Tech Skills

Cybersecurity

Ethical hacking, penetration testing, network security, CTFs and defensive security

6,777
lessons
Skills in this topic
View full skill map โ†’
Security Basics
beginner
Fix OWASP top 10 vulnerabilities
AI Security
intermediate
Identify and patch prompt injection vulnerabilities
Network Security
intermediate
Configure a firewall with proper inbound/outbound rules
Ethical Hacking & Pen Testing
intermediate
Conduct a full pen test with Kali Linux
Cloud Security
intermediate
Implement IAM least-privilege policies on AWS/GCP
Incident Response
intermediate
Build an incident response playbook
Security Compliance
intermediate
Map controls for SOC 2 Type II compliance
Defensive AI
advanced
Build an AI-powered log anomaly detector
Cybersecurity Live - CS50 #Reels
Cybersecurity
Cybersecurity Live - CS50 #Reels
CS50 Intermediate 2y ago
Strategy 5: Prioritize Incident Response
Cybersecurity โšก AI Lesson
Strategy 5: Prioritize Incident Response
SANS Institute Intermediate 2y ago
I got Pwned ... and so did you! (you're likely in the 12 Billion)
Cybersecurity โšก AI Lesson
I got Pwned ... and so did you! (you're likely in the 12 Billion)
David Bombal Intermediate 2y ago
Three ways to level up your Windows Privilege Escalation skills #windows  #privesc #techtok #infosec
Cybersecurity โšก AI Lesson
Three ways to level up your Windows Privilege Escalation skills #windows #privesc #techtok #infosec
The Cyber Mentor Intermediate 2y ago
Rapid Windows Memory Analysis with Volatility 3
Cybersecurity
Rapid Windows Memory Analysis with Volatility 3
John Hammond Intermediate 2y ago
Exploring the Latest Dark Web Onion Sites
Cybersecurity
Exploring the Latest Dark Web Onion Sites
John Hammond Intermediate 2y ago
Strategy 4: Hire AND Grow Quality Staff
Cybersecurity โšก AI Lesson
Strategy 4: Hire AND Grow Quality Staff
SANS Institute Intermediate 2y ago
Experience a Real Pentest with the PNPT Exam #pentesting  #ethicalhacking   #pnpt
Cybersecurity โšก AI Lesson
Experience a Real Pentest with the PNPT Exam #pentesting #ethicalhacking #pnpt
The Cyber Mentor Intermediate 2y ago
AI Voice Scams are on the RISE!
Cybersecurity
AI Voice Scams are on the RISE!
1littlecoder Intermediate 3y ago
Who Is Hacking the World's Best Online Poker Players?๐ŸŽ™Darknet Diaries Ep. 74: Mikko
Cybersecurity
Who Is Hacking the World's Best Online Poker Players?๐ŸŽ™Darknet Diaries Ep. 74: Mikko
Jack Rhysider Intermediate 3y ago
When You Can't Breach the Network, Hack the Humans๐ŸŽ™Darknet Diaries Ep. 69: Human Hacker
Cybersecurity
When You Can't Breach the Network, Hack the Humans๐ŸŽ™Darknet Diaries Ep. 69: Human Hacker
Jack Rhysider Intermediate 3y ago
3 HACKING gadgets you have to TRY!!
Cybersecurity โšก AI Lesson
3 HACKING gadgets you have to TRY!!
NetworkChuck Intermediate 3y ago
How to Hack Passwords
Cybersecurity
How to Hack Passwords
Sahil & Sarra Intermediate 3y ago
IconScout plugin for Figma | Access icons, illustrations, 3D and Lottie animations within Figma
Cybersecurity
IconScout plugin for Figma | Access icons, illustrations, 3D and Lottie animations within Figma
IconScout Intermediate 3y ago
Amazon S3: Data Encryption Options
Cybersecurity โšก AI Lesson
Amazon S3: Data Encryption Options
AWS Developers Intermediate 3y ago
Why We Need Even More Linux Distros!?!
Cybersecurity
Why We Need Even More Linux Distros!?!
