Tech Skills

Cybersecurity

Ethical hacking, penetration testing, network security, CTFs and defensive security

6,780
lessons
Skills in this topic
View full skill map โ†’
Security Basics
beginner
Fix OWASP top 10 vulnerabilities
AI Security
intermediate
Identify and patch prompt injection vulnerabilities
Network Security
intermediate
Configure a firewall with proper inbound/outbound rules
Ethical Hacking & Pen Testing
intermediate
Conduct a full pen test with Kali Linux
Cloud Security
intermediate
Implement IAM least-privilege policies on AWS/GCP
Incident Response
intermediate
Build an incident response playbook
Security Compliance
intermediate
Map controls for SOC 2 Type II compliance
Defensive AI
advanced
Build an AI-powered log anomaly detector
Cat Self: macOS and Linux Security
Cybersecurity โšก AI Lesson
Cat Self: macOS and Linux Security
SANS Institute Intermediate 3y ago
Is this the future of the Internet? UDP Deep Dive.
Cybersecurity
Is this the future of the Internet? UDP Deep Dive.
David Bombal Intermediate 3y ago
The Cybergang That Stole $1 Billion From ATMs๐ŸŽ™Darknet Diaries Ep. 35: Carbanak
Cybersecurity
The Cybergang That Stole $1 Billion From ATMs๐ŸŽ™Darknet Diaries Ep. 35: Carbanak
Jack Rhysider Intermediate 3y ago
Hacking Is Life-or-Death When You Target a Hospital๐ŸŽ™Darknet Diaries Ep. 121: Ed
Cybersecurity
Hacking Is Life-or-Death When You Target a Hospital๐ŸŽ™Darknet Diaries Ep. 121: Ed
Jack Rhysider Intermediate 3y ago
Security Conversations That Matter | Seat At The Table
Cybersecurity โšก AI Lesson
Security Conversations That Matter | Seat At The Table
SANS Institute Intermediate 3y ago
The Internet just changed.
Cybersecurity
The Internet just changed.
David Bombal Intermediate 3y ago
Reverse Engineering - Computerphile
Cybersecurity โšก AI Lesson
Reverse Engineering - Computerphile
Computerphile Intermediate 3y ago
3 ways the web can be INSECURE๐Ÿ‘ฉโ€๐Ÿ’ป #ad #cybersecurity #trendmicro #PremiumSecuritySuite #technology
Cybersecurity
3 ways the web can be INSECURE๐Ÿ‘ฉโ€๐Ÿ’ป #ad #cybersecurity #trendmicro #PremiumSecuritySuite #technology
Coding with Lewis Intermediate 3y ago
Put your hacking skills to the test with Capture The Flag competition #Shorts
Cybersecurity
Put your hacking skills to the test with Capture The Flag competition #Shorts
Google for Developers Intermediate 3y ago
How to Prioritize Your Work: Effort Impact Scale
Cybersecurity
How to Prioritize Your Work: Effort Impact Scale
AJ&Smart Intermediate 3y ago
Activating ACM Private Certificate Authority - AWS Virtual Workshop
Cybersecurity
Activating ACM Private Certificate Authority - AWS Virtual Workshop
AWS Developers Intermediate 3y ago
Hacking JavaScript: ELECTRON Applications w/ 7ASecurity
Cybersecurity
Hacking JavaScript: ELECTRON Applications w/ 7ASecurity
John Hammond Intermediate 3y ago
HackTheBox - Fingerprint
Cybersecurity
HackTheBox - Fingerprint
IppSec Intermediate 4y ago
I published an Internet app, waitโ€”how do I protect it? - AWS Online Tech Talks
Cybersecurity
I published an Internet app, waitโ€”how do I protect it? - AWS Online Tech Talks
AWS Developers Intermediate 4y ago
Dirty Pipe - CVE-2022-0847 - Linux Privilege Escalation
Cybersecurity โšก AI Lesson
Dirty Pipe - CVE-2022-0847 - Linux Privilege Escalation
HackerSploit Intermediate 4y ago
Exploiting Java Tomcat With a Crazy JSP Web Shell - Real World CTF 2022
Cybersecurity โšก AI Lesson
Exploiting Java Tomcat With a Crazy JSP Web Shell - Real World CTF 2022
