Tech Skills

Cybersecurity

Ethical hacking, penetration testing, network security, CTFs and defensive security

6,732
lessons
Skills in this topic
View full skill map โ†’
Security Basics
beginner
Fix OWASP top 10 vulnerabilities
AI Security
intermediate
Identify and patch prompt injection vulnerabilities
Network Security
intermediate
Configure a firewall with proper inbound/outbound rules
Ethical Hacking & Pen Testing
intermediate
Conduct a full pen test with Kali Linux
Cloud Security
intermediate
Implement IAM least-privilege policies on AWS/GCP
Incident Response
intermediate
Build an incident response playbook
Security Compliance
intermediate
Map controls for SOC 2 Type II compliance
Defensive AI
advanced
Build an AI-powered log anomaly detector
Wireshark Tutorial For Beginners | How Wireshark Works | Packet Analysis Explained | Simplilearn
Cybersecurity
Wireshark Tutorial For Beginners | How Wireshark Works | Packet Analysis Explained | Simplilearn
Simplilearn Beginner 31m ago
Supply chain attacks are taking over for real
Cybersecurity
Supply chain attacks are taking over for real
CoderOne Beginner 15h ago
Hack a Drug Lord's Smart Toilet!
Cybersecurity
Hack a Drug Lord's Smart Toilet!
John Hammond Advanced 20h ago
The Payload Podcast 006
Cybersecurity
The Payload Podcast 006
John Hammond Beginner 20h ago
How a GitLab engineer DESTROYED their main databaseโ€ฆ
Cybersecurity
How a GitLab engineer DESTROYED their main databaseโ€ฆ
Coding with Lewis Intermediate 22h ago
LIVE: ๐Ÿ•ต๏ธ HTB Sherlocks! | Cybersecurity | Blue Team
Cybersecurity
LIVE: ๐Ÿ•ต๏ธ HTB Sherlocks! | Cybersecurity | Blue Team
The Cyber Mentor Intermediate 23h ago
A Quick Way to Prove Your Cybersecurity Skillset!
Cybersecurity
A Quick Way to Prove Your Cybersecurity Skillset!
The Cyber Mentor Intermediate 1d ago
How to Create New Rules and Manage False Positives Through Rule Exceptions in AWS WAF Console
Cybersecurity
How to Create New Rules and Manage False Positives Through Rule Exceptions in AWS WAF Console
Amazon Web Services Advanced 1d ago
Earn up to $10,000 for Finding Bugs in Anthropicโ€™s Systems! ๐Ÿ’ป๐Ÿ’ฐ
Cybersecurity
Earn up to $10,000 for Finding Bugs in Anthropicโ€™s Systems! ๐Ÿ’ป๐Ÿ’ฐ
Analytics Vidhya Advanced 2d ago
Become Ultra Elite Hackerman With This Application
Cybersecurity
Become Ultra Elite Hackerman With This Application
Brodie Robertson Intermediate 2d ago
Your Cloud Security is Already Built-in: How to Finally Enforce It
Cybersecurity
Your Cloud Security is Already Built-in: How to Finally Enforce It
Google Cloud Intermediate 2d ago
Mark Cavage on Agentic AI, Sandboxing & Enterprise Security | Ep 10
Cybersecurity
Mark Cavage on Agentic AI, Sandboxing & Enterprise Security | Ep 10
Data Science Dojo Intermediate 2d ago
Top 5 AI Tools For Ethical Hacking In 2026 | Top AI Tools For CyberSecurity | #Shorts  #simplilearn
Cybersecurity
Top 5 AI Tools For Ethical Hacking In 2026 | Top AI Tools For CyberSecurity | #Shorts #simplilearn
Simplilearn Beginner 3d ago
HackTheBox - Overwatch
Cybersecurity
HackTheBox - Overwatch
IppSec Beginner 5d ago
3 risks of using clear DNS
Cybersecurity
3 risks of using clear DNS
David Bombal Beginner 5d ago
OpenClaw: Simple VPS Setup Guide
Cybersecurity
OpenClaw: Simple VPS Setup Guide
NeuralNine Beginner 6d ago
Stop AI Agents From SQL Injecting Your Database
Cybersecurity
Stop AI Agents From SQL Injecting Your Database
MLOps.community Intermediate 6d ago
How HackerRank Stops Cheating in Tech Interviews
Cybersecurity
How HackerRank Stops Cheating in Tech Interviews
HackerRank Intermediate 6d ago
Threat Hunting with Taz Wake
Cybersecurity
Threat Hunting with Taz Wake
SANS Institute Advanced 6d ago
Linux Just Standardized Something We All Use
Cybersecurity
Linux Just Standardized Something We All Use
Brodie Robertson Intermediate 6d ago
Language-Agnostic Detection of Bugs in Zero-Knowledge Proof Programs
Cybersecurity
Language-Agnostic Detection of Bugs in Zero-Knowledge Proof Programs
Microsoft Research Intermediate 6d ago
Ever been run over by a robot? I have โ€” for science!
