Tech Skills

Cybersecurity

Ethical hacking, penetration testing, network security, CTFs and defensive security

6,785
lessons
Skills in this topic
View full skill map โ†’
Security Basics
beginner
Fix OWASP top 10 vulnerabilities
AI Security
intermediate
Identify and patch prompt injection vulnerabilities
Network Security
intermediate
Configure a firewall with proper inbound/outbound rules
Ethical Hacking & Pen Testing
intermediate
Conduct a full pen test with Kali Linux
Cloud Security
intermediate
Implement IAM least-privilege policies on AWS/GCP
Incident Response
intermediate
Build an incident response playbook
Security Compliance
intermediate
Map controls for SOC 2 Type II compliance
Defensive AI
advanced
Build an AI-powered log anomaly detector
3 of the Top Note-Taking Apps Ranked
Cybersecurity โšก AI Lesson
3 of the Top Note-Taking Apps Ranked
The Cyber Mentor Beginner 1y ago
Discussing Active Directory & Internal Network Security
Cybersecurity
Discussing Active Directory & Internal Network Security
John Hammond Beginner 1y ago
You have to look out for these hacks in 2024! (plus get FREE training)
Cybersecurity
You have to look out for these hacks in 2024! (plus get FREE training)
David Bombal Beginner 1y ago
HackTheBox - Ouija
Cybersecurity
HackTheBox - Ouija
IppSec Beginner 1y ago
Learn Any Programming Language (from scratch)
Cybersecurity โšก AI Lesson
Learn Any Programming Language (from scratch)
The Cyber Mentor Beginner 1y ago
AI in Cybersecurity | Working of AI in Cybersecurity | Need for AI in Cybersecurity | Edureka
Cybersecurity
AI in Cybersecurity | Working of AI in Cybersecurity | Need for AI in Cybersecurity | Edureka
edureka! Beginner 1y ago
How Accurate is Your Recovery Timeline? | The Incident Commander Series Ep. 2
Cybersecurity โšก AI Lesson
How Accurate is Your Recovery Timeline? | The Incident Commander Series Ep. 2
SANS Institute Beginner 1y ago
๐Ÿ” Master Amazon SEO : Outrank Competitors Easily! #shorts
Cybersecurity
๐Ÿ” Master Amazon SEO : Outrank Competitors Easily! #shorts
Jacky Chou from Indexsy Beginner 2y ago
Automated Cloud Security with ONE CLICK
Cybersecurity
Automated Cloud Security with ONE CLICK
John Hammond Beginner 2y ago
Social Engineering in Cyber Security Explained | What is Social Engineering?| CEH Training | Edureka
Cybersecurity
Social Engineering in Cyber Security Explained | What is Social Engineering?| CEH Training | Edureka
edureka! Beginner 2y ago
HackTheBox - Monitored
Cybersecurity
HackTheBox - Monitored
IppSec Beginner 2y ago
Certificate vs. Certification, whats the difference? ๐Ÿค”
Cybersecurity
Certificate vs. Certification, whats the difference? ๐Ÿค”
Coursera Beginner 2y ago
Android Bluetooth Hacking with Python #shorts #android #bluetooth #raspberrypi #python
Cybersecurity โšก AI Lesson
Android Bluetooth Hacking with Python #shorts #android #bluetooth #raspberrypi #python
David Bombal Beginner 2y ago
Data Protection | The 8 Domains of the Cloud Security Maturity Model | Part 1
Cybersecurity โšก AI Lesson
Data Protection | The 8 Domains of the Cloud Security Maturity Model | Part 1
SANS Institute Beginner 2y ago
Itโ€™s all about the end game!
Cybersecurity
Itโ€™s all about the end game!
