Tech Skills

Cybersecurity

Ethical hacking, penetration testing, network security, CTFs and defensive security

6,732
lessons
Skills in this topic
View full skill map โ†’
Security Basics
beginner
Fix OWASP top 10 vulnerabilities
AI Security
intermediate
Identify and patch prompt injection vulnerabilities
Network Security
intermediate
Configure a firewall with proper inbound/outbound rules
Ethical Hacking & Pen Testing
intermediate
Conduct a full pen test with Kali Linux
Cloud Security
intermediate
Implement IAM least-privilege policies on AWS/GCP
Incident Response
intermediate
Build an incident response playbook
Security Compliance
intermediate
Map controls for SOC 2 Type II compliance
Defensive AI
advanced
Build an AI-powered log anomaly detector
How a GitLab engineer DESTROYED their main databaseโ€ฆ
Cybersecurity
How a GitLab engineer DESTROYED their main databaseโ€ฆ
Coding with Lewis Intermediate 22h ago
LIVE: ๐Ÿ•ต๏ธ HTB Sherlocks! | Cybersecurity | Blue Team
Cybersecurity
LIVE: ๐Ÿ•ต๏ธ HTB Sherlocks! | Cybersecurity | Blue Team
The Cyber Mentor Intermediate 23h ago
A Quick Way to Prove Your Cybersecurity Skillset!
Cybersecurity
A Quick Way to Prove Your Cybersecurity Skillset!
The Cyber Mentor Intermediate 1d ago
Become Ultra Elite Hackerman With This Application
Cybersecurity
Become Ultra Elite Hackerman With This Application
Brodie Robertson Intermediate 2d ago
Your Cloud Security is Already Built-in: How to Finally Enforce It
Cybersecurity
Your Cloud Security is Already Built-in: How to Finally Enforce It
Google Cloud Intermediate 2d ago
Mark Cavage on Agentic AI, Sandboxing & Enterprise Security | Ep 10
Cybersecurity
Mark Cavage on Agentic AI, Sandboxing & Enterprise Security | Ep 10
Data Science Dojo Intermediate 2d ago
Stop AI Agents From SQL Injecting Your Database
Cybersecurity
Stop AI Agents From SQL Injecting Your Database
MLOps.community Intermediate 6d ago
How HackerRank Stops Cheating in Tech Interviews
Cybersecurity
How HackerRank Stops Cheating in Tech Interviews
HackerRank Intermediate 6d ago
Linux Just Standardized Something We All Use
Cybersecurity
Linux Just Standardized Something We All Use
Brodie Robertson Intermediate 6d ago
Language-Agnostic Detection of Bugs in Zero-Knowledge Proof Programs
Cybersecurity
Language-Agnostic Detection of Bugs in Zero-Knowledge Proof Programs
Microsoft Research Intermediate 6d ago
3 Keys to Weather the Autonomous Attack Storm
Cybersecurity
3 Keys to Weather the Autonomous Attack Storm
SANS Institute Intermediate 1w ago
Hacking on the PDP1 Raspberry Pi Emulator - Computerphile
Cybersecurity
Hacking on the PDP1 Raspberry Pi Emulator - Computerphile
Computerphile Intermediate 1w ago
The Only Cure For This Malware Is to Throw Your Router in the Trash ๐Ÿ”Œ Episode 174: Pacific Rim
Cybersecurity
The Only Cure For This Malware Is to Throw Your Router in the Trash ๐Ÿ”Œ Episode 174: Pacific Rim
Jack Rhysider Intermediate 1w ago
Keynote: Every Doorknob, All At Once: AI Cyber Lessons
Cybersecurity
Keynote: Every Doorknob, All At Once: AI Cyber Lessons
