Tech Skills

Cybersecurity

Ethical hacking, penetration testing, network security, CTFs and defensive security

6,790
lessons
Skills in this topic
View full skill map →
Security Basics
beginner
Fix OWASP top 10 vulnerabilities
AI Security
intermediate
Identify and patch prompt injection vulnerabilities
Network Security
intermediate
Configure a firewall with proper inbound/outbound rules
Ethical Hacking & Pen Testing
intermediate
Conduct a full pen test with Kali Linux
Cloud Security
intermediate
Implement IAM least-privilege policies on AWS/GCP
Incident Response
intermediate
Build an incident response playbook
Security Compliance
intermediate
Map controls for SOC 2 Type II compliance
Defensive AI
advanced
Build an AI-powered log anomaly detector
【Members ASMR】 Catching up with a relaxing trigger assortment~ 🌿 #holoCouncil
Cybersecurity
【Members ASMR】 Catching up with a relaxing trigger assortment~ 🌿 #holoCouncil
Ceres Fauna Ch. hololive-EN Beginner 1y ago
【Kalimba Practice】 Playing my kalimba for you! #holoCouncil
Cybersecurity
【Kalimba Practice】 Playing my kalimba for you! #holoCouncil
Ceres Fauna Ch. hololive-EN Beginner 1y ago
How to Achieve Your Cybersecurity Goals in 2025
Cybersecurity ⚡ AI Lesson
How to Achieve Your Cybersecurity Goals in 2025
The Cyber Mentor Beginner 1y ago
FREE Ethical Hacking course (70 hours & includes Kali Linux labs)
Cybersecurity ⚡ AI Lesson
FREE Ethical Hacking course (70 hours & includes Kali Linux labs)
David Bombal Intermediate 1y ago
Sneaky Botnets!
Cybersecurity
Sneaky Botnets!
Jack Rhysider Intermediate 1y ago
Top 10 Highest Paying Jobs For 2025 | Best Jobs For Future | Top High Paying Jobs 2025 | Edureka
Cybersecurity
Top 10 Highest Paying Jobs For 2025 | Best Jobs For Future | Top High Paying Jobs 2025 | Edureka
edureka! Advanced 1y ago
Spying on Scammers
Cybersecurity
Spying on Scammers
John Hammond Beginner 1y ago
What is CSRF? | Cross-Site Request Forgery Explained | Edureka
Cybersecurity
What is CSRF? | Cross-Site Request Forgery Explained | Edureka
edureka! Beginner 1y ago
The Only Cyber Security Roadmap you need for 2025 |
Cybersecurity
The Only Cyber Security Roadmap you need for 2025 |
GeeksforGeeks Beginner 1y ago
This Hidden Army of Bots is Stealing Your Data
Cybersecurity
This Hidden Army of Bots is Stealing Your Data
Jack Rhysider Intermediate 1y ago
A Hacker's Guide to Cookie Jar Overflow Techniques
Cybersecurity ⚡ AI Lesson
A Hacker's Guide to Cookie Jar Overflow Techniques
The Cyber Mentor Beginner 1y ago
🎄🎅HOLIDAY HACK CHALLENGE🎅🎄
Cybersecurity
🎄🎅HOLIDAY HACK CHALLENGE🎅🎄
John Hammond Beginner 1y ago
Cybersecurity, in SPACE!!
Cybersecurity ⚡ AI Lesson
Cybersecurity, in SPACE!!
