Tech Skills

Cybersecurity

Ethical hacking, penetration testing, network security, CTFs and defensive security

6,754
lessons
Skills in this topic
View full skill map →
Security Basics
beginner
Fix OWASP top 10 vulnerabilities
AI Security
intermediate
Identify and patch prompt injection vulnerabilities
Network Security
intermediate
Configure a firewall with proper inbound/outbound rules
Ethical Hacking & Pen Testing
intermediate
Conduct a full pen test with Kali Linux
Cloud Security
intermediate
Implement IAM least-privilege policies on AWS/GCP
Incident Response
intermediate
Build an incident response playbook
Security Compliance
intermediate
Map controls for SOC 2 Type II compliance
Defensive AI
advanced
Build an AI-powered log anomaly detector
2024 Artificial Intelligence Security Trends and Predictions
Cybersecurity ⚡ AI Lesson
2024 Artificial Intelligence Security Trends and Predictions
SANS Institute Intermediate 2y ago
PikaBot Malware Analysis: Debugging in Visual Studio
Cybersecurity
PikaBot Malware Analysis: Debugging in Visual Studio
John Hammond Intermediate 2y ago
Make Malware Analysis FASTER with Binary Emulation
Cybersecurity
Make Malware Analysis FASTER with Binary Emulation
John Hammond Intermediate 2y ago
Top 10 Study Habits 2024
Cybersecurity ⚡ AI Lesson
Top 10 Study Habits 2024
NetworkChuck Intermediate 2y ago
Is Hashing Encryption? #shorts #encryption #hashing #password
Cybersecurity
Is Hashing Encryption? #shorts #encryption #hashing #password
David Bombal Intermediate 2y ago
How to prepare for a career in cybersecurity with no prior experience.
Cybersecurity
How to prepare for a career in cybersecurity with no prior experience.
Coursera Intermediate 2y ago
Do you know the difference between the encryption algorithms? #shorts #encryption #tls #vpn
Cybersecurity
Do you know the difference between the encryption algorithms? #shorts #encryption #tls #vpn
David Bombal Intermediate 2y ago
How hackers infiltrated the CIA director's email #shorts #cybersecurity
Cybersecurity
How hackers infiltrated the CIA director's email #shorts #cybersecurity
Jack Rhysider Intermediate 2y ago
Begin your journey into DFIR, Blue Team, Malware and Threat Hunting with Mary Ellen Kennel
Cybersecurity ⚡ AI Lesson
Begin your journey into DFIR, Blue Team, Malware and Threat Hunting with Mary Ellen Kennel
The Cyber Mentor Intermediate 2y ago
How hackers breach iPhone security
Cybersecurity ⚡ AI Lesson
How hackers breach iPhone security
Jack Rhysider Intermediate 2y ago
2024 Cyber Defense Trends and Predictions
Cybersecurity ⚡ AI Lesson
2024 Cyber Defense Trends and Predictions
SANS Institute Intermediate 2y ago
Cyber Security Question and Answers  | CyberSecurity Interview Tips  | Edureka Rewind - 1
Cybersecurity
Cyber Security Question and Answers | CyberSecurity Interview Tips | Edureka Rewind - 1
edureka! Intermediate 2y ago
Go FROM business ZERO to a growth hacking HERO.
Cybersecurity
Go FROM business ZERO to a growth hacking HERO.
Adam Erhart Intermediate 2y ago
cybersecurity vs software engineering 😱😱😱
Cybersecurity
cybersecurity vs software engineering 😱😱😱
Sajjaad Khader Intermediate 2y ago
Phases in Cybersecurity  |Cybersecurity Training | Edureka | Cybersecurity Rewind - 2
Cybersecurity
Phases in Cybersecurity |Cybersecurity Training | Edureka | Cybersecurity Rewind - 2
edureka! Intermediate 2y ago
What if Q* broke cybersecurity? How would we adapt? Deep dive! P≠NP? Here's why it's probably fine..
Cybersecurity
What if Q* broke cybersecurity? How would we adapt? Deep dive! P≠NP? Here's why it's probably fine..
David Shapiro Intermediate 2y ago
Dig Deeper and Faster with AI
Cybersecurity
Dig Deeper and Faster with AI
John Hammond Intermediate 2y ago
I Made a Custom Threat Intel Feed (Connecting Apps with n8n)
Cybersecurity ⚡ AI Lesson
I Made a Custom Threat Intel Feed (Connecting Apps with n8n)
John Hammond Intermediate 2y ago
NetworkChuck's Life Hack
Cybersecurity
NetworkChuck's Life Hack
John Hammond Intermediate 2y ago
How to Extract Plaintext Wi-Fi Passwords (with Rust)
Cybersecurity
How to Extract Plaintext Wi-Fi Passwords (with Rust)
John Hammond Intermediate 2y ago
This Computer Malware Steals Your Information
Cybersecurity
This Computer Malware Steals Your Information
John Hammond Intermediate 2y ago
Enhancing Your Environment
Cybersecurity
Enhancing Your Environment
John Hammond Intermediate 2y ago
Kernel Level Exploits
Cybersecurity
Kernel Level Exploits
John Hammond Intermediate 2y ago
Getting Ahead in the Industry
Cybersecurity
Getting Ahead in the Industry
John Hammond Intermediate 2y ago
Cyber Defense is Literally Free
Cybersecurity ⚡ AI Lesson
Cyber Defense is Literally Free
