Tech Skills

Cybersecurity

Ethical hacking, penetration testing, network security, CTFs and defensive security

6,759
lessons
Skills in this topic
View full skill map →
Security Basics
beginner
Fix OWASP top 10 vulnerabilities
AI Security
intermediate
Identify and patch prompt injection vulnerabilities
Network Security
intermediate
Configure a firewall with proper inbound/outbound rules
Ethical Hacking & Pen Testing
intermediate
Conduct a full pen test with Kali Linux
Cloud Security
intermediate
Implement IAM least-privilege policies on AWS/GCP
Incident Response
intermediate
Build an incident response playbook
Security Compliance
intermediate
Map controls for SOC 2 Type II compliance
Defensive AI
advanced
Build an AI-powered log anomaly detector
Multicast is just Weird.... Doesn't even know who gets it?
Cybersecurity
Multicast is just Weird.... Doesn't even know who gets it?
David Bombal Intermediate 2y ago
How Hackers Compromise Other Users
Cybersecurity
How Hackers Compromise Other Users
John Hammond Intermediate 2y ago
Indian Prime Minister's personal website was hacked?
Cybersecurity
Indian Prime Minister's personal website was hacked?
Jack Rhysider Intermediate 2y ago
Wait ... your router has been online for how long??!! #shorts #cybersecurity #hacking
Cybersecurity
Wait ... your router has been online for how long??!! #shorts #cybersecurity #hacking
David Bombal Intermediate 2y ago
The MOVEit Hack In Retrospect
Cybersecurity
The MOVEit Hack In Retrospect
John Hammond Intermediate 2y ago
How a Nigerian man stole millions of dollars in tax refunds
Cybersecurity ⚡ AI Lesson
How a Nigerian man stole millions of dollars in tax refunds
Jack Rhysider Intermediate 2y ago
Thinking Outside the Firewall: Unconventional Cybersecurity Journeys | Host: Rich Greene
Cybersecurity ⚡ AI Lesson
Thinking Outside the Firewall: Unconventional Cybersecurity Journeys | Host: Rich Greene
SANS Institute Intermediate 2y ago
ESG and Sustainable Financial Strategy Course
Cybersecurity
ESG and Sustainable Financial Strategy Course
Saïd Business School, University of Oxford Intermediate 2y ago
Guarding LLM and NLP APIs: A Trailblazing Odyssey for Enhanced Security //Ads Dawson // Podcast #190
Cybersecurity
Guarding LLM and NLP APIs: A Trailblazing Odyssey for Enhanced Security //Ads Dawson // Podcast #190
MLOps.community Intermediate 2y ago
What Can You Gain with Cybersecurity Certificates?
Cybersecurity
What Can You Gain with Cybersecurity Certificates?
Coursera Intermediate 2y ago
Three Cloud Security Differentiators for Leaders
Cybersecurity ⚡ AI Lesson
Three Cloud Security Differentiators for Leaders
SANS Institute Intermediate 2y ago
CS50 Cybersecurity - Lecture 3 - Securing Software
Cybersecurity
CS50 Cybersecurity - Lecture 3 - Securing Software
CS50 Intermediate 2y ago
How to prepare for a career in cybersecurity with no prior experience.
Cybersecurity
How to prepare for a career in cybersecurity with no prior experience.
Coursera Intermediate 2y ago
Cybersecurity Roadmap 2023 ! #cybersecurity
Cybersecurity
Cybersecurity Roadmap 2023 ! #cybersecurity
Shweta Intermediate 2y ago
where do you ACTUALLY submit vulnerabilities?
Cybersecurity
where do you ACTUALLY submit vulnerabilities?
John Hammond Intermediate 2y ago
I Took Over a Microsoft Cloud Account. Again.
Cybersecurity ⚡ AI Lesson
I Took Over a Microsoft Cloud Account. Again.
John Hammond Intermediate 2y ago
Testing Your Cybersecurity Defenses
Cybersecurity
Testing Your Cybersecurity Defenses
John Hammond Intermediate 2y ago
Hacking with Bloodhound: Map Your Environment
Cybersecurity
Hacking with Bloodhound: Map Your Environment
John Hammond Intermediate 2y ago
Weird Security Voyeurs Unite | Host: Ryan Chapman | Guest: Sherrod Degrippo
Cybersecurity ⚡ AI Lesson
Weird Security Voyeurs Unite | Host: Ryan Chapman | Guest: Sherrod Degrippo
SANS Institute Intermediate 2y ago
they're selling WHAT on Telegram?!?
Cybersecurity ⚡ AI Lesson
they're selling WHAT on Telegram?!?
John Hammond Intermediate 2y ago
How Amat Cama hacked Samsung for 3 years straight
Cybersecurity
How Amat Cama hacked Samsung for 3 years straight
Jack Rhysider Intermediate 2y ago
I Stole a Microsoft 365 Account. Here's How.
Cybersecurity
I Stole a Microsoft 365 Account. Here's How.
John Hammond Intermediate 2y ago
macOS to Kali Linux to Windows 98? (back to the future copy and paste) #shorts #linux #windows
Cybersecurity
macOS to Kali Linux to Windows 98? (back to the future copy and paste) #shorts #linux #windows
David Bombal Intermediate 2y ago
this Cybersecurity Platform is FREE
Cybersecurity
this Cybersecurity Platform is FREE