NetworkChuck Intermediate 1y ago
Satellite hacking (with real world example)
Cybersecurity
Satellite hacking (with real world example)
David Bombal Beginner 1y ago
HackTheBox - Sea
Cybersecurity
HackTheBox - Sea
IppSec Beginner 1y ago
Access ANY Network (remotely)
Cybersecurity ⚡ AI Lesson
Access ANY Network (remotely)
NetworkChuck Beginner 1y ago
Setup Keyence IV3 Camera: Step-by-Step Guide
Cybersecurity ⚡ AI Lesson
Setup Keyence IV3 Camera: Step-by-Step Guide
Roboflow Beginner 1y ago
SANS Threat Analysis Rundown with Katie Nickels | December 2024
Cybersecurity ⚡ AI Lesson
SANS Threat Analysis Rundown with Katie Nickels | December 2024
SANS Institute Beginner 1y ago
Introduction To Adversary Emulation
Cybersecurity ⚡ AI Lesson
Introduction To Adversary Emulation
HackerSploit Beginner 1y ago
CyberThreat 2024 Recap: Highlights, CTF Competition, and Key Insights
Cybersecurity ⚡ AI Lesson
CyberThreat 2024 Recap: Highlights, CTF Competition, and Key Insights
SANS Institute Beginner 1y ago
【Watchalong】 Komi Can't Communicate #holoCouncil
Cybersecurity ⚡ AI Lesson
【Watchalong】 Komi Can't Communicate #holoCouncil
Ceres Fauna Ch. hololive-EN Beginner 1y ago
【Members ASMR】 Relaxing and chatting with ASMR~ 🌿 #holoCouncil
Cybersecurity ⚡ AI Lesson
【Members ASMR】 Relaxing and chatting with ASMR~ 🌿 #holoCouncil
Ceres Fauna Ch. hololive-EN Beginner 1y ago
【Watchalong】 Komi Can't Communicate #holoCouncil
Cybersecurity ⚡ AI Lesson
【Watchalong】 Komi Can't Communicate #holoCouncil
Ceres Fauna Ch. hololive-EN Beginner 1y ago
【Members Fall Guys】 You won't grab, right? (◕‿◕) #holoCouncil
Cybersecurity
【Members Fall Guys】 You won't grab, right? (◕‿◕) #holoCouncil
Ceres Fauna Ch. hololive-EN Beginner 1y ago
【Members ASMR】 Chatty and Cozy ASMR 💚 #holoCouncil
Cybersecurity
【Members ASMR】 Chatty and Cozy ASMR 💚 #holoCouncil
Ceres Fauna Ch. hololive-EN Beginner 1y ago
【Members Watchalong】 Kiki's Delivery Service! #holoCouncil
Cybersecurity
【Members Watchalong】 Kiki's Delivery Service! #holoCouncil
Ceres Fauna Ch. hololive-EN Beginner 1y ago
【Members' Stream】 Halloween Doodling & Chatting! 🎃 #holoCouncil
Cybersecurity ⚡ AI Lesson
【Members' Stream】 Halloween Doodling & Chatting! 🎃 #holoCouncil
Ceres Fauna Ch. hololive-EN Beginner 1y ago
【Members Only!】Drawing a Council Sleepover 💚 #holoCouncil
Cybersecurity
【Members Only!】Drawing a Council Sleepover 💚 #holoCouncil
Ceres Fauna Ch. hololive-EN Beginner 1y ago
What are Money Mules?
Cybersecurity ⚡ AI Lesson
What are Money Mules?
