Tech Skills

Cybersecurity

Ethical hacking, penetration testing, network security, CTFs and defensive security

6,799
lessons
Skills in this topic
View full skill map →
Security Basics
beginner
Fix OWASP top 10 vulnerabilities
AI Security
intermediate
Identify and patch prompt injection vulnerabilities
Network Security
intermediate
Configure a firewall with proper inbound/outbound rules
Ethical Hacking & Pen Testing
intermediate
Conduct a full pen test with Kali Linux
Cloud Security
intermediate
Implement IAM least-privilege policies on AWS/GCP
Incident Response
intermediate
Build an incident response playbook
Security Compliance
intermediate
Map controls for SOC 2 Type II compliance
Defensive AI
advanced
Build an AI-powered log anomaly detector
The Mastermind behind Pakistan's nuclear arms scene
Cybersecurity
The Mastermind behind Pakistan's nuclear arms scene
Jack Rhysider Intermediate 2y ago
The power of scripting and programming in cybersecurity should not be underestimated!
Cybersecurity
The power of scripting and programming in cybersecurity should not be underestimated!
Coursera Beginner 2y ago
Real World Windows Pentest Tutorial (demos of Top 5 Active Directory hacks)
Cybersecurity
Real World Windows Pentest Tutorial (demos of Top 5 Active Directory hacks)
David Bombal Beginner 2y ago
HackTheBox - Devvortex
Cybersecurity
HackTheBox - Devvortex
IppSec Beginner 2y ago
What is Kali Linux | Kali Linux Hacking Tutorials | Ethical Hacking Training | Edureka Rewind
Cybersecurity
What is Kali Linux | Kali Linux Hacking Tutorials | Ethical Hacking Training | Edureka Rewind
edureka! Beginner 2y ago
6 Tips to Stay Motivated
Cybersecurity ⚡ AI Lesson
6 Tips to Stay Motivated
The Cyber Mentor Beginner 2y ago
Grant Collins is spilling all the cybersecurity tea. ☕️
Cybersecurity
Grant Collins is spilling all the cybersecurity tea. ☕️
Coursera Beginner 2y ago
Your VPN won't protect you 😱
Cybersecurity ⚡ AI Lesson
Your VPN won't protect you 😱
David Bombal Beginner 2y ago
Hackers Abuse Zero-Day Exploit for CrushFTP
Cybersecurity
Hackers Abuse Zero-Day Exploit for CrushFTP
John Hammond Beginner 2y ago
Python vs. Bash vs. PowerShell: The Benefits of Each
Cybersecurity ⚡ AI Lesson
Python vs. Bash vs. PowerShell: The Benefits of Each
The Cyber Mentor Beginner 2y ago
Protecting workloads with Google Cloud next generation firewall
Cybersecurity
Protecting workloads with Google Cloud next generation firewall
Google Cloud Tech Intermediate 2y ago
Best Practices to Enhance the Security of Your RDP Server
Cybersecurity
Best Practices to Enhance the Security of Your RDP Server
UltaHost Beginner 2y ago
Government Unveils Malware Analysis Tool, But...
Cybersecurity
Government Unveils Malware Analysis Tool, But...
John Hammond Beginner 2y ago
Detect, Respond, and Recover from Cybersecurity Attacks | Google Cloud Cybersecurity Certificate
Cybersecurity
Detect, Respond, and Recover from Cybersecurity Attacks | Google Cloud Cybersecurity Certificate
Google Cloud Beginner 2y ago
Cloud Security Risks: Identify and Protect Against Threats | Google Cloud Cybersecurity Certificate
Cybersecurity
Cloud Security Risks: Identify and Protect Against Threats | Google Cloud Cybersecurity Certificate
Google Cloud Beginner 2y ago
Edureka YouTube Channel Has Now 4 Million+ Ridiculously Committed Subscribers
Cybersecurity
Edureka YouTube Channel Has Now 4 Million+ Ridiculously Committed Subscribers
edureka! Advanced 2y ago
computer science vs cybersecurity in 2025
Cybersecurity ⚡ AI Lesson
computer science vs cybersecurity in 2025
Sajjaad Khader Intermediate 2y ago
HackTheBox - Hospital
Cybersecurity
HackTheBox - Hospital
IppSec Beginner 2y ago
How did someone make $2,000 per day with Roblox?
Cybersecurity ⚡ AI Lesson
How did someone make $2,000 per day with Roblox?
Jack Rhysider Intermediate 2y ago
Incident Response VS Incident Management | The Incident Commander Series Ep. 1
Cybersecurity ⚡ AI Lesson
Incident Response VS Incident Management | The Incident Commander Series Ep. 1
SANS Institute Beginner 2y ago
60 Hacking Commands You NEED to Know
Cybersecurity ⚡ AI Lesson
60 Hacking Commands You NEED to Know
NetworkChuck Beginner 2y ago
Countdown Begins: SANS to Reveal The Five Biggest Cyber Threats at RSAC 2024
Cybersecurity ⚡ AI Lesson
Countdown Begins: SANS to Reveal The Five Biggest Cyber Threats at RSAC 2024
SANS Institute Advanced 2y ago
AES GCM (Advanced Encryption Standard in Galois Counter Mode) - Computerphile
Cybersecurity ⚡ AI Lesson
AES GCM (Advanced Encryption Standard in Galois Counter Mode) - Computerphile
Computerphile Advanced 2y ago
Should I Get a Degree in Cybersecurity? Here Are the Benefits!
Cybersecurity
Should I Get a Degree in Cybersecurity? Here Are the Benefits!