SANS Institute Intermediate 1w ago
Dual Boot Windows and Ubuntu Linux in 10 Minutes (2026)
Cybersecurity
Dual Boot Windows and Ubuntu Linux in 10 Minutes (2026)
David Bombal Intermediate 1w ago
Stanford's youngest instructor on InfoSec, AI, catching cheaters - Rachel Fernandez [Podcast #217]
Cybersecurity
Stanford's youngest instructor on InfoSec, AI, catching cheaters - Rachel Fernandez [Podcast #217]
freeCodeCamp.org Intermediate 1w ago
Top Cybersecurity Certifications 2026 | Best Cybersecurity Certifications | #Shorts | #Simplilearn
Cybersecurity
Top Cybersecurity Certifications 2026 | Best Cybersecurity Certifications | #Shorts | #Simplilearn
Simplilearn Intermediate 2w ago
Stop account hijacks with Google Ads passkeys
Cybersecurity
Stop account hijacks with Google Ads passkeys
Google Ads Intermediate 2w ago
Securing the Agentic Enterprise
Cybersecurity
Securing the Agentic Enterprise
Google Cloud Intermediate 2w ago
Inside the world's most elite student hackathon โ€“ Full Documentary on Stanford Tree Hacks 2026
Cybersecurity
Inside the world's most elite student hackathon โ€“ Full Documentary on Stanford Tree Hacks 2026
freeCodeCamp.org Intermediate 2w ago
Securing Azure Cosmos DB: The Right Way | Sudhanshu Khera | Azure Cosmos DB Conf 2026
Cybersecurity
Securing Azure Cosmos DB: The Right Way | Sudhanshu Khera | Azure Cosmos DB Conf 2026
Microsoft Developer Intermediate 2w ago
Top 5 Ethical Hacking Gadgets In 2026 | Best Ethical Hacking Gadgets In 2026 | #Shorts #Simplilearn
Cybersecurity
Top 5 Ethical Hacking Gadgets In 2026 | Best Ethical Hacking Gadgets In 2026 | #Shorts #Simplilearn
Simplilearn Intermediate 2w ago
From alleged hairdryer hacking to insider #trading, prediction markets are getting messy fast.
Cybersecurity
From alleged hairdryer hacking to insider #trading, prediction markets are getting messy fast.
Business Insider Intermediate 2w ago
The best way to install Linux or other operating systems? (Ventoy)
Cybersecurity
The best way to install Linux or other operating systems? (Ventoy)
David Bombal Intermediate 2w ago
Linus Torvalds Reveals His Biggest Linux Failure #shorts #linux #linus #knowledge
Cybersecurity
Linus Torvalds Reveals His Biggest Linux Failure #shorts #linux #linus #knowledge
WebKnower Intermediate 2w ago
You Have Been Saying Linus Wrong #shorts #linux #linus #programming #knowledge
Cybersecurity
You Have Been Saying Linus Wrong #shorts #linux #linus #programming #knowledge
WebKnower Intermediate 3w ago
Stanford Course - Web Security
Cybersecurity
Stanford Course - Web Security
Stanford Online Intermediate 3w ago
JHT Livestream: mitmproxy & OpenWRT to read HTTPS traffic!
Cybersecurity
JHT Livestream: mitmproxy & OpenWRT to read HTTPS traffic!
John Hammond Intermediate 3w ago
A rich hacker just penetrated 31 WordPress plugins...
Cybersecurity
A rich hacker just penetrated 31 WordPress plugins...
Fireship Intermediate 4w ago
Can you steal $10,000 from a locked iPhone?
Cybersecurity
Can you steal $10,000 from a locked iPhone?
