Tech Skills

Cybersecurity

Ethical hacking, penetration testing, network security, CTFs and defensive security

6,777
lessons
Skills in this topic
View full skill map →
Security Basics
beginner
Fix OWASP top 10 vulnerabilities
AI Security
intermediate
Identify and patch prompt injection vulnerabilities
Network Security
intermediate
Configure a firewall with proper inbound/outbound rules
Ethical Hacking & Pen Testing
intermediate
Conduct a full pen test with Kali Linux
Cloud Security
intermediate
Implement IAM least-privilege policies on AWS/GCP
Incident Response
intermediate
Build an incident response playbook
Security Compliance
intermediate
Map controls for SOC 2 Type II compliance
Defensive AI
advanced
Build an AI-powered log anomaly detector
How To Pivot Through a Network with Chisel
Cybersecurity
How To Pivot Through a Network with Chisel
John Hammond Intermediate 2y ago
OneCoin exposed as the biggest crypto scam!
Cybersecurity ⚡ AI Lesson
OneCoin exposed as the biggest crypto scam!
Jack Rhysider Intermediate 2y ago
Classify Malware with YARA
Cybersecurity
Classify Malware with YARA
John Hammond Intermediate 2y ago
AI for Good Specialization: Learn AI's role in addressing real-world challenges
Cybersecurity
AI for Good Specialization: Learn AI's role in addressing real-world challenges
DeepLearningAI Intermediate 2y ago
Phases in Cybersecurity  | Cybersecurity Training | Edureka | Cybersecurity Rewind - 2
Cybersecurity
Phases in Cybersecurity | Cybersecurity Training | Edureka | Cybersecurity Rewind - 2
edureka! Intermediate 2y ago
Flipper Zero vs Alarm? (will the Bike alarm stop it?) #shorts
Cybersecurity
Flipper Zero vs Alarm? (will the Bike alarm stop it?) #shorts
David Bombal Intermediate 2y ago
Flipper Zero WiFi Hacking (Fake WiFi networks) #shorts
Cybersecurity
Flipper Zero WiFi Hacking (Fake WiFi networks) #shorts
David Bombal Intermediate 2y ago
I Learned How To Hack WiFi In 2 Days...
Cybersecurity ⚡ AI Lesson
I Learned How To Hack WiFi In 2 Days...
Tech With Tim Intermediate 2y ago
Bonus Episode: What does it take to author a cybersecurity book?
Cybersecurity ⚡ AI Lesson
Bonus Episode: What does it take to author a cybersecurity book?
SANS Institute Intermediate 2y ago
Cyber Leadership Analogies and Metaphors
Cybersecurity ⚡ AI Lesson
Cyber Leadership Analogies and Metaphors
SANS Institute Intermediate 2y ago
Tips to Improve eCommerce Store Security in 2023 | Virtina
Cybersecurity
Tips to Improve eCommerce Store Security in 2023 | Virtina
Virtina Intermediate 2y ago
He made millions (illegally) hacking online poker
Cybersecurity ⚡ AI Lesson
He made millions (illegally) hacking online poker
Jack Rhysider Intermediate 2y ago
The Evolution of Windows.    #windows #evolution #windowsos #windowsevolution
Cybersecurity
The Evolution of Windows. #windows #evolution #windowsos #windowsevolution
CydexCode Intermediate 2y ago
Web App Hacking with Caido.io
Cybersecurity ⚡ AI Lesson
Web App Hacking with Caido.io
The Cyber Mentor Intermediate 2y ago
The Most Important Thing I Learned About Core Values!
Cybersecurity
The Most Important Thing I Learned About Core Values!