LiveOverflow Intermediate 4y ago
Windows Privilege Escalation - Token Impersonation With RoguePotato & PrintSpoofer
Cybersecurity โšก AI Lesson
Windows Privilege Escalation - Token Impersonation With RoguePotato & PrintSpoofer
HackerSploit Intermediate 4y ago
This lets you create complex applications on the web๐Ÿ‘ฉโ€๐Ÿ’ป #technology #programming #webdev #software
Cybersecurity
This lets you create complex applications on the web๐Ÿ‘ฉโ€๐Ÿ’ป #technology #programming #webdev #software
Coding with Lewis Intermediate 4y ago
What happens if you hack 4.5 billion BTC? // The Code Report
Cybersecurity
What happens if you hack 4.5 billion BTC? // The Code Report
Fireship Intermediate 4y ago
how to NOT be a hacking noob in 2022 // ft. John Hammond
Cybersecurity โšก AI Lesson
how to NOT be a hacking noob in 2022 // ft. John Hammond
NetworkChuck (2) Intermediate 4y ago
how to NOT be a hacking noob in 2022 // ft. John Hammond
Cybersecurity โšก AI Lesson
how to NOT be a hacking noob in 2022 // ft. John Hammond
NetworkChuck Intermediate 4y ago
Tony Turner: Securing the Cyber Supply Chain
Cybersecurity โšก AI Lesson
Tony Turner: Securing the Cyber Supply Chain
SANS Institute Intermediate 3y ago
Blueprint Live at SANSFIRE 2022: A panel with Heather Mahalik, Katie Nickels and Jeff McJunkin
Cybersecurity โšก AI Lesson
Blueprint Live at SANSFIRE 2022: A panel with Heather Mahalik, Katie Nickels and Jeff McJunkin
SANS Institute Intermediate 3y ago
James Rowley: Creating and Running an Insider Threat Program
Cybersecurity โšก AI Lesson
James Rowley: Creating and Running an Insider Threat Program
SANS Institute Intermediate 3y ago
Panel | Self-Management Strategies for Avoiding Burnout, Staying Healthy, and Getting Stuff Done
Cybersecurity โšก AI Lesson
Panel | Self-Management Strategies for Avoiding Burnout, Staying Healthy, and Getting Stuff Done
SANS Institute Intermediate 3y ago
He Took Control of 50,000 Printers With 3 Lines of Code๐ŸŽ™Darknet Diaries Ep. 31: Hacker Giraffe
Cybersecurity
He Took Control of 50,000 Printers With 3 Lines of Code๐ŸŽ™Darknet Diaries Ep. 31: Hacker Giraffe
Jack Rhysider Intermediate 3y ago
The Real STEM Sadie: Owning Your Story
Cybersecurity โšก AI Lesson
The Real STEM Sadie: Owning Your Story
SANS Institute Intermediate 3y ago
Recruiting, Training, and Retaining Neurodivergent Talent
Cybersecurity โšก AI Lesson
Recruiting, Training, and Retaining Neurodivergent Talent
SANS Institute Intermediate 3y ago
Why an Innocent Man Confessed to Medical Extortion Hacking๐ŸŽ™Darknet Diaries Ep. 25: Alberto
Cybersecurity
Why an Innocent Man Confessed to Medical Extortion Hacking๐ŸŽ™Darknet Diaries Ep. 25: Alberto
Jack Rhysider Intermediate 3y ago
New Shell in Town: Adventures in using PowerShell on Linux
Cybersecurity โšก AI Lesson
New Shell in Town: Adventures in using PowerShell on Linux
SANS Institute Intermediate 4y ago
Risky Business: Careers in GRC
Cybersecurity โšก AI Lesson
Risky Business: Careers in GRC
SANS Institute Intermediate 4y ago
Taking the Plunge:  Advice from People Who Literally Wrote the Book on Cybersecurity Careers Panel
Cybersecurity โšก AI Lesson
Taking the Plunge: Advice from People Who Literally Wrote the Book on Cybersecurity Careers Panel
SANS Institute Intermediate 4y ago
New2Cyber Catch-22: Getting Experience When You Have No Experience
Cybersecurity โšก AI Lesson
New2Cyber Catch-22: Getting Experience When You Have No Experience
