Tech Skills

Cybersecurity

Ethical hacking, penetration testing, network security, CTFs and defensive security

6,779
lessons
Skills in this topic
View full skill map โ†’
Security Basics
beginner
Fix OWASP top 10 vulnerabilities
AI Security
intermediate
Identify and patch prompt injection vulnerabilities
Network Security
intermediate
Configure a firewall with proper inbound/outbound rules
Ethical Hacking & Pen Testing
intermediate
Conduct a full pen test with Kali Linux
Cloud Security
intermediate
Implement IAM least-privilege policies on AWS/GCP
Incident Response
intermediate
Build an incident response playbook
Security Compliance
intermediate
Map controls for SOC 2 Type II compliance
Defensive AI
advanced
Build an AI-powered log anomaly detector
Top Skills Youโ€™ll Build with the Microsoft Cybersecurity Certificate on Coursera
Cybersecurity
Top Skills Youโ€™ll Build with the Microsoft Cybersecurity Certificate on Coursera
Coursera Intermediate 1y ago
Ethical Hacking for Beginners | 5 Phases of Ethical Hacking | Ethical Hacking Tutorial | Edureka
Cybersecurity
Ethical Hacking for Beginners | 5 Phases of Ethical Hacking | Ethical Hacking Tutorial | Edureka
edureka! Beginner 1y ago
How Hackers Break Into Servers Through IoT Hardware
Cybersecurity โšก AI Lesson
How Hackers Break Into Servers Through IoT Hardware
The Cyber Mentor Beginner 1y ago
The Myth: You Need to Be an Expert Hacker to Work in Cybersecurity
Cybersecurity โšก AI Lesson
The Myth: You Need to Be an Expert Hacker to Work in Cybersecurity
SANS Institute Advanced 1y ago
The Myth: Cybersecurity Is Only For People in IT
Cybersecurity โšก AI Lesson
The Myth: Cybersecurity Is Only For People in IT
SANS Institute Advanced 1y ago
AI Cybersecurity for Product Managers - AI PM Community Session #79
Cybersecurity โšก AI Lesson
AI Cybersecurity for Product Managers - AI PM Community Session #79
PM Exercises Intermediate 1y ago
IT Skills You'll Learn in the IBM IT Support Professional Certificate Program
Cybersecurity
IT Skills You'll Learn in the IBM IT Support Professional Certificate Program
Coursera Beginner 1y ago
Amazon Cybersecurity HACKER Q&A ๐Ÿคซ
Cybersecurity โšก AI Lesson
Amazon Cybersecurity HACKER Q&A ๐Ÿคซ
Sajjaad Khader Intermediate 1y ago
HackTheBox - Administrator
Cybersecurity
HackTheBox - Administrator
IppSec Beginner 1y ago
RevOps: "OR... I can set up Zapier to scan the contents..."
Cybersecurity
RevOps: "OR... I can set up Zapier to scan the contents..."
Zapier Intermediate 1y ago
What is the MITRE CVE Program - and Why It Matters So Much
Cybersecurity โšก AI Lesson
What is the MITRE CVE Program - and Why It Matters So Much
The Cyber Mentor Beginner 1y ago
Hidden Dangers of Phone Cameras! #PhoneCameraSpy #CameraHack #CyberSecurity
Cybersecurity
Hidden Dangers of Phone Cameras! #PhoneCameraSpy #CameraHack #CyberSecurity
Arivi by HCL GUVI Beginner 1y ago
Jim Rohnโ€™s 12 Pillars of Unshakable Success | The Ultimate Personal Code
Cybersecurity
Jim Rohnโ€™s 12 Pillars of Unshakable Success | The Ultimate Personal Code
Evan Carmichael Intermediate 1y ago
The brain of a pea? #shorts #hub #switch #network #wireshark #ccna
Cybersecurity
The brain of a pea? #shorts #hub #switch #network #wireshark #ccna
David Bombal Intermediate 1y ago
4chan penetrated by a gang of soyjaksโ€ฆ
Cybersecurity
4chan penetrated by a gang of soyjaksโ€ฆ
Fireship Beginner 1y ago
Real-Time cyber threats
Cybersecurity โšก AI Lesson
Real-Time cyber threats
Weights & Biases Intermediate 1y ago
cybersecurity just got f***ed
Cybersecurity
cybersecurity just got f***ed
John Hammond Intermediate 1y ago
Do you agree? Using Open WiFi networks in 2025? #shorts #wifi #iphone #android #cybersecurity
Cybersecurity
Do you agree? Using Open WiFi networks in 2025? #shorts #wifi #iphone #android #cybersecurity
David Bombal Intermediate 1y ago
Open Source Vs  Closed Source Model | Amr Awadallah | Data Science Dojo #opensource #ai
Cybersecurity
Open Source Vs Closed Source Model | Amr Awadallah | Data Science Dojo #opensource #ai
Data Science Dojo Beginner 1y ago
Finding Web App Vulnerabilities with AI
Cybersecurity โšก AI Lesson
Finding Web App Vulnerabilities with AI
John Hammond Intermediate 1y ago
RevOps: "The CRM AI did what!? I know what to do. Zapier."
