Tech Skills

Cybersecurity

Ethical hacking, penetration testing, network security, CTFs and defensive security

6,735
lessons
Skills in this topic
View full skill map โ†’
Security Basics
beginner
Fix OWASP top 10 vulnerabilities
AI Security
intermediate
Identify and patch prompt injection vulnerabilities
Network Security
intermediate
Configure a firewall with proper inbound/outbound rules
Ethical Hacking & Pen Testing
intermediate
Conduct a full pen test with Kali Linux
Cloud Security
intermediate
Implement IAM least-privilege policies on AWS/GCP
Incident Response
intermediate
Build an incident response playbook
Security Compliance
intermediate
Map controls for SOC 2 Type II compliance
Defensive AI
advanced
Build an AI-powered log anomaly detector
How a GitLab engineer DESTROYED their main databaseโ€ฆ
Cybersecurity
How a GitLab engineer DESTROYED their main databaseโ€ฆ
Coding with Lewis Intermediate 1d ago
LIVE: ๐Ÿ•ต๏ธ HTB Sherlocks! | Cybersecurity | Blue Team
Cybersecurity
LIVE: ๐Ÿ•ต๏ธ HTB Sherlocks! | Cybersecurity | Blue Team
The Cyber Mentor Intermediate 1d ago
A Quick Way to Prove Your Cybersecurity Skillset!
Cybersecurity
A Quick Way to Prove Your Cybersecurity Skillset!
The Cyber Mentor Intermediate 1d ago
Become Ultra Elite Hackerman With This Application
Cybersecurity
Become Ultra Elite Hackerman With This Application
Brodie Robertson Intermediate 3d ago
Your Cloud Security is Already Built-in: How to Finally Enforce It
Cybersecurity
Your Cloud Security is Already Built-in: How to Finally Enforce It
Google Cloud Intermediate 3d ago
Mark Cavage on Agentic AI, Sandboxing & Enterprise Security | Ep 10
Cybersecurity
Mark Cavage on Agentic AI, Sandboxing & Enterprise Security | Ep 10
Data Science Dojo Intermediate 3d ago
Stop AI Agents From SQL Injecting Your Database
Cybersecurity
Stop AI Agents From SQL Injecting Your Database
MLOps.community Intermediate 6d ago
How HackerRank Stops Cheating in Tech Interviews
Cybersecurity
How HackerRank Stops Cheating in Tech Interviews
HackerRank Intermediate 6d ago
Linux Just Standardized Something We All Use
Cybersecurity
Linux Just Standardized Something We All Use
Brodie Robertson Intermediate 1w ago
Language-Agnostic Detection of Bugs in Zero-Knowledge Proof Programs
Cybersecurity
Language-Agnostic Detection of Bugs in Zero-Knowledge Proof Programs
Microsoft Research Intermediate 1w ago
3 Keys to Weather the Autonomous Attack Storm
Cybersecurity
3 Keys to Weather the Autonomous Attack Storm
SANS Institute Intermediate 1w ago
Hacking on the PDP1 Raspberry Pi Emulator - Computerphile
Cybersecurity
Hacking on the PDP1 Raspberry Pi Emulator - Computerphile
Computerphile Intermediate 1w ago
The Only Cure For This Malware Is to Throw Your Router in the Trash ๐Ÿ”Œ Episode 174: Pacific Rim
Cybersecurity
The Only Cure For This Malware Is to Throw Your Router in the Trash ๐Ÿ”Œ Episode 174: Pacific Rim
Jack Rhysider Intermediate 1w ago
Keynote: Every Doorknob, All At Once: AI Cyber Lessons
Cybersecurity
Keynote: Every Doorknob, All At Once: AI Cyber Lessons
