Tech Skills

Cybersecurity

Ethical hacking, penetration testing, network security, CTFs and defensive security

6,799
lessons
Skills in this topic
View full skill map โ†’
Security Basics
beginner
Fix OWASP top 10 vulnerabilities
AI Security
intermediate
Identify and patch prompt injection vulnerabilities
Network Security
intermediate
Configure a firewall with proper inbound/outbound rules
Ethical Hacking & Pen Testing
intermediate
Conduct a full pen test with Kali Linux
Cloud Security
intermediate
Implement IAM least-privilege policies on AWS/GCP
Incident Response
intermediate
Build an incident response playbook
Security Compliance
intermediate
Map controls for SOC 2 Type II compliance
Defensive AI
advanced
Build an AI-powered log anomaly detector
How to learn foundational cybersecurity skills, brought to you by Sandra Liu.
Cybersecurity
How to learn foundational cybersecurity skills, brought to you by Sandra Liu.
Coursera Intermediate 1y ago
HackTheBox - Ouija
Cybersecurity
HackTheBox - Ouija
IppSec Beginner 1y ago
Learn Any Programming Language (from scratch)
Cybersecurity โšก AI Lesson
Learn Any Programming Language (from scratch)
The Cyber Mentor Beginner 1y ago
AI in Cybersecurity | Working of AI in Cybersecurity | Need for AI in Cybersecurity | Edureka
Cybersecurity
AI in Cybersecurity | Working of AI in Cybersecurity | Need for AI in Cybersecurity | Edureka
edureka! Beginner 1y ago
3 Ways to Find and Exploit Command Injection
Cybersecurity โšก AI Lesson
3 Ways to Find and Exploit Command Injection
The Cyber Mentor Beginner 1y ago
$75 Million Bitcoin theft in Slovenia
Cybersecurity
$75 Million Bitcoin theft in Slovenia
Jack Rhysider Intermediate 2y ago
How Accurate is Your Recovery Timeline? | The Incident Commander Series Ep. 2
Cybersecurity โšก AI Lesson
How Accurate is Your Recovery Timeline? | The Incident Commander Series Ep. 2
SANS Institute Beginner 2y ago
๐Ÿ” Master Amazon SEO : Outrank Competitors Easily! #shorts
Cybersecurity
๐Ÿ” Master Amazon SEO : Outrank Competitors Easily! #shorts
Jacky Chou from Indexsy Beginner 2y ago
Automated Cloud Security with ONE CLICK
Cybersecurity
Automated Cloud Security with ONE CLICK
John Hammond Beginner 2y ago
Yet Another Cybercrime Hacking Forum...
Cybersecurity โšก AI Lesson
Yet Another Cybercrime Hacking Forum...
John Hammond Beginner 2y ago
Social Engineering in Cyber Security Explained | What is Social Engineering?| CEH Training | Edureka
Cybersecurity
Social Engineering in Cyber Security Explained | What is Social Engineering?| CEH Training | Edureka
edureka! Beginner 2y ago
How Skype compromised your WoW account
Cybersecurity
How Skype compromised your WoW account
Jack Rhysider Intermediate 2y ago
HackTheBox - Monitored
Cybersecurity
HackTheBox - Monitored
IppSec Beginner 2y ago
CISOs Confront AI: Adapting Cybersecurity to the AI Era
Cybersecurity โšก AI Lesson
CISOs Confront AI: Adapting Cybersecurity to the AI Era
SANS Institute Intermediate 2y ago
Certificate vs. Certification, whats the difference? ๐Ÿค”
Cybersecurity
Certificate vs. Certification, whats the difference? ๐Ÿค”
Coursera Beginner 2y ago
Android Bluetooth Hacking with Python #shorts #android #bluetooth #raspberrypi #python
Cybersecurity โšก AI Lesson
Android Bluetooth Hacking with Python #shorts #android #bluetooth #raspberrypi #python
David Bombal Beginner 2y ago
Hacking Wordpress with Python in seconds (using Dark Web and Telegram data)
Cybersecurity โšก AI Lesson
Hacking Wordpress with Python in seconds (using Dark Web and Telegram data)
David Bombal Beginner 2y ago
8 Rules for Better Data Storytelling | Get Your Insights Understood
Cybersecurity โšก AI Lesson
8 Rules for Better Data Storytelling | Get Your Insights Understood
DataCamp Intermediate 2y ago
Do you use your pet's name as your password?
