Tech Skills

Cybersecurity

Ethical hacking, penetration testing, network security, CTFs and defensive security

6,762
lessons
Skills in this topic
View full skill map โ†’
Security Basics
beginner
Fix OWASP top 10 vulnerabilities
AI Security
intermediate
Identify and patch prompt injection vulnerabilities
Network Security
intermediate
Configure a firewall with proper inbound/outbound rules
Ethical Hacking & Pen Testing
intermediate
Conduct a full pen test with Kali Linux
Cloud Security
intermediate
Implement IAM least-privilege policies on AWS/GCP
Incident Response
intermediate
Build an incident response playbook
Security Compliance
intermediate
Map controls for SOC 2 Type II compliance
Defensive AI
advanced
Build an AI-powered log anomaly detector
Meet Bjorn: The Viking Network Raider!
Cybersecurity โšก AI Lesson
Meet Bjorn: The Viking Network Raider!
The Cyber Mentor Beginner 1y ago
The Gremlin Stealer Malware
Cybersecurity โšก AI Lesson
The Gremlin Stealer Malware
John Hammond Beginner 1y ago
Cybersecurity Explained in 60 Seconds!
Cybersecurity
Cybersecurity Explained in 60 Seconds!
edureka! Beginner 1y ago
Hacking IP Cameras (CCTV) with Demos and Real World Examples
Cybersecurity โšก AI Lesson
Hacking IP Cameras (CCTV) with Demos and Real World Examples
David Bombal Beginner 1y ago
Artificial Intelligence x Cyber Challenge (DARPA Interview)
Cybersecurity โšก AI Lesson
Artificial Intelligence x Cyber Challenge (DARPA Interview)
John Hammond Beginner 1y ago
How APTs Steal Your Secrets
Cybersecurity โšก AI Lesson
How APTs Steal Your Secrets
The Cyber Mentor Beginner 1y ago
Cybersecurity COMPLETE Beginnerโ€™s Guide
Cybersecurity
Cybersecurity COMPLETE Beginnerโ€™s Guide
Sajjaad Khader Beginner 1y ago
IBM and ISC2 Cybersecurity Certificate: Build Skills for High-Stakes Security Roles
Cybersecurity
IBM and ISC2 Cybersecurity Certificate: Build Skills for High-Stakes Security Roles
Coursera Beginner 1y ago
Secure VPC Networks with Cloud Next Generation Firewall
Cybersecurity
Secure VPC Networks with Cloud Next Generation Firewall
Google Cloud Beginner 1y ago
Top 7 High-Paying Tech Jobs in 2025! ๐Ÿš€
Cybersecurity
Top 7 High-Paying Tech Jobs in 2025! ๐Ÿš€
GeeksforGeeks Beginner 1y ago
Never Charge Your Phone in Public Without Watching This! #phonetheft #usefultips #techintamil
Cybersecurity
Never Charge Your Phone in Public Without Watching This! #phonetheft #usefultips #techintamil
Arivi by HCL GUVI Beginner 1y ago
10 Marketing Strategies That Actually Work (For ANY Business)
Cybersecurity โšก AI Lesson
10 Marketing Strategies That Actually Work (For ANY Business)
Adam Erhart Beginner 1y ago
Introduction to Cloud Next Generation Firewall
Cybersecurity
Introduction to Cloud Next Generation Firewall
Google Cloud Beginner 1y ago
Uncovering the Reality of OTP Hacking in 2026 | How Hackers Steal Your OTPs | OTP Security | Edureka
Cybersecurity
Uncovering the Reality of OTP Hacking in 2026 | How Hackers Steal Your OTPs | OTP Security | Edureka
edureka! Beginner 1y ago
Why Most People Stay Broke | MASTER Discipline to Build Unshakable Wealth!
Cybersecurity
Why Most People Stay Broke | MASTER Discipline to Build Unshakable Wealth!