SANS Institute Intermediate 1w ago
Dual Boot Windows and Ubuntu Linux in 10 Minutes (2026)
Cybersecurity
Dual Boot Windows and Ubuntu Linux in 10 Minutes (2026)
David Bombal Intermediate 1w ago
Stanford's youngest instructor on InfoSec, AI, catching cheaters - Rachel Fernandez [Podcast #217]
Cybersecurity
Stanford's youngest instructor on InfoSec, AI, catching cheaters - Rachel Fernandez [Podcast #217]
freeCodeCamp.org Intermediate 1w ago
Top Cybersecurity Certifications 2026 | Best Cybersecurity Certifications | #Shorts | #Simplilearn
Cybersecurity
Top Cybersecurity Certifications 2026 | Best Cybersecurity Certifications | #Shorts | #Simplilearn
Simplilearn Intermediate 2w ago
Stop account hijacks with Google Ads passkeys
Cybersecurity
Stop account hijacks with Google Ads passkeys
Google Ads Intermediate 2w ago
Securing the Agentic Enterprise
Cybersecurity
Securing the Agentic Enterprise
Google Cloud Intermediate 2w ago
Inside the world's most elite student hackathon โ€“ Full Documentary on Stanford Tree Hacks 2026
Cybersecurity
Inside the world's most elite student hackathon โ€“ Full Documentary on Stanford Tree Hacks 2026
freeCodeCamp.org Intermediate 2w ago
Securing Azure Cosmos DB: The Right Way | Sudhanshu Khera | Azure Cosmos DB Conf 2026
Cybersecurity
Securing Azure Cosmos DB: The Right Way | Sudhanshu Khera | Azure Cosmos DB Conf 2026
Microsoft Developer Intermediate 2w ago
Top 5 Ethical Hacking Gadgets In 2026 | Best Ethical Hacking Gadgets In 2026 | #Shorts #Simplilearn
Cybersecurity
Top 5 Ethical Hacking Gadgets In 2026 | Best Ethical Hacking Gadgets In 2026 | #Shorts #Simplilearn
Simplilearn Intermediate 2w ago
From alleged hairdryer hacking to insider #trading, prediction markets are getting messy fast.
Cybersecurity
From alleged hairdryer hacking to insider #trading, prediction markets are getting messy fast.
Business Insider Intermediate 2w ago
The best way to install Linux or other operating systems? (Ventoy)
Cybersecurity
The best way to install Linux or other operating systems? (Ventoy)
David Bombal Intermediate 2w ago
Linus Torvalds Reveals His Biggest Linux Failure #shorts #linux #linus #knowledge
Cybersecurity
Linus Torvalds Reveals His Biggest Linux Failure #shorts #linux #linus #knowledge
WebKnower Intermediate 2w ago
You Have Been Saying Linus Wrong #shorts #linux #linus #programming #knowledge
Cybersecurity
You Have Been Saying Linus Wrong #shorts #linux #linus #programming #knowledge
WebKnower Intermediate 3w ago
Stanford Course - Web Security
Cybersecurity
Stanford Course - Web Security
Stanford Online Intermediate 3w ago
JHT Livestream: mitmproxy & OpenWRT to read HTTPS traffic!
Cybersecurity
JHT Livestream: mitmproxy & OpenWRT to read HTTPS traffic!
John Hammond Intermediate 3w ago
A rich hacker just penetrated 31 WordPress plugins...
Cybersecurity
A rich hacker just penetrated 31 WordPress plugins...
Fireship Intermediate 4w ago
Can you steal $10,000 from a locked iPhone?
Cybersecurity
Can you steal $10,000 from a locked iPhone?