Cybersecurity
Do you use your pet's name as your password?
Google for Developers Intermediate 2y ago
Hacking a Smart Camera: IoT Hacking With Andrew Bellini (Part 4)
Cybersecurity โšก AI Lesson
Hacking a Smart Camera: IoT Hacking With Andrew Bellini (Part 4)
The Cyber Mentor Beginner 2y ago
How to Secure Your Email (DMARC, DKIM, SPF Tutorial)
Cybersecurity โšก AI Lesson
How to Secure Your Email (DMARC, DKIM, SPF Tutorial)
The Cyber Mentor Beginner 2y ago
Learn to Hack AWS & Cloud Security
Cybersecurity
Learn to Hack AWS & Cloud Security
John Hammond Beginner 2y ago
This five-year-old hacked Xbox
Cybersecurity โšก AI Lesson
This five-year-old hacked Xbox
Jack Rhysider Intermediate 2y ago
Rust Programming 101 Full Course - Rust for Beginners
Cybersecurity โšก AI Lesson
Rust Programming 101 Full Course - Rust for Beginners
The Cyber Mentor Beginner 2y ago
Data Protection | The 8 Domains of the Cloud Security Maturity Model | Part 1
Cybersecurity โšก AI Lesson
Data Protection | The 8 Domains of the Cloud Security Maturity Model | Part 1
SANS Institute Beginner 2y ago
Keynote | The Fast-Food Effect: Translating Fast-Food Mastery into Cross-Industry Success
Cybersecurity โšก AI Lesson
Keynote | The Fast-Food Effect: Translating Fast-Food Mastery into Cross-Industry Success
SANS Institute Intermediate 2y ago
How a Montana Mom Became the FBI's Secret Weapon Against Al Qaeda๐ŸŽ™Darknet Diaries Ep. 145: Shannen
Cybersecurity
How a Montana Mom Became the FBI's Secret Weapon Against Al Qaeda๐ŸŽ™Darknet Diaries Ep. 145: Shannen
Jack Rhysider Intermediate 2y ago
Thieves stole $40K in Ethereum with NFT scam
Cybersecurity
Thieves stole $40K in Ethereum with NFT scam
Jack Rhysider Intermediate 2y ago
It is essential to keep up with the threat landscape!
Cybersecurity
It is essential to keep up with the threat landscape!
Coursera Intermediate 2y ago
Hacking a Smart Camera: IoT Hacking With Andrew Bellini (Part 3)
Cybersecurity โšก AI Lesson
Hacking a Smart Camera: IoT Hacking With Andrew Bellini (Part 3)
The Cyber Mentor Beginner 2y ago
The 8 Domains of the Cloud Security Maturity Model | Overview
Cybersecurity โšก AI Lesson
The 8 Domains of the Cloud Security Maturity Model | Overview
SANS Institute Beginner 2y ago
No Tools in a CTF
Cybersecurity
No Tools in a CTF
John Hammond Beginner 2y ago
Itโ€™s all about the end game!
Cybersecurity
Itโ€™s all about the end game!
Coursera Beginner 2y ago
From Rogue to Vanguard: My Odyssey through the Cyber Realm
Cybersecurity โšก AI Lesson
From Rogue to Vanguard: My Odyssey through the Cyber Realm
SANS Institute Intermediate 2y ago
Breaking the Mold: How Two Women from Non-Technical Backgrounds Broke into Cybersecurity.
Cybersecurity โšก AI Lesson
Breaking the Mold: How Two Women from Non-Technical Backgrounds Broke into Cybersecurity.
