Tech Skills

Cybersecurity

Ethical hacking, penetration testing, network security, CTFs and defensive security

6,736
lessons
Skills in this topic
View full skill map โ†’
Security Basics
beginner
Fix OWASP top 10 vulnerabilities
AI Security
intermediate
Identify and patch prompt injection vulnerabilities
Network Security
intermediate
Configure a firewall with proper inbound/outbound rules
Ethical Hacking & Pen Testing
intermediate
Conduct a full pen test with Kali Linux
Cloud Security
intermediate
Implement IAM least-privilege policies on AWS/GCP
Incident Response
intermediate
Build an incident response playbook
Security Compliance
intermediate
Map controls for SOC 2 Type II compliance
Defensive AI
advanced
Build an AI-powered log anomaly detector
Trepang 2: How We Saved The Helicopter Boss Fight!
Cybersecurity
Trepang 2: How We Saved The Helicopter Boss Fight!
AI and Games Intermediate 8mo ago
Superstores Are Scanning Your Face - The SCARY Part
Cybersecurity โšก AI Lesson
Superstores Are Scanning Your Face - The SCARY Part
David Bombal Intermediate 8mo ago
Is Spotify doxxing you now?
Cybersecurity
Is Spotify doxxing you now?
David Bombal Intermediate 8mo ago
Cybersecurity In Healthcare | Importance Of Cybersecurity In Healthcare | Simplilearn
Cybersecurity
Cybersecurity In Healthcare | Importance Of Cybersecurity In Healthcare | Simplilearn
Simplilearn Intermediate 9mo ago
These 8 Companies You've Never Heard Of Sell Your Personal Data to the Cops ๐Ÿšจ Ep. 162: Hieu
Cybersecurity
These 8 Companies You've Never Heard Of Sell Your Personal Data to the Cops ๐Ÿšจ Ep. 162: Hieu
Jack Rhysider Intermediate 9mo ago
Supply Chain Forum 2025: Firmware Attacks Expanding the Enterprise Attack Surface
Cybersecurity โšก AI Lesson
Supply Chain Forum 2025: Firmware Attacks Expanding the Enterprise Attack Surface
SANS Institute Intermediate 9mo ago
AI Security for Product Managers - AI PM Community Session #83
Cybersecurity โšก AI Lesson
AI Security for Product Managers - AI PM Community Session #83
PM Exercises Intermediate 10mo ago
why are Hackers going to Las Vegas?
Cybersecurity โšก AI Lesson
why are Hackers going to Las Vegas?
NetworkChuck Intermediate 10mo ago
Cybersecurity in 2025 ๐Ÿ‘€
Cybersecurity
Cybersecurity in 2025 ๐Ÿ‘€
Sajjaad Khader Intermediate 10mo ago
Summit Live: Databricks Apps - Empowering data + AI teams to build and deploy applications with ease
Cybersecurity โšก AI Lesson
Summit Live: Databricks Apps - Empowering data + AI teams to build and deploy applications with ease
Databricks Intermediate 10mo ago
LIVE: Web Hacking | Pentesting | AppSec | Cybersecurity | TryHackme | AMA
Cybersecurity โšก AI Lesson
LIVE: Web Hacking | Pentesting | AppSec | Cybersecurity | TryHackme | AMA
The Cyber Mentor Intermediate 10mo ago
Hacking the Factory
Cybersecurity โšก AI Lesson
Hacking the Factory
Latent Space Intermediate 10mo ago
State Street Uses Databricks as a Cybersecurity Lakehouse for Threat Intelligence & Real-Time Alerts
Cybersecurity โšก AI Lesson
State Street Uses Databricks as a Cybersecurity Lakehouse for Threat Intelligence & Real-Time Alerts
Databricks Intermediate 10mo ago
Cybersecurity Engineer: One of the Highest Paying Jobs in 2025!
Cybersecurity
Cybersecurity Engineer: One of the Highest Paying Jobs in 2025!
edureka! Intermediate 10mo ago
The Myth: AI Is Coming for Your Job
Cybersecurity โšก AI Lesson
The Myth: AI Is Coming for Your Job
SANS Institute Intermediate 10mo ago
How You Can Impersonate Anyone in Active Directory (with Shikata!)