Veritasium Intermediate 4w ago
How to add a Cookie Consent Banner in WordPress the RIGHT Way
Cybersecurity
How to add a Cookie Consent Banner in WordPress the RIGHT Way
WPBeginner - WordPress Tutorials Intermediate 4w ago
Fedora Is Replacing Ubuntu Linux As The Default
Cybersecurity
Fedora Is Replacing Ubuntu Linux As The Default
Brodie Robertson Intermediate 1w ago
Linux Ricing Brings Back Steam Skins With Millennium
Cybersecurity
Linux Ricing Brings Back Steam Skins With Millennium
Brodie Robertson Intermediate 1w ago
CopyFail Compromises The Last 9 Years Of Linux Distros
Cybersecurity
CopyFail Compromises The Last 9 Years Of Linux Distros
Brodie Robertson Intermediate 1w ago
Josh Mason | Real Folks of Cyber | DITL
Cybersecurity
Josh Mason | Real Folks of Cyber | DITL
The Cyber Mentor Intermediate 2w ago
Securing agents
Cybersecurity
Securing agents
Google Cloud Intermediate 2w ago
Securing the Agentic Enterprise
Cybersecurity
Securing the Agentic Enterprise
Google Cloud Intermediate 2w ago
Protect Your Linux Desktop From Malicious USB Devices
Cybersecurity
Protect Your Linux Desktop From Malicious USB Devices
Brodie Robertson Intermediate 2w ago
Security in 22 seconds!
Cybersecurity
Security in 22 seconds!
Google Cloud Intermediate 2w ago
There's No Way This Web Extension Is Real
Cybersecurity
There's No Way This Web Extension Is Real
Brodie Robertson Intermediate 2w ago
Building Your 2026 Cybersecurity Audit Plan
Cybersecurity
Building Your 2026 Cybersecurity Audit Plan
SANS Institute Intermediate 2w ago
Trust Your Vendors, Do You?
Cybersecurity
Trust Your Vendors, Do You?
SANS Institute Intermediate 2w ago
How to Make a Mission & Vision for Your Security Team in 60 Minutes or Less
Cybersecurity
How to Make a Mission & Vision for Your Security Team in 60 Minutes or Less
SANS Institute Intermediate 2w ago
IPv8 Changes Everything We Know About IP
Cybersecurity
IPv8 Changes Everything We Know About IP
Brodie Robertson Intermediate 3w ago
Why Linus Torvalds Does Not Give Tech Advice #shorts #linux #techtips #knowledge
Cybersecurity
Why Linus Torvalds Does Not Give Tech Advice #shorts #linux #techtips #knowledge
WebKnower Intermediate 3w ago
Linus Torvalds Admits His Biggest Mistakes #shorts #linux #programming #knowledge
Cybersecurity
Linus Torvalds Admits His Biggest Mistakes #shorts #linux #programming #knowledge
WebKnower Intermediate 3w ago
How to track dark ships using OSINT (with demos)
Cybersecurity
How to track dark ships using OSINT (with demos)
David Bombal Intermediate 3w ago
Linus Torvalds Struggles With Machine Maintenance #shorts #linux #opensource
Cybersecurity
Linus Torvalds Struggles With Machine Maintenance #shorts #linux #opensource
WebKnower Intermediate 4w ago
๐Ÿ“š Coursera Courses Opens on Coursera ยท Free to audit
1 / 3 View all โ†’
Cybersecurity and Network Defense Fundamentals
๐Ÿ“š Coursera Course โ†—
Self-paced
Cybersecurity and Network Defense Fundamentals
Opens on Coursera โ†—
Execution, persistence, privilege escalation and evasion
๐Ÿ“š Coursera Course โ†—
Self-paced
Execution, persistence, privilege escalation and evasion
Opens on Coursera โ†—
Secure Networking in Azure
๐Ÿ“š Coursera Course โ†—
Self-paced
Secure Networking in Azure
Opens on Coursera โ†—
Intro to Secure Coding and Input Validation in Android
๐Ÿ“š Coursera Course โ†—
Self-paced
Intro to Secure Coding and Input Validation in Android
Opens on Coursera โ†—
Learn Ethereum, Smart Contracts & Trading
๐Ÿ“š Coursera Course โ†—
Self-paced
Learn Ethereum, Smart Contracts & Trading
Opens on Coursera โ†—
Cybersecurity and Its Ten Domains
๐Ÿ“š Coursera Course โ†—
Self-paced
Cybersecurity and Its Ten Domains
Opens on Coursera โ†—