SANS Institute Beginner 2y ago
Detection Engineers Unveiled: A Day in the Life and the Path to This Exciting Career
Cybersecurity โšก AI Lesson
Detection Engineers Unveiled: A Day in the Life and the Path to This Exciting Career
SANS Institute Beginner 2y ago
Inclusive Cybersecurity: Tips for Hacking Barriers
Cybersecurity โšก AI Lesson
Inclusive Cybersecurity: Tips for Hacking Barriers
SANS Institute Advanced 2y ago
Day in the Life of a CTI Engineer
Cybersecurity โšก AI Lesson
Day in the Life of a CTI Engineer
SANS Institute Beginner 2y ago
HackTheBox - Napper
Cybersecurity
HackTheBox - Napper
IppSec Beginner 2y ago
The Vanilla Gift Card Trap
Cybersecurity
The Vanilla Gift Card Trap
Jack Rhysider Intermediate 2y ago
Do You Need to Know Programming to Be A Hacker?
Cybersecurity โšก AI Lesson
Do You Need to Know Programming to Be A Hacker?
The Cyber Mentor Beginner 2y ago
CISOs Confront AI: Adapting Cybersecurity to the AI Era
Cybersecurity โšก AI Lesson
CISOs Confront AI: Adapting Cybersecurity to the AI Era
SANS Institute Intermediate 2y ago
Hacking a Smart Camera: IoT Hacking With Andrew Bellini (Part 2)
Cybersecurity โšก AI Lesson
Hacking a Smart Camera: IoT Hacking With Andrew Bellini (Part 2)
The Cyber Mentor Beginner 2y ago
This exploit emptied 6,000 Coinbase wallets
Cybersecurity โšก AI Lesson
This exploit emptied 6,000 Coinbase wallets
Jack Rhysider Intermediate 2y ago
Build a Pro-Level Detection Engineering Strategy | SOC Success Pt. 2
Cybersecurity โšก AI Lesson
Build a Pro-Level Detection Engineering Strategy | SOC Success Pt. 2
SANS Institute Beginner 2y ago
Hacking a Smart Camera: IoT Hacking With Andrew Bellini (Part 1)
Cybersecurity โšก AI Lesson
Hacking a Smart Camera: IoT Hacking With Andrew Bellini (Part 1)
The Cyber Mentor Beginner 2y ago
Entry-level cybersecurity Professional Certificates can equip you with the skills you need.
Cybersecurity
Entry-level cybersecurity Professional Certificates can equip you with the skills you need.
Coursera Beginner 2y ago
The $70 million TalkTalk Breach
Cybersecurity
The $70 million TalkTalk Breach
Jack Rhysider Intermediate 2y ago
๐Ÿ“š Coursera Courses Opens on Coursera ยท Free to audit
1 / 3 View all โ†’
Hacking Exercise For Health. The surprising new science of fitness.
๐Ÿ“š Coursera Course โ†—
Self-paced
Hacking Exercise For Health. The surprising new science of fitness.
Opens on Coursera โ†—
Web Hacking Expert - Full-Stack Exploitation Mastery
๐Ÿ“š Coursera Course โ†—
Self-paced
Web Hacking Expert - Full-Stack Exploitation Mastery
Opens on Coursera โ†—
Cyber Incident Response
๐Ÿ“š Coursera Course โ†—
Self-paced
Cyber Incident Response
Opens on Coursera โ†—
OWASP Top 10 - Risks 6-10
๐Ÿ“š Coursera Course โ†—
Self-paced
OWASP Top 10 - Risks 6-10
Opens on Coursera โ†—
DevSecOps & Cloud Security
๐Ÿ“š Coursera Course โ†—
Self-paced
DevSecOps & Cloud Security
Opens on Coursera โ†—
Cybersecurity Tools and Technologies
๐Ÿ“š Coursera Course โ†—
Self-paced
Cybersecurity Tools and Technologies
Opens on Coursera โ†—