Tech Skills

Cybersecurity

Ethical hacking, penetration testing, network security, CTFs and defensive security

6,732
lessons
Skills in this topic
View full skill map โ†’
Security Basics
beginner
Fix OWASP top 10 vulnerabilities
AI Security
intermediate
Identify and patch prompt injection vulnerabilities
Network Security
intermediate
Configure a firewall with proper inbound/outbound rules
Ethical Hacking & Pen Testing
intermediate
Conduct a full pen test with Kali Linux
Cloud Security
intermediate
Implement IAM least-privilege policies on AWS/GCP
Incident Response
intermediate
Build an incident response playbook
Security Compliance
intermediate
Map controls for SOC 2 Type II compliance
Defensive AI
advanced
Build an AI-powered log anomaly detector
Getting Started with Windows Prefetch
Cybersecurity
Getting Started with Windows Prefetch
The Cyber Mentor Beginner 3w ago
How your ISP tracks you (even with encrypted DNS)
Cybersecurity
How your ISP tracks you (even with encrypted DNS)
David Bombal Beginner 3w ago
๐Ÿ”ŠAre you seeing ads for whatever you talk? Check this setting๐Ÿ“ฑ
Cybersecurity
๐Ÿ”ŠAre you seeing ads for whatever you talk? Check this setting๐Ÿ“ฑ
Arivi by HCL GUVI Beginner 3w ago
SC-900 Exam Tips and Study Strategy
Cybersecurity
SC-900 Exam Tips and Study Strategy
Coursera Beginner 3w ago
JHT Livestream: mitmproxy & OpenWRT to read HTTPS traffic!
Cybersecurity
JHT Livestream: mitmproxy & OpenWRT to read HTTPS traffic!
John Hammond Intermediate 3w ago
A rich hacker just penetrated 31 WordPress plugins...
Cybersecurity
A rich hacker just penetrated 31 WordPress plugins...
Fireship Intermediate 4w ago
How Generative AI Detects Cyber Attacks
Cybersecurity
How Generative AI Detects Cyber Attacks
Coursera Beginner 4w ago
Can you steal $10,000 from a locked iPhone?
Cybersecurity
Can you steal $10,000 from a locked iPhone?
Veritasium Intermediate 4w ago
Linus Torvalds Struggles With Machine Maintenance #shorts #linux #opensource
Cybersecurity
Linus Torvalds Struggles With Machine Maintenance #shorts #linux #opensource
WebKnower Intermediate 4w ago
AI Found More Bugs in 2 Weeks Than Most Careers #shorts
Cybersecurity
AI Found More Bugs in 2 Weeks Than Most Careers #shorts
Authority Hacker Podcast Advanced 4w ago
How to add a Cookie Consent Banner in WordPress the RIGHT Way
Cybersecurity
How to add a Cookie Consent Banner in WordPress the RIGHT Way
WPBeginner - WordPress Tutorials Intermediate 4w ago
Manual Labor to Cybersecurity Engineer
Cybersecurity
Manual Labor to Cybersecurity Engineer
SANS Institute Beginner 4w ago
Failed a Cybersecurity Exam? Hereโ€™s What Happened Next
Cybersecurity
Failed a Cybersecurity Exam? Hereโ€™s What Happened Next
SANS Institute Beginner 4w ago
Cybersecurity Books to Read: DFIR Investigative Mindset
Cybersecurity
Cybersecurity Books to Read: DFIR Investigative Mindset
The Cyber Mentor Intermediate 4w ago
Linus Torvalds Trusts Fuzz Testing More Than Code Reviews #shorts #linux #programming
Cybersecurity
Linus Torvalds Trusts Fuzz Testing More Than Code Reviews #shorts #linux #programming
WebKnower Beginner 4w ago
Cybersecurity Projects You Need To Get Hired In 2026 | Cybersecurity Project Portfolio | Simplilearn
Cybersecurity
Cybersecurity Projects You Need To Get Hired In 2026 | Cybersecurity Project Portfolio | Simplilearn
Simplilearn Beginner 1mo ago
This setting can save you from exposing everything๐Ÿ“ฑ
Cybersecurity
This setting can save you from exposing everything๐Ÿ“ฑ
Arivi by HCL GUVI Beginner 1mo ago
Hackers are using AI to win. 3 ways to STOP them in 2026.
