Tech Skills

Cybersecurity

Ethical hacking, penetration testing, network security, CTFs and defensive security

1415
videos
Ethical Hacking - Capture the Flag Walkthroughs - v2
📚 Coursera
🔐 Cybersecurity
Ethical Hacking - Capture the Flag Walkthroughs - v2
Coursera Intermediate 2h ago
Cyber Threats and Network Security Foundations
📚 Coursera
🔐 Cybersecurity
Cyber Threats and Network Security Foundations
Coursera Intermediate 2h ago
Model Context Protocol (MCP) Mastery
📚 Coursera
🔐 Cybersecurity
Model Context Protocol (MCP) Mastery
Coursera Intermediate 2h ago
Enterprise Firewall Administrator
📚 Coursera
🔐 Cybersecurity
Enterprise Firewall Administrator
Coursera Intermediate 2h ago
PowerShell for Penetration Testing
📚 Coursera
🔐 Cybersecurity
PowerShell for Penetration Testing
Coursera Intermediate 2h ago
Designing Robust Information System Security Architectures
📚 Coursera
🔐 Cybersecurity
Designing Robust Information System Security Architectures
Coursera Intermediate 2h ago
Securing AI and Advanced Topics
📚 Coursera
🔐 Cybersecurity
Securing AI and Advanced Topics
Coursera Intermediate 2h ago
CFR: Reconnaissance, Attack, and Post-Attack Analysis
📚 Coursera
🔐 Cybersecurity
CFR: Reconnaissance, Attack, and Post-Attack Analysis
Coursera Intermediate 2h ago
TOTAL - CompTIA CySA+ Cybersecurity Analyst (CS0-003)
📚 Coursera
🔐 Cybersecurity
TOTAL - CompTIA CySA+ Cybersecurity Analyst (CS0-003)
Coursera Intermediate 2h ago
Advanced Incident Handling and Analysis Techniques
📚 Coursera
🔐 Cybersecurity
Advanced Incident Handling and Analysis Techniques
Coursera Intermediate 2h ago
CompTIA Cloud CV0-003: Unit 4
📚 Coursera
🔐 Cybersecurity
CompTIA Cloud CV0-003: Unit 4
Coursera Intermediate 2h ago
Sécuriser GKE avec Cloud Next Generation Firewall
📚 Coursera
🔐 Cybersecurity
Sécuriser GKE avec Cloud Next Generation Firewall
Coursera Intermediate 2h ago
Advanced Network Security and Endpoint Strategies
📚 Coursera
🔐 Cybersecurity
Advanced Network Security and Endpoint Strategies
Coursera Intermediate 2h ago
Incident Response, Risk Management, and Compliance
📚 Coursera
🔐 Cybersecurity
Incident Response, Risk Management, and Compliance
Coursera Intermediate 2h ago
Linux Security Techniques
📚 Coursera
🔐 Cybersecurity
Linux Security Techniques
Coursera Intermediate 2h ago
ChatGPT for Cybersecurity: AI Tools for Threat Defense
📚 Coursera
🔐 Cybersecurity
ChatGPT for Cybersecurity: AI Tools for Threat Defense
Coursera Intermediate 2h ago
Penetration Testing, Threat Hunting, and Cryptography
📚 Coursera
🔐 Cybersecurity
Penetration Testing, Threat Hunting, and Cryptography
Coursera Intermediate 2h ago
Securing the IoT Landscape: From Inception to Architecture
📚 Coursera
🔐 Cybersecurity
Securing the IoT Landscape: From Inception to Architecture
Coursera Intermediate 2h ago
Ethical Hacking with Kali Linux
📚 Coursera
🔐 Cybersecurity
Ethical Hacking with Kali Linux
Coursera Intermediate 2h ago
Conflict Management Essentials
📚 Coursera
🔐 Cybersecurity
Conflict Management Essentials
Coursera Intermediate 2h ago
Effective Management: Essential Manager Skills
📚 Coursera
🔐 Cybersecurity
Effective Management: Essential Manager Skills
Coursera Intermediate 2h ago
Cybersecurity Governance: 16 Steps with NIST & ISO
📚 Coursera
🔐 Cybersecurity
Cybersecurity Governance: 16 Steps with NIST & ISO
Coursera Intermediate 2h ago
Cryptography
📚 Coursera
🔐 Cybersecurity
Cryptography
Coursera Intermediate 2h ago
Segurança de redes VPC com Cloud Next Generation Firewall
📚 Coursera
🔐 Cybersecurity
Segurança de redes VPC com Cloud Next Generation Firewall
Coursera Intermediate 2h ago