Tech Skills

Cybersecurity

Ethical hacking, penetration testing, network security, CTFs and defensive security

6,828
lessons
Skills in this topic
View full skill map →
Security Basics
beginner
Fix OWASP top 10 vulnerabilities
AI Security
intermediate
Identify and patch prompt injection vulnerabilities
Network Security
intermediate
Configure a firewall with proper inbound/outbound rules
Ethical Hacking & Pen Testing
intermediate
Conduct a full pen test with Kali Linux
Cloud Security
intermediate
Implement IAM least-privilege policies on AWS/GCP
Incident Response
intermediate
Build an incident response playbook
Security Compliance
intermediate
Map controls for SOC 2 Type II compliance
Defensive AI
advanced
Build an AI-powered log anomaly detector
📚 Coursera Courses Opens on Coursera · Free to audit
1 / 3 View all →
Into the Trenches: Security Operations Center
📚 Coursera Course ↗
Self-paced
Into the Trenches: Security Operations Center
Opens on Coursera ↗
Linux Security Basics and Beyond: Unit 4
📚 Coursera Course ↗
Self-paced
Linux Security Basics and Beyond: Unit 4
Opens on Coursera ↗
Incident Management and Continuous Improvement
📚 Coursera Course ↗
Self-paced
Incident Management and Continuous Improvement
Opens on Coursera ↗
Network Defense Essentials: Hands-On Edition
📚 Coursera Course ↗
Self-paced
Network Defense Essentials: Hands-On Edition
Opens on Coursera ↗
VPN Tunneling with OpenVPN: Secure Network Connections
📚 Coursera Course ↗
Self-paced
VPN Tunneling with OpenVPN: Secure Network Connections
Opens on Coursera ↗
Ethical Hacking with Kali Linux: Analyze & Defend
📚 Coursera Course ↗
Self-paced
Ethical Hacking with Kali Linux: Analyze & Defend
Opens on Coursera ↗