Cybersecurity
Hackers are using AI to win. 3 ways to STOP them in 2026.
David Bombal Intermediate 1mo ago
Cybersecurity Full Course 2026 | Cyber Security Tutorial For Beginners | #Shorts | #Simplilearn
Cybersecurity
Cybersecurity Full Course 2026 | Cyber Security Tutorial For Beginners | #Shorts | #Simplilearn
Simplilearn Beginner 1mo ago
The 1.3 Day Exploit: How AI is Accelerating Cyber Threats | Ali Ghodsi at RSAC 2026
Cybersecurity
The 1.3 Day Exploit: How AI is Accelerating Cyber Threats | Ali Ghodsi at RSAC 2026
Databricks Intermediate 1mo ago
HUGE AI-powered Microsoft Account phishing campaign
Cybersecurity
HUGE AI-powered Microsoft Account phishing campaign
John Hammond Beginner 1mo ago
Her dad's streaming box sent tons of data to China. Then the FBI showed up. ๐Ÿ“บ Ep. 172: SuperBox
Cybersecurity
Her dad's streaming box sent tons of data to China. Then the FBI showed up. ๐Ÿ“บ Ep. 172: SuperBox
Jack Rhysider Advanced 1mo ago
Top Skills Youโ€™ll Build with the IBM and ISC2 Cybersecurity Certificate on Coursera
Cybersecurity
Top Skills Youโ€™ll Build with the IBM and ISC2 Cybersecurity Certificate on Coursera
Coursera Beginner 4w ago
What Is VAST in Cybersecurity? Explained
Cybersecurity
What Is VAST in Cybersecurity? Explained
Coursera Beginner 4w ago
Breaking Into Cybersecurity after 30
Cybersecurity
Breaking Into Cybersecurity after 30
SANS Institute Beginner 4w ago
From Physical Therapy to Cloud Security Specialist
Cybersecurity
From Physical Therapy to Cloud Security Specialist
SANS Institute Beginner 4w ago
From No Experience to Ethical Hacker
Cybersecurity
From No Experience to Ethical Hacker
SANS Institute Beginner 4w ago
Threat Modeling Explained for Beginners
Cybersecurity
Threat Modeling Explained for Beginners
Coursera Beginner 1mo ago
When Linus Torvalds Finds A Bug #shorts #linux #programming #bug #security
Cybersecurity
When Linus Torvalds Finds A Bug #shorts #linux #programming #bug #security
WebKnower Intermediate 1mo ago
Availability vs Continuity in Azure Explained
Cybersecurity
Availability vs Continuity in Azure Explained
Coursera Beginner 1mo ago
SANS Critical Advisory: BugBusters - AI Vulnerability Discovery Hype versus Reality
Cybersecurity
SANS Critical Advisory: BugBusters - AI Vulnerability Discovery Hype versus Reality
SANS Institute Beginner 1mo ago
Ethical Hacking Full Course 2026 [FREE] | Ethical Hacking Tutorial For Beginners | Simplilearn
Cybersecurity
Ethical Hacking Full Course 2026 [FREE] | Ethical Hacking Tutorial For Beginners | Simplilearn
Simplilearn Beginner 1mo ago
Ethical Hacking Full Course 2026 [FREE] | Ethical Hacking Tutorial For Beginners | Simplilearn
Cybersecurity
Ethical Hacking Full Course 2026 [FREE] | Ethical Hacking Tutorial For Beginners | Simplilearn
Simplilearn Beginner 1mo ago
Top Cybersecurity Interview Questions And Answers | Cybersecurity Interview | #Shorts | #Simplilearn
Cybersecurity
Top Cybersecurity Interview Questions And Answers | Cybersecurity Interview | #Shorts | #Simplilearn
Simplilearn Advanced 1mo ago
30 Most Asked Linux Interview Questions And Answers 2026 | Linux Interview Questions | Simplilearn
