Tech Skills

Cybersecurity

Ethical hacking, penetration testing, network security, CTFs and defensive security

6354
lessons
Crypto: Classic RSA with a Twist (ParsonsCTF)
🔐 Cybersecurity
Crypto: Classic RSA with a Twist (ParsonsCTF)
John Hammond Intermediate 6y ago
Linux Essentials: Curl Fundamentals
🔐 Cybersecurity
Linux Essentials: Curl Fundamentals
HackerSploit Intermediate 6y ago
Facebook CTF - SQL Injection with Spaces (Products Manager)
🔐 Cybersecurity
Facebook CTF - SQL Injection with Spaces (Products Manager)
John Hammond Intermediate 6y ago
Will Network Engineers still have jobs? Or will Software Developers replace Network Engineers?
🔐 Cybersecurity
Will Network Engineers still have jobs? Or will Software Developers replace Network Engineers?
David Bombal Beginner 6y ago
Zero to Hero: Week 11 - File Transfers, Pivoting, and Reporting Writing
🔐 Cybersecurity
Zero to Hero: Week 11 - File Transfers, Pivoting, and Reporting Writing
The Cyber Mentor Beginner 6y ago
Not Giving Credit Where Credit is Due - Common Cybersecurity Writing Mistakes
🔐 Cybersecurity
Not Giving Credit Where Credit is Due - Common Cybersecurity Writing Mistakes
SANS Institute Beginner 6y ago
Writing a Pentest Report
🔐 Cybersecurity
Writing a Pentest Report
The Cyber Mentor Beginner 6y ago
Including Details Most Readers Don’t Read - Common Cybersecurity Writing Mistakes
🔐 Cybersecurity
Including Details Most Readers Don’t Read - Common Cybersecurity Writing Mistakes
SANS Institute Beginner 6y ago
What is Wi-Fi 6? Fundamentals of 802.11ax / wifi 6
🔐 Cybersecurity
What is Wi-Fi 6? Fundamentals of 802.11ax / wifi 6
David Bombal Beginner 6y ago
Hacking Browsers - Setup and Debug JavaScriptCore / WebKit
🔐 Cybersecurity
Hacking Browsers - Setup and Debug JavaScriptCore / WebKit
LiveOverflow Intermediate 6y ago
HackTheBox - Chaos
🔐 Cybersecurity
HackTheBox - Chaos
IppSec Beginner 6y ago
Post Exploitation With Empire And LaZagne
🔐 Cybersecurity
Post Exploitation With Empire And LaZagne
HackerSploit Intermediate 6y ago
HackTheBox - Conceal
🔐 Cybersecurity
HackTheBox - Conceal
IppSec Beginner 6y ago
Escalating Tensions in Difficult Situations - Common Cybersecurity Writing Mistakes
🔐 Cybersecurity
Escalating Tensions in Difficult Situations - Common Cybersecurity Writing Mistakes
SANS Institute Beginner 6y ago
Using FUD to Cause Anxiety - Common Cybersecurity Writing Mistakes
🔐 Cybersecurity
Using FUD to Cause Anxiety - Common Cybersecurity Writing Mistakes
SANS Institute Beginner 6y ago
Wi-Fi 6 Augmented Reality Demo: 802.11ax wifi 6 changes the game!
🔐 Cybersecurity
Wi-Fi 6 Augmented Reality Demo: 802.11ax wifi 6 changes the game!
David Bombal Beginner 6y ago
Zero to Hero: Episode 10 - MS17-010/EternalBlue, GPP/cPasswords, and Kerberoasting
🔐 Cybersecurity
Zero to Hero: Episode 10 - MS17-010/EternalBlue, GPP/cPasswords, and Kerberoasting
The Cyber Mentor Beginner 6y ago
Not Using Parallel Structure - Common Cybersecurity Writing Mistakes
🔐 Cybersecurity
Not Using Parallel Structure - Common Cybersecurity Writing Mistakes
SANS Institute Beginner 6y ago
Using More Words Than Necessary - Common Cybersecurity Writing Mistakes
🔐 Cybersecurity
Using More Words Than Necessary - Common Cybersecurity Writing Mistakes
SANS Institute Beginner 6y ago
Applying Inconsistent Formatting - Common Cybersecurity Writing Mistakes
🔐 Cybersecurity
Applying Inconsistent Formatting - Common Cybersecurity Writing Mistakes
SANS Institute Beginner 6y ago
bWAPP - Server-Side Include (SSI) Injection
🔐 Cybersecurity
bWAPP - Server-Side Include (SSI) Injection
HackerSploit Intermediate 6y ago
Wi-Fi 6 Demo: Samsung S10 and Cisco AP: 802.11ax / wifi 6 smashes it!
🔐 Cybersecurity
Wi-Fi 6 Demo: Samsung S10 and Cisco AP: 802.11ax / wifi 6 smashes it!
David Bombal Beginner 6y ago
Including Indecipherable Graphics - Common Cybersecurity Writing Mistakes
🔐 Cybersecurity
Including Indecipherable Graphics - Common Cybersecurity Writing Mistakes
SANS Institute Beginner 6y ago
Overstuffing the Paragraphs - Common Cybersecurity Writing Mistakes
🔐 Cybersecurity
Overstuffing the Paragraphs - Common Cybersecurity Writing Mistakes
SANS Institute Beginner 6y ago
Burying the Main Point - Common Cybersecurity Writing Mistakes
🔐 Cybersecurity
Burying the Main Point - Common Cybersecurity Writing Mistakes
SANS Institute Beginner 6y ago
bWAPP - OS Command Injection With Commix (All levels)
🔐 Cybersecurity
bWAPP - OS Command Injection With Commix (All levels)
