Tech Skills

Cybersecurity

Ethical hacking, penetration testing, network security, CTFs and defensive security

6,995
lessons
Skills in this topic
View full skill map →
Security Basics
beginner
Fix OWASP top 10 vulnerabilities
AI Security
intermediate
Identify and patch prompt injection vulnerabilities
Network Security
intermediate
Configure a firewall with proper inbound/outbound rules
Ethical Hacking & Pen Testing
intermediate
Conduct a full pen test with Kali Linux
Cloud Security
intermediate
Implement IAM least-privilege policies on AWS/GCP
Incident Response
intermediate
Build an incident response playbook
Security Compliance
intermediate
Map controls for SOC 2 Type II compliance
Defensive AI
advanced
Build an AI-powered log anomaly detector
Free Cisco VIRL server! You can now use VIRL for free!  Thank you Cisco DevNet!
Cybersecurity
Free Cisco VIRL server! You can now use VIRL for free! Thank you Cisco DevNet!
David Bombal Beginner 7y ago
Becoming a Growth Designer (w/ Lex Roman)
Cybersecurity
Becoming a Growth Designer (w/ Lex Roman)
Flux Academy Beginner 7y ago
Maltego - Automated Information Gathering
Cybersecurity ⚡ AI Lesson
Maltego - Automated Information Gathering
HackerSploit Intermediate 7y ago
Pros vs. Joes CTF at BsidesDC 2018
Cybersecurity
Pros vs. Joes CTF at BsidesDC 2018
John Hammond Intermediate 7y ago
HackTheBox - Jerry
Cybersecurity
HackTheBox - Jerry
IppSec Beginner 7y ago
Raven1 VulnHub CTF Walkthrough - Boot-To-Root
Cybersecurity ⚡ AI Lesson
Raven1 VulnHub CTF Walkthrough - Boot-To-Root
HackerSploit Intermediate 7y ago
What is SD-WAN? say GOODBYE to MPLS, DMVPN, iWAN... w/ SDN, Cisco and Viptela
Cybersecurity ⚡ AI Lesson
What is SD-WAN? say GOODBYE to MPLS, DMVPN, iWAN... w/ SDN, Cisco and Viptela
NetworkChuck Beginner 7y ago
Multi-Exponent RSA Cryptography | Square CTF "Flipped Bits"
Cybersecurity
Multi-Exponent RSA Cryptography | Square CTF "Flipped Bits"
John Hammond Intermediate 7y ago
HackTheBox - Reel
Cybersecurity
HackTheBox - Reel
IppSec Beginner 7y ago
Chat to your switches using Slack/Webex and Docker containers plus other Docker use cases.
Cybersecurity
Chat to your switches using Slack/Webex and Docker containers plus other Docker use cases.
David Bombal Intermediate 7y ago
Elisabeth Rochat de la Vallée: Numerology in the Classics - The number 0
Cybersecurity ⚡ AI Lesson
Elisabeth Rochat de la Vallée: Numerology in the Classics - The number 0
TCM Academy Beginner 7y ago
Analysing a Collection of Windows Binaries and Embedded Resources - FLARE-On 2018
Cybersecurity
Analysing a Collection of Windows Binaries and Embedded Resources - FLARE-On 2018
LiveOverflow Beginner 7y ago
Node.js Rest API With Restify, Mongoose, JWT - Part 2
Cybersecurity ⚡ AI Lesson
Node.js Rest API With Restify, Mongoose, JWT - Part 2
Traversy Media Intermediate 7y ago
Basic Windows Reversing and Attacking Weak Crypto - FLARE-On 2018
Cybersecurity
Basic Windows Reversing and Attacking Weak Crypto - FLARE-On 2018
LiveOverflow Intermediate 7y ago
Practical Advice for Submitting to Speak at a Cybersecurity Conference
Cybersecurity
Practical Advice for Submitting to Speak at a Cybersecurity Conference
SANS Institute Advanced 7y ago
Hardware Hacking - Computerphile
Cybersecurity ⚡ AI Lesson
Hardware Hacking - Computerphile
Computerphile Intermediate 7y ago
SANS Webcast - Trust No One: Introducing SEC530: Defensible Security Architecture
Cybersecurity ⚡ AI Lesson
SANS Webcast - Trust No One: Introducing SEC530: Defensible Security Architecture
SANS Institute Beginner 7y ago
How To Prevent The Most Common Cross Site Scripting Attack
Cybersecurity ⚡ AI Lesson
How To Prevent The Most Common Cross Site Scripting Attack
Web Dev Simplified Beginner 7y ago
Start Contributing to Open Source (Hacktoberfest)
Cybersecurity
Start Contributing to Open Source (Hacktoberfest)
Web Dev Simplified Beginner 7y ago
WebMap - A Dashboard For Nmap Scans
Cybersecurity ⚡ AI Lesson
WebMap - A Dashboard For Nmap Scans
HackerSploit Intermediate 7y ago
Wireshark - Display Filters
Cybersecurity ⚡ AI Lesson
Wireshark - Display Filters
HackerSploit Intermediate 7y ago
Wireshark - Capture Filters
Cybersecurity ⚡ AI Lesson
Wireshark - Capture Filters