Veritasium Intermediate 4w ago
How to add a Cookie Consent Banner in WordPress the RIGHT Way
Cybersecurity
How to add a Cookie Consent Banner in WordPress the RIGHT Way
WPBeginner - WordPress Tutorials Intermediate 4w ago
Fedora Is Replacing Ubuntu Linux As The Default
Cybersecurity
Fedora Is Replacing Ubuntu Linux As The Default
Brodie Robertson Intermediate 1w ago
Linux Ricing Brings Back Steam Skins With Millennium
Cybersecurity
Linux Ricing Brings Back Steam Skins With Millennium
Brodie Robertson Intermediate 1w ago
CopyFail Compromises The Last 9 Years Of Linux Distros
Cybersecurity
CopyFail Compromises The Last 9 Years Of Linux Distros
Brodie Robertson Intermediate 1w ago
Josh Mason | Real Folks of Cyber | DITL
Cybersecurity
Josh Mason | Real Folks of Cyber | DITL
The Cyber Mentor Intermediate 2w ago
Securing agents
Cybersecurity
Securing agents
Google Cloud Intermediate 2w ago
Securing the Agentic Enterprise
Cybersecurity
Securing the Agentic Enterprise
Google Cloud Intermediate 2w ago
Protect Your Linux Desktop From Malicious USB Devices
Cybersecurity
Protect Your Linux Desktop From Malicious USB Devices
Brodie Robertson Intermediate 2w ago
Security in 22 seconds!
Cybersecurity
Security in 22 seconds!
Google Cloud Intermediate 2w ago
There's No Way This Web Extension Is Real
Cybersecurity
There's No Way This Web Extension Is Real
Brodie Robertson Intermediate 2w ago
Building Your 2026 Cybersecurity Audit Plan
Cybersecurity
Building Your 2026 Cybersecurity Audit Plan
SANS Institute Intermediate 2w ago
Trust Your Vendors, Do You?
Cybersecurity
Trust Your Vendors, Do You?
SANS Institute Intermediate 2w ago
How to Make a Mission & Vision for Your Security Team in 60 Minutes or Less
Cybersecurity
How to Make a Mission & Vision for Your Security Team in 60 Minutes or Less
SANS Institute Intermediate 2w ago
IPv8 Changes Everything We Know About IP
Cybersecurity
IPv8 Changes Everything We Know About IP
Brodie Robertson Intermediate 3w ago
Why Linus Torvalds Does Not Give Tech Advice #shorts #linux #techtips #knowledge
Cybersecurity
Why Linus Torvalds Does Not Give Tech Advice #shorts #linux #techtips #knowledge
WebKnower Intermediate 3w ago
Linus Torvalds Admits His Biggest Mistakes #shorts #linux #programming #knowledge
Cybersecurity
Linus Torvalds Admits His Biggest Mistakes #shorts #linux #programming #knowledge
WebKnower Intermediate 3w ago
How to track dark ships using OSINT (with demos)
Cybersecurity
How to track dark ships using OSINT (with demos)
David Bombal Intermediate 3w ago
Linus Torvalds Struggles With Machine Maintenance #shorts #linux #opensource
Cybersecurity
Linus Torvalds Struggles With Machine Maintenance #shorts #linux #opensource
WebKnower Intermediate 4w ago
๐Ÿ“š Coursera Courses Opens on Coursera ยท Free to audit
1 / 3 View all โ†’
Advanced Network Security and Endpoint Strategies
๐Ÿ“š Coursera Course โ†—
Self-paced
Advanced Network Security and Endpoint Strategies
Opens on Coursera โ†—
The Complete Pentesting and Privilege Escalation Course
๐Ÿ“š Coursera Course โ†—
Self-paced
The Complete Pentesting and Privilege Escalation Course
Opens on Coursera โ†—
IoT Security: Interface and Data Security
๐Ÿ“š Coursera Course โ†—
Self-paced
IoT Security: Interface and Data Security
Opens on Coursera โ†—
Leadership and Change Management for Sustainability Success
๐Ÿ“š Coursera Course โ†—
Self-paced
Leadership and Change Management for Sustainability Success
Opens on Coursera โ†—
Introduction to the Threat Intelligence Lifecycle
๐Ÿ“š Coursera Course โ†—
Self-paced
Introduction to the Threat Intelligence Lifecycle
Opens on Coursera โ†—
Microsoft Unified XDR and SIEM Solution Handbook
๐Ÿ“š Coursera Course โ†—
Self-paced
Microsoft Unified XDR and SIEM Solution Handbook
Opens on Coursera โ†—