Tech Skills

Cybersecurity

Ethical hacking, penetration testing, network security, CTFs and defensive security

6,789
lessons
Skills in this topic
View full skill map →
Security Basics
beginner
Fix OWASP top 10 vulnerabilities
AI Security
intermediate
Identify and patch prompt injection vulnerabilities
Network Security
intermediate
Configure a firewall with proper inbound/outbound rules
Ethical Hacking & Pen Testing
intermediate
Conduct a full pen test with Kali Linux
Cloud Security
intermediate
Implement IAM least-privilege policies on AWS/GCP
Incident Response
intermediate
Build an incident response playbook
Security Compliance
intermediate
Map controls for SOC 2 Type II compliance
Defensive AI
advanced
Build an AI-powered log anomaly detector
Cybersecurity Q&A with Heath Adams
Cybersecurity ⚡ AI Lesson
Cybersecurity Q&A with Heath Adams
The Cyber Mentor Beginner 1y ago
Learn Cryptography!
Cybersecurity
Learn Cryptography!
John Hammond Beginner 1y ago
The Malware That Could Be Draining Your Bank
Cybersecurity ⚡ AI Lesson
The Malware That Could Be Draining Your Bank
Jack Rhysider Intermediate 1y ago
This Trojan is Stealing Identities Across the Web
Cybersecurity
This Trojan is Stealing Identities Across the Web
Jack Rhysider Intermediate 1y ago
Enhancing Security of Bluetooth Secure Connections via Deferrable Authentication
Cybersecurity ⚡ AI Lesson
Enhancing Security of Bluetooth Secure Connections via Deferrable Authentication
Microsoft Research Beginner 1y ago
Mastering Persistence: Using an Apache2 Rootkit for Stealth and Defense Evasion
Cybersecurity ⚡ AI Lesson
Mastering Persistence: Using an Apache2 Rootkit for Stealth and Defense Evasion
HackerSploit Intermediate 1y ago
Why is XML so vulnerable? (XXE Demos)
Cybersecurity
Why is XML so vulnerable? (XXE Demos)
David Bombal Beginner 1y ago
GraphQL Security for Beginners
Cybersecurity ⚡ AI Lesson
GraphQL Security for Beginners
The Cyber Mentor Beginner 1y ago
What is Shell GPT? | Unlocking ChatGPT on Linux | Edureka
Cybersecurity
What is Shell GPT? | Unlocking ChatGPT on Linux | Edureka
edureka! Beginner 1y ago
Will you get 10/10? How to stop e-mail spoofing with DMARC, SPF and DKIM
Cybersecurity
Will you get 10/10? How to stop e-mail spoofing with DMARC, SPF and DKIM
David Bombal Beginner 1y ago
Linux Challenges for Holiday Hacking
Cybersecurity
Linux Challenges for Holiday Hacking
John Hammond Intermediate 1y ago
Top 10 Technologies To Learn In 2025 | Top Trending Technologies in 2025 | Edureka
Cybersecurity
Top 10 Technologies To Learn In 2025 | Top Trending Technologies in 2025 | Edureka
edureka! Advanced 1y ago
D-Link says “just buy a new router” after 9.8 critical vulnerability…
Cybersecurity ⚡ AI Lesson
D-Link says “just buy a new router” after 9.8 critical vulnerability…
Fireship Beginner 1y ago
What is AI for Good?
Cybersecurity ⚡ AI Lesson
What is AI for Good?
DeepLearningAI Beginner 1y ago
As cyber attacks become more sophisticated, what role will AI play?
Cybersecurity
As cyber attacks become more sophisticated, what role will AI play?
Google Cloud Intermediate 1y ago
HackTheBox - Axlle
Cybersecurity
HackTheBox - Axlle
IppSec Beginner 1y ago
How They Steal Company Secrets in Minutes
Cybersecurity
How They Steal Company Secrets in Minutes
Jack Rhysider Intermediate 1y ago
Inside the Registry Challenge: CTF Zone Finals 2024
Cybersecurity ⚡ AI Lesson
Inside the Registry Challenge: CTF Zone Finals 2024
John Hammond Intermediate 1y ago
This Hacking Tool Tricks Windows Into Sharing Passwords
Cybersecurity
This Hacking Tool Tricks Windows Into Sharing Passwords
Jack Rhysider Intermediate 1y ago
Capture the Flag! Command Injection by Docker Layers
Cybersecurity
Capture the Flag! Command Injection by Docker Layers
John Hammond Beginner 1y ago
How Zapier Can Be Used Against You
Cybersecurity
How Zapier Can Be Used Against You
Jack Rhysider Intermediate 1y ago
Why You MUST Audit Open Source Tools Before Use
Cybersecurity ⚡ AI Lesson
Why You MUST Audit Open Source Tools Before Use
The Cyber Mentor Beginner 1y ago
The Secret Backdoor Hackers Use to Access Your Accounts
Cybersecurity
The Secret Backdoor Hackers Use to Access Your Accounts
Jack Rhysider Intermediate 1y ago
From Novice to Pro: Unleashing Hacking Genius
Cybersecurity
From Novice to Pro: Unleashing Hacking Genius
John Hammond Intermediate 1y ago
Unlock Your Cybersecurity Potential with Hands-On Labs
Cybersecurity ⚡ AI Lesson
Unlock Your Cybersecurity Potential with Hands-On Labs
John Hammond Intermediate 1y ago
Cybersecurity in the Age of AI | AI in Cybersecurity | Edureka
Cybersecurity