Cybersecurity
Ever been run over by a robot? I have โ€” for science!
The Verge Advanced 1w ago
Operation Sindoor: How Pahalgam Attack Was Revenged | Amit Dubey Podcast, Cyber Security
Cybersecurity
Operation Sindoor: How Pahalgam Attack Was Revenged | Amit Dubey Podcast, Cyber Security
Switch Advanced 1w ago
3 Keys to Weather the Autonomous Attack Storm
Cybersecurity
3 Keys to Weather the Autonomous Attack Storm
SANS Institute Intermediate 1w ago
Hacking on the PDP1 Raspberry Pi Emulator - Computerphile
Cybersecurity
Hacking on the PDP1 Raspberry Pi Emulator - Computerphile
Computerphile Intermediate 1w ago
Can EVMs Be Hacked, How Secure, Safe Are EVMs? | West Bengal Election Results 2026 | Mamata Banerjee
Cybersecurity
Can EVMs Be Hacked, How Secure, Safe Are EVMs? | West Bengal Election Results 2026 | Mamata Banerjee
Switch Advanced 1w ago
The Only Cure For This Malware Is to Throw Your Router in the Trash ๐Ÿ”Œ Episode 174: Pacific Rim
Cybersecurity
The Only Cure For This Malware Is to Throw Your Router in the Trash ๐Ÿ”Œ Episode 174: Pacific Rim
Jack Rhysider Intermediate 1w ago
May the force help you troubleshoot ...
Cybersecurity
May the force help you troubleshoot ...
David Bombal Beginner 1w ago
Stanford's youngest instructor on InfoSec, AI, catching cheaters - Rachel Fernandez [Podcast #217]
Cybersecurity
Stanford's youngest instructor on InfoSec, AI, catching cheaters - Rachel Fernandez [Podcast #217]
freeCodeCamp.org Intermediate 1w ago
MetaSploit Tutorial For Beginners 2026 | MetaSploit Explained | Metasploit Framework | Simplilearn
Cybersecurity
MetaSploit Tutorial For Beginners 2026 | MetaSploit Explained | Metasploit Framework | Simplilearn
Simplilearn Beginner 6d ago
How the Coalition for Secure AI Prepares Defenders
Cybersecurity
How the Coalition for Secure AI Prepares Defenders
SANS Institute Beginner 1w ago
Germany Was Just Deleted From The Internet
Cybersecurity
Germany Was Just Deleted From The Internet
Brodie Robertson Beginner 1w ago
Ethical Hacking Full Course 2026 [FREE] | Ethical Hacking Tutorial For Beginners | Simplilearn
Cybersecurity
Ethical Hacking Full Course 2026 [FREE] | Ethical Hacking Tutorial For Beginners | Simplilearn
Simplilearn Beginner 1w ago
Ethical Hacking Full Course 2026 [FREE] | Ethical Hacking Tutorial For Beginners | Simplilearn
Cybersecurity
Ethical Hacking Full Course 2026 [FREE] | Ethical Hacking Tutorial For Beginners | Simplilearn
Simplilearn Beginner 1w ago
Is Ethical Hacking A Good Career In 2026 | Skills, Salary And Roadmap | #Shorts | #Simplilearn
Cybersecurity
Is Ethical Hacking A Good Career In 2026 | Skills, Salary And Roadmap | #Shorts | #Simplilearn
Simplilearn Beginner 1w ago
Cybersecurity Roadmap | Cybersecurity Skills | How To Become A Cybersecurity Engineer | Simplilearn
