Tech Skills

Cybersecurity

Ethical hacking, penetration testing, network security, CTFs and defensive security

6,803
lessons
Skills in this topic
View full skill map →
Security Basics
beginner
Fix OWASP top 10 vulnerabilities
AI Security
intermediate
Identify and patch prompt injection vulnerabilities
Network Security
intermediate
Configure a firewall with proper inbound/outbound rules
Ethical Hacking & Pen Testing
intermediate
Conduct a full pen test with Kali Linux
Cloud Security
intermediate
Implement IAM least-privilege policies on AWS/GCP
Incident Response
intermediate
Build an incident response playbook
Security Compliance
intermediate
Map controls for SOC 2 Type II compliance
Defensive AI
advanced
Build an AI-powered log anomaly detector
The war between cheaters and game developers
Cybersecurity
The war between cheaters and game developers
Jack Rhysider Intermediate 1y ago
When to Start Your Cybersecurity Career
Cybersecurity ⚡ AI Lesson
When to Start Your Cybersecurity Career
The Cyber Mentor Beginner 1y ago
They took his computer. That didn't stop him from hacking Rockstar Games and leaking GTA 6
Cybersecurity ⚡ AI Lesson
They took his computer. That didn't stop him from hacking Rockstar Games and leaking GTA 6
David Bombal Intermediate 1y ago
Cyber security fundamentals | Understanding Cybersecurity Basics | Edureka Rewind
Cybersecurity
Cyber security fundamentals | Understanding Cybersecurity Basics | Edureka Rewind
edureka! Beginner 1y ago
3 SOC Analyst Projects for Beginners
Cybersecurity ⚡ AI Lesson
3 SOC Analyst Projects for Beginners
The Cyber Mentor Beginner 1y ago
How a kid hacked a mobile farming game
Cybersecurity
How a kid hacked a mobile farming game
Jack Rhysider Intermediate 1y ago
HackTheBox - Perfection
Cybersecurity ⚡ AI Lesson
HackTheBox - Perfection
IppSec Beginner 1y ago
Linux on Windows......Windows on Linux
Cybersecurity ⚡ AI Lesson
Linux on Windows......Windows on Linux
NetworkChuck Beginner 1y ago
Ivanka Trump: Politics, Family, Real Estate, Fashion, Music, and Life | Lex Fridman Podcast #436
Cybersecurity
Ivanka Trump: Politics, Family, Real Estate, Fashion, Music, and Life | Lex Fridman Podcast #436
Lex Fridman Beginner 1y ago
Cyber Security Full Course | Cyber Security Training For Beginners | Cyber Security Course | Edureka
Cybersecurity
Cyber Security Full Course | Cyber Security Training For Beginners | Cyber Security Course | Edureka
edureka! Beginner 1y ago
Never store your passwords & keys like this! #shorts #passwords #cybersecurity
Cybersecurity
Never store your passwords & keys like this! #shorts #passwords #cybersecurity
David Bombal Intermediate 1y ago
Simplified Google Cloud network security: Zero-trust and beyond
Cybersecurity
Simplified Google Cloud network security: Zero-trust and beyond
Google Cloud Tech Intermediate 1y ago
Protect your workload with Google Cloud next generation firewall
Cybersecurity
Protect your workload with Google Cloud next generation firewall
Google Cloud Tech Advanced 1y ago
Secure your Cloud journey with effortless protection from Palo Alto Networks & Google Cloud
Cybersecurity
Secure your Cloud journey with effortless protection from Palo Alto Networks & Google Cloud
Google Cloud Beginner 1y ago
Introduction To Red Teaming
Cybersecurity ⚡ AI Lesson
Introduction To Red Teaming
HackerSploit Beginner 1y ago
HackTheBox - Jab
Cybersecurity
HackTheBox - Jab
IppSec Beginner 1y ago
Speed Up Pentest Report Writing
Cybersecurity ⚡ AI Lesson
Speed Up Pentest Report Writing
John Hammond Beginner 1y ago
The Confidence Formula: 5 Steps to Transform Your Self-Belief
Cybersecurity ⚡ AI Lesson
The Confidence Formula: 5 Steps to Transform Your Self-Belief
Russell Brunson Beginner 1y ago
Stop Scammers from Controlling Your Computer
Cybersecurity
Stop Scammers from Controlling Your Computer
John Hammond Beginner 1y ago
Pentesting Diaries 0x1 - SQL Injection 101
Cybersecurity ⚡ AI Lesson
Pentesting Diaries 0x1 - SQL Injection 101
HackerSploit Beginner 1y ago
Advance your career in business with Royal Holloway, University of London
Cybersecurity
Advance your career in business with Royal Holloway, University of London
Coursera Beginner 1y ago
Simon Sinek: "Strong Thigh Muscles = More friends", This Is Why You Can't Make Friends!
Cybersecurity
Simon Sinek: "Strong Thigh Muscles = More friends", This Is Why You Can't Make Friends!
The Diary Of A CEO Beginner 1y ago
1000 Players - One Game of Doom
Cybersecurity ⚡ AI Lesson
1000 Players - One Game of Doom
ThePrimeagen Intermediate 1y ago
Getting Started With Hardware Hacking
Cybersecurity ⚡ AI Lesson