Brodie Robertson Intermediate 3y ago
Keynote | Neurodivergent Associates are an Asset: A CISOโ€™s Perspective on Retention and Inclusion
Cybersecurity โšก AI Lesson
Keynote | Neurodivergent Associates are an Asset: A CISOโ€™s Perspective on Retention and Inclusion
SANS Institute Intermediate 2y ago
Opening Keynote | Investing in Neurodiversity
Cybersecurity โšก AI Lesson
Opening Keynote | Investing in Neurodiversity
SANS Institute Intermediate 2y ago
Strategy 3: Build a SOC Structure to Match Your Organizational Needs
Cybersecurity โšก AI Lesson
Strategy 3: Build a SOC Structure to Match Your Organizational Needs
SANS Institute Intermediate 2y ago
Here's a quick look at a path to becoming a webapp pentester! #webapp #pentesting #cybersecurity
Cybersecurity โšก AI Lesson
Here's a quick look at a path to becoming a webapp pentester! #webapp #pentesting #cybersecurity
The Cyber Mentor Intermediate 3y ago
Strategy 2: Give the SOC the Authority to Do Its Job
Cybersecurity โšก AI Lesson
Strategy 2: Give the SOC the Authority to Do Its Job
SANS Institute Intermediate 3y ago
Are you getting ready for Summer? So are hackers! #passwordchange  #ethicalhacking #cybersecurity
Cybersecurity โšก AI Lesson
Are you getting ready for Summer? So are hackers! #passwordchange #ethicalhacking #cybersecurity
The Cyber Mentor Intermediate 3y ago
L2CODE like a hacker #programming #python #rust #cybersecurity
Cybersecurity โšก AI Lesson
L2CODE like a hacker #programming #python #rust #cybersecurity
The Cyber Mentor Intermediate 3y ago
Hide a Hacker's Reverse Shell in ONE Command
Cybersecurity โšก AI Lesson
Hide a Hacker's Reverse Shell in ONE Command
John Hammond Intermediate 3y ago
Dangerous Code in Seconds: Eval the evil #webapp  #infosec  #cybersecurity  #ethicalhacking
Cybersecurity โšก AI Lesson
Dangerous Code in Seconds: Eval the evil #webapp #infosec #cybersecurity #ethicalhacking
The Cyber Mentor Intermediate 3y ago
SANS Neurodiversity in Cybersecurity Summit 2023 Graphic Illustrations
Cybersecurity โšก AI Lesson
SANS Neurodiversity in Cybersecurity Summit 2023 Graphic Illustrations
SANS Institute Intermediate 3y ago
NICE Career: Discovering Career Pathways
Cybersecurity โšก AI Lesson
NICE Career: Discovering Career Pathways
SANS Institute Intermediate 3y ago
Cybersecurity Role Finder: Navigating Your Personal Path into Cybersecurity Careers
Cybersecurity โšก AI Lesson
Cybersecurity Role Finder: Navigating Your Personal Path into Cybersecurity Careers
SANS Institute Intermediate 3y ago
Going the Distance: Lessons from The Last Mile Education Fund
Cybersecurity โšก AI Lesson
Going the Distance: Lessons from The Last Mile Education Fund
SANS Institute Intermediate 3y ago
Hacking Complex Passwords with Rules & Munging
Cybersecurity โšก AI Lesson
Hacking Complex Passwords with Rules & Munging
John Hammond Intermediate 3y ago
Strategy 1: Know What You Are Protecting and Why
Cybersecurity โšก AI Lesson
Strategy 1: Know What You Are Protecting and Why
SANS Institute Intermediate 3y ago
Living Off The Land - Windows Disk Cleaner Persistence
Cybersecurity
Living Off The Land - Windows Disk Cleaner Persistence
John Hammond Intermediate 3y ago
Get Ready, A Very Special Season 4 Is On the Way!
Cybersecurity โšก AI Lesson
Get Ready, A Very Special Season 4 Is On the Way!
SANS Institute Intermediate 3y ago
How To Test Your Security with Atomic Red Team
Cybersecurity โšก AI Lesson
How To Test Your Security with Atomic Red Team
John Hammond Intermediate 3y ago
winget: Install ROGUE Software & Packages?