Cybersecurity in the Age of AI | AI in Cybersecurity | Edureka
edureka! Beginner 1y ago
Hack WiFi with a phone? (Kali Linux Nethunter Pro)
Cybersecurity ⚡ AI Lesson
Hack WiFi with a phone? (Kali Linux Nethunter Pro)
David Bombal Intermediate 1y ago
Unlocking Privilege Escalation in EntraID: The Essentials
Cybersecurity
Unlocking Privilege Escalation in EntraID: The Essentials
John Hammond Intermediate 1y ago
How Email Spam Fueled a Dirty Online Economy
Cybersecurity
How Email Spam Fueled a Dirty Online Economy
Jack Rhysider Intermediate 1y ago
Can You Hack a Car With a Flipper Zero?
Cybersecurity ⚡ AI Lesson
Can You Hack a Car With a Flipper Zero?
The Cyber Mentor Beginner 1y ago
Exposing Vulnerabilities in EntraID: Ethical Hacking Insights
Cybersecurity
Exposing Vulnerabilities in EntraID: Ethical Hacking Insights
John Hammond Intermediate 1y ago
The Secrets to Staying Focused in Cybersecurity
Cybersecurity ⚡ AI Lesson
The Secrets to Staying Focused in Cybersecurity
The Cyber Mentor Beginner 1y ago
Hacking Everyday Items: The Truth Behind Suitcase Locks
Cybersecurity
Hacking Everyday Items: The Truth Behind Suitcase Locks
John Hammond Intermediate 1y ago
LIVE: Hacking, AppSec and Cybersecurity | GraphQL | Ask Me Anything
Cybersecurity ⚡ AI Lesson
LIVE: Hacking, AppSec and Cybersecurity | GraphQL | Ask Me Anything
The Cyber Mentor Beginner 1y ago
Build Your Own Wi-Fi Pen Testing Device: ESP-32 Marauder
Cybersecurity ⚡ AI Lesson
Build Your Own Wi-Fi Pen Testing Device: ESP-32 Marauder
The Cyber Mentor Beginner 1y ago
WARNING: Make sure your family and colleagues are aware #shorts #ai #iphone #android #cybersecurity
Cybersecurity ⚡ AI Lesson
WARNING: Make sure your family and colleagues are aware #shorts #ai #iphone #android #cybersecurity
David Bombal Intermediate 1y ago
Exploring Cybersecurity as a Career: Is it Worth it? | Pros & Cons of Cybersecurity Career | Edureka
Cybersecurity
Exploring Cybersecurity as a Career: Is it Worth it? | Pros & Cons of Cybersecurity Career | Edureka
edureka! Beginner 1y ago
TCM Security Black Friday / Cyber Monday Deals 2024
Cybersecurity ⚡ AI Lesson
TCM Security Black Friday / Cyber Monday Deals 2024
The Cyber Mentor Beginner 1y ago
LIVE: Hacking, AppSec and Cybersecurity | TryHackMe
Cybersecurity ⚡ AI Lesson
LIVE: Hacking, AppSec and Cybersecurity | TryHackMe
The Cyber Mentor Beginner 1y ago
Cybersecurity Projects for Beginners | Top 10 Cybersecurity Project Ideas | Edureka
Cybersecurity
Cybersecurity Projects for Beginners | Top 10 Cybersecurity Project Ideas | Edureka
edureka! Beginner 1y ago
Collaborative Hacking with HHC 2024
Cybersecurity
Collaborative Hacking with HHC 2024
John Hammond Intermediate 1y ago
Hacker unlocks Cryptography secrets (hashing, encryption and more)
Cybersecurity
Hacker unlocks Cryptography secrets (hashing, encryption and more)
David Bombal Beginner 1y ago
A Holiday Hacking Dream
Cybersecurity
A Holiday Hacking Dream
John Hammond Intermediate 1y ago
TCM Security 2024 Black Friday Cyber Monday Sale is Here!
Cybersecurity ⚡ AI Lesson
TCM Security 2024 Black Friday Cyber Monday Sale is Here!
The Cyber Mentor Beginner 1y ago
Build Your Own Wi-Fi Hacking Tool (ESP32 Marauder)
Cybersecurity ⚡ AI Lesson
Build Your Own Wi-Fi Hacking Tool (ESP32 Marauder)
The Cyber Mentor Beginner 1y ago
Kali Linux USB persistence the right way
Cybersecurity
Kali Linux USB persistence the right way
David Bombal Beginner 1y ago
World Building for SANS Holiday Hack Challenge
Cybersecurity
World Building for SANS Holiday Hack Challenge
John Hammond Beginner 1y ago
What are these? #shorts #firewall #cybersecurity #pfsense #opnsense
Cybersecurity
What are these? #shorts #firewall #cybersecurity #pfsense #opnsense
David Bombal Intermediate 1y ago
📚 Coursera Courses Opens on Coursera · Free to audit
1 / 3 View all →
Cybersecurity Threat Vectors and Mitigation
📚 Coursera Course ↗
Self-paced
Cybersecurity Threat Vectors and Mitigation
Opens on Coursera ↗
Sécuriser GKE avec Cloud Next Generation Firewall
📚 Coursera Course ↗
Self-paced
Sécuriser GKE avec Cloud Next Generation Firewall
Opens on Coursera ↗
Legal and Ethical Cyber Investigations
📚 Coursera Course ↗
Self-paced
Legal and Ethical Cyber Investigations
Opens on Coursera ↗
Incident Response and Risk Management
📚 Coursera Course ↗
Self-paced
Incident Response and Risk Management
Opens on Coursera ↗
Implementing MPLS VPNs
📚 Coursera Course ↗
Self-paced
Implementing MPLS VPNs
Opens on Coursera ↗
Advanced Networking Services and Routing
📚 Coursera Course ↗
Self-paced
Advanced Networking Services and Routing
Opens on Coursera ↗