Tech Skills

Cybersecurity

Ethical hacking, penetration testing, network security, CTFs and defensive security

6,909
lessons
Skills in this topic
View full skill map โ†’
Security Basics
beginner
Fix OWASP top 10 vulnerabilities
AI Security
intermediate
Identify and patch prompt injection vulnerabilities
Network Security
intermediate
Configure a firewall with proper inbound/outbound rules
Ethical Hacking & Pen Testing
intermediate
Conduct a full pen test with Kali Linux
Cloud Security
intermediate
Implement IAM least-privilege policies on AWS/GCP
Incident Response
intermediate
Build an incident response playbook
Security Compliance
intermediate
Map controls for SOC 2 Type II compliance
Defensive AI
advanced
Build an AI-powered log anomaly detector
Cybersecurity Charisma: Unlocking Security Culture and Leadership
Cybersecurity โšก AI Lesson
Cybersecurity Charisma: Unlocking Security Culture and Leadership
SANS Institute Beginner 2y ago
This is NetWars!
Cybersecurity โšก AI Lesson
This is NetWars!
SANS Institute Beginner 2y ago
Earn Your Cybersecurity Master's Degree Online | University of London
Cybersecurity
Earn Your Cybersecurity Master's Degree Online | University of London
Coursera Beginner 2y ago
5 Hacking Tools I Can't Live Without
Cybersecurity โšก AI Lesson
5 Hacking Tools I Can't Live Without
The Cyber Mentor Beginner 2y ago
Top 3 Cybersecurity Career Tips (from Ex-NSA Hacker)
Cybersecurity โšก AI Lesson
Top 3 Cybersecurity Career Tips (from Ex-NSA Hacker)
David Bombal Beginner 2y ago
HackTheBox - Stocker
Cybersecurity โšก AI Lesson
HackTheBox - Stocker
IppSec Beginner 2y ago
Hacking Google Cloud?
Cybersecurity
Hacking Google Cloud?
LiveOverflow Beginner 2y ago
Don't use these passwords! (Too easy to crack) #shorts
Cybersecurity โšก AI Lesson
Don't use these passwords! (Too easy to crack) #shorts
David Bombal Beginner 2y ago
Responsive Screen Sizes ๐Ÿ‘จโ€๐Ÿ’ป.  #responsive #responsivewebdesign #responsivedesign
Cybersecurity
Responsive Screen Sizes ๐Ÿ‘จโ€๐Ÿ’ป. #responsive #responsivewebdesign #responsivedesign
CydexCode Beginner 2y ago
WordPress Vulnerabilities
Cybersecurity โšก AI Lesson
WordPress Vulnerabilities
The Cyber Mentor Beginner 2y ago
HackTheBox - Escape
Cybersecurity โšก AI Lesson
HackTheBox - Escape
IppSec Beginner 2y ago
Ethical Hacking: Bypass Passwords with Linux PAM Degradation Attack
Cybersecurity
Ethical Hacking: Bypass Passwords with Linux PAM Degradation Attack
John Hammond Beginner 2y ago
Hacking 101๏ฟผ
Cybersecurity
Hacking 101๏ฟผ
GeeksforGeeks Beginner 2y ago
Bert Kreischer: Comedy, Drinking, Rogan, Segura, Churchill & Kim Jong Un | Lex Fridman Podcast #382
Cybersecurity
Bert Kreischer: Comedy, Drinking, Rogan, Segura, Churchill & Kim Jong Un | Lex Fridman Podcast #382
Lex Fridman Beginner 2y ago
Authentication Bypass Using Root Array
Cybersecurity
Authentication Bypass Using Root Array
LiveOverflow Beginner 2y ago
SANS New NetWars Core Version 9
Cybersecurity โšก AI Lesson
SANS New NetWars Core Version 9
SANS Institute Beginner 2y ago
Protecting the Cloud from Ransomware | Host: Ryan Chapman | June 20, 2023
Cybersecurity โšก AI Lesson
Protecting the Cloud from Ransomware | Host: Ryan Chapman | June 20, 2023
SANS Institute Beginner 2y ago
Pegasus Spyware: so dangerous that it should be banned? OTW explains...
Cybersecurity
Pegasus Spyware: so dangerous that it should be banned? OTW explains...
David Bombal Beginner 2y ago
Panel | Mastercard Trust Center
Cybersecurity โšก AI Lesson
Panel | Mastercard Trust Center
SANS Institute Beginner 2y ago
How SMBs can defend against Top Threats using the CIS Critical Security Controls (Controls)
Cybersecurity โšก AI Lesson
How SMBs can defend against Top Threats using the CIS Critical Security Controls (Controls)
SANS Institute Beginner 2y ago
MOVEit Vulnerability CVE-2023-34362 Breach Deep Dive
Cybersecurity โšก AI Lesson
MOVEit Vulnerability CVE-2023-34362 Breach Deep Dive
The Cyber Mentor Beginner 2y ago
WiFi hacking with a Raspberry Pi and Parrot OS
Cybersecurity
WiFi hacking with a Raspberry Pi and Parrot OS
David Bombal Beginner 2y ago
The Dark Knight of OSINT, Matt Edmondson | Host: Rob Lee | June 13, 2023
Cybersecurity โšก AI Lesson
The Dark Knight of OSINT, Matt Edmondson | Host: Rob Lee | June 13, 2023
SANS Institute Beginner 2y ago
the CHEAPEST path to becoming an ethical hacker
Cybersecurity โšก AI Lesson
the CHEAPEST path to becoming an ethical hacker