Coursera Beginner 2y ago
3 Ways to Avoid Burnout
Cybersecurity ⚡ AI Lesson
3 Ways to Avoid Burnout
The Cyber Mentor Beginner 2y ago
Hack Active Directory with LLMNR
Cybersecurity ⚡ AI Lesson
Hack Active Directory with LLMNR
The Cyber Mentor Beginner 2y ago
Did you know you can program this? 🤯 #shorts #f1 #cybersecurity #linux
Cybersecurity ⚡ AI Lesson
Did you know you can program this? 🤯 #shorts #f1 #cybersecurity #linux
David Bombal Beginner 2y ago
The new AI Cyber Defense  you need to know about
Cybersecurity
The new AI Cyber Defense you need to know about
David Bombal Beginner 2y ago
Start Hacking for FREE
Cybersecurity ⚡ AI Lesson
Start Hacking for FREE
The Cyber Mentor Beginner 2y ago
Next Gen Hackers protecting our world
Cybersecurity ⚡ AI Lesson
Next Gen Hackers protecting our world
David Bombal Beginner 2y ago
How Golden Ticket Attacks Work
Cybersecurity ⚡ AI Lesson
How Golden Ticket Attacks Work
The Cyber Mentor Beginner 2y ago
Are You Interested in Blue Teaming?
Cybersecurity
Are You Interested in Blue Teaming?
Coursera Intermediate 2y ago
Should You Learn Programming for Cybersecurity?
Cybersecurity ⚡ AI Lesson
Should You Learn Programming for Cybersecurity?
The Cyber Mentor Beginner 2y ago
Start Your Cybersecurity Career with TryHackMe
Cybersecurity ⚡ AI Lesson
Start Your Cybersecurity Career with TryHackMe
The Cyber Mentor Beginner 2y ago
Black Hat Bash: Bash Scripting for Hackers and Pentesters (Bonus: GraphQL and Drone hacking)
Cybersecurity ⚡ AI Lesson
Black Hat Bash: Bash Scripting for Hackers and Pentesters (Bonus: GraphQL and Drone hacking)
David Bombal Beginner 2y ago
You ever seen these devices? Networking for Hackers and Cybersecurity professionals.
Cybersecurity
You ever seen these devices? Networking for Hackers and Cybersecurity professionals.
David Bombal Beginner 2y ago
How scammers can reverse their payment
Cybersecurity
How scammers can reverse their payment
Jack Rhysider Intermediate 2y ago
Why You Need to Know Active Directory
Cybersecurity ⚡ AI Lesson
Why You Need to Know Active Directory
The Cyber Mentor Beginner 2y ago
Everything you need to know about networking fundamentals from @TheBeardedITDad.
Cybersecurity
Everything you need to know about networking fundamentals from @TheBeardedITDad.
Coursera Beginner 2y ago
Common Job Application Mistakes and How to Fix Them
Cybersecurity ⚡ AI Lesson
Common Job Application Mistakes and How to Fix Them
The Cyber Mentor Beginner 2y ago
Scraping Dark Web Sites with Python
Cybersecurity
Scraping Dark Web Sites with Python
John Hammond Beginner 2y ago
Focus on developing skills and experience to naturally receive better compensation.
Cybersecurity
Focus on developing skills and experience to naturally receive better compensation.
Coursera Beginner 2y ago
How an AT&T employee stole $23 million overnight
Cybersecurity ⚡ AI Lesson
How an AT&T employee stole $23 million overnight
Jack Rhysider Intermediate 2y ago
Demo of the Microsoft Window's Hack developed by the NSA (with OTW)
Cybersecurity
Demo of the Microsoft Window's Hack developed by the NSA (with OTW)
David Bombal Beginner 2y ago
How to Keep Up with Cybersecurity News
Cybersecurity ⚡ AI Lesson
How to Keep Up with Cybersecurity News
The Cyber Mentor Beginner 2y ago
How Hackers Can Hide PowerShell in Environment Variables
Cybersecurity
How Hackers Can Hide PowerShell in Environment Variables
John Hammond Beginner 2y ago
3 Resources to Learn Programming Languages for Pentesting
Cybersecurity ⚡ AI Lesson
3 Resources to Learn Programming Languages for Pentesting
The Cyber Mentor Beginner 2y ago
Malware & Cybersecurity Threats on the Horizon
Cybersecurity ⚡ AI Lesson
Malware & Cybersecurity Threats on the Horizon
John Hammond Beginner 2y ago
📚 Coursera Courses Opens on Coursera · Free to audit
1 / 3 View all →
Prevention of Harassment in the Workplace: US
📚 Coursera Course ↗
Self-paced
Prevention of Harassment in the Workplace: US
Opens on Coursera ↗
Reporting and Advanced Practices
📚 Coursera Course ↗
Self-paced
Reporting and Advanced Practices
Opens on Coursera ↗
PowerPoint Data Viz – Business Charting Techniques
📚 Coursera Course ↗
Self-paced
PowerPoint Data Viz – Business Charting Techniques
Opens on Coursera ↗
Master Marketing Strategy: Analyze, Design & Evaluate
📚 Coursera Course ↗
Self-paced
Master Marketing Strategy: Analyze, Design & Evaluate
Opens on Coursera ↗
Cyber Security for Absolute Beginners – Part 1
📚 Coursera Course ↗
Self-paced
Cyber Security for Absolute Beginners – Part 1
Opens on Coursera ↗
Cybersecurity Policy for Aviation and Internet Infrastructures
📚 Coursera Course ↗
Self-paced
Cybersecurity Policy for Aviation and Internet Infrastructures
Opens on Coursera ↗