HackerSploit Intermediate 6y ago
bWAPP - HTML Injection - Stored (Blog)
🔐 Cybersecurity
bWAPP - HTML Injection - Stored (Blog)
HackerSploit Intermediate 6y ago
bWAPP - HTML Injection - Reflected POST
🔐 Cybersecurity
bWAPP - HTML Injection - Reflected POST
HackerSploit Intermediate 6y ago
Zero to Hero: Week 9 - NTLM Relay, Token Impersonation, Pass the Hash, PsExec, and more
🔐 Cybersecurity
Zero to Hero: Week 9 - NTLM Relay, Token Impersonation, Pass the Hash, PsExec, and more
The Cyber Mentor Beginner 6y ago
Active Directory Exploitation - LLMNR/NBT-NS Poisoning
🔐 Cybersecurity
Active Directory Exploitation - LLMNR/NBT-NS Poisoning
The Cyber Mentor Beginner 6y ago
CrunchBangPlusPlus - #!++ - Installation & Review
🔐 Cybersecurity
CrunchBangPlusPlus - #!++ - Installation & Review
HackerSploit Intermediate 6y ago
Time. What did you do today?
🔐 Cybersecurity
Time. What did you do today?
David Bombal Intermediate 6y ago
Bug Bounty Hunting - PHP Code Injection
🔐 Cybersecurity
Bug Bounty Hunting - PHP Code Injection
HackerSploit Intermediate 6y ago
HackTheBox - LightWeight
🔐 Cybersecurity
HackTheBox - LightWeight
IppSec Intermediate 6y ago
Heartbleed Exploit - Discovery & Exploitation
🔐 Cybersecurity
Heartbleed Exploit - Discovery & Exploitation
HackerSploit Intermediate 6y ago
A Day in the Life of an Ethical Hacker / Penetration Tester
🔐 Cybersecurity
A Day in the Life of an Ethical Hacker / Penetration Tester
The Cyber Mentor Beginner 6y ago
Zero to Hero: Week 8 - Building an AD Lab, LLMNR Poisoning, and NTLMv2 Cracking with Hashcat
🔐 Cybersecurity
Zero to Hero: Week 8 - Building an AD Lab, LLMNR Poisoning, and NTLMv2 Cracking with Hashcat
The Cyber Mentor Beginner 6y ago
Installing Windows Server 2016 on VMWare in 5 Minutes
🔐 Cybersecurity
Installing Windows Server 2016 on VMWare in 5 Minutes
The Cyber Mentor Beginner 6y ago
How To Backup Linux Systems With Grsync
🔐 Cybersecurity
How To Backup Linux Systems With Grsync
HackerSploit Intermediate 6y ago
CCNA Routing Troubleshooting Quiz Question: Can you answer this ccna quiz question?
🔐 Cybersecurity
CCNA Routing Troubleshooting Quiz Question: Can you answer this ccna quiz question?
David Bombal Intermediate 6y ago
HackTheBox - Bighead
🔐 Cybersecurity
HackTheBox - Bighead
IppSec Intermediate 6y ago
Bug Bounty Hunting - iframe Injection & HTML Injection
🔐 Cybersecurity
Bug Bounty Hunting - iframe Injection & HTML Injection
HackerSploit Intermediate 6y ago
Zero to Hero Pentesting: Episode 7 - Exploitation, Shells, and Some Credential Stuffing
🔐 Cybersecurity
Zero to Hero Pentesting: Episode 7 - Exploitation, Shells, and Some Credential Stuffing
The Cyber Mentor Beginner 6y ago
CCNA Dynamic Trunking Protocol (DTP) Quiz: Can you answer the ccna quiz questions?
🔐 Cybersecurity
CCNA Dynamic Trunking Protocol (DTP) Quiz: Can you answer the ccna quiz questions?
David Bombal Intermediate 6y ago
HackTheBox - Irked
🔐 Cybersecurity
HackTheBox - Irked
IppSec Beginner 6y ago
Zero to Hero Pentesting: Episode 6 - Enumeration (Kioptrix & Hack The Box)
🔐 Cybersecurity
Zero to Hero Pentesting: Episode 6 - Enumeration (Kioptrix & Hack The Box)
The Cyber Mentor Beginner 6y ago
How To Setup VSCode In The Cloud - code-server
🔐 Cybersecurity
How To Setup VSCode In The Cloud - code-server
HackerSploit Intermediate 6y ago
Zero to Hero Pentesting: Episode 5 - Scanning Tools (Nmap, Nessus, BurpSuite, etc.) & Tactics
🔐 Cybersecurity
Zero to Hero Pentesting: Episode 5 - Scanning Tools (Nmap, Nessus, BurpSuite, etc.) & Tactics
The Cyber Mentor Beginner 6y ago
📚 Coursera Courses Opens on Coursera · Free to audit
1 / 3 View all →
Advanced Practices in Application Security
📚 Coursera Course ↗
Self-paced
Advanced Practices in Application Security
Opens on Coursera ↗
Learn Man in the Middle Attacks from Scratch
📚 Coursera Course ↗
Self-paced
Learn Man in the Middle Attacks from Scratch
Opens on Coursera ↗
Information Security Incident Management
📚 Coursera Course ↗
Self-paced
Information Security Incident Management
Opens on Coursera ↗
Cybersecurity Concepts
📚 Coursera Course ↗
Self-paced
Cybersecurity Concepts
Opens on Coursera ↗
How to Analyze Tweet Engagement with Twitter Analytics
📚 Coursera Course ↗
Self-paced
How to Analyze Tweet Engagement with Twitter Analytics
Opens on Coursera ↗
Risk Management and Incident Response
📚 Coursera Course ↗
Self-paced
Risk Management and Incident Response
Opens on Coursera ↗