Tech Skills

Cybersecurity

Ethical hacking, penetration testing, network security, CTFs and defensive security

6343
lessons
Do you use your pet's name as your password?
🔐 Cybersecurity
Do you use your pet's name as your password?
Google for Developers Intermediate 1y ago
This exploit emptied 6,000 Coinbase wallets
🔐 Cybersecurity
This exploit emptied 6,000 Coinbase wallets
Jack Rhysider Intermediate 1y ago
Build a Pro-Level Detection Engineering Strategy | SOC Success Pt. 2
🔐 Cybersecurity
Build a Pro-Level Detection Engineering Strategy | SOC Success Pt. 2
SANS Institute Beginner 1y ago
Hacking a Smart Camera: IoT Hacking With Andrew Bellini (Part 1)
🔐 Cybersecurity
Hacking a Smart Camera: IoT Hacking With Andrew Bellini (Part 1)
The Cyber Mentor Beginner 1y ago
Entry-level cybersecurity Professional Certificates can equip you with the skills you need.
🔐 Cybersecurity
Entry-level cybersecurity Professional Certificates can equip you with the skills you need.
Coursera Beginner 1y ago
The $70 million TalkTalk Breach
🔐 Cybersecurity
The $70 million TalkTalk Breach
Jack Rhysider Intermediate 1y ago
The power of scripting and programming in cybersecurity should not be underestimated!
🔐 Cybersecurity
The power of scripting and programming in cybersecurity should not be underestimated!
Coursera Beginner 1y ago
Real World Windows Pentest Tutorial (demos of Top 5 Active Directory hacks)
🔐 Cybersecurity
Real World Windows Pentest Tutorial (demos of Top 5 Active Directory hacks)
David Bombal Beginner 1y ago
HackTheBox - Devvortex
🔐 Cybersecurity
HackTheBox - Devvortex
IppSec Beginner 1y ago
What is Kali Linux | Kali Linux Hacking Tutorials | Ethical Hacking Training | Edureka Rewind
🔐 Cybersecurity
What is Kali Linux | Kali Linux Hacking Tutorials | Ethical Hacking Training | Edureka Rewind
edureka! Beginner 1y ago
6 Tips to Stay Motivated
🔐 Cybersecurity
6 Tips to Stay Motivated
The Cyber Mentor Beginner 1y ago
Your VPN won't protect you 😱
🔐 Cybersecurity
Your VPN won't protect you 😱
David Bombal Beginner 1y ago
Hackers Abuse Zero-Day Exploit for CrushFTP
🔐 Cybersecurity
Hackers Abuse Zero-Day Exploit for CrushFTP
John Hammond Beginner 1y ago
Diagnosing GB Liver Dysfunction
🔐 Cybersecurity
Diagnosing GB Liver Dysfunction
TCM Academy Intermediate 1y ago
Protecting workloads with Google Cloud next generation firewall
🔐 Cybersecurity
Protecting workloads with Google Cloud next generation firewall
Google Cloud Tech Intermediate 1y ago
Best Practices to Enhance the Security of Your RDP Server
🔐 Cybersecurity
Best Practices to Enhance the Security of Your RDP Server
UltaHost Beginner 1y ago
Government Unveils Malware Analysis Tool, But...
🔐 Cybersecurity
Government Unveils Malware Analysis Tool, But...
John Hammond Beginner 1y ago
Detect, Respond, and Recover from Cybersecurity Attacks | Google Cloud Cybersecurity Certificate
🔐 Cybersecurity
Detect, Respond, and Recover from Cybersecurity Attacks | Google Cloud Cybersecurity Certificate
Google Cloud Beginner 1y ago
Cloud Security Risks: Identify and Protect Against Threats | Google Cloud Cybersecurity Certificate
🔐 Cybersecurity
Cloud Security Risks: Identify and Protect Against Threats | Google Cloud Cybersecurity Certificate
Google Cloud Beginner 1y ago
Edureka YouTube Channel Has Now 4 Million+ Ridiculously Committed Subscribers
🔐 Cybersecurity
Edureka YouTube Channel Has Now 4 Million+ Ridiculously Committed Subscribers
edureka! Advanced 1y ago
computer science vs cybersecurity in 2025
🔐 Cybersecurity
computer science vs cybersecurity in 2025
Sajjaad Khader Intermediate 1y ago
HackTheBox - Hospital
🔐 Cybersecurity
HackTheBox - Hospital
IppSec Beginner 1y ago
The Mastermind behind Pakistan's nuclear arms scene
🔐 Cybersecurity
The Mastermind behind Pakistan's nuclear arms scene
Jack Rhysider Intermediate 1y ago
Grant Collins is spilling all the cybersecurity tea. ☕️
🔐 Cybersecurity
Grant Collins is spilling all the cybersecurity tea. ☕️
Coursera Beginner 1y ago
Python vs. Bash vs. PowerShell: The Benefits of Each
🔐 Cybersecurity
Python vs. Bash vs. PowerShell: The Benefits of Each
The Cyber Mentor Beginner 1y ago
Should I Get a Degree in Cybersecurity? Here Are the Benefits!
🔐 Cybersecurity
Should I Get a Degree in Cybersecurity? Here Are the Benefits!