Coursera Beginner 2y ago
Best Practices to Enhance the Security of Your RDP Server
Cybersecurity
Best Practices to Enhance the Security of Your RDP Server
UltaHost Beginner 2y ago
3 Ways to Find and Exploit Command Injection
Cybersecurity โšก AI Lesson
3 Ways to Find and Exploit Command Injection
The Cyber Mentor Beginner 1y ago
Hacking a Smart Camera: IoT Hacking With Andrew Bellini (Part 4)
Cybersecurity โšก AI Lesson
Hacking a Smart Camera: IoT Hacking With Andrew Bellini (Part 4)
The Cyber Mentor Beginner 2y ago
Yet Another Cybercrime Hacking Forum...
Cybersecurity โšก AI Lesson
Yet Another Cybercrime Hacking Forum...
John Hammond Beginner 2y ago
How to Secure Your Email (DMARC, DKIM, SPF Tutorial)
Cybersecurity โšก AI Lesson
How to Secure Your Email (DMARC, DKIM, SPF Tutorial)
The Cyber Mentor Beginner 2y ago
Learn to Hack AWS & Cloud Security
Cybersecurity
Learn to Hack AWS & Cloud Security
John Hammond Beginner 2y ago
Rust Programming 101 Full Course - Rust for Beginners
Cybersecurity โšก AI Lesson
Rust Programming 101 Full Course - Rust for Beginners
The Cyber Mentor Beginner 2y ago
Hacking a Smart Camera: IoT Hacking With Andrew Bellini (Part 3)
Cybersecurity โšก AI Lesson
Hacking a Smart Camera: IoT Hacking With Andrew Bellini (Part 3)
The Cyber Mentor Beginner 2y ago
The 8 Domains of the Cloud Security Maturity Model | Overview
Cybersecurity โšก AI Lesson
The 8 Domains of the Cloud Security Maturity Model | Overview
SANS Institute Beginner 2y ago
No Tools in a CTF
Cybersecurity
No Tools in a CTF
John Hammond Beginner 2y ago
Hacking Wordpress with Python in seconds (using Dark Web and Telegram data)
Cybersecurity โšก AI Lesson
Hacking Wordpress with Python in seconds (using Dark Web and Telegram data)
David Bombal Beginner 2y ago
Breaking the Mold: How Two Women from Non-Technical Backgrounds Broke into Cybersecurity.
Cybersecurity โšก AI Lesson
Breaking the Mold: How Two Women from Non-Technical Backgrounds Broke into Cybersecurity.
SANS Institute Beginner 2y ago
Detection Engineers Unveiled: A Day in the Life and the Path to This Exciting Career
Cybersecurity โšก AI Lesson
Detection Engineers Unveiled: A Day in the Life and the Path to This Exciting Career
SANS Institute Beginner 2y ago
Day in the Life of a CTI Engineer
Cybersecurity โšก AI Lesson
Day in the Life of a CTI Engineer
SANS Institute Beginner 2y ago
HackTheBox - Napper
Cybersecurity
HackTheBox - Napper
IppSec Beginner 2y ago
Do You Need to Know Programming to Be A Hacker?
Cybersecurity โšก AI Lesson
Do You Need to Know Programming to Be A Hacker?
The Cyber Mentor Beginner 2y ago
Hacking a Smart Camera: IoT Hacking With Andrew Bellini (Part 2)
Cybersecurity โšก AI Lesson
Hacking a Smart Camera: IoT Hacking With Andrew Bellini (Part 2)
The Cyber Mentor Beginner 2y ago
Build a Pro-Level Detection Engineering Strategy | SOC Success Pt. 2
Cybersecurity โšก AI Lesson
Build a Pro-Level Detection Engineering Strategy | SOC Success Pt. 2
SANS Institute Beginner 2y ago
Hacking a Smart Camera: IoT Hacking With Andrew Bellini (Part 1)
Cybersecurity โšก AI Lesson
Hacking a Smart Camera: IoT Hacking With Andrew Bellini (Part 1)
The Cyber Mentor Beginner 2y ago
Entry-level cybersecurity Professional Certificates can equip you with the skills you need.
