Tech Skills

Cybersecurity

Ethical hacking, penetration testing, network security, CTFs and defensive security

6,734
lessons
Skills in this topic
View full skill map →
Security Basics
beginner
Fix OWASP top 10 vulnerabilities
AI Security
intermediate
Identify and patch prompt injection vulnerabilities
Network Security
intermediate
Configure a firewall with proper inbound/outbound rules
Ethical Hacking & Pen Testing
intermediate
Conduct a full pen test with Kali Linux
Cloud Security
intermediate
Implement IAM least-privilege policies on AWS/GCP
Incident Response
intermediate
Build an incident response playbook
Security Compliance
intermediate
Map controls for SOC 2 Type II compliance
Defensive AI
advanced
Build an AI-powered log anomaly detector
Career Transition Episode 48 | Cyber security Career Transition | Edureka Reviews
Cybersecurity
Career Transition Episode 48 | Cyber security Career Transition | Edureka Reviews
edureka! Advanced 1y ago
Bruteforcing Windows Defender Exclusions
Cybersecurity ⚡ AI Lesson
Bruteforcing Windows Defender Exclusions
John Hammond Advanced 1y ago
Enhanced Vendor Risk Assessment | Tony Turner
Cybersecurity ⚡ AI Lesson
Enhanced Vendor Risk Assessment | Tony Turner
SANS Institute Advanced 1y ago
SANS Hacker Tools & Incident Handling Training Course: SEC504 with Kevin Tyers
Cybersecurity ⚡ AI Lesson
SANS Hacker Tools & Incident Handling Training Course: SEC504 with Kevin Tyers
SANS Institute Advanced 1y ago
Ransomware In Action: MedusaLocker ReadText34
Cybersecurity
Ransomware In Action: MedusaLocker ReadText34
John Hammond Advanced 1y ago
SIIES Uses Google Security Products to Drive Enhanced Cybersecurity in Yucatán
Cybersecurity
SIIES Uses Google Security Products to Drive Enhanced Cybersecurity in Yucatán
Google Cloud Advanced 1y ago
CISSP Interview Questions and Answers 2025 | CISSP Exam Preparation | Edureka
Cybersecurity
CISSP Interview Questions and Answers 2025 | CISSP Exam Preparation | Edureka
edureka! Advanced 1y ago
The Pack: How cybersecurity is evolving
Cybersecurity
The Pack: How cybersecurity is evolving
Google Cloud Advanced 1y ago
AI in Prompt Engineering Hacking #SocialEngineering #CyberSecurity #Phishing #AIThreats #aibeware
Cybersecurity
AI in Prompt Engineering Hacking #SocialEngineering #CyberSecurity #Phishing #AIThreats #aibeware
AI Beware Advanced 1y ago
Protect your workload with Google Cloud next generation firewall
Cybersecurity
Protect your workload with Google Cloud next generation firewall
Google Cloud Tech Advanced 1y ago
AES GCM (Advanced Encryption Standard in Galois Counter Mode) - Computerphile
Cybersecurity ⚡ AI Lesson
AES GCM (Advanced Encryption Standard in Galois Counter Mode) - Computerphile
Computerphile Advanced 2y ago
Why hack in when you can just log in?
Cybersecurity ⚡ AI Lesson
Why hack in when you can just log in?