Coursera Beginner 1y ago
3 Ways to Avoid Burnout
🔐 Cybersecurity
3 Ways to Avoid Burnout
The Cyber Mentor Beginner 1y ago
Hack Active Directory with LLMNR
🔐 Cybersecurity
Hack Active Directory with LLMNR
The Cyber Mentor Beginner 1y ago
Did you know you can program this? 🤯 #shorts #f1 #cybersecurity #linux
🔐 Cybersecurity
Did you know you can program this? 🤯 #shorts #f1 #cybersecurity #linux
David Bombal Beginner 1y ago
The new AI Cyber Defense  you need to know about
🔐 Cybersecurity
The new AI Cyber Defense you need to know about
David Bombal Beginner 1y ago
Start Hacking for FREE
🔐 Cybersecurity
Start Hacking for FREE
The Cyber Mentor Beginner 1y ago
Next Gen Hackers protecting our world
🔐 Cybersecurity
Next Gen Hackers protecting our world
David Bombal Beginner 1y ago
How Golden Ticket Attacks Work
🔐 Cybersecurity
How Golden Ticket Attacks Work
The Cyber Mentor Beginner 1y ago
Are You Interested in Blue Teaming?
🔐 Cybersecurity
Are You Interested in Blue Teaming?
Coursera Intermediate 1y ago
Should You Learn Programming for Cybersecurity?
🔐 Cybersecurity
Should You Learn Programming for Cybersecurity?
The Cyber Mentor Beginner 1y ago
Start Your Cybersecurity Career with TryHackMe
🔐 Cybersecurity
Start Your Cybersecurity Career with TryHackMe
The Cyber Mentor Beginner 1y ago
Black Hat Bash: Bash Scripting for Hackers and Pentesters (Bonus: GraphQL and Drone hacking)
🔐 Cybersecurity
Black Hat Bash: Bash Scripting for Hackers and Pentesters (Bonus: GraphQL and Drone hacking)
David Bombal Beginner 1y ago
How did someone make $2,000 per day with Roblox?
🔐 Cybersecurity
How did someone make $2,000 per day with Roblox?
Jack Rhysider Intermediate 1y ago
You ever seen these devices? Networking for Hackers and Cybersecurity professionals.
🔐 Cybersecurity
You ever seen these devices? Networking for Hackers and Cybersecurity professionals.
David Bombal Beginner 1y ago
How scammers can reverse their payment
🔐 Cybersecurity
How scammers can reverse their payment
Jack Rhysider Intermediate 1y ago
Why You Need to Know Active Directory
🔐 Cybersecurity
Why You Need to Know Active Directory
The Cyber Mentor Beginner 1y ago
Everything you need to know about networking fundamentals from @TheBeardedITDad.
🔐 Cybersecurity
Everything you need to know about networking fundamentals from @TheBeardedITDad.
Coursera Beginner 1y ago
Common Job Application Mistakes and How to Fix Them
🔐 Cybersecurity
Common Job Application Mistakes and How to Fix Them
The Cyber Mentor Beginner 1y ago
Scraping Dark Web Sites with Python
🔐 Cybersecurity
Scraping Dark Web Sites with Python
John Hammond Beginner 1y ago
Focus on developing skills and experience to naturally receive better compensation.
🔐 Cybersecurity
Focus on developing skills and experience to naturally receive better compensation.
Coursera Beginner 1y ago
How an AT&T employee stole $23 million overnight
🔐 Cybersecurity
How an AT&T employee stole $23 million overnight
Jack Rhysider Intermediate 1y ago
Demo of the Microsoft Window's Hack developed by the NSA (with OTW)
🔐 Cybersecurity
Demo of the Microsoft Window's Hack developed by the NSA (with OTW)
David Bombal Beginner 1y ago
How to Keep Up with Cybersecurity News
🔐 Cybersecurity
How to Keep Up with Cybersecurity News
The Cyber Mentor Beginner 1y ago
📚 Coursera Courses Opens on Coursera · Free to audit
1 / 3 View all →
Intro to IoT Pentesting
📚 Coursera Course ↗
Self-paced
Intro to IoT Pentesting
Opens on Coursera ↗
CISSP Domain 5: Identity and Access Management (IAM)
📚 Coursera Course ↗
Self-paced
CISSP Domain 5: Identity and Access Management (IAM)
Opens on Coursera ↗
Cybersecurity Policy for Aviation and Internet Infrastructures
📚 Coursera Course ↗
Self-paced
Cybersecurity Policy for Aviation and Internet Infrastructures
Opens on Coursera ↗
Cyber Security for Absolute Beginners – Part 1
📚 Coursera Course ↗
Self-paced
Cyber Security for Absolute Beginners – Part 1
Opens on Coursera ↗
API Basics 2: Build a Blog (REST, URLs & HTTP Requests)
📚 Coursera Course ↗
Self-paced
API Basics 2: Build a Blog (REST, URLs & HTTP Requests)
Opens on Coursera ↗
Data Center Security Management with Microsoft System Center
📚 Coursera Course ↗
Self-paced
Data Center Security Management with Microsoft System Center
Opens on Coursera ↗