Evan Carmichael Beginner 1y ago
HackTheBox - Vintage
Cybersecurity โšก AI Lesson
HackTheBox - Vintage
IppSec Beginner 1y ago
Giving Back to the Cybersecurity Community Through Teaching
Cybersecurity โšก AI Lesson
Giving Back to the Cybersecurity Community Through Teaching
SANS Institute Beginner 1y ago
Level Up Your Security Team Through Automation
Cybersecurity โšก AI Lesson
Level Up Your Security Team Through Automation
SANS Institute Beginner 1y ago
IT Skills You'll Learn in the IBM IT Support Professional Certificate Program
Cybersecurity
IT Skills You'll Learn in the IBM IT Support Professional Certificate Program
Coursera Beginner 1y ago
HackTheBox - Administrator
Cybersecurity
HackTheBox - Administrator
IppSec Beginner 1y ago
Hidden Dangers of Phone Cameras! #PhoneCameraSpy #CameraHack #CyberSecurity
Cybersecurity
Hidden Dangers of Phone Cameras! #PhoneCameraSpy #CameraHack #CyberSecurity
Arivi by HCL GUVI Beginner 1y ago
4chan penetrated by a gang of soyjaksโ€ฆ
Cybersecurity
4chan penetrated by a gang of soyjaksโ€ฆ
Fireship Beginner 1y ago
Open Source Vs  Closed Source Model | Amr Awadallah | Data Science Dojo #opensource #ai
Cybersecurity
Open Source Vs Closed Source Model | Amr Awadallah | Data Science Dojo #opensource #ai
Data Science Dojo Beginner 1y ago
Free Cybersecurity & IT Training From TCM Security!
Cybersecurity โšก AI Lesson
Free Cybersecurity & IT Training From TCM Security!
The Cyber Mentor Beginner 1y ago
LIVE: Web Hacking | Pentesting | AppSec | Cybersecurity | TryHackme | AMA
Cybersecurity โšก AI Lesson
LIVE: Web Hacking | Pentesting | AppSec | Cybersecurity | TryHackme | AMA
The Cyber Mentor Beginner 1y ago
cybersecurity expert gets hacked
Cybersecurity
cybersecurity expert gets hacked
John Hammond Beginner 1y ago
Hacking My Dog's Microchip With a Flipper Zero!
Cybersecurity โšก AI Lesson
Hacking My Dog's Microchip With a Flipper Zero!
The Cyber Mentor Beginner 1y ago
How to Pass the PNPT: From Zero to Hero!
Cybersecurity โšก AI Lesson
How to Pass the PNPT: From Zero to Hero!
The Cyber Mentor Beginner 1y ago
How I Almost Got Phished From a Text Message!
Cybersecurity โšก AI Lesson
How I Almost Got Phished From a Text Message!
The Cyber Mentor Beginner 1y ago
LIVE: Exploit Development | Shellcoding | Cybersecurity | Red Team | AMA
Cybersecurity โšก AI Lesson
LIVE: Exploit Development | Shellcoding | Cybersecurity | Red Team | AMA
The Cyber Mentor Beginner 1y ago
Evaluate Your Cloud Next Generation Firewall Needs
Cybersecurity
Evaluate Your Cloud Next Generation Firewall Needs
Google Cloud Beginner 1y ago
3 Tech Books You MUST Read
Cybersecurity โšก AI Lesson
3 Tech Books You MUST Read
The Cyber Mentor Beginner 1y ago
The Best and The Worst of Cybersecurity Career Advice!
Cybersecurity โšก AI Lesson
The Best and The Worst of Cybersecurity Career Advice!
The Cyber Mentor Beginner 1y ago
DDoS Attack | What is a DDoS Attack? | DDoS Attack Explained | Edureka
Cybersecurity
DDoS Attack | What is a DDoS Attack? | DDoS Attack Explained | Edureka
edureka! Beginner 1y ago
Will AI Replace Your Tech Job in 2025?
Cybersecurity โšก AI Lesson
Will AI Replace Your Tech Job in 2025?
