Tech Skills

Cybersecurity

Ethical hacking, penetration testing, network security, CTFs and defensive security

6,807
lessons
Skills in this topic
View full skill map →
Security Basics
beginner
Fix OWASP top 10 vulnerabilities
AI Security
intermediate
Identify and patch prompt injection vulnerabilities
Network Security
intermediate
Configure a firewall with proper inbound/outbound rules
Ethical Hacking & Pen Testing
intermediate
Conduct a full pen test with Kali Linux
Cloud Security
intermediate
Implement IAM least-privilege policies on AWS/GCP
Incident Response
intermediate
Build an incident response playbook
Security Compliance
intermediate
Map controls for SOC 2 Type II compliance
Defensive AI
advanced
Build an AI-powered log anomaly detector
HackTheBox - Clicker
Cybersecurity
HackTheBox - Clicker
IppSec Beginner 2y ago
Is AI Still Writing Bad Code?
Cybersecurity ⚡ AI Lesson
Is AI Still Writing Bad Code?
The Cyber Mentor Beginner 2y ago
Free Web Application Ethical Hacking Course (Includes Server-side request forgery SSRF)
Cybersecurity ⚡ AI Lesson
Free Web Application Ethical Hacking Course (Includes Server-side request forgery SSRF)
David Bombal Beginner 2y ago
How to Hack Active Directory with ASREP Roasting
Cybersecurity
How to Hack Active Directory with ASREP Roasting
John Hammond Beginner 2y ago
5 Ways to Boost your Cybersecurity Career in 2024
Cybersecurity ⚡ AI Lesson
5 Ways to Boost your Cybersecurity Career in 2024
The Cyber Mentor Beginner 2y ago
Finding The .webp Vulnerability in 8s (Fuzzing with AFL++)
Cybersecurity ⚡ AI Lesson
Finding The .webp Vulnerability in 8s (Fuzzing with AFL++)
LiveOverflow Beginner 2y ago
The best Hacking Courses & Certs? Your 2024 roadmap to Pentester success.
Cybersecurity ⚡ AI Lesson
The best Hacking Courses & Certs? Your 2024 roadmap to Pentester success.
David Bombal Beginner 2y ago
HackTheBox - Bookworm
Cybersecurity ⚡ AI Lesson
HackTheBox - Bookworm
IppSec Beginner 2y ago
Create Your Own File Extension
Cybersecurity
Create Your Own File Extension
John Hammond Beginner 2y ago
Emerging Technologies: Designing Strategy and Forecasting Disruption I Program Overview
Cybersecurity
Emerging Technologies: Designing Strategy and Forecasting Disruption I Program Overview
Stanford Online Beginner 2y ago
Ethical Hacking Tutorial For Beginners [2023] | Learn Ethical hacking From Scratch | Edureka Rewind
Cybersecurity
Ethical Hacking Tutorial For Beginners [2023] | Learn Ethical hacking From Scratch | Edureka Rewind
edureka! Beginner 2y ago
What is Kali Linux | Kali Linux Hacking Tutorials | Ethical Hacking Training | Edureka Rewind
Cybersecurity
What is Kali Linux | Kali Linux Hacking Tutorials | Ethical Hacking Training | Edureka Rewind
edureka! Beginner 2y ago
How Ethical Hacking Tricks Can Protect Your APIs and Apps
Cybersecurity
How Ethical Hacking Tricks Can Protect Your APIs and Apps
The New Stack Beginner 2y ago
3 Levels of WiFi Hacking
Cybersecurity
3 Levels of WiFi Hacking
NetworkChuck Beginner 2y ago
HTMX Crash Course | Dynamic Pages Without Writing Any JavaScript
Cybersecurity ⚡ AI Lesson
HTMX Crash Course | Dynamic Pages Without Writing Any JavaScript
Traversy Media Beginner 2y ago
CS50x 2024 - Cybersecurity
Cybersecurity
CS50x 2024 - Cybersecurity
CS50 Beginner 2y ago
the most secure OS in the world.....I hate it
Cybersecurity ⚡ AI Lesson
the most secure OS in the world.....I hate it
NetworkChuck Beginner 2y ago
Introducing SANS Executive Cybersecurity Exercises
Cybersecurity ⚡ AI Lesson
Introducing SANS Executive Cybersecurity Exercises
SANS Institute Beginner 2y ago
Quick Intro to Insecure Direct Object References (IDORs) & How You Can Fix Them
Cybersecurity
Quick Intro to Insecure Direct Object References (IDORs) & How You Can Fix Them
AWS Developers Beginner 2y ago
Quick Intro to Injection Attacks & How You Can Fix Them
Cybersecurity
Quick Intro to Injection Attacks & How You Can Fix Them
AWS Developers Beginner 2y ago
Network security fundamentals: Creating layered network defenses with built-in tools
Cybersecurity
Network security fundamentals: Creating layered network defenses with built-in tools
Google Cloud Beginner 2y ago
All About WEB SECURITY | Web Security for Full Stack Developers | GeeksforGeeks
Cybersecurity
All About WEB SECURITY | Web Security for Full Stack Developers | GeeksforGeeks
GeeksforGeeks Beginner 2y ago
Learn Application Security Testing in 2024
Cybersecurity ⚡ AI Lesson
Learn Application Security Testing in 2024
The Cyber Mentor Beginner 2y ago
Free OSINT course and resources: How you can get started in 2024
Cybersecurity