Cybersecurity
How You Can Impersonate Anyone in Active Directory (with Shikata!)
John Hammond Intermediate 10mo ago
Evading Antivirus Detection in C (with Dahvid Schloss)
Cybersecurity
Evading Antivirus Detection in C (with Dahvid Schloss)
John Hammond Intermediate 10mo ago
LIVE: New Cert | Chaining Vulnerabilities | AppSec | Cybersecurity | Pentesting
Cybersecurity โšก AI Lesson
LIVE: New Cert | Chaining Vulnerabilities | AppSec | Cybersecurity | Pentesting
The Cyber Mentor Intermediate 10mo ago
21,000 Hackers go HERE every Summer
Cybersecurity โšก AI Lesson
21,000 Hackers go HERE every Summer
NetworkChuck Intermediate 10mo ago
Fastest Way To Learn Bug Bounty In 2026 | Bug Bounty Roadmap 2026 | CyberSecurity | Simplilearn
Cybersecurity
Fastest Way To Learn Bug Bounty In 2026 | Bug Bounty Roadmap 2026 | CyberSecurity | Simplilearn
Simplilearn Intermediate 11mo ago
Top Certifications to Skyrocket Your Career in 2025!
Cybersecurity
Top Certifications to Skyrocket Your Career in 2025!
edureka! Intermediate 11mo ago
Webinar: Systems thinking in practice
Cybersecurity โšก AI Lesson
Webinar: Systems thinking in practice
Saรฏd Business School, University of Oxford Intermediate 11mo ago
How Pretto Made 200 Employees Happier & More Productive with Zapier
Cybersecurity
How Pretto Made 200 Employees Happier & More Productive with Zapier
Zapier Intermediate 11mo ago
Every Cyber Attack Facing America | Incognito Mode | WIRED
Cybersecurity
Every Cyber Attack Facing America | Incognito Mode | WIRED
WIRED Intermediate 11mo ago
Governments are hacking firewalls and ...
Cybersecurity
Governments are hacking firewalls and ...
David Bombal Intermediate 8mo ago
How One Prompt Hijacked Lenovoโ€™s AI Chatbot
Cybersecurity
How One Prompt Hijacked Lenovoโ€™s AI Chatbot
David Bombal Intermediate 8mo ago
Car Features PAYWALLED: hardware already inside
Cybersecurity
Car Features PAYWALLED: hardware already inside
David Bombal Intermediate 8mo ago
Germanyโ€™s ad-blocker RISK in 2025: whatโ€™s at stake
Cybersecurity
Germanyโ€™s ad-blocker RISK in 2025: whatโ€™s at stake
David Bombal Intermediate 8mo ago
UK Piracy Blocks: Your VPN's UK Exit Won't Help
Cybersecurity
UK Piracy Blocks: Your VPN's UK Exit Won't Help
David Bombal Intermediate 9mo ago
Firewall Zero Day Hack in the wild โ˜น๏ธ #firewall #hack
Cybersecurity
Firewall Zero Day Hack in the wild โ˜น๏ธ #firewall #hack
David Bombal Intermediate 9mo ago
All are equal... except UK MPs
Cybersecurity
All are equal... except UK MPs
David Bombal Intermediate 9mo ago
How the UK KILLED Privacy: The Online Safety Act Nightmare
Cybersecurity โšก AI Lesson
How the UK KILLED Privacy: The Online Safety Act Nightmare
David Bombal Intermediate 9mo ago
UK LAW triggered 1,400% VPN SURGE
Cybersecurity
UK LAW triggered 1,400% VPN SURGE
David Bombal Intermediate 9mo ago
VPN PROMISES BROKEN... ExpressVPNโ€™s Debug Leak
Cybersecurity โšก AI Lesson
VPN PROMISES BROKEN... ExpressVPNโ€™s Debug Leak
David Bombal Intermediate 9mo ago
Hardcoded PASSWORDS in 2025? ๐Ÿคฏ
Cybersecurity โšก AI Lesson
Hardcoded PASSWORDS in 2025? ๐Ÿคฏ
David Bombal Intermediate 9mo ago
Simplified Delta Sharing With Network Security
Cybersecurity โšก AI Lesson