John Hammond Intermediate 2y ago
How Hackers Move Through Networks (with Ligolo)
Cybersecurity ⚡ AI Lesson
How Hackers Move Through Networks (with Ligolo)
John Hammond Intermediate 2y ago
True or False? Your IP address gives your location? #shorts #iphone #android #starlink #vpn
Cybersecurity
True or False? Your IP address gives your location? #shorts #iphone #android #starlink #vpn
David Bombal Intermediate 2y ago
This Windows Program can CLONE ITSELF
Cybersecurity
This Windows Program can CLONE ITSELF
John Hammond Intermediate 2y ago
Over 30,000 Indian websites hacked by Pakistani hackers #shorts #cybersecurity
Cybersecurity
Over 30,000 Indian websites hacked by Pakistani hackers #shorts #cybersecurity
Jack Rhysider Intermediate 2y ago
They Hacked Govts and Celebs, But Their Downfall Will Gut You🎙Darknet Diaries Ep. 109 TeaMp0isoN
Cybersecurity
They Hacked Govts and Celebs, But Their Downfall Will Gut You🎙Darknet Diaries Ep. 109 TeaMp0isoN
Jack Rhysider Intermediate 2y ago
How phone calls can hack a bank
Cybersecurity
How phone calls can hack a bank
Jack Rhysider Intermediate 2y ago
The mysterious virus that erases its own tracks
Cybersecurity
The mysterious virus that erases its own tracks
Jack Rhysider Intermediate 2y ago
How they scammed people for downloading nothing
Cybersecurity
How they scammed people for downloading nothing
Jack Rhysider Intermediate 2y ago
I Get Paid to Trick People Into Giving Up Their Passwords🎙Darknet Diaries Ep. 107: Alethe
Cybersecurity
I Get Paid to Trick People Into Giving Up Their Passwords🎙Darknet Diaries Ep. 107: Alethe
Jack Rhysider Intermediate 2y ago
Ed’s Whacky Winter Wonder Holiday Bonanza | Host: Ed Skoudis | December 12, 2023
Cybersecurity ⚡ AI Lesson
Ed’s Whacky Winter Wonder Holiday Bonanza | Host: Ed Skoudis | December 12, 2023
SANS Institute Intermediate 2y ago
I Hacked Another File Upload Website
Cybersecurity
I Hacked Another File Upload Website
John Hammond Intermediate 2y ago
Using AI for call scams!
Cybersecurity ⚡ AI Lesson
Using AI for call scams!
Jack Rhysider Intermediate 2y ago
Digital Forensics with FTK Imager (TryHackMe Advent of Cyber Day 8)
Cybersecurity
Digital Forensics with FTK Imager (TryHackMe Advent of Cyber Day 8)
John Hammond Intermediate 2y ago
How Pirate Bay claimed to be hosted in North Korea
Cybersecurity ⚡ AI Lesson
How Pirate Bay claimed to be hosted in North Korea
Jack Rhysider Intermediate 2y ago
How To Hack APIs with Python
Cybersecurity
How To Hack APIs with Python
John Hammond Intermediate 2y ago
Empowering Tomorrow’s Security Leaders with the SANS Transformational Triad
Cybersecurity ⚡ AI Lesson
Empowering Tomorrow’s Security Leaders with the SANS Transformational Triad
SANS Institute Intermediate 2y ago
This Cybercrime Group Puts Its Hackers Through School
Cybersecurity
This Cybercrime Group Puts Its Hackers Through School
John Hammond Intermediate 2y ago
Kali Linux WHOIS with HackerD #shorts #kalilinux #domain #steam
Cybersecurity
Kali Linux WHOIS with HackerD #shorts #kalilinux #domain #steam
David Bombal Intermediate 2y ago
TryHackMe! Advent of Cyber 2023 Kick-Off
Cybersecurity
TryHackMe! Advent of Cyber 2023 Kick-Off
John Hammond Intermediate 2y ago
How much is your Instagram username worth?
Cybersecurity
How much is your Instagram username worth?
Jack Rhysider Intermediate 2y ago
Capture the Flag: Hacking Yet Another Markup Language
Cybersecurity
Capture the Flag: Hacking Yet Another Markup Language
John Hammond Intermediate 2y ago
Steve Tran: Hacker, Magician, Police Officer, and CISO
Cybersecurity ⚡ AI Lesson
Steve Tran: Hacker, Magician, Police Officer, and CISO
SANS Institute Intermediate 2y ago
This Cybercrime Forum Is Full Of Hackers
Cybersecurity
This Cybercrime Forum Is Full Of Hackers
John Hammond Intermediate 2y ago
📚 Coursera Courses Opens on Coursera · Free to audit
1 / 3 View all →
Information Security Foundations
📚 Coursera Course ↗
Self-paced
Information Security Foundations
Opens on Coursera ↗
IT Risk Assessment Practices
📚 Coursera Course ↗
Self-paced
IT Risk Assessment Practices
Opens on Coursera ↗
Cybersecurity Essentials - From Zero to Secure
📚 Coursera Course ↗
Self-paced
Cybersecurity Essentials - From Zero to Secure
Opens on Coursera ↗
Web Hacking Expert - Full-Stack Exploitation Mastery
📚 Coursera Course ↗
Self-paced
Web Hacking Expert - Full-Stack Exploitation Mastery
Opens on Coursera ↗
Introduction to Automotive Cybersecurity & Vehicle Networks
📚 Coursera Course ↗
Self-paced
Introduction to Automotive Cybersecurity & Vehicle Networks
Opens on Coursera ↗
 Vulnerability Assessment and Management
📚 Coursera Course ↗
Self-paced
Vulnerability Assessment and Management
Opens on Coursera ↗