HackerSploit Intermediate 7y ago
Wireshark - Interface & OSI Model
Cybersecurity ⚡ AI Lesson
Wireshark - Interface & OSI Model
HackerSploit Intermediate 7y ago
MORSE CODE Steganography (2/2) BsidesCT CTF 2018
Cybersecurity
MORSE CODE Steganography (2/2) BsidesCT CTF 2018
John Hammond Intermediate 7y ago
Steganography (1/2) BsidesCT CTF 2018
Cybersecurity
Steganography (1/2) BsidesCT CTF 2018
John Hammond Intermediate 7y ago
HackTheBox - DropZone
Cybersecurity ⚡ AI Lesson
HackTheBox - DropZone
IppSec Beginner 7y ago
HackTheBox - Bounty
Cybersecurity ⚡ AI Lesson
HackTheBox - Bounty
IppSec Beginner 7y ago
OWASP Juice Shop - SQL Injection
Cybersecurity ⚡ AI Lesson
OWASP Juice Shop - SQL Injection
HackerSploit Intermediate 7y ago
Cisco NX-OS APIs (NX-API): Lots of options to chose from. Learn Nexus APIs with Hank Preston.
Cybersecurity
Cisco NX-OS APIs (NX-API): Lots of options to chose from. Learn Nexus APIs with Hank Preston.
David Bombal Beginner 7y ago
SANS Webcast - Perimeter Security and Why it is Obsolete
Cybersecurity
SANS Webcast - Perimeter Security and Why it is Obsolete
SANS Institute Advanced 7y ago
picoCTF 2018 [03]  Cryptography Warmups, grep & netcat
Cybersecurity
picoCTF 2018 [03] Cryptography Warmups, grep & netcat
John Hammond Intermediate 7y ago
Which Python book should I buy? David Bombal's Book Club.
Cybersecurity
Which Python book should I buy? David Bombal's Book Club.
David Bombal Beginner 7y ago
HackTheBox - Fighter
Cybersecurity ⚡ AI Lesson
HackTheBox - Fighter
IppSec Beginner 7y ago
HackTheBox - Sunday
Cybersecurity
HackTheBox - Sunday
IppSec Beginner 7y ago
HackTheBox - Olympus
Cybersecurity
HackTheBox - Olympus
IppSec Intermediate 7y ago
DEF CON CTF 2018 Finals
Cybersecurity ⚡ AI Lesson
DEF CON CTF 2018 Finals
LiveOverflow Beginner 7y ago
Solving Equations with Sympy | CSAW CTF "Algebra"
Cybersecurity
Solving Equations with Sympy | CSAW CTF "Algebra"
John Hammond Intermediate 7y ago
Single-Byte XOR | CSAW CTF "babycrypto"
Cybersecurity
Single-Byte XOR | CSAW CTF "babycrypto"
John Hammond Intermediate 7y ago
LDAP Injection | CSAW CTF "ldab"
Cybersecurity
LDAP Injection | CSAW CTF "ldab"
John Hammond Intermediate 7y ago
x86 Assembly | CSAW CTF "A Tour of x86"
Cybersecurity
x86 Assembly | CSAW CTF "A Tour of x86"
John Hammond Intermediate 7y ago
PWN Overflow | CSAW CTF "BigBoy"
Cybersecurity
PWN Overflow | CSAW CTF "BigBoy"
John Hammond Intermediate 7y ago
HackTheBox - Canape
Cybersecurity
HackTheBox - Canape
IppSec Beginner 7y ago
First time in Las Vegas for BlackHat, DEF CON and more...
Cybersecurity ⚡ AI Lesson
First time in Las Vegas for BlackHat, DEF CON and more...
LiveOverflow Beginner 7y ago
GIF Split & Stack | IceCTF [05] "Modern Picasso"
Cybersecurity
GIF Split & Stack | IceCTF [05] "Modern Picasso"
John Hammond Intermediate 7y ago
Hiding Content with CSS | IceCTF [02] "Lights Out!"
Cybersecurity
Hiding Content with CSS | IceCTF [02] "Lights Out!"
John Hammond Intermediate 7y ago
HackTheBox - Poison
Cybersecurity
HackTheBox - Poison
IppSec Beginner 7y ago
The Last Flag (Overachiever) - Pwn Adventure 3
Cybersecurity
The Last Flag (Overachiever) - Pwn Adventure 3
LiveOverflow Intermediate 7y ago
Wakanda 1 CTF Walkthrough - Boot-To-Root
Cybersecurity ⚡ AI Lesson
Wakanda 1 CTF Walkthrough - Boot-To-Root
HackerSploit Intermediate 7y ago
📚 Coursera Courses Opens on Coursera · Free to audit
1 / 3 View all →
Certified Kubernetes Administrator (CKA): Unit 4
📚 Coursera Course ↗
Self-paced
Certified Kubernetes Administrator (CKA): Unit 4
Opens on Coursera ↗
Cyber Security for Absolute Beginners – Part 1
📚 Coursera Course ↗
Self-paced
Cyber Security for Absolute Beginners – Part 1
Opens on Coursera ↗
CyberSec First Responder – Advanced (CFR-A): Address
📚 Coursera Course ↗
Self-paced
CyberSec First Responder – Advanced (CFR-A): Address
Opens on Coursera ↗
Cybersecurity Awareness and Innovation
📚 Coursera Course ↗
Self-paced
Cybersecurity Awareness and Innovation
Opens on Coursera ↗
Security Operations
📚 Coursera Course ↗
Self-paced
Security Operations
Opens on Coursera ↗
Cybersecurity and the Internet of Things
📚 Coursera Course ↗
Self-paced
Cybersecurity and the Internet of Things
Opens on Coursera ↗