network Security, Compliance and Governance
📚 Coursera Course ↗
Self-paced
AWS: Network Security, Compliance and Governance
Opens on Coursera ↗
Verbal Communications and Presentation Skills
📚 Coursera Course ↗
Self-paced
Verbal Communications and Presentation Skills
Opens on Coursera ↗