Cybersecurity
Entry-level cybersecurity Professional Certificates can equip you with the skills you need.
Coursera Beginner 2y ago
The power of scripting and programming in cybersecurity should not be underestimated!
Cybersecurity
The power of scripting and programming in cybersecurity should not be underestimated!
Coursera Beginner 2y ago
Real World Windows Pentest Tutorial (demos of Top 5 Active Directory hacks)
Cybersecurity
Real World Windows Pentest Tutorial (demos of Top 5 Active Directory hacks)
David Bombal Beginner 2y ago
HackTheBox - Devvortex
Cybersecurity
HackTheBox - Devvortex
IppSec Beginner 2y ago
What is Kali Linux | Kali Linux Hacking Tutorials | Ethical Hacking Training | Edureka Rewind
Cybersecurity
What is Kali Linux | Kali Linux Hacking Tutorials | Ethical Hacking Training | Edureka Rewind
edureka! Beginner 2y ago
6 Tips to Stay Motivated
Cybersecurity โšก AI Lesson
6 Tips to Stay Motivated
The Cyber Mentor Beginner 2y ago
Grant Collins is spilling all the cybersecurity tea. โ˜•๏ธ
Cybersecurity
Grant Collins is spilling all the cybersecurity tea. โ˜•๏ธ
Coursera Beginner 2y ago
Your VPN won't protect you ๐Ÿ˜ฑ
Cybersecurity โšก AI Lesson
Your VPN won't protect you ๐Ÿ˜ฑ
David Bombal Beginner 2y ago
Hackers Abuse Zero-Day Exploit for CrushFTP
Cybersecurity
Hackers Abuse Zero-Day Exploit for CrushFTP
John Hammond Beginner 2y ago
Python vs. Bash vs. PowerShell: The Benefits of Each
Cybersecurity โšก AI Lesson
Python vs. Bash vs. PowerShell: The Benefits of Each
The Cyber Mentor Beginner 2y ago
Should I Get a Degree in Cybersecurity? Here Are the Benefits!
Cybersecurity
Should I Get a Degree in Cybersecurity? Here Are the Benefits!
Coursera Beginner 2y ago
3 Ways to Avoid Burnout
Cybersecurity โšก AI Lesson
3 Ways to Avoid Burnout
The Cyber Mentor Beginner 2y ago
Hack Active Directory with LLMNR
Cybersecurity โšก AI Lesson
Hack Active Directory with LLMNR
The Cyber Mentor Beginner 2y ago
Did you know you can program this? ๐Ÿคฏ #shorts #f1 #cybersecurity #linux
Cybersecurity โšก AI Lesson
Did you know you can program this? ๐Ÿคฏ #shorts #f1 #cybersecurity #linux
David Bombal Beginner 2y ago
๐Ÿ“š Coursera Courses Opens on Coursera ยท Free to audit
1 / 3 View all โ†’
Zero Trust Architectures
๐Ÿ“š Coursera Course โ†—
Self-paced
Zero Trust Architectures
Opens on Coursera โ†—
CCST Cybersecurity Video Training Series
๐Ÿ“š Coursera Course โ†—
Self-paced
CCST Cybersecurity Video Training Series
Opens on Coursera โ†—
PenTest Planning & Information Gathering
๐Ÿ“š Coursera Course โ†—
Self-paced
PenTest Planning & Information Gathering
Opens on Coursera โ†—
Network Security Principles
๐Ÿ“š Coursera Course โ†—
Self-paced
Network Security Principles
Opens on Coursera โ†—
Communication Strategies for a Virtual Age
๐Ÿ“š Coursera Course โ†—
Self-paced
Communication Strategies for a Virtual Age
Opens on Coursera โ†—
The Foundations of Cybersecurity
๐Ÿ“š Coursera Course โ†—
Self-paced
The Foundations of Cybersecurity
Opens on Coursera โ†—