David Bombal Advanced 2y ago
AI superpowered networks? (NVIDIA and Cisco join forces)
Cybersecurity
AI superpowered networks? (NVIDIA and Cisco join forces)
David Bombal Advanced 2y ago
Leveraging Ethical Hacking Skills for Network and Application Security | Edureka x EC Council
Cybersecurity
Leveraging Ethical Hacking Skills for Network and Application Security | Edureka x EC Council
edureka! Advanced 1y ago
Cyber Security Interview Question and Answers  | CyberSecurity Interview Tips  | Edureka
Cybersecurity
Cyber Security Interview Question and Answers | CyberSecurity Interview Tips | Edureka
edureka! Advanced 1y ago
Dr. Ullrich on Today’s Cyber Threats: SANSFIRE 2024 Insights
Cybersecurity ⚡ AI Lesson
Dr. Ullrich on Today’s Cyber Threats: SANSFIRE 2024 Insights
SANS Institute Advanced 1y ago
Fileless Malware Analysis & PowerShell Deobfuscation
Cybersecurity
Fileless Malware Analysis & PowerShell Deobfuscation
John Hammond Advanced 1y ago
Inclusive Cybersecurity: Tips for Hacking Barriers
Cybersecurity ⚡ AI Lesson
Inclusive Cybersecurity: Tips for Hacking Barriers
SANS Institute Advanced 2y ago
Edureka YouTube Channel Has Now 4 Million+ Ridiculously Committed Subscribers
Cybersecurity
Edureka YouTube Channel Has Now 4 Million+ Ridiculously Committed Subscribers
edureka! Advanced 2y ago
Countdown Begins: SANS to Reveal The Five Biggest Cyber Threats at RSAC 2024
Cybersecurity ⚡ AI Lesson
Countdown Begins: SANS to Reveal The Five Biggest Cyber Threats at RSAC 2024
SANS Institute Advanced 2y ago
Don't Use CyberChef. Use This Instead.
Cybersecurity ⚡ AI Lesson
Don't Use CyberChef. Use This Instead.
John Hammond Advanced 2y ago
What is Ethical Hacking? | Ethical Hacking in 15 Minutes | Learn Ethical Hacking | Edureka
Cybersecurity
What is Ethical Hacking? | Ethical Hacking in 15 Minutes | Learn Ethical Hacking | Edureka
edureka! Advanced 2y ago
Microsoft Entra Training
Cybersecurity
Microsoft Entra Training
John Hammond Advanced 2y ago
Technical Term Tips
Cybersecurity
Technical Term Tips
John Hammond Advanced 2y ago
2024 Industrial Control Systems Trends and Predictions
Cybersecurity ⚡ AI Lesson
2024 Industrial Control Systems Trends and Predictions
SANS Institute Advanced 2y ago
i BACKDOORED a Desktop Shortcut (to run malware)
Cybersecurity ⚡ AI Lesson
i BACKDOORED a Desktop Shortcut (to run malware)
John Hammond Advanced 2y ago
Hands-on Cybersecurity Training in New Orleans 2024
Cybersecurity ⚡ AI Lesson
Hands-on Cybersecurity Training in New Orleans 2024
SANS Institute Advanced 2y ago
Hackers Steal Passwords & Personal Information
Cybersecurity ⚡ AI Lesson
Hackers Steal Passwords & Personal Information
John Hammond Advanced 2y ago
I Put A Fake Email Server On The Internet
Cybersecurity
I Put A Fake Email Server On The Internet
John Hammond Advanced 2y ago
CyberThreat 2023
Cybersecurity ⚡ AI Lesson
CyberThreat 2023
SANS Institute Advanced 2y ago
This Company Got Hacked... but HOW?
Cybersecurity
This Company Got Hacked... but HOW?
John Hammond Advanced 2y ago
LDR551: Building and Leading Security Operations Centers | GSOM
Cybersecurity ⚡ AI Lesson
LDR551: Building and Leading Security Operations Centers | GSOM
SANS Institute Advanced 2y ago
Incident Response: Azure Log Analysis
Cybersecurity ⚡ AI Lesson
Incident Response: Azure Log Analysis
John Hammond Advanced 2y ago
Career Transition Series - Episode 27 | Cyber security Career Transition | Edureka Reviews
Cybersecurity
Career Transition Series - Episode 27 | Cyber security Career Transition | Edureka Reviews
edureka! Advanced 2y ago
Mercenary PREDATOR Spyware and other THREATS (plus FREE training)
Cybersecurity
Mercenary PREDATOR Spyware and other THREATS (plus FREE training)
David Bombal Advanced 2y ago
SANS Network Security 2023 Recap: Cybersecurity, Night Talks, & Puppies!