Simplified Delta Sharing With Network Security
Databricks Intermediate 10mo ago
Partner Summit Breakout: Story-Driven Success: Empowering Partners and Account Teams with Impactful
Cybersecurity โšก AI Lesson
Partner Summit Breakout: Story-Driven Success: Empowering Partners and Account Teams with Impactful
Databricks Intermediate 10mo ago
ROOT Android Virtual Devices: Your 1st Step to Mobile Hacking
Cybersecurity โšก AI Lesson
ROOT Android Virtual Devices: Your 1st Step to Mobile Hacking
David Bombal Intermediate 10mo ago
Beyond the Patch: Measuring the Unknown in Vulnerability Management
Cybersecurity โšก AI Lesson
Beyond the Patch: Measuring the Unknown in Vulnerability Management
SANS Institute Intermediate 10mo ago
From the SANS Cyber Leaders Podcast: Fighting Back with John Hubbard
Cybersecurity โšก AI Lesson
From the SANS Cyber Leaders Podcast: Fighting Back with John Hubbard
SANS Institute Intermediate 10mo ago
This Wireshark Cert Could Change Your Career
Cybersecurity โšก AI Lesson
This Wireshark Cert Could Change Your Career
David Bombal Intermediate 10mo ago
Will this Tiny Chip Change EVERYTHING in Quantum Computing?
Cybersecurity
Will this Tiny Chip Change EVERYTHING in Quantum Computing?
David Bombal Intermediate 11mo ago
Learning to Hack Active Directory Certificate Services (with Shikata!)
Cybersecurity โšก AI Lesson
Learning to Hack Active Directory Certificate Services (with Shikata!)
John Hammond Intermediate 11mo ago
WiFi Myth: Too many people believe this one.
Cybersecurity
WiFi Myth: Too many people believe this one.
David Bombal Intermediate 11mo ago
Spooky Action at a Distance #einstein #quantum #computing #cybersecurity
Cybersecurity
Spooky Action at a Distance #einstein #quantum #computing #cybersecurity
David Bombal Intermediate 11mo ago
Windows Endpoint Telemetry (ft. Jonny Johnson)
Cybersecurity
Windows Endpoint Telemetry (ft. Jonny Johnson)
John Hammond Intermediate 11mo ago
Which is used by default? #shorts #iphone #android #starlink #vpn
Cybersecurity
Which is used by default? #shorts #iphone #android #starlink #vpn
David Bombal Intermediate 11mo ago
WiFi Myths ... don't believe this one.
Cybersecurity
WiFi Myths ... don't believe this one.
David Bombal Intermediate 11mo ago
๐Ÿ“š Coursera Courses Opens on Coursera ยท Free to audit
1 / 3 View all โ†’
Network Traffic Analysis with Wireshark
๐Ÿ“š Coursera Course โ†—
Self-paced
Network Traffic Analysis with Wireshark
Opens on Coursera โ†—
Analyze Cybersecurity Risks in Financial Systems
๐Ÿ“š Coursera Course โ†—
Self-paced
Analyze Cybersecurity Risks in Financial Systems
Opens on Coursera โ†—
Consultative Selling and Buyer Engagement
๐Ÿ“š Coursera Course โ†—
Self-paced
Consultative Selling and Buyer Engagement
Opens on Coursera โ†—
Introducciรณn a Cloud Next Generation Firewall
๐Ÿ“š Coursera Course โ†—
Self-paced
Introducciรณn a Cloud Next Generation Firewall
Opens on Coursera โ†—
Inglรฉs Empresarial: Finanzas y Economรญa
๐Ÿ“š Coursera Course โ†—
Self-paced
Inglรฉs Empresarial: Finanzas y Economรญa
Opens on Coursera โ†—
CISSP Domain 4: Communication and Network Security
๐Ÿ“š Coursera Course โ†—
Self-paced
CISSP Domain 4: Communication and Network Security
Opens on Coursera โ†—