Tech Skills

Cybersecurity

Ethical hacking, penetration testing, network security, CTFs and defensive security

6,803
lessons
Skills in this topic
View full skill map โ†’
Security Basics
beginner
Fix OWASP top 10 vulnerabilities
AI Security
intermediate
Identify and patch prompt injection vulnerabilities
Network Security
intermediate
Configure a firewall with proper inbound/outbound rules
Ethical Hacking & Pen Testing
intermediate
Conduct a full pen test with Kali Linux
Cloud Security
intermediate
Implement IAM least-privilege policies on AWS/GCP
Incident Response
intermediate
Build an incident response playbook
Security Compliance
intermediate
Map controls for SOC 2 Type II compliance
Defensive AI
advanced
Build an AI-powered log anomaly detector
Tulsi Gabbard: War, Politics, and the Military Industrial Complex | Lex Fridman Podcast #423
Cybersecurity
Tulsi Gabbard: War, Politics, and the Military Industrial Complex | Lex Fridman Podcast #423
Lex Fridman Beginner 2y ago
Hackers Hide with Clever Alternate Data Streams
Cybersecurity
Hackers Hide with Clever Alternate Data Streams
John Hammond Beginner 2y ago
Are you liable if criminals use your hacking software?
Cybersecurity โšก AI Lesson
Are you liable if criminals use your hacking software?
Jack Rhysider Intermediate 2y ago
Mind Blowing ๐Ÿคฏ Reverse Shell Demo with DNS data bouncing exfiltration!
Cybersecurity
Mind Blowing ๐Ÿคฏ Reverse Shell Demo with DNS data bouncing exfiltration!
David Bombal Beginner 2y ago
HackTheBox - Rebound
Cybersecurity
HackTheBox - Rebound
IppSec Beginner 2y ago
7 tech leaders who ended up in prison
Cybersecurity โšก AI Lesson
7 tech leaders who ended up in prison
Fireship Intermediate 2y ago
Can AI Solve CAPTCHAs?
Cybersecurity โšก AI Lesson
Can AI Solve CAPTCHAs?
The Cyber Mentor Beginner 2y ago
What's the Best Firewall? #shorts #firewall #cybersecurity #iphone #android
Cybersecurity โšก AI Lesson
What's the Best Firewall? #shorts #firewall #cybersecurity #iphone #android
David Bombal Intermediate 2y ago
Giving a Caido a Try With Alex
Cybersecurity โšก AI Lesson
Giving a Caido a Try With Alex
The Cyber Mentor Beginner 2y ago
Why you shouldn't reuse passwords
Cybersecurity
Why you shouldn't reuse passwords
Jack Rhysider Intermediate 2y ago
Malware Analysis & Threat Intel: UAC Bypasses
Cybersecurity โšก AI Lesson
Malware Analysis & Threat Intel: UAC Bypasses
John Hammond Beginner 2y ago
Changing the Landscape: Women Redefining Cybersecurity
Cybersecurity โšก AI Lesson
Changing the Landscape: Women Redefining Cybersecurity
SANS Institute Intermediate 2y ago
What is Kali Linux | Kali Linux Hacking Tutorials | Ethical Hacking Training | Edureka Rewind
Cybersecurity
What is Kali Linux | Kali Linux Hacking Tutorials | Ethical Hacking Training | Edureka Rewind
edureka! Beginner 2y ago
How to Become an Ethical Hacker | Ethical hacking certification | Ethical hacking training | Edureka
Cybersecurity
How to Become an Ethical Hacker | Ethical hacking certification | Ethical hacking training | Edureka
edureka! Beginner 2y ago
Top four entry-level roles in cybersecurity, brought to you by Sandra Liu, cybersecurity enthusiast.
Cybersecurity
Top four entry-level roles in cybersecurity, brought to you by Sandra Liu, cybersecurity enthusiast.
Coursera Beginner 2y ago
Kimbal Musk: The Art of Cooking, Tesla, SpaceX, Zip2, and Family | Lex Fridman Podcast #417
Cybersecurity
Kimbal Musk: The Art of Cooking, Tesla, SpaceX, Zip2, and Family | Lex Fridman Podcast #417
Lex Fridman Beginner 2y ago
Day Johnson is on a mission to decode the fusion between engineering & life.
Cybersecurity
Day Johnson is on a mission to decode the fusion between engineering & life.
Coursera Beginner 2y ago
3 Things You Need to Become a Penetration Tester
Cybersecurity โšก AI Lesson
3 Things You Need to Become a Penetration Tester
The Cyber Mentor Beginner 2y ago
5 Ways To Be More Productive
Cybersecurity โšก AI Lesson
5 Ways To Be More Productive
The Cyber Mentor Beginner 2y ago
Is your Discord account safe?
Cybersecurity
Is your Discord account safe?
Jack Rhysider Intermediate 2y ago
Network Chuck Hacked YouTube! Learn how RIGHT NOW!!
Cybersecurity
Network Chuck Hacked YouTube! Learn how RIGHT NOW!!
David Bombal Beginner 2y ago
What is a File Disclosure Vulnerability?
Cybersecurity โšก AI Lesson
What is a File Disclosure Vulnerability?
The Cyber Mentor Beginner 2y ago
How Hackers Compromise BIG Networks (with NetExec)
Cybersecurity
How Hackers Compromise BIG Networks (with NetExec)
John Hammond Intermediate 2y ago
Red Flags for Cybersecurity Jobseekers: Interviews and Resumes
Cybersecurity โšก AI Lesson
Red Flags for Cybersecurity Jobseekers: Interviews and Resumes
The Cyber Mentor Beginner 2y ago
Stop these weird addresses #shorts #firewall #iphone #android #starlink
Cybersecurity
Stop these weird addresses #shorts #firewall #iphone #android #starlink
David Bombal Intermediate 2y ago
The Apex Legends Hack.
Cybersecurity โšก AI Lesson
The Apex Legends Hack.
John Hammond Intermediate 2y ago
What's the Structure of a JSON Web Token?
Cybersecurity โšก AI Lesson
What's the Structure of a JSON Web Token?
The Cyber Mentor Beginner 2y ago
Finding WEIRD Typosquatting Websites
Cybersecurity
Finding WEIRD Typosquatting Websites
John Hammond Intermediate 2y ago
Stealing $100,000 from Puff Daddy
Cybersecurity
Stealing $100,000 from Puff Daddy
Jack Rhysider Intermediate 2y ago
Remediate XXE (XML External Entity Injection)
Cybersecurity โšก AI Lesson
Remediate XXE (XML External Entity Injection)
The Cyber Mentor Beginner 2y ago
Hackers remotely hack millions of cars!
Cybersecurity
Hackers remotely hack millions of cars!
David Bombal Intermediate 2y ago
3 Ways to Level Up Your