Tech Skills

Cybersecurity

Ethical hacking, penetration testing, network security, CTFs and defensive security

6,983
lessons
Skills in this topic
View full skill map →
Security Basics
beginner
Fix OWASP top 10 vulnerabilities
AI Security
intermediate
Identify and patch prompt injection vulnerabilities
Network Security
intermediate
Configure a firewall with proper inbound/outbound rules
Ethical Hacking & Pen Testing
intermediate
Conduct a full pen test with Kali Linux
Cloud Security
intermediate
Implement IAM least-privilege policies on AWS/GCP
Incident Response
intermediate
Build an incident response playbook
Security Compliance
intermediate
Map controls for SOC 2 Type II compliance
Defensive AI
advanced
Build an AI-powered log anomaly detector
find social media accounts with Sherlock (in 5 MIN)
Cybersecurity ⚡ AI Lesson
find social media accounts with Sherlock (in 5 MIN)
NetworkChuck Beginner 5y ago
how to build a HACKING lab (to become a hacker)
Cybersecurity ⚡ AI Lesson
how to build a HACKING lab (to become a hacker)
NetworkChuck Beginner 5y ago
Start of Cyber Security Challenge Germany 2021 #shorts
Cybersecurity
Start of Cyber Security Challenge Germany 2021 #shorts
LiveOverflow Beginner 5y ago
Top 5 Hacking Books: Blue Team Edition
Cybersecurity
Top 5 Hacking Books: Blue Team Edition
David Bombal Beginner 5y ago
GuidePoint Security CTF - Custom Base64 Languages - Kirby & Alphabet
Cybersecurity
GuidePoint Security CTF - Custom Base64 Languages - Kirby & Alphabet
John Hammond Beginner 5y ago
Your first hacking cert?
Cybersecurity
Your first hacking cert?
David Bombal Beginner 5y ago
HackTheBox - Academy
Cybersecurity
HackTheBox - Academy
IppSec Beginner 5y ago
The Only 2 Things You Need to Succeed as a Designer
Cybersecurity
The Only 2 Things You Need to Succeed as a Designer
Flux Academy Beginner 5y ago
HackTheBox - Feline
Cybersecurity
HackTheBox - Feline
IppSec Beginner 5y ago
Learner Spotlight: My Journey from Cybersecurity Professional to Data Analyst [Testimonial]
Cybersecurity ⚡ AI Lesson
Learner Spotlight: My Journey from Cybersecurity Professional to Data Analyst [Testimonial]
DataCamp Beginner 5y ago
How CPUs Access Hardware - Another SerenityOS Exploit
Cybersecurity ⚡ AI Lesson
How CPUs Access Hardware - Another SerenityOS Exploit
LiveOverflow Beginner 5y ago
TryHackMe! Skynet - Wildcard Injection
Cybersecurity
TryHackMe! Skynet - Wildcard Injection
John Hammond Beginner 5y ago
Setting Up a Remote Pentesting DropBox
Cybersecurity ⚡ AI Lesson
Setting Up a Remote Pentesting DropBox
The Cyber Mentor Beginner 5y ago
Hacking a Website using XSS (Cross Site Scripting)
Cybersecurity
Hacking a Website using XSS (Cross Site Scripting)
CoderOne Beginner 5y ago
SOLARWINDS – A SANS Lightning Summit
Cybersecurity ⚡ AI Lesson
SOLARWINDS – A SANS Lightning Summit
SANS Institute Beginner 5y ago
Mini Workshop: Attack & Defend
Cybersecurity ⚡ AI Lesson
Mini Workshop: Attack & Defend
SANS Institute Beginner 5y ago
Building a WiFi Hacking Device for Only $2
Cybersecurity ⚡ AI Lesson
Building a WiFi Hacking Device for Only $2
The Cyber Mentor Beginner 5y ago
Getting Started With Malware Analysis & Reverse Engineering
Cybersecurity ⚡ AI Lesson
Getting Started With Malware Analysis & Reverse Engineering
HackerSploit Beginner 5y ago
Cybertalk - EP9 - AI In Cyber Security, Bug Bounties & Reverse Engineering
Cybersecurity ⚡ AI Lesson
Cybertalk - EP9 - AI In Cyber Security, Bug Bounties & Reverse Engineering
HackerSploit Beginner 5y ago
Basics of SQL Injection - Penetration Testing for Ethical Hackers
Cybersecurity
Basics of SQL Injection - Penetration Testing for Ethical Hackers
freeCodeCamp.org Beginner 5y ago
Simple Caesar Encryption in Python
Cybersecurity ⚡ AI Lesson
Simple Caesar Encryption in Python
NeuralNine Beginner 5y ago
How To Start A Career In Digital Marketing
Cybersecurity
How To Start A Career In Digital Marketing
Dan Lok Beginner 5y ago
How to get your first Cybersecurity job
Cybersecurity
How to get your first Cybersecurity job
David Bombal Beginner 5y ago
Cyberwar jobs are here
Cybersecurity
Cyberwar jobs are here
David Bombal Beginner 5y ago