Cybersecurity โšก AI Lesson
RevOps: "The CRM AI did what!? I know what to do. Zapier."
Zapier Intermediate 1y ago
HackTheBox - LinkVortex
Cybersecurity
HackTheBox - LinkVortex
IppSec Beginner 1y ago
Cybersecurity Skills You NEED To Learn (2026) | The Most In-Demand Cybersecurity Skills | Edureka
Cybersecurity
Cybersecurity Skills You NEED To Learn (2026) | The Most In-Demand Cybersecurity Skills | Edureka
edureka! Beginner 1y ago
Hide Your Secrets Like a Pro! #tricks #techintamil #tech
Cybersecurity
Hide Your Secrets Like a Pro! #tricks #techintamil #tech
Arivi by HCL GUVI Beginner 1y ago
How FIN6 Exfiltrates Files Over FTP
Cybersecurity โšก AI Lesson
How FIN6 Exfiltrates Files Over FTP
HackerSploit Intermediate 1y ago
From Zero to Zero Day (and beyond) - Life of a Hacker: Jonathan Jacobi
Cybersecurity
From Zero to Zero Day (and beyond) - Life of a Hacker: Jonathan Jacobi
LiveOverflow Beginner 1y ago
We bought stolen election access before the hackers did
Cybersecurity โšก AI Lesson
We bought stolen election access before the hackers did
Weights & Biases Intermediate 1y ago
The Myth: I'm Not a Target, So I Don't Need to Be Cybersecurity Aware
Cybersecurity โšก AI Lesson
The Myth: I'm Not a Target, So I Don't Need to Be Cybersecurity Aware
SANS Institute Advanced 1y ago
RIP CVE Program?! How the MITRE Funding Crisis Threatens Cybersecurity
Cybersecurity โšก AI Lesson
RIP CVE Program?! How the MITRE Funding Crisis Threatens Cybersecurity
The Cyber Mentor Beginner 1y ago
LIVE: Moose on the loose | CVE | Cybersecurity | AMA
Cybersecurity โšก AI Lesson
LIVE: Moose on the loose | CVE | Cybersecurity | AMA
The Cyber Mentor Beginner 1y ago
Hardware Reverse Engineering with a Logic Analyzer
Cybersecurity โšก AI Lesson
Hardware Reverse Engineering with a Logic Analyzer
The Cyber Mentor Beginner 1y ago
Panel | Mentors and Mentees: Navigating Cybersecurity's Path Together
Cybersecurity โšก AI Lesson
Panel | Mentors and Mentees: Navigating Cybersecurity's Path Together
SANS Institute Intermediate 1y ago
A Day in the Life of a Network Security Engineer
Cybersecurity โšก AI Lesson
A Day in the Life of a Network Security Engineer
SANS Institute Advanced 1y ago
Lightning Talk | Ever sucked into Wikipedia for three hours? CTI might be for you!
Cybersecurity โšก AI Lesson
Lightning Talk | Ever sucked into Wikipedia for three hours? CTI might be for you!