Free OSINT course and resources: How you can get started in 2024
David Bombal Beginner 2y ago
Mind blowing 🤯 $20 million USD bounties! (Zero to Hero Money Hacking Roadmap)
Cybersecurity
Mind blowing 🤯 $20 million USD bounties! (Zero to Hero Money Hacking Roadmap)
David Bombal Beginner 2y ago
Burp Extension Development Part 2: Data Persistence
Cybersecurity ⚡ AI Lesson
Burp Extension Development Part 2: Data Persistence
The Cyber Mentor Beginner 2y ago
How to Become an Ethical Hacker | Ethical hacking certification | Ethical hacking training | Edureka
Cybersecurity
How to Become an Ethical Hacker | Ethical hacking certification | Ethical hacking training | Edureka
edureka! Beginner 2y ago
Cybersecurity Full Course - 10 Hours | Cyber Security Training for Beginners | Edureka
Cybersecurity
Cybersecurity Full Course - 10 Hours | Cyber Security Training for Beginners | Edureka
edureka! Beginner 2y ago
Ranking Port Scanners - Tier List
Cybersecurity ⚡ AI Lesson
Ranking Port Scanners - Tier List
The Cyber Mentor Beginner 2y ago
HackTheBox - Sau
Cybersecurity
HackTheBox - Sau
IppSec Beginner 2y ago
Burp Extension Development Part 1: Setup & Basics
Cybersecurity ⚡ AI Lesson
Burp Extension Development Part 1: Setup & Basics
The Cyber Mentor Beginner 2y ago
Top Hacking Books for 2024 (plus Resources): FREE and Paid
Cybersecurity
Top Hacking Books for 2024 (plus Resources): FREE and Paid
David Bombal Beginner 2y ago
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tutorial | Edureka Rewind
Cybersecurity
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tutorial | Edureka Rewind
edureka! Beginner 2y ago
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Edureka Rewind
Cybersecurity
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Edureka Rewind
edureka! Beginner 2y ago
Hacking Tools (with demos) that you need to learn in 2024
Cybersecurity
Hacking Tools (with demos) that you need to learn in 2024
David Bombal Beginner 2y ago
2024 Roadmap to Master Hacker
Cybersecurity
2024 Roadmap to Master Hacker
David Bombal Beginner 2y ago
💰 Cybersecurity Salary, Career & More | Edureka #Shorts
Cybersecurity
💰 Cybersecurity Salary, Career & More | Edureka #Shorts
edureka! Beginner 2y ago
The Highs and Lows of Working in Cybersecurity
Cybersecurity ⚡ AI Lesson
The Highs and Lows of Working in Cybersecurity
The Cyber Mentor Beginner 2y ago
Avoid "OR 1=1" in SQL Injections
Cybersecurity ⚡ AI Lesson
Avoid "OR 1=1" in SQL Injections
The Cyber Mentor Beginner 2y ago
WiFi hacking like Mr Robot (with OTW)
Cybersecurity
WiFi hacking like Mr Robot (with OTW)
David Bombal Beginner 2y ago
Best Games to Teach You How to Code
Cybersecurity ⚡ AI Lesson
Best Games to Teach You How to Code
The Cyber Mentor Beginner 2y ago
Ethical Hacking using Kali Linux | Ethical Hacking Tutorial | Edureka | Cybersecurity Rewind - 3
Cybersecurity
Ethical Hacking using Kali Linux | Ethical Hacking Tutorial | Edureka | Cybersecurity Rewind - 3
edureka! Beginner 2y ago
Learn to Hack AWS & Kubernetes Clusters (for free)
Cybersecurity
Learn to Hack AWS & Kubernetes Clusters (for free)
John Hammond Beginner 2y ago
The 1st Annual TCM Invitational CTF (THIS SATURDAY!)
Cybersecurity ⚡ AI Lesson
The 1st Annual TCM Invitational CTF (THIS SATURDAY!)
The Cyber Mentor Beginner 2y ago
Next Gen Hacker?
Cybersecurity
Next Gen Hacker?
David Bombal Beginner 2y ago
HackTheBox - Authority
Cybersecurity ⚡ AI Lesson
HackTheBox - Authority
IppSec Beginner 2y ago
New Web Application Penetration Testing Certification
Cybersecurity ⚡ AI Lesson
New Web Application Penetration Testing Certification
The Cyber Mentor Beginner 2y ago
Writing Custom Malware: Import Address Table Hooking
Cybersecurity
Writing Custom Malware: Import Address Table Hooking
John Hammond Beginner 2y ago
📚 Coursera Courses Opens on Coursera · Free to audit
1 / 3 View all →
Security Hardening
📚 Coursera Course ↗
Self-paced
Security Hardening
Opens on Coursera ↗
Cloud Data & Application Security
📚 Coursera Course ↗
Self-paced
Cloud Data & Application Security
Opens on Coursera ↗
Previous OWASP Risks
📚 Coursera Course ↗
Self-paced
Previous OWASP Risks
Opens on Coursera ↗
Introduction to Secure Coding and Input Validation in iOS
📚 Coursera Course ↗
Self-paced
Introduction to Secure Coding and Input Validation in iOS
Opens on Coursera ↗
AWS: Threat Detection, Logging and Monitoring
📚 Coursera Course ↗
Self-paced
AWS: Threat Detection, Logging and Monitoring
Opens on Coursera ↗
Introdução ao Cloud Next Generation Firewall
📚 Coursera Course ↗
Self-paced
Introdução ao Cloud Next Generation Firewall
Opens on Coursera ↗