Cybersecurity
Cybersecurity Roadmap | Cybersecurity Skills | How To Become A Cybersecurity Engineer | Simplilearn
Simplilearn Advanced 1w ago
Lightning Talk: What Got Us Here Will Get Us There
Cybersecurity
Lightning Talk: What Got Us Here Will Get Us There
SANS Institute Beginner 1w ago
Lightning Talk: Why AI for ICS Needs IT/OT Integration
Cybersecurity
Lightning Talk: Why AI for ICS Needs IT/OT Integration
SANS Institute Beginner 1w ago
Lightning Talk: AI vs. AI: They're Already Inside
Cybersecurity
Lightning Talk: AI vs. AI: They're Already Inside
SANS Institute Beginner 1w ago
Lightning Talk: AI as the Attack: Weaponizing APIs
Cybersecurity
Lightning Talk: AI as the Attack: Weaponizing APIs
SANS Institute Beginner 1w ago
Keynote: Integrous AI
Cybersecurity
Keynote: Integrous AI
SANS Institute Beginner 1w ago
Keynote: Every Doorknob, All At Once: AI Cyber Lessons
Cybersecurity
Keynote: Every Doorknob, All At Once: AI Cyber Lessons
SANS Institute Intermediate 1w ago
Fedora Is Replacing Ubuntu Linux As The Default
Cybersecurity
Fedora Is Replacing Ubuntu Linux As The Default
Brodie Robertson Intermediate 1w ago
Which Apps, Communication System Was Used in Pahalgam Attack | Cyber Security Podcast | Amit Dubey
Cybersecurity
Which Apps, Communication System Was Used in Pahalgam Attack | Cyber Security Podcast | Amit Dubey
Switch Advanced 1w ago
Linux Ricing Brings Back Steam Skins With Millennium
Cybersecurity
Linux Ricing Brings Back Steam Skins With Millennium
Brodie Robertson Intermediate 1w ago
Dual Boot Windows and Ubuntu Linux in 10 Minutes (2026)
Cybersecurity
Dual Boot Windows and Ubuntu Linux in 10 Minutes (2026)
David Bombal Intermediate 1w ago
A Guide to LNK File Forensics
Cybersecurity
A Guide to LNK File Forensics
The Cyber Mentor Beginner 1w ago
Bringing AI Securely Online with Florence Mottay
Cybersecurity
Bringing AI Securely Online with Florence Mottay
SANS Institute Advanced 1w ago
๐Ÿ“š Coursera Courses Opens on Coursera ยท Free to audit
1 / 3 View all โ†’
Switching, Routing, and Network Services
๐Ÿ“š Coursera Course โ†—
Self-paced
Switching, Routing, and Network Services
Opens on Coursera โ†—
Beginning Security
๐Ÿ“š Coursera Course โ†—
Self-paced
Beginning Security
Opens on Coursera โ†—
The CISO Masterclass
๐Ÿ“š Coursera Course โ†—
Self-paced
The CISO Masterclass
Opens on Coursera โ†—
Threat Response
๐Ÿ“š Coursera Course โ†—
Self-paced
Threat Response
Opens on Coursera โ†—
Evaluate Your Cloud Next Generation Firewall Needs
๐Ÿ“š Coursera Course โ†—
Self-paced
Evaluate Your Cloud Next Generation Firewall Needs
Opens on Coursera โ†—
Security and Troubleshooting Essentials
๐Ÿ“š Coursera Course โ†—
Self-paced
Security and Troubleshooting Essentials
Opens on Coursera โ†—