Tech Skills

Cybersecurity

Ethical hacking, penetration testing, network security, CTFs and defensive security

6,997
lessons
Skills in this topic
View full skill map →
Security Basics
beginner
Fix OWASP top 10 vulnerabilities
AI Security
intermediate
Identify and patch prompt injection vulnerabilities
Network Security
intermediate
Configure a firewall with proper inbound/outbound rules
Ethical Hacking & Pen Testing
intermediate
Conduct a full pen test with Kali Linux
Cloud Security
intermediate
Implement IAM least-privilege policies on AWS/GCP
Incident Response
intermediate
Build an incident response playbook
Security Compliance
intermediate
Map controls for SOC 2 Type II compliance
Defensive AI
advanced
Build an AI-powered log anomaly detector
The 2015 SANS Holiday Hack Challenge
Cybersecurity ⚡ AI Lesson
The 2015 SANS Holiday Hack Challenge
SANS Institute Intermediate 10y ago
Hack The Drone - SANS Cyber Academy UK
Cybersecurity ⚡ AI Lesson
Hack The Drone - SANS Cyber Academy UK
SANS Institute Beginner 10y ago
How Digital Audio Works - Computerphile
Cybersecurity ⚡ AI Lesson
How Digital Audio Works - Computerphile
Computerphile Beginner 10y ago
Man in the Middle Attacks & Superfish - Computerphile
Cybersecurity ⚡ AI Lesson
Man in the Middle Attacks & Superfish - Computerphile
Computerphile Intermediate 10y ago
Live Q&A on hacking prevention and recovery
Cybersecurity
Live Q&A on hacking prevention and recovery
Google Search Central Advanced 10y ago
Programming Terms: String Interpolation
Cybersecurity
Programming Terms: String Interpolation
Corey Schafer Beginner 10y ago
LiveOverflow - Trailer
Cybersecurity
LiveOverflow - Trailer
LiveOverflow Intermediate 11y ago
How to Study Effectively: 8 Advanced Tips - College Info Geek
Cybersecurity
How to Study Effectively: 8 Advanced Tips - College Info Geek
Thomas Frank Beginner 11y ago
How to Read Your Textbooks More Efficiently - College Info Geek
Cybersecurity
How to Read Your Textbooks More Efficiently - College Info Geek
Thomas Frank Intermediate 11y ago
CS50 2014 - Week 10
Cybersecurity
CS50 2014 - Week 10
CS50 Intermediate 11y ago
Python [pygame] 12 Platforming Rectangular Collision Resolution
Cybersecurity
Python [pygame] 12 Platforming Rectangular Collision Resolution
John Hammond Intermediate 12y ago
Python [pygame] 11 Rectangular Collision Detection
Cybersecurity
Python [pygame] 11 Rectangular Collision Detection
John Hammond Intermediate 12y ago
Hire the hackers! - Misha Glenny
Cybersecurity
Hire the hackers! - Misha Glenny
TED-Ed Beginner 12y ago
Behind the Great Firewall of China - Michael Anti
Cybersecurity
Behind the Great Firewall of China - Michael Anti
TED-Ed Intermediate 12y ago
XBee Basics - Lesson 5 - API mode: Send Digital Output to a Rmote XBee
Cybersecurity
XBee Basics - Lesson 5 - API mode: Send Digital Output to a Rmote XBee
Jack Rhysider Beginner 13y ago
XBee Basics - Lesson 4 - API mode: Reading analog data from remote XBee
Cybersecurity
XBee Basics - Lesson 4 - API mode: Reading analog data from remote XBee
Jack Rhysider Beginner 13y ago
The Nervous System - CrashCourse Biology #26
Cybersecurity
The Nervous System - CrashCourse Biology #26
CrashCourse Beginner 13y ago
Animal Behavior - CrashCourse Biology #25
Cybersecurity
Animal Behavior - CrashCourse Biology #25
CrashCourse Beginner 13y ago
The Android Challenge
Cybersecurity ⚡ AI Lesson
The Android Challenge
ColdFusion Intermediate 14y ago
Anti-Learning (So Bad, it's Good) - Computerphile
Cybersecurity ⚡ AI Lesson
Anti-Learning (So Bad, it's Good) - Computerphile
Computerphile Beginner 10y ago
Zig Zag Decryption - Computerphile
Cybersecurity ⚡ AI Lesson
Zig Zag Decryption - Computerphile
Computerphile Intermediate 10y ago
SANS DFIR NetWars
Cybersecurity
SANS DFIR NetWars
SANS Institute Beginner 10y ago
Inside a Data Centre - Computerphile
Cybersecurity ⚡ AI Lesson
Inside a Data Centre - Computerphile
Computerphile Intermediate 10y ago
Could We Ban Encryption? - Computerphile
Cybersecurity ⚡ AI Lesson
Could We Ban Encryption? - Computerphile
Computerphile Intermediate 10y ago