John Hammond Intermediate 2y ago
Hacking Websites: NodeJS Server-Side Template Injection
Cybersecurity
Hacking Websites: NodeJS Server-Side Template Injection
John Hammond Intermediate 2y ago
Jadee Hanson: Balancing CISO, CIO, and Product Leadership
Cybersecurity ⚡ AI Lesson
Jadee Hanson: Balancing CISO, CIO, and Product Leadership
SANS Institute Intermediate 2y ago
The Russian cyberattack that crippled Ukraine
Cybersecurity
The Russian cyberattack that crippled Ukraine
Jack Rhysider Intermediate 2y ago
Fetch the Flag CTF is Live Right Now
Cybersecurity
Fetch the Flag CTF is Live Right Now
John Hammond Intermediate 2y ago
The 3CX Hack In Retrospect
Cybersecurity
The 3CX Hack In Retrospect
John Hammond Intermediate 2y ago
Cloud Security with Microsoft 365 Developer Tenants
Cybersecurity ⚡ AI Lesson
Cloud Security with Microsoft 365 Developer Tenants
John Hammond Intermediate 2y ago
Did the World Bank’s servers get breached?
Cybersecurity
Did the World Bank’s servers get breached?
Jack Rhysider Intermediate 2y ago
RagnarLocker Ransomware Seized by Law Enforcement
Cybersecurity ⚡ AI Lesson
RagnarLocker Ransomware Seized by Law Enforcement
John Hammond Intermediate 2y ago
Brett Cumming: Saying Yes Led to a Career in Cybersecurity
Cybersecurity ⚡ AI Lesson
Brett Cumming: Saying Yes Led to a Career in Cybersecurity
SANS Institute Intermediate 2y ago
They Made QR Codes LONGER?!?
Cybersecurity
They Made QR Codes LONGER?!?
John Hammond Intermediate 2y ago
How these hackers won a Tesla using a web browser
Cybersecurity
How these hackers won a Tesla using a web browser
Jack Rhysider Intermediate 2y ago
Building the Security Culture Dream Team | Host: Lance Spitzner | Guest: Molly McLain
Cybersecurity ⚡ AI Lesson
Building the Security Culture Dream Team | Host: Lance Spitzner | Guest: Molly McLain
SANS Institute Intermediate 2y ago
3 FREE Resources for Cyber Defenders
Cybersecurity ⚡ AI Lesson
3 FREE Resources for Cyber Defenders
John Hammond Intermediate 2y ago
Kali Linux WiFi Managed Mode (from Monitor mode) : HackerD explains #shorts #wifi #kalilinux
Cybersecurity
Kali Linux WiFi Managed Mode (from Monitor mode) : HackerD explains #shorts #wifi #kalilinux
David Bombal Intermediate 2y ago
Hunting for Hackers with Sigma Rules
Cybersecurity
Hunting for Hackers with Sigma Rules
John Hammond Intermediate 2y ago
Website Vulnerabilities to Fully Hacked Server
Cybersecurity
Website Vulnerabilities to Fully Hacked Server
John Hammond Intermediate 2y ago
Detect Hackers & Malware on your Computer (literally for free)
Cybersecurity
Detect Hackers & Malware on your Computer (literally for free)
John Hammond Intermediate 2y ago
Kali Linux WiFi Monitor Mode: HackerD explains #shorts #wifi #kalilinux
Cybersecurity
Kali Linux WiFi Monitor Mode: HackerD explains #shorts #wifi #kalilinux
David Bombal Intermediate 2y ago
Wifi Hacking with a Steam Deck and Kali Linux #shorts #wifi
Cybersecurity ⚡ AI Lesson
Wifi Hacking with a Steam Deck and Kali Linux #shorts #wifi
David Bombal Intermediate 2y ago
The Penetration Test That Went Horribly Wrong🎙Darknet Diaries Ep. 95: Jon & Brian's Big Adventure
Cybersecurity
The Penetration Test That Went Horribly Wrong🎙Darknet Diaries Ep. 95: Jon & Brian's Big Adventure
Jack Rhysider Intermediate 2y ago
New "Dark Web" Generative AI Chatbots?!
Cybersecurity
New "Dark Web" Generative AI Chatbots?!
John Hammond Intermediate 2y ago
Your Windows Passwords 😱 #shorts #windows
Cybersecurity
Your Windows Passwords 😱 #shorts #windows
David Bombal Intermediate 2y ago
How "Mimikatz" works
Cybersecurity
How "Mimikatz" works
Jack Rhysider Intermediate 2y ago
This scammer milked Facebook for millions
Cybersecurity
This scammer milked Facebook for millions
Jack Rhysider Intermediate 2y ago
📚 Coursera Courses Opens on Coursera · Free to audit
1 / 3 View all →
Introduction to Google Security Operations (SIEM)
📚 Coursera Course ↗
Self-paced
Introduction to Google Security Operations (SIEM)
Opens on Coursera ↗
JavaScript Security Part 1
📚 Coursera Course ↗
Self-paced
JavaScript Security Part 1
Opens on Coursera ↗
Securing Systems and Networks
📚 Coursera Course ↗
Self-paced
Securing Systems and Networks
Opens on Coursera ↗
Foundations of Networking and Cisco Device Management
📚 Coursera Course ↗
Self-paced
Foundations of Networking and Cisco Device Management
Opens on Coursera ↗
Cybersecurity basics for everyone
📚 Coursera Course ↗
Self-paced
Cybersecurity basics for everyone
Opens on Coursera ↗
Azure Cloud Security Lab – Ethical Hacking Essentials
📚 Coursera Course ↗
Self-paced
Azure Cloud Security Lab – Ethical Hacking Essentials
Opens on Coursera ↗