Tech Skills

Cybersecurity

Ethical hacking, penetration testing, network security, CTFs and defensive security

7,052
lessons
Skills in this topic
View full skill map →
Security Basics
beginner
Fix OWASP top 10 vulnerabilities
AI Security
intermediate
Identify and patch prompt injection vulnerabilities
Network Security
intermediate
Configure a firewall with proper inbound/outbound rules
Ethical Hacking & Pen Testing
intermediate
Conduct a full pen test with Kali Linux
Cloud Security
intermediate
Implement IAM least-privilege policies on AWS/GCP
Incident Response
intermediate
Build an incident response playbook
Security Compliance
intermediate
Map controls for SOC 2 Type II compliance
Defensive AI
advanced
Build an AI-powered log anomaly detector
📚 Coursera Courses Opens on Coursera · Free to audit
1 / 3 View all →
Cybersecurity and the Internet of Things
📚 Coursera Course ↗
Self-paced
Cybersecurity and the Internet of Things
Opens on Coursera ↗
CISSP Domain 1: Security and Risk Management
📚 Coursera Course ↗
Self-paced
CISSP Domain 1: Security and Risk Management
Opens on Coursera ↗
Sound the Alarm: Detection and Response
📚 Coursera Course ↗
Self-paced
Sound the Alarm: Detection and Response
Opens on Coursera ↗
Security-Driven Software Development
📚 Coursera Course ↗
Self-paced
Security-Driven Software Development
Opens on Coursera ↗
Vulnerability Scanning with Nmap: Network Scanning
📚 Coursera Course ↗
Self-paced
Vulnerability Scanning with Nmap: Network Scanning
Opens on Coursera ↗
Keamanan IT: Pertahanan terhadap Kejahatan Digital
📚 Coursera Course ↗
Self-paced
Keamanan IT: Pertahanan terhadap Kejahatan Digital
Opens on Coursera ↗