Evan Carmichael Intermediate 2y ago
How does the PNPT compare to other Pentest Certifications?  #PNPT #pentester #pentesting
Cybersecurity ⚡ AI Lesson
How does the PNPT compare to other Pentest Certifications? #PNPT #pentester #pentesting
The Cyber Mentor Intermediate 2y ago
Take Charge of Your Indexability: How to Optimize Your Technical Work [MozCon 2021] — Areej AbuAli
Cybersecurity
Take Charge of Your Indexability: How to Optimize Your Technical Work [MozCon 2021] — Areej AbuAli
Moz Intermediate 2y ago
Your Computer could be For Sale on the Dark Web
Cybersecurity
Your Computer could be For Sale on the Dark Web
John Hammond Intermediate 2y ago
Not All ZIP Files Are Equal
Cybersecurity ⚡ AI Lesson
Not All ZIP Files Are Equal
John Hammond Intermediate 2y ago
Flipper Zero WiFi Hacking (Rogue AP) #shorts
Cybersecurity
Flipper Zero WiFi Hacking (Rogue AP) #shorts
David Bombal Intermediate 2y ago
Capture the Flag at Blackhat USA 2023!
Cybersecurity
Capture the Flag at Blackhat USA 2023!
John Hammond Intermediate 2y ago
Books! Books! Books! Which author should I interview? #shorts
Cybersecurity ⚡ AI Lesson
Books! Books! Books! Which author should I interview? #shorts
David Bombal Intermediate 2y ago
Flipper Zero RFID Fuzzer (Fuzz RFID) #shorts
Cybersecurity
Flipper Zero RFID Fuzzer (Fuzz RFID) #shorts
David Bombal Intermediate 2y ago
Telegram Cybercrime is INSANE
Cybersecurity ⚡ AI Lesson
Telegram Cybercrime is INSANE
John Hammond Intermediate 2y ago
Flipper Zero WiFi Hacking #shorts
Cybersecurity ⚡ AI Lesson
Flipper Zero WiFi Hacking #shorts
David Bombal Intermediate 2y ago
Strategies of a World-Class SOC | Host: John Hubbard | July 18, 2023
Cybersecurity ⚡ AI Lesson
Strategies of a World-Class SOC | Host: John Hubbard | July 18, 2023
SANS Institute Intermediate 2y ago
Strategy 11: Turn up the Volume by Expanding SOC Functionality
Cybersecurity ⚡ AI Lesson
Strategy 11: Turn up the Volume by Expanding SOC Functionality
SANS Institute Intermediate 2y ago
Insider Risk & Generative AI
Cybersecurity ⚡ AI Lesson
Insider Risk & Generative AI
SANS Institute Intermediate 2y ago
Preserving Creativity and the Ethical Implications of AI Art Generators
Cybersecurity ⚡ AI Lesson
Preserving Creativity and the Ethical Implications of AI Art Generators
SANS Institute Intermediate 2y ago
Navigating the Impact of Emerging Tech on Education: A Teen's Perspective on AI and Cybersecurity
Cybersecurity ⚡ AI Lesson
Navigating the Impact of Emerging Tech on Education: A Teen's Perspective on AI and Cybersecurity
SANS Institute Intermediate 2y ago
AI and Its Impact on Cybersecurity
Cybersecurity ⚡ AI Lesson
AI and Its Impact on Cybersecurity
SANS Institute Intermediate 2y ago
New to Cyber: AI-Powered Careers
Cybersecurity ⚡ AI Lesson
New to Cyber: AI-Powered Careers
SANS Institute Intermediate 2y ago
Addressing Practical and Ethical Issues in AI-Assisted Threat Intelligence Analysis
Cybersecurity ⚡ AI Lesson
Addressing Practical and Ethical Issues in AI-Assisted Threat Intelligence Analysis
SANS Institute Intermediate 2y ago
Mass Digital Forensics & Incident Response with Velociraptor
Cybersecurity ⚡ AI Lesson
Mass Digital Forensics & Incident Response with Velociraptor
John Hammond Intermediate 2y ago
Strategy 10: Measure Performance to Improve Performance
Cybersecurity ⚡ AI Lesson
