Tech Skills

Cybersecurity

Ethical hacking, penetration testing, network security, CTFs and defensive security

6,738
lessons
Skills in this topic
View full skill map โ†’
Security Basics
beginner
Fix OWASP top 10 vulnerabilities
AI Security
intermediate
Identify and patch prompt injection vulnerabilities
Network Security
intermediate
Configure a firewall with proper inbound/outbound rules
Ethical Hacking & Pen Testing
intermediate
Conduct a full pen test with Kali Linux
Cloud Security
intermediate
Implement IAM least-privilege policies on AWS/GCP
Incident Response
intermediate
Build an incident response playbook
Security Compliance
intermediate
Map controls for SOC 2 Type II compliance
Defensive AI
advanced
Build an AI-powered log anomaly detector
Fraud Detection in the AI Era // Rafael Sandroni // MLOps Podcast #301
Cybersecurity โšก AI Lesson
Fraud Detection in the AI Era // Rafael Sandroni // MLOps Podcast #301
MLOps.community Intermediate 1y ago
Why nobody likes cybersecurity
Cybersecurity
Why nobody likes cybersecurity
Weights & Biases Intermediate 1y ago
this MP3 file is malware
Cybersecurity
this MP3 file is malware
John Hammond Intermediate 1y ago
Can you hack a hub? #shorts #hub #switch #network #wireshark #ccna
Cybersecurity
Can you hack a hub? #shorts #hub #switch #network #wireshark #ccna
David Bombal Intermediate 1y ago
Wasm on feature phones with Cloud Phone's Thomas Barrasso
Cybersecurity
Wasm on feature phones with Cloud Phone's Thomas Barrasso
Chrome for Developers Intermediate 1y ago
the CRITICAL 9.1 severity Next.js vulnerability
Cybersecurity โšก AI Lesson
the CRITICAL 9.1 severity Next.js vulnerability
John Hammond Intermediate 1y ago
WSL Setup (GPU WiFi Cracking, Wireshark, Remote Desktop and a lot more)
Cybersecurity โšก AI Lesson
WSL Setup (GPU WiFi Cracking, Wireshark, Remote Desktop and a lot more)
David Bombal Intermediate 1y ago
IBM Cybersecurity Analyst Professional Certificate: Build Critical Skills for a Thriving Career
Cybersecurity
IBM Cybersecurity Analyst Professional Certificate: Build Critical Skills for a Thriving Career
Coursera Intermediate 1y ago
Oxford Cyber Security for Business Leaders Programme
Cybersecurity
Oxford Cyber Security for Business Leaders Programme
Saรฏd Business School, University of Oxford Intermediate 1y ago
Hacking in Tamil Movies! Reality ๐Ÿคฃ #scienceandtechnology #facts #techintamil
Cybersecurity
Hacking in Tamil Movies! Reality ๐Ÿคฃ #scienceandtechnology #facts #techintamil
Arivi by HCL GUVI Intermediate 1y ago
Get Hired In Cybersecurity Without Previous Experience
Cybersecurity โšก AI Lesson
Get Hired In Cybersecurity Without Previous Experience
The Cyber Mentor Intermediate 1y ago
Burner Phone vs China's Great Firewall
Cybersecurity
Burner Phone vs China's Great Firewall
Dwarkesh Patel Intermediate 1y ago
IBM Cybersecurity Certificate: Your Path to a Top Tech Career
Cybersecurity
IBM Cybersecurity Certificate: Your Path to a Top Tech Career
Coursera Intermediate 1y ago
The Hacker Who Testified Before Congress & Changed Everything๐ŸŽ™Darknet Diaries Ep 155: Kingpin
Cybersecurity
The Hacker Who Testified Before Congress & Changed Everything๐ŸŽ™Darknet Diaries Ep 155: Kingpin