Best hacking laptop and OS?
Cybersecurity
Best hacking laptop and OS?
David Bombal Beginner 5y ago
Top 5 hacking books
Cybersecurity
Top 5 hacking books
David Bombal Beginner 5y ago
crunch
Cybersecurity
crunch
David Bombal Beginner 5y ago
HackTheBox - Doctor
Cybersecurity
HackTheBox - Doctor
IppSec Beginner 5y ago
Does Hacking Require Programming Skills?
Cybersecurity
Does Hacking Require Programming Skills?
LiveOverflow Beginner 5y ago
Get a cert, get a hacking job? #CEH #OSCP
Cybersecurity
Get a cert, get a hacking job? #CEH #OSCP
David Bombal Beginner 5y ago
Social Engineering: What It Is, Why It Matters, and What You Can Do
Cybersecurity ⚡ AI Lesson
Social Engineering: What It Is, Why It Matters, and What You Can Do
SANS Institute Beginner 5y ago
Hacking Your Brain: Using Proven Psychology Techniques to Set and Smash Goals
Cybersecurity ⚡ AI Lesson
Hacking Your Brain: Using Proven Psychology Techniques to Set and Smash Goals
SANS Institute Beginner 5y ago
Starting a Career as an Ethical Hacker
Cybersecurity ⚡ AI Lesson
Starting a Career as an Ethical Hacker
SANS Institute Beginner 5y ago
Defending Critical Infrastructure
Cybersecurity ⚡ AI Lesson
Defending Critical Infrastructure
SANS Institute Beginner 5y ago
Cybersecurity Career Success for Neurodivergent Individuals
Cybersecurity ⚡ AI Lesson
Cybersecurity Career Success for Neurodivergent Individuals
SANS Institute Beginner 5y ago
Protecting Your Digital Identity
Cybersecurity ⚡ AI Lesson
Protecting Your Digital Identity
SANS Institute Beginner 5y ago
Next-Level App Hacking: Threat Modeling for Better Attacks
Cybersecurity ⚡ AI Lesson
Next-Level App Hacking: Threat Modeling for Better Attacks
SANS Institute Beginner 5y ago
Cybersecurity Careers: Where Do You Fit?
Cybersecurity ⚡ AI Lesson
Cybersecurity Careers: Where Do You Fit?
SANS Institute Beginner 5y ago
Can People Hack Nuclear Plants?
Cybersecurity ⚡ AI Lesson
Can People Hack Nuclear Plants?
SANS Institute Beginner 5y ago
Cracking WiFi WPA2 Handshake
Cybersecurity
Cracking WiFi WPA2 Handshake
David Bombal Beginner 5y ago
Python WiFi MAC changer (Windows 10 MAC address spoofing)
Cybersecurity
Python WiFi MAC changer (Windows 10 MAC address spoofing)
David Bombal Beginner 5y ago
Blind Cross Site Scripting (XSS) Overview - Bug Bounty Hunting & Web App Pentesting
Cybersecurity ⚡ AI Lesson
Blind Cross Site Scripting (XSS) Overview - Bug Bounty Hunting & Web App Pentesting
The Cyber Mentor Beginner 5y ago
HackTheBox - Compromised
Cybersecurity ⚡ AI Lesson
HackTheBox - Compromised
IppSec Beginner 5y ago
Former NSA hacker: top skills, jobs and hacking in 2021
Cybersecurity
Former NSA hacker: top skills, jobs and hacking in 2021
David Bombal Beginner 5y ago
HackTheBox - Rope2
Cybersecurity ⚡ AI Lesson
HackTheBox - Rope2
IppSec Beginner 5y ago
Ex-NSA hacker tells us how to get into hacking!
Cybersecurity
Ex-NSA hacker tells us how to get into hacking!
David Bombal Beginner 5y ago
Kernel Root Exploit via a ptrace() and execve() Race Condition
Cybersecurity ⚡ AI Lesson
Kernel Root Exploit via a ptrace() and execve() Race Condition
LiveOverflow Beginner 5y ago
HackTheBox - Omni
Cybersecurity
HackTheBox - Omni
IppSec Beginner 5y ago
📚 Coursera Courses Opens on Coursera · Free to audit
1 / 3 View all →
Technical Deep Dive with Incident Response Tools
📚 Coursera Course ↗
Self-paced
Technical Deep Dive with Incident Response Tools
Opens on Coursera ↗
CyberSec First Responder (CFR-310)
📚 Coursera Course ↗
Self-paced
CyberSec First Responder (CFR-310)
Opens on Coursera ↗
Security Architecture & Operations
📚 Coursera Course ↗
Self-paced
Security Architecture & Operations
Opens on Coursera ↗
Network Traffic Analysis for Incident Response
📚 Coursera Course ↗
Self-paced
Network Traffic Analysis for Incident Response
Opens on Coursera ↗
Cybersecurity: Protecting your Information on the Go
📚 Coursera Course ↗
Self-paced
Cybersecurity: Protecting your Information on the Go
Opens on Coursera ↗
Exam Prep SC-200: Microsoft Security Operations Analyst
📚 Coursera Course ↗
Self-paced
Exam Prep SC-200: Microsoft Security Operations Analyst
Opens on Coursera ↗