SANS Institute Beginner 1y ago
A Day in the Life of a Threat Emulation Specialist: Demystifying Offensive Cybersecurity
Cybersecurity โšก AI Lesson
A Day in the Life of a Threat Emulation Specialist: Demystifying Offensive Cybersecurity
SANS Institute Beginner 1y ago
Lightning Talk | Negating the Noise: Prioritize Your Cybersecurity
Cybersecurity โšก AI Lesson
Lightning Talk | Negating the Noise: Prioritize Your Cybersecurity
SANS Institute Beginner 1y ago
Cyber Adjacent: 5 Lessons Learned from a Day in the Life of an IT Project Manager
Cybersecurity โšก AI Lesson
Cyber Adjacent: 5 Lessons Learned from a Day in the Life of an IT Project Manager
SANS Institute Beginner 1y ago
From TV news to cybersecurity: the 5 steps I took to completely change careers
Cybersecurity โšก AI Lesson
From TV news to cybersecurity: the 5 steps I took to completely change careers
SANS Institute Beginner 1y ago
Going Technical, Against All Odds: From Digital Communications to Reverse Engineering Malware
Cybersecurity โšก AI Lesson
Going Technical, Against All Odds: From Digital Communications to Reverse Engineering Malware
SANS Institute Beginner 1y ago
Screenshot.jpg (When They Got Hacked)
Cybersecurity โšก AI Lesson
Screenshot.jpg (When They Got Hacked)
John Hammond Beginner 1y ago
How AI Dating Scams Are Getting Dangerously Smart in 2025
Cybersecurity โšก AI Lesson
How AI Dating Scams Are Getting Dangerously Smart in 2025
The Cyber Mentor Beginner 1y ago
From Special Forces to Cybersecurity: Rich Greene on Communication and Persuasion in Infosec
Cybersecurity โšก AI Lesson
From Special Forces to Cybersecurity: Rich Greene on Communication and Persuasion in Infosec
SANS Institute Intermediate 1y ago
LIVE: Memory Forensics | Volatility | Cybersecurity | Blue Team | AMA
Cybersecurity โšก AI Lesson
LIVE: Memory Forensics | Volatility | Cybersecurity | Blue Team | AMA
The Cyber Mentor Beginner 1y ago
Watch Out for this AI Prompt Injection Hack!
Cybersecurity โšก AI Lesson
Watch Out for this AI Prompt Injection Hack!
The Cyber Mentor Beginner 1y ago
I Backdoored Cursor AI
Cybersecurity
I Backdoored Cursor AI
John Hammond Intermediate 1y ago
RevOps: "Don't worry. Zapier will wake it up."
Cybersecurity
RevOps: "Don't worry. Zapier will wake it up."
Zapier Intermediate 1y ago
Burpsuite proxy browser and App Interception
Cybersecurity
Burpsuite proxy browser and App Interception
David Bombal Intermediate 1y ago
Learn Cybersecurity Defense!
Cybersecurity
Learn Cybersecurity Defense!
John Hammond Beginner 1y ago
๐Ÿ“š Coursera Courses Opens on Coursera ยท Free to audit
1 / 3 View all โ†’
Introduction to the Threat Intelligence Lifecycle
๐Ÿ“š Coursera Course โ†—
Self-paced
Introduction to the Threat Intelligence Lifecycle
Opens on Coursera โ†—
Cybersecurity: Overlooked Threats to Your Strategy
๐Ÿ“š Coursera Course โ†—
Self-paced
Cybersecurity: Overlooked Threats to Your Strategy
Opens on Coursera โ†—
Introduction ร  Cloud Next Generation Firewall
๐Ÿ“š Coursera Course โ†—
Self-paced
Introduction ร  Cloud Next Generation Firewall
Opens on Coursera โ†—
Managing Information System Security Architecture
๐Ÿ“š Coursera Course โ†—
Self-paced
Managing Information System Security Architecture
Opens on Coursera โ†—
TCP/IP and Internet
๐Ÿ“š Coursera Course โ†—
Self-paced
TCP/IP and Internet
Opens on Coursera โ†—
Wireshark for Security:  Detect Network Anomalies
๐Ÿ“š Coursera Course โ†—
Self-paced
Wireshark for Security: Detect Network Anomalies
Opens on Coursera โ†—