Jack Rhysider Intermediate 1y ago
How the French Hacked Criminal Networks
Cybersecurity
How the French Hacked Criminal Networks
Jack Rhysider Intermediate 1y ago
Hackers vs. The World
Cybersecurity
Hackers vs. The World
Jack Rhysider Intermediate 1y ago
Fake University HACKED Their Students
Cybersecurity
Fake University HACKED Their Students
Jack Rhysider Intermediate 1y ago
How Hackers Are Using Game Cheats to Steal Your Info
Cybersecurity
How Hackers Are Using Game Cheats to Steal Your Info
Jack Rhysider Intermediate 1y ago
3 Powerful WAF Bypass Techniques That Actually Work
Cybersecurity ⚡ AI Lesson
3 Powerful WAF Bypass Techniques That Actually Work
The Cyber Mentor Beginner 1y ago
TCM Holiday Stream 2024 | Quiz w/Prizes | AMA
Cybersecurity ⚡ AI Lesson
TCM Holiday Stream 2024 | Quiz w/Prizes | AMA
The Cyber Mentor Beginner 1y ago
Unpacking Code for CTF Challenges: Create Your Dirty Image
Cybersecurity ⚡ AI Lesson
Unpacking Code for CTF Challenges: Create Your Dirty Image
John Hammond Intermediate 1y ago
Preventing Session Hijacking: Essential Cybersecurity Strategies
Cybersecurity
Preventing Session Hijacking: Essential Cybersecurity Strategies
John Hammond Intermediate 1y ago
Unlocking Secrets: Hacking With InfoStealer Malware
Cybersecurity
Unlocking Secrets: Hacking With InfoStealer Malware
John Hammond Intermediate 1y ago
Bruteforce WiFi WPA2 with GPU
Cybersecurity
Bruteforce WiFi WPA2 with GPU
David Bombal Beginner 1y ago
The Stock Market Scam Fooling People With Fake Predictions
Cybersecurity
The Stock Market Scam Fooling People With Fake Predictions
Jack Rhysider Intermediate 1y ago
Hacking a Reddit Account: A Step-by-Step Demonstration
Cybersecurity
Hacking a Reddit Account: A Step-by-Step Demonstration
John Hammond Intermediate 1y ago
How Skrillex's Skype Password Got Leaked
Cybersecurity
How Skrillex's Skype Password Got Leaked
Jack Rhysider Intermediate 1y ago
What is Broken Access Control? A Quick Guide for Beginners
Cybersecurity ⚡ AI Lesson
What is Broken Access Control? A Quick Guide for Beginners
The Cyber Mentor Beginner 1y ago
Nmap Tutorial for Beginners | Learn Network Scanning & Hacking Tools | Edureka
Cybersecurity
Nmap Tutorial for Beginners | Learn Network Scanning & Hacking Tools | Edureka
edureka! Beginner 1y ago
Leading Global Cybersecurity with Christine Bejerasco
Cybersecurity ⚡ AI Lesson
Leading Global Cybersecurity with Christine Bejerasco
SANS Institute Beginner 1y ago
What's your score? #shorts #cybersecurity #email #phishing #iphone #android #privacy
Cybersecurity
What's your score? #shorts #cybersecurity #email #phishing #iphone #android #privacy
David Bombal Beginner 1y ago
I Stole My Own Reddit Account. Here's How.
Cybersecurity ⚡ AI Lesson
I Stole My Own Reddit Account. Here's How.
John Hammond Beginner 1y ago
Did You Fall for This Fake Bank Email Scam?
Cybersecurity
Did You Fall for This Fake Bank Email Scam?
Jack Rhysider Intermediate 1y ago
📚 Coursera Courses Opens on Coursera · Free to audit
1 / 3 View all →
Introduction to Automotive Cybersecurity & Vehicle Networks
📚 Coursera Course ↗
Self-paced
Introduction to Automotive Cybersecurity & Vehicle Networks
Opens on Coursera ↗
Network Architecture
📚 Coursera Course ↗
Self-paced
Network Architecture
Opens on Coursera ↗
Empower Patients: Autonomy Through Simulation and Role-Play
📚 Coursera Course ↗
Self-paced
Empower Patients: Autonomy Through Simulation and Role-Play
Opens on Coursera ↗
Ethical Hacking: Meterpreter, DNS & ICMP Attacks
📚 Coursera Course ↗
Self-paced
Ethical Hacking: Meterpreter, DNS & ICMP Attacks
Opens on Coursera ↗
Learn Ethereum, Smart Contracts & Trading
📚 Coursera Course ↗
Self-paced
Learn Ethereum, Smart Contracts & Trading
Opens on Coursera ↗
AWS: Data Protection and Security Governance
📚 Coursera Course ↗
Self-paced
AWS: Data Protection and Security Governance
Opens on Coursera ↗