Cybersecurity ⚡ AI Lesson
SANS Network Security 2023 Recap: Cybersecurity, Night Talks, & Puppies!
SANS Institute Advanced 2y ago
Top 4 Cybersecurity Things you better be doing! #shorts #cybersecurity #hacking
Cybersecurity
Top 4 Cybersecurity Things you better be doing! #shorts #cybersecurity #hacking
David Bombal Advanced 2y ago
SANS Cyber Defense Initiative® 2023 in Washington, DC
Cybersecurity ⚡ AI Lesson
SANS Cyber Defense Initiative® 2023 in Washington, DC
SANS Institute Advanced 2y ago
Kapil Assudani: Cloud, AI, and Reducing the Attack Surface
Cybersecurity ⚡ AI Lesson
Kapil Assudani: Cloud, AI, and Reducing the Attack Surface
SANS Institute Advanced 2y ago
Top 3 Cybersecurity Threats in 2024? #shorts #cybersecurity #hacking
Cybersecurity
Top 3 Cybersecurity Threats in 2024? #shorts #cybersecurity #hacking
David Bombal Advanced 2y ago
Mike Melo: The Case for DSPM vs. CSPM
Cybersecurity ⚡ AI Lesson
Mike Melo: The Case for DSPM vs. CSPM
SANS Institute Advanced 2y ago
Bernard Brantley: Cutting Edge Cloud Thinking and Team Building
Cybersecurity ⚡ AI Lesson
Bernard Brantley: Cutting Edge Cloud Thinking and Team Building
SANS Institute Advanced 2y ago
Rinki Sethi: From Analyst to CISO and Board Member
Cybersecurity ⚡ AI Lesson
Rinki Sethi: From Analyst to CISO and Board Member
SANS Institute Advanced 2y ago
Healthcare Ransomware Discussion | Ryan Chapman
Cybersecurity ⚡ AI Lesson
Healthcare Ransomware Discussion | Ryan Chapman
SANS Institute Advanced 2y ago
Artificial Intelligence in Healthcare and How to Use it to Defend | David Hoelzer
Cybersecurity ⚡ AI Lesson
Artificial Intelligence in Healthcare and How to Use it to Defend | David Hoelzer
SANS Institute Advanced 2y ago
VULNERABLE Kernel Drivers for Security Research
Cybersecurity ⚡ AI Lesson
VULNERABLE Kernel Drivers for Security Research
John Hammond Advanced 2y ago
Exploring the Latest Malware Samples
Cybersecurity ⚡ AI Lesson
Exploring the Latest Malware Samples
John Hammond Advanced 2y ago
You came with *that* plan? You're braver than I thought!
Cybersecurity ⚡ AI Lesson
You came with *that* plan? You're braver than I thought!
SANS Institute Advanced 2y ago
📚 Coursera Courses Opens on Coursera · Free to audit
1 / 3 View all →
Incident Response, BC, and DR Concepts
📚 Coursera Course ↗
Self-paced
Incident Response, BC, and DR Concepts
Opens on Coursera ↗
Computer Networks and Network Security
📚 Coursera Course ↗
Self-paced
Computer Networks and Network Security
Opens on Coursera ↗
Leadership: Impactful Feedback in a Hybrid World
📚 Coursera Course ↗
Self-paced
Leadership: Impactful Feedback in a Hybrid World
Opens on Coursera ↗
Risk Management and Incident Response
📚 Coursera Course ↗
Self-paced
Risk Management and Incident Response
Opens on Coursera ↗
Introduction to Cybersecurity for Business
📚 Coursera Course ↗
Self-paced
Introduction to Cybersecurity for Business
Opens on Coursera ↗
Network Monitoring and Analysis
📚 Coursera Course ↗
Self-paced
Network Monitoring and Analysis
Opens on Coursera ↗