Jack Rhysider Intermediate 1y ago
Top 5 Common API Security Mistakes & How to Avoid Them ( Tamil )
Cybersecurity
Top 5 Common API Security Mistakes & How to Avoid Them ( Tamil )
TechArchLab Intermediate 1y ago
BREAK INTO Cybersecurity in 2025 ๐Ÿ’ฐ
Cybersecurity
BREAK INTO Cybersecurity in 2025 ๐Ÿ’ฐ
Sajjaad Khader Intermediate 1y ago
It only takes one photo
Cybersecurity โšก AI Lesson
It only takes one photo
NetworkChuck Intermediate 1y ago
Computer Virus: How It Got Its Name! #facts #techintamil #scienceandtechnology
Cybersecurity
Computer Virus: How It Got Its Name! #facts #techintamil #scienceandtechnology
Arivi by HCL GUVI Intermediate 1y ago
How to get a job in IT (2025)
Cybersecurity โšก AI Lesson
How to get a job in IT (2025)
NetworkChuck Intermediate 1y ago
The SECRET to Embedding Metasploit Payloads in VBA Macros
Cybersecurity โšก AI Lesson
The SECRET to Embedding Metasploit Payloads in VBA Macros
HackerSploit Intermediate 1y ago
A Wild Website Where People Lose Millions of Dollars
Cybersecurity
A Wild Website Where People Lose Millions of Dollars
Jack Rhysider Intermediate 1y ago
Exploring Offensive Cybersecurity: Threat Emulation | John Rodriguez
Cybersecurity โšก AI Lesson
Exploring Offensive Cybersecurity: Threat Emulation | John Rodriguez
SANS Institute Intermediate 1y ago
New Way Now: Dunelm delivers style to homes securely with Google Cloud
Cybersecurity
New Way Now: Dunelm delivers style to homes securely with Google Cloud
Google Cloud Intermediate 1y ago
TOP Cybersecurity Jobs in 2025
Cybersecurity
TOP Cybersecurity Jobs in 2025
Sajjaad Khader Intermediate 1y ago
A Day in the Life of a Network Security Engineer | Sanjay Poddar
Cybersecurity โšก AI Lesson
A Day in the Life of a Network Security Engineer | Sanjay Poddar
SANS Institute Intermediate 1y ago
Offensive VBA 0x4 - Reverse Shell Macro with Powercat
Cybersecurity โšก AI Lesson
Offensive VBA 0x4 - Reverse Shell Macro with Powercat
HackerSploit Intermediate 1y ago
Why AI Product Management is the Future? | Andrew Ng Insights
Cybersecurity โšก AI Lesson
Why AI Product Management is the Future? | Andrew Ng Insights
Analytics Vidhya Intermediate 1y ago
Linux for Windows?
Cybersecurity โšก AI Lesson
Linux for Windows?
David Bombal Intermediate 1y ago
ms teams is now a C2 (command-and-control)
Cybersecurity
ms teams is now a C2 (command-and-control)
John Hammond Intermediate 1y ago
they tried to hack me so i confronted them
Cybersecurity โšก AI Lesson
they tried to hack me so i confronted them
John Hammond Intermediate 1y ago
LOCAL Private Telephone System (PBX) with USA number for $1 a month
Cybersecurity
LOCAL Private Telephone System (PBX) with USA number for $1 a month
David Bombal Intermediate 1y ago
the tools that real hackers use
Cybersecurity โšก AI Lesson
the tools that real hackers use
John Hammond Intermediate 1y ago
are built-in windows programs vulnerable?
Cybersecurity โšก AI Lesson
are built-in windows programs vulnerable?
John Hammond Intermediate 1y ago
The Snyk Fetch the Flag CTF is LIVE right now!!
Cybersecurity โšก AI Lesson
The Snyk Fetch the Flag CTF is LIVE right now!!