Getting Started With Hardware Hacking
The Cyber Mentor Beginner 1y ago
The biggest video game cheat operation
Cybersecurity ⚡ AI Lesson
The biggest video game cheat operation
Jack Rhysider Intermediate 1y ago
Ubisoft sues 17-year-old for selling cheats
Cybersecurity
Ubisoft sues 17-year-old for selling cheats
Jack Rhysider Intermediate 1y ago
How to Get Pentesting Experience
Cybersecurity ⚡ AI Lesson
How to Get Pentesting Experience
The Cyber Mentor Beginner 1y ago
Your webcam is at risk
Cybersecurity
Your webcam is at risk
Jack Rhysider Intermediate 1y ago
Pass the PWPA Exam With These Tips
Cybersecurity ⚡ AI Lesson
Pass the PWPA Exam With These Tips
The Cyber Mentor Beginner 1y ago
Nmap basic scan with HackerD #shorts #nmap #kalilinx
Cybersecurity
Nmap basic scan with HackerD #shorts #nmap #kalilinx
David Bombal Beginner 1y ago
Hacking Roadmap to Success: AMA with The Cyber Mentor and FREE training!
Cybersecurity
Hacking Roadmap to Success: AMA with The Cyber Mentor and FREE training!
David Bombal Beginner 1y ago
The ad malware scam
Cybersecurity ⚡ AI Lesson
The ad malware scam
Jack Rhysider Intermediate 1y ago
Breaking into Penetration Testing: Career Tips and Insights
Cybersecurity ⚡ AI Lesson
Breaking into Penetration Testing: Career Tips and Insights
The Cyber Mentor Beginner 1y ago
Bypass SQL Filters & Get SQL Injection With These Quick Tips
Cybersecurity ⚡ AI Lesson
Bypass SQL Filters & Get SQL Injection With These Quick Tips
The Cyber Mentor Beginner 1y ago
Russia Hacked the US Elections?
Cybersecurity
Russia Hacked the US Elections?
Jack Rhysider Intermediate 1y ago
Next Gen Hackers are NEXT level 🤯
Cybersecurity ⚡ AI Lesson
Next Gen Hackers are NEXT level 🤯
David Bombal Beginner 1y ago
North Korean Hackers Targeting American Comedies
Cybersecurity ⚡ AI Lesson
North Korean Hackers Targeting American Comedies
Jack Rhysider Intermediate 1y ago
How to Prepare for The Practical Web Pentest Professional Exam
Cybersecurity ⚡ AI Lesson
How to Prepare for The Practical Web Pentest Professional Exam
The Cyber Mentor Beginner 1y ago
Hack your water and electricity! Myth or Reality?
Cybersecurity
Hack your water and electricity! Myth or Reality?
David Bombal Beginner 1y ago
Leveraging Ethical Hacking Skills for Network and Application Security | Edureka x EC Council
Cybersecurity
Leveraging Ethical Hacking Skills for Network and Application Security | Edureka x EC Council
edureka! Advanced 1y ago
How US forces crippled ISIS computers
Cybersecurity
How US forces crippled ISIS computers
Jack Rhysider Intermediate 1y ago
Hacking a Smart Camera: IoT Hacking With Andrew Bellini (Part 5 - Conclusion)
Cybersecurity ⚡ AI Lesson
Hacking a Smart Camera: IoT Hacking With Andrew Bellini (Part 5 - Conclusion)
The Cyber Mentor Beginner 1y ago
OSINT Deep Dive: What Voter Records Can Tell You
Cybersecurity ⚡ AI Lesson
OSINT Deep Dive: What Voter Records Can Tell You
The Cyber Mentor Beginner 1y ago
Cyber Security Interview Question and Answers  | CyberSecurity Interview Tips  | Edureka
Cybersecurity
Cyber Security Interview Question and Answers | CyberSecurity Interview Tips | Edureka
edureka! Advanced 1y ago
What’s worse than TikTok's data collection?
Cybersecurity
What’s worse than TikTok's data collection?
Jack Rhysider Intermediate 1y ago
HackTheBox - Crafty
Cybersecurity ⚡ AI Lesson
HackTheBox - Crafty
IppSec Beginner 1y ago
Fuzz Faster with Turbo Intruder
Cybersecurity ⚡ AI Lesson
Fuzz Faster with Turbo Intruder
The Cyber Mentor Beginner 1y ago
How North Korea led the largest crypto heist in history
Cybersecurity ⚡ AI Lesson
How North Korea led the largest crypto heist in history
Jack Rhysider Intermediate 1y ago
📚 Coursera Courses Opens on Coursera · Free to audit
1 / 3 View all →
Cybersecurity: Overlooked Threats to Your Strategy
📚 Coursera Course ↗
Self-paced
Cybersecurity: Overlooked Threats to Your Strategy
Opens on Coursera ↗
Discrete Math for Computer Science - Algorithms & Recursion
📚 Coursera Course ↗
Self-paced
Discrete Math for Computer Science - Algorithms & Recursion
Opens on Coursera ↗
Ethical Hacking Foundations
📚 Coursera Course ↗
Self-paced
Ethical Hacking Foundations
Opens on Coursera ↗
Detecting and Mitigating Cyber Threats and Attacks
📚 Coursera Course ↗
Self-paced
Detecting and Mitigating Cyber Threats and Attacks
Opens on Coursera ↗
Introducción a Cloud Next Generation Firewall
📚 Coursera Course ↗
Self-paced
Introducción a Cloud Next Generation Firewall
Opens on Coursera ↗
Cisco Collaboration Edge Services
📚 Coursera Course ↗
Self-paced
Cisco Collaboration Edge Services
Opens on Coursera ↗