The Cyber Mentor Beginner 2y ago
The Emerging Technologies of AI, Edge and Quantum computing that are important to know about...
Cybersecurity
The Emerging Technologies of AI, Edge and Quantum computing that are important to know about...
David Bombal Beginner 2y ago
HackTheBox - Soccer
Cybersecurity
HackTheBox - Soccer
IppSec Beginner 2y ago
Blind SQL Injection Made Easy
Cybersecurity โšก AI Lesson
Blind SQL Injection Made Easy
The Cyber Mentor Beginner 2y ago
Cybersecurity's BIG Problem. Why it needs to change.
Cybersecurity โšก AI Lesson
Cybersecurity's BIG Problem. Why it needs to change.
David Bombal Beginner 2y ago
SANS Live Training Student Success Story: Mackenize Morris
Cybersecurity โšก AI Lesson
SANS Live Training Student Success Story: Mackenize Morris
SANS Institute Beginner 2y ago
HackTheBox - TwoMillion
Cybersecurity
HackTheBox - TwoMillion
IppSec Beginner 2y ago
Next Level API Hacking with Kiterunner
Cybersecurity โšก AI Lesson
Next Level API Hacking with Kiterunner
The Cyber Mentor Beginner 2y ago
HackTheBox - Bagel
Cybersecurity โšก AI Lesson
HackTheBox - Bagel
IppSec Beginner 2y ago
Practical Junior Penetration Tester (PJPT) - Certification Overview
Cybersecurity โšก AI Lesson
Practical Junior Penetration Tester (PJPT) - Certification Overview
The Cyber Mentor Beginner 2y ago
Windows Pentest Tutorial (Active Directory Game Over!)
Cybersecurity โšก AI Lesson
Windows Pentest Tutorial (Active Directory Game Over!)
David Bombal Beginner 2y ago
Catch me if you can! #shorts
Cybersecurity
Catch me if you can! #shorts
David Bombal Beginner 2y ago
What the Heck is Going on with Cybersecurity Higher Ed? | Host: Ed Skoudis | May 30, 2023
Cybersecurity โšก AI Lesson
What the Heck is Going on with Cybersecurity Higher Ed? | Host: Ed Skoudis | May 30, 2023
SANS Institute Beginner 2y ago
What is the BEST Hacking Platform?
Cybersecurity โšก AI Lesson
What is the BEST Hacking Platform?
The Cyber Mentor Beginner 2y ago
HackTheBox - Absolute
Cybersecurity
HackTheBox - Absolute
IppSec Beginner 2y ago
Building a Password Cracker in Rust
Cybersecurity โšก AI Lesson
Building a Password Cracker in Rust
The Cyber Mentor Beginner 2y ago
It's DNS again ๐Ÿ˜ข Did you know this Malware Hack?
Cybersecurity โšก AI Lesson
It's DNS again ๐Ÿ˜ข Did you know this Malware Hack?
David Bombal Beginner 2y ago
Kali NetHunter Pro in 6 minutes
Cybersecurity
Kali NetHunter Pro in 6 minutes
David Bombal Beginner 2y ago
This New Web Hacking Tool May Replace Burp Suite
Cybersecurity โšก AI Lesson
This New Web Hacking Tool May Replace Burp Suite
The Cyber Mentor Beginner 2y ago
His new gadget any good at catching rogue devices?
Cybersecurity
His new gadget any good at catching rogue devices?
David Bombal Beginner 2y ago
HackTheBox - Precious
Cybersecurity โšก AI Lesson
HackTheBox - Precious
IppSec Beginner 2y ago
the BEST resources for finding a cybersecurity job
Cybersecurity โšก AI Lesson
the BEST resources for finding a cybersecurity job
The Cyber Mentor Beginner 2y ago
The BEST Notetaking Apps Ranked
Cybersecurity โšก AI Lesson
The BEST Notetaking Apps Ranked
The Cyber Mentor Beginner 3y ago
How to be Invisible Online (and the hard truth about it)...
Cybersecurity
How to be Invisible Online (and the hard truth about it)...
David Bombal Beginner 3y ago
FIVE Practical AI Uses for Cybersecurity
Cybersecurity โšก AI Lesson
FIVE Practical AI Uses for Cybersecurity
The Cyber Mentor Beginner 3y ago
๐Ÿ“š Coursera Courses Opens on Coursera ยท Free to audit
1 / 3 View all โ†’
IoT Security: Interface and Data Security
๐Ÿ“š Coursera Course โ†—
Self-paced
IoT Security: Interface and Data Security
Opens on Coursera โ†—
Getting Started in Port Scanning Using Nmap and Kali Linux
๐Ÿ“š Coursera Course โ†—
Self-paced
Getting Started in Port Scanning Using Nmap and Kali Linux
Opens on Coursera โ†—
Identifying Security Vulnerabilities
๐Ÿ“š Coursera Course โ†—
Self-paced
Identifying Security Vulnerabilities
Opens on Coursera โ†—
Introduction to Secure Coding and Input Validation in iOS
๐Ÿ“š Coursera Course โ†—
Self-paced
Introduction to Secure Coding and Input Validation in iOS
Opens on Coursera โ†—
CyberSec First Responder โ€“ Advanced (CFR-A): Analyze
๐Ÿ“š Coursera Course โ†—
Self-paced
CyberSec First Responder โ€“ Advanced (CFR-A): Analyze
Opens on Coursera โ†—
The CISO Masterclass
๐Ÿ“š Coursera Course โ†—
Self-paced
The CISO Masterclass
Opens on Coursera โ†—