The Cyber Mentor Beginner 1y ago
LIVE: PowerShell Deobfuscation | Cybersecurity | Blue Team | AMA
Cybersecurity โšก AI Lesson
LIVE: PowerShell Deobfuscation | Cybersecurity | Blue Team | AMA
The Cyber Mentor Beginner 1y ago
Penetration Testing For Beginners | Phases of Penetration Testing | Penetration Testing Tutorial
Cybersecurity
Penetration Testing For Beginners | Phases of Penetration Testing | Penetration Testing Tutorial
edureka! Beginner 1y ago
Ethical Hacking for Beginners | 5 Phases of Ethical Hacking | Ethical Hacking Tutorial | Edureka
Cybersecurity
Ethical Hacking for Beginners | 5 Phases of Ethical Hacking | Ethical Hacking Tutorial | Edureka
edureka! Beginner 1y ago
How Hackers Break Into Servers Through IoT Hardware
Cybersecurity โšก AI Lesson
How Hackers Break Into Servers Through IoT Hardware
The Cyber Mentor Beginner 1y ago
What is the MITRE CVE Program - and Why It Matters So Much
Cybersecurity โšก AI Lesson
What is the MITRE CVE Program - and Why It Matters So Much
The Cyber Mentor Beginner 1y ago
RIP CVE Program?! How the MITRE Funding Crisis Threatens Cybersecurity
Cybersecurity โšก AI Lesson
RIP CVE Program?! How the MITRE Funding Crisis Threatens Cybersecurity
The Cyber Mentor Beginner 1y ago
LIVE: Moose on the loose | CVE | Cybersecurity | AMA
Cybersecurity โšก AI Lesson
LIVE: Moose on the loose | CVE | Cybersecurity | AMA
The Cyber Mentor Beginner 1y ago
Hardware Reverse Engineering with a Logic Analyzer
Cybersecurity โšก AI Lesson
Hardware Reverse Engineering with a Logic Analyzer
The Cyber Mentor Beginner 1y ago
Lightning Talk | Ever sucked into Wikipedia for three hours? CTI might be for you!
Cybersecurity โšก AI Lesson
Lightning Talk | Ever sucked into Wikipedia for three hours? CTI might be for you!
SANS Institute Beginner 1y ago
A Day in the Life of a Threat Emulation Specialist: Demystifying Offensive Cybersecurity
Cybersecurity โšก AI Lesson
A Day in the Life of a Threat Emulation Specialist: Demystifying Offensive Cybersecurity
SANS Institute Beginner 1y ago
Lightning Talk | Negating the Noise: Prioritize Your Cybersecurity
Cybersecurity โšก AI Lesson
Lightning Talk | Negating the Noise: Prioritize Your Cybersecurity
SANS Institute Beginner 1y ago
Cyber Adjacent: 5 Lessons Learned from a Day in the Life of an IT Project Manager
Cybersecurity โšก AI Lesson
Cyber Adjacent: 5 Lessons Learned from a Day in the Life of an IT Project Manager
SANS Institute Beginner 1y ago
From TV news to cybersecurity: the 5 steps I took to completely change careers
Cybersecurity โšก AI Lesson
From TV news to cybersecurity: the 5 steps I took to completely change careers
SANS Institute Beginner 1y ago
๐Ÿ“š Coursera Courses Opens on Coursera ยท Free to audit
1 / 3 View all โ†’
Cybersecurity Case Studies and Capstone Project
๐Ÿ“š Coursera Course โ†—
Self-paced
Cybersecurity Case Studies and Capstone Project
Opens on Coursera โ†—
Network Defense Essentials (NDE)
๐Ÿ“š Coursera Course โ†—
Self-paced
Network Defense Essentials (NDE)
Opens on Coursera โ†—
Incident Response, BC, and DR Concepts
๐Ÿ“š Coursera Course โ†—
Self-paced
Incident Response, BC, and DR Concepts
Opens on Coursera โ†—
Data Center Security Management with Microsoft System Center
๐Ÿ“š Coursera Course โ†—
Self-paced
Data Center Security Management with Microsoft System Center
Opens on Coursera โ†—
Evaluate Your Cloud Next Generation Firewall Needs
๐Ÿ“š Coursera Course โ†—
Self-paced
Evaluate Your Cloud Next Generation Firewall Needs
Opens on Coursera โ†—
Metasploit para Principiantes: Bรกsicos de explotaciรณn
๐Ÿ“š Coursera Course โ†—
Self-paced
Metasploit para Principiantes: Bรกsicos de explotaciรณn
Opens on Coursera โ†—