SANS Institute Intermediate 4y ago
Why SecDevOps is the New Way in Cybersecurity
Cybersecurity โšก AI Lesson
Why SecDevOps is the New Way in Cybersecurity
SANS Institute Intermediate 4y ago
Promoted from CISO to CIO
Cybersecurity โšก AI Lesson
Promoted from CISO to CIO
SANS Institute Intermediate 4y ago
Amp Up Your Career:  Careers in Energy and Critical Infrastructure Cybersecurity
Cybersecurity โšก AI Lesson
Amp Up Your Career: Careers in Energy and Critical Infrastructure Cybersecurity
SANS Institute Intermediate 4y ago
Hacking Your Mind: Como comeรงar e continuar a evoluir
Cybersecurity โšก AI Lesson
Hacking Your Mind: Como comeรงar e continuar a evoluir
SANS Institute Intermediate 4y ago
AT&T Charged Him $900 So He Took Down Their Network | Darknet Diaries Ep. 20: mobman
Cybersecurity
AT&T Charged Him $900 So He Took Down Their Network | Darknet Diaries Ep. 20: mobman
Jack Rhysider Intermediate 4y ago
Hiring and Mentoring in 2022 | Seat at the Table
Cybersecurity โšก AI Lesson
Hiring and Mentoring in 2022 | Seat at the Table
SANS Institute Intermediate 4y ago
Cloud Wars; Episode I - The IAM Menace
Cybersecurity โšก AI Lesson
Cloud Wars; Episode I - The IAM Menace
SANS Institute Intermediate 4y ago
Join us for the Free SANS New2Cyber Summit 2022!
Cybersecurity โšก AI Lesson
Join us for the Free SANS New2Cyber Summit 2022!
SANS Institute Intermediate 4y ago
16 secs to break it! ๐Ÿ˜ฑ 70% of real world WiFi networks owned!
Cybersecurity
16 secs to break it! ๐Ÿ˜ฑ 70% of real world WiFi networks owned!
David Bombal Intermediate 4y ago
Black Girls Hack Too
Cybersecurity โšก AI Lesson
Black Girls Hack Too
SANS Institute Intermediate 4y ago
Linux Defense Evasion - Apache2 Rootkit
Cybersecurity โšก AI Lesson
Linux Defense Evasion - Apache2 Rootkit
HackerSploit Intermediate 4y ago
How To Crack ZIP & RAR Files With Hashcat
Cybersecurity โšก AI Lesson
How To Crack ZIP & RAR Files With Hashcat
HackerSploit Intermediate 4y ago
Web App Pentesting - Setting Up OWASP bWAPP With Docker
Cybersecurity โšก AI Lesson
Web App Pentesting - Setting Up OWASP bWAPP With Docker
HackerSploit Intermediate 4y ago
Windows Privilege Escalation - Exploiting Insecure GUI Apps
Cybersecurity โšก AI Lesson
Windows Privilege Escalation - Exploiting Insecure GUI Apps
HackerSploit Intermediate 4y ago
Windows Privilege Escalation - Exploiting Scheduled Tasks
Cybersecurity โšก AI Lesson
Windows Privilege Escalation - Exploiting Scheduled Tasks
HackerSploit Intermediate 4y ago
๐Ÿ“š Coursera Courses Opens on Coursera ยท Free to audit
1 / 3 View all โ†’
AI for Cybersecurity
๐Ÿ“š Coursera Course โ†—
Self-paced
AI for Cybersecurity
Opens on Coursera โ†—
Quantum Computing For Everyone - An Introduction
๐Ÿ“š Coursera Course โ†—
Self-paced
Quantum Computing For Everyone - An Introduction
Opens on Coursera โ†—
Hacking COVID-19 โ€” Course 5: Tracing SARS-CoV-2's Evolution
๐Ÿ“š Coursera Course โ†—
Self-paced
Hacking COVID-19 โ€” Course 5: Tracing SARS-CoV-2's Evolution
Opens on Coursera โ†—
Cybersecurity Policy for Aviation and Internet Infrastructures
๐Ÿ“š Coursera Course โ†—
Self-paced
Cybersecurity Policy for Aviation and Internet Infrastructures
Opens on Coursera โ†—
CCST Cybersecurity Video Training Series
๐Ÿ“š Coursera Course โ†—
Self-paced
CCST Cybersecurity Video Training Series
Opens on Coursera โ†—
AWS: Data Protection and Security Governance
๐Ÿ“š Coursera Course โ†—
Self-paced
AWS: Data Protection and Security Governance
Opens on Coursera โ†—