Cybersecurity โšก AI Lesson
winget: Install ROGUE Software & Packages?
John Hammond Intermediate 3y ago
Kubernetes Hacking: From Weak Applications to Cluster Control
Cybersecurity โšก AI Lesson
Kubernetes Hacking: From Weak Applications to Cluster Control
John Hammond Intermediate 3y ago
Python Pwntools Hacking: ret2libc GOT & PLT
Cybersecurity
Python Pwntools Hacking: ret2libc GOT & PLT
John Hammond Intermediate 3y ago
Password Hacking in Kali Linux
Cybersecurity โšก AI Lesson
Password Hacking in Kali Linux
John Hammond Intermediate 3y ago
Hackers Bypass Google Two-Factor Authentication (2FA) SMS
Cybersecurity โšก AI Lesson
Hackers Bypass Google Two-Factor Authentication (2FA) SMS
John Hammond Intermediate 3y ago
Mom Hacked a Prison With a Clipboard & USB Stick๐ŸŽ™Darknet Diaries Ep. 67: The Big House
Cybersecurity
Mom Hacked a Prison With a Clipboard & USB Stick๐ŸŽ™Darknet Diaries Ep. 67: The Big House
Jack Rhysider Intermediate 3y ago
Hacking CI/CD (Basic Pipeline Poisoning)
Cybersecurity
Hacking CI/CD (Basic Pipeline Poisoning)
John Hammond Intermediate 3y ago
"I rob banks for a living," but it's all totally legal๐ŸŽ™Darknet Diaries Ep. 66: Freakyclown
Cybersecurity
"I rob banks for a living," but it's all totally legal๐ŸŽ™Darknet Diaries Ep. 66: Freakyclown
Jack Rhysider Intermediate 3y ago
Meet SANS Senior Instructor: Mark Baggett
Cybersecurity โšก AI Lesson
Meet SANS Senior Instructor: Mark Baggett
SANS Institute Intermediate 3y ago
Meet SANS Instructor: Terrence Williams
Cybersecurity โšก AI Lesson
Meet SANS Instructor: Terrence Williams
SANS Institute Intermediate 3y ago
Meet SANS Senior Instructor: John Hubbard
Cybersecurity โšก AI Lesson
Meet SANS Senior Instructor: John Hubbard
SANS Institute Intermediate 3y ago
Meet SANS Certified Instructor: Dean Parsons
Cybersecurity โšก AI Lesson
Meet SANS Certified Instructor: Dean Parsons
SANS Institute Intermediate 3y ago
Jenee Saunders on SANS Cybersecurity Leadership Triads
Cybersecurity โšก AI Lesson
Jenee Saunders on SANS Cybersecurity Leadership Triads
SANS Institute Intermediate 3y ago
SANS Cyber Threat Intelligence Summit 2023 Graphic Illustrations
Cybersecurity โšก AI Lesson
SANS Cyber Threat Intelligence Summit 2023 Graphic Illustrations
SANS Institute Intermediate 3y ago
๐Ÿ“š Coursera Courses Opens on Coursera ยท Free to audit
1 / 3 View all โ†’
Data Center Security Management with Microsoft System Center
๐Ÿ“š Coursera Course โ†—
Self-paced
Data Center Security Management with Microsoft System Center
Opens on Coursera โ†—
Incident Response, Risk Management, and Compliance
๐Ÿ“š Coursera Course โ†—
Self-paced
Incident Response, Risk Management, and Compliance
Opens on Coursera โ†—
Introduction to Cybersecurity Foundations
๐Ÿ“š Coursera Course โ†—
Self-paced
Introduction to Cybersecurity Foundations
Opens on Coursera โ†—
AWS Developer: Unit 2
๐Ÿ“š Coursera Course โ†—
Self-paced
AWS Developer: Unit 2
Opens on Coursera โ†—
Bitcoin Transaction & Network Security
๐Ÿ“š Coursera Course โ†—
Self-paced
Bitcoin Transaction & Network Security
Opens on Coursera โ†—
Security and Troubleshooting Essentials
๐Ÿ“š Coursera Course โ†—
Self-paced
Security and Troubleshooting Essentials
Opens on Coursera โ†—