John Hammond Intermediate 1y ago
Private Key Encryption - why is it used? #shorts #encryption #hashing #password
Cybersecurity
Private Key Encryption - why is it used? #shorts #encryption #hashing #password
David Bombal Intermediate 1y ago
The real world Iron Man? #shorts #ironman #mcu #cosplay #cybersecurity #zerotrust
Cybersecurity โšก AI Lesson
The real world Iron Man? #shorts #ironman #mcu #cosplay #cybersecurity #zerotrust
David Bombal Intermediate 1y ago
Hacking Before Computers! #facts #scienceandtechnology #techintamil
Cybersecurity
Hacking Before Computers! #facts #scienceandtechnology #techintamil
Arivi by HCL GUVI Intermediate 1y ago
Firewalls vs Firewalling #shorts #firewall #cisco #hack
Cybersecurity
Firewalls vs Firewalling #shorts #firewall #cisco #hack
David Bombal Intermediate 1y ago
Is DeepSeek Lying to you? #shorts #wireshark #deepseek #privacy #cybersecurity
Cybersecurity
Is DeepSeek Lying to you? #shorts #wireshark #deepseek #privacy #cybersecurity
David Bombal Intermediate 1y ago
Cybersecurity v Computer Science 2025 โ€ผ๏ธ
Cybersecurity
Cybersecurity v Computer Science 2025 โ€ผ๏ธ
Sajjaad Khader Intermediate 1y ago
How Hackers Target a Victim
Cybersecurity โšก AI Lesson
How Hackers Target a Victim
Jack Rhysider Intermediate 1y ago
From IT Support to Cybersecurity Leader: Jay Jamesโ€™ Keynote Journey
Cybersecurity โšก AI Lesson
From IT Support to Cybersecurity Leader: Jay Jamesโ€™ Keynote Journey
SANS Institute Intermediate 1y ago
Non-Technical to Technical: Breaking into Reverse Engineering | Alex Perotti
Cybersecurity โšก AI Lesson
Non-Technical to Technical: Breaking into Reverse Engineering | Alex Perotti
SANS Institute Intermediate 1y ago
What Cybersecurity, AI or other questions do you want me to ask them? #cybersecurity #ai #ciscolive
Cybersecurity โšก AI Lesson
What Cybersecurity, AI or other questions do you want me to ask them? #cybersecurity #ai #ciscolive
David Bombal Intermediate 1y ago
Pentesting Methodologies & CTF Challenges!
Cybersecurity โšก AI Lesson
Pentesting Methodologies & CTF Challenges!
John Hammond Intermediate 1y ago
I hope to see you in person! #shorts #ztw25 #cybersecurity #threatlocker
Cybersecurity
I hope to see you in person! #shorts #ztw25 #cybersecurity #threatlocker
David Bombal Intermediate 1y ago
Emulating FIN6 - Gaining Initial Access (Office Word Macro)
Cybersecurity โšก AI Lesson
Emulating FIN6 - Gaining Initial Access (Office Word Macro)
HackerSploit Intermediate 1y ago
Hackers have hacked AI  - Cisco Defense protects organizations #shorts #ai #cybersecurity #cisco
Cybersecurity
Hackers have hacked AI - Cisco Defense protects organizations #shorts #ai #cybersecurity #cisco
David Bombal Intermediate 1y ago
๐Ÿ“š Coursera Courses Opens on Coursera ยท Free to audit
1 / 3 View all โ†’
Cybersecurity: Protecting your Information on the Go
๐Ÿ“š Coursera Course โ†—
Self-paced
Cybersecurity: Protecting your Information on the Go
Opens on Coursera โ†—
Cyber Security Professional โ€“ Beginnerโ€™s Career Guide
๐Ÿ“š Coursera Course โ†—
Self-paced
Cyber Security Professional โ€“ Beginnerโ€™s Career Guide
Opens on Coursera โ†—
Intro to IoT Pentesting
๐Ÿ“š Coursera Course โ†—
Self-paced
Intro to IoT Pentesting
Opens on Coursera โ†—
Digital Shield: Cybersecurity for Data and System Protection
๐Ÿ“š Coursera Course โ†—
Self-paced
Digital Shield: Cybersecurity for Data and System Protection
Opens on Coursera โ†—
Mastering BFSI Interviews: Resumes & Mock Interviews
๐Ÿ“š Coursera Course โ†—
Self-paced
Mastering BFSI Interviews: Resumes & Mock Interviews
Opens on Coursera โ†—
Healthcare Data Management and Information Systems
๐Ÿ“š Coursera Course โ†—
Self-paced
Healthcare Data Management and Information Systems
Opens on Coursera โ†—