Cybersecurity
30 Most Asked Linux Interview Questions And Answers 2026 | Linux Interview Questions | Simplilearn
Simplilearn Beginner 1mo ago
Hacking Windows Active Directory in 10 minutes
Cybersecurity
Hacking Windows Active Directory in 10 minutes
David Bombal Beginner 1mo ago
How the MITRE ATT&CK Framework Works
Cybersecurity
How the MITRE ATT&CK Framework Works
Coursera Beginner 1mo ago
What Is Penetration Testing? Explained Simply
Cybersecurity
What Is Penetration Testing? Explained Simply
Coursera Beginner 1mo ago
Bye Bye Bellini! | Andrew Bellini's Farewell Stream | Cybersecurity | AMA
Cybersecurity
Bye Bye Bellini! | Andrew Bellini's Farewell Stream | Cybersecurity | AMA
The Cyber Mentor Intermediate 1mo ago
Why Cybersecurity Training Matters More Than Ever
Cybersecurity
Why Cybersecurity Training Matters More Than Ever
SANS Institute Beginner 1mo ago
Warning: Vibe Hacking is here
Cybersecurity
Warning: Vibe Hacking is here
David Bombal Intermediate 1mo ago
How Teenage Hackers Hijack the Internet (with Joe Tidy!)
Cybersecurity
How Teenage Hackers Hijack the Internet (with Joe Tidy!)
John Hammond Beginner 1mo ago
What Does a Red Team Do in Cybersecurity?
Cybersecurity
What Does a Red Team Do in Cybersecurity?
Coursera Beginner 1mo ago
Hackers make FAKE notifications
Cybersecurity
Hackers make FAKE notifications
John Hammond Advanced 1mo ago
What Does a Blue Team Do in Cybersecurity?
Cybersecurity
What Does a Blue Team Do in Cybersecurity?
Coursera Beginner 1mo ago
How To Install Kali Linux In 2026 ? | Install Kali Linux  In Windows 11  | Simplilearn
Cybersecurity
How To Install Kali Linux In 2026 ? | Install Kali Linux In Windows 11 | Simplilearn
Simplilearn Beginner 1mo ago
Cybersecurity Tools Youโ€™ll Master with Google
Cybersecurity
Cybersecurity Tools Youโ€™ll Master with Google
Coursera Intermediate 1mo ago
Top 5 Cybersecurity Certifications 2026 | Best Cybersecurity Certifications | #Shorts #simplilearn
Cybersecurity
Top 5 Cybersecurity Certifications 2026 | Best Cybersecurity Certifications | #Shorts #simplilearn
Simplilearn Beginner 1mo ago
๐Ÿ“š Coursera Courses Opens on Coursera ยท Free to audit
1 / 3 View all โ†’
Wireshark for Security:  Detect Network Anomalies
๐Ÿ“š Coursera Course โ†—
Self-paced
Wireshark for Security: Detect Network Anomalies
Opens on Coursera โ†—
Data Visualization & Advanced App Logic
๐Ÿ“š Coursera Course โ†—
Self-paced
Data Visualization & Advanced App Logic
Opens on Coursera โ†—
Security Architecture for Cloud and Mobile
๐Ÿ“š Coursera Course โ†—
Self-paced
Security Architecture for Cloud and Mobile
Opens on Coursera โ†—
CISSP Domain 7: Security Operations
๐Ÿ“š Coursera Course โ†—
Self-paced
CISSP Domain 7: Security Operations
Opens on Coursera โ†—
Network Defense Essentials: Hands-On Edition
๐Ÿ“š Coursera Course โ†—
Self-paced
Network Defense Essentials: Hands-On Edition
Opens on Coursera โ†—
Effective Management: Essential Manager Skills
๐Ÿ“š Coursera Course โ†—
Self-paced
Effective Management: Essential Manager Skills
Opens on Coursera โ†—