Tech Skills

Cybersecurity

Ethical hacking, penetration testing, network security, CTFs and defensive security

6,803
lessons
Skills in this topic
View full skill map →
Security Basics
beginner
Fix OWASP top 10 vulnerabilities
AI Security
intermediate
Identify and patch prompt injection vulnerabilities
Network Security
intermediate
Configure a firewall with proper inbound/outbound rules
Ethical Hacking & Pen Testing
intermediate
Conduct a full pen test with Kali Linux
Cloud Security
intermediate
Implement IAM least-privilege policies on AWS/GCP
Incident Response
intermediate
Build an incident response playbook
Security Compliance
intermediate
Map controls for SOC 2 Type II compliance
Defensive AI
advanced
Build an AI-powered log anomaly detector
📚 Coursera Courses Opens on Coursera · Free to audit
1 / 3 View all →
Advanced Prometheus Alerting and Monitoring
📚 Coursera Course ↗
Self-paced
Advanced Prometheus Alerting and Monitoring
Opens on Coursera ↗
Cybersecurity Foundations: Threats Networks, and IoT Protection
📚 Coursera Course ↗
Self-paced
Cybersecurity Foundations: Threats Networks, and IoT Protection
Opens on Coursera ↗
Memory, Encryption, and Protecting Data in Android
📚 Coursera Course ↗
Self-paced
Memory, Encryption, and Protecting Data in Android
Opens on Coursera ↗
Network Defense Strategies
📚 Coursera Course ↗
Self-paced
Network Defense Strategies
Opens on Coursera ↗
Hacking and Patching
📚 Coursera Course ↗
Self-paced
Hacking and Patching
Opens on Coursera ↗
Introduction to Information Technology and AWS Cloud
📚 Coursera Course ↗
Self-paced
Introduction to Information Technology and AWS Cloud
Opens on Coursera ↗