Wearables and Augmented Reality - Computerphile
Cybersecurity ⚡ AI Lesson
Wearables and Augmented Reality - Computerphile
Computerphile Intermediate 11y ago
SANS FOR610: Reverse Engineering Malware: Malware Analysis Tools & Techniques
Cybersecurity
SANS FOR610: Reverse Engineering Malware: Malware Analysis Tools & Techniques
SANS Institute Intermediate 11y ago
Do You Actually Need to Read Your Textbooks? - College Info Geek
Cybersecurity
Do You Actually Need to Read Your Textbooks? - College Info Geek
Thomas Frank Intermediate 11y ago
Studying Well Requires Intellectual Combat - College Info Geek
Cybersecurity
Studying Well Requires Intellectual Combat - College Info Geek
Thomas Frank Beginner 11y ago
Is College Worth It? Use the Tony Hawk Method to Find Out. - College Info Geek
Cybersecurity
Is College Worth It? Use the Tony Hawk Method to Find Out. - College Info Geek
Thomas Frank Intermediate 11y ago
Gaining Momentum: A 4-Step Process for Starting Every Day Productively - College Info Geek
Cybersecurity
Gaining Momentum: A 4-Step Process for Starting Every Day Productively - College Info Geek
Thomas Frank Beginner 11y ago
Cross Site Request Forgery - Computerphile
Cybersecurity ⚡ AI Lesson
Cross Site Request Forgery - Computerphile
Computerphile Intermediate 12y ago
Hacking Websites with SQL Injection - Computerphile
Cybersecurity ⚡ AI Lesson
Hacking Websites with SQL Injection - Computerphile
Computerphile Intermediate 12y ago
Virtual Machines Power the Cloud - Computerphile
Cybersecurity ⚡ AI Lesson
Virtual Machines Power the Cloud - Computerphile
Computerphile Intermediate 12y ago
What is fat? - George Zaidan
Cybersecurity
What is fat? - George Zaidan
TED-Ed Beginner 13y ago
Python 00 Installing IDLE on Linux
Cybersecurity
Python 00 Installing IDLE on Linux
John Hammond Intermediate 13y ago
XBee Basics - Lesson 3 - API Mode: Digital Input from Remote Sensor
Cybersecurity
XBee Basics - Lesson 3 - API Mode: Digital Input from Remote Sensor
Jack Rhysider Beginner 13y ago
Python [hashlib] 02 Algorithms
Cybersecurity
Python [hashlib] 02 Algorithms
John Hammond Intermediate 13y ago
Batch 90 Array Reverse
Cybersecurity
Batch 90 Array Reverse
John Hammond Intermediate 13y ago
Batch 89 Array Remove
Cybersecurity
Batch 89 Array Remove
John Hammond Intermediate 13y ago
Batch 88 Array Insert
Cybersecurity
Batch 88 Array Insert
John Hammond Intermediate 13y ago
Batch 87 Array Index
Cybersecurity
Batch 87 Array Index
John Hammond Intermediate 13y ago
Batch 86 Array Count
Cybersecurity
Batch 86 Array Count
John Hammond Intermediate 13y ago
Batch 85 Array Append
Cybersecurity
Batch 85 Array Append
John Hammond Intermediate 13y ago
Batch 14 Mathematical Expressions
Cybersecurity
Batch 14 Mathematical Expressions
John Hammond Intermediate 14y ago
Python 26 Object Oriented Programming
Cybersecurity
Python 26 Object Oriented Programming
John Hammond Intermediate 14y ago
Python 08 Programming Style and Comments
Cybersecurity
Python 08 Programming Style and Comments
John Hammond Intermediate 14y ago
HTML, Net Shares, GML!
Cybersecurity
HTML, Net Shares, GML!
John Hammond Intermediate 14y ago
HTML Tables in Python!
Cybersecurity
HTML Tables in Python!
John Hammond Intermediate 14y ago
📚 Coursera Courses Opens on Coursera · Free to audit
1 / 3 View all →
Managing Cybersecurity Incidents and Disasters
📚 Coursera Course ↗
Self-paced
Managing Cybersecurity Incidents and Disasters
Opens on Coursera ↗
Implementing MPLS VPNs
📚 Coursera Course ↗
Self-paced
Implementing MPLS VPNs
Opens on Coursera ↗
Implementing Basic BGP
📚 Coursera Course ↗
Self-paced
Implementing Basic BGP
Opens on Coursera ↗
Advanced Networking, Virtualization, and Security
📚 Coursera Course ↗
Self-paced
Advanced Networking, Virtualization, and Security
Opens on Coursera ↗
Incident Response and Defense with OpenVAS
📚 Coursera Course ↗
Self-paced
Incident Response and Defense with OpenVAS
Opens on Coursera ↗
AWS: Content Delivery and Networking
📚 Coursera Course ↗
Self-paced
AWS: Content Delivery and Networking
Opens on Coursera ↗