Strategy 10: Measure Performance to Improve Performance
SANS Institute Intermediate 2y ago
Strategy 9: Communicate Clearly, Collaborate Often, Share Generously
Cybersecurity ⚡ AI Lesson
Strategy 9: Communicate Clearly, Collaborate Often, Share Generously
SANS Institute Intermediate 2y ago
Keynote | Demonstrating CISO ROI with the C-Suite
Cybersecurity ⚡ AI Lesson
Keynote | Demonstrating CISO ROI with the C-Suite
SANS Institute Intermediate 2y ago
Panel | The Intersection of Cybersecurity and Law
Cybersecurity ⚡ AI Lesson
Panel | The Intersection of Cybersecurity and Law
SANS Institute Intermediate 2y ago
Leading High Performing Teams During Lean Times
Cybersecurity ⚡ AI Lesson
Leading High Performing Teams During Lean Times
SANS Institute Intermediate 2y ago
How Hackers Use netsh.exe For Persistence & Code Execution (Sliver C2)
Cybersecurity ⚡ AI Lesson
How Hackers Use netsh.exe For Persistence & Code Execution (Sliver C2)
John Hammond Intermediate 2y ago
Scale Your Cloud Infrastructure (Hosting CTFs)
Cybersecurity
Scale Your Cloud Infrastructure (Hosting CTFs)
John Hammond Intermediate 2y ago
Strategy 8: Leverage Tools and Support Analyst Workflow
Cybersecurity ⚡ AI Lesson
Strategy 8: Leverage Tools and Support Analyst Workflow
SANS Institute Intermediate 2y ago
$540 million of crypto was stolen through an unlikely loophole: LinkedIn
Cybersecurity
$540 million of crypto was stolen through an unlikely loophole: LinkedIn
Jack Rhysider Intermediate 2y ago
Blueprint Live at the SANS Blue Team Summit 2023
Cybersecurity ⚡ AI Lesson
Blueprint Live at the SANS Blue Team Summit 2023
SANS Institute Intermediate 2y ago
Strategy 7: Select and Collect the Right Data
Cybersecurity ⚡ AI Lesson
Strategy 7: Select and Collect the Right Data
SANS Institute Intermediate 2y ago
Locking It Down: Best Practices for Strong Passwords and Authentication Tools.
Cybersecurity ⚡ AI Lesson
Locking It Down: Best Practices for Strong Passwords and Authentication Tools.
SANS Institute Intermediate 2y ago
How Hackers Evade Program Allowlists with DLLs
Cybersecurity
How Hackers Evade Program Allowlists with DLLs
John Hammond Intermediate 2y ago
Strategy 6: Illuminate Adversaries with Cyber Threat Intelligence
Cybersecurity ⚡ AI Lesson
Strategy 6: Illuminate Adversaries with Cyber Threat Intelligence
SANS Institute Intermediate 2y ago
📚 Coursera Courses Opens on Coursera · Free to audit
1 / 3 View all →
Risk Management Excellence - NIST 800-37 Framework Training
📚 Coursera Course ↗
Self-paced
Risk Management Excellence - NIST 800-37 Framework Training
Opens on Coursera ↗
Bitcoin Transaction & Network Security
📚 Coursera Course ↗
Self-paced
Bitcoin Transaction & Network Security
Opens on Coursera ↗
CISSP Domain 6: Security Assessment and Testing
📚 Coursera Course ↗
Self-paced
CISSP Domain 6: Security Assessment and Testing
Opens on Coursera ↗
Information Security Foundations
📚 Coursera Course ↗
Self-paced
Information Security Foundations
Opens on Coursera ↗
CFR: Reconnaissance, Attack, and Post-Attack Analysis
📚 Coursera Course ↗
Self-paced
CFR: Reconnaissance, Attack, and Post-Attack Analysis
Opens on Coursera ↗
Sustainability Reporting: From Regulation to Implementation
📚 Coursera Course ↗
Self-paced
Sustainability Reporting: From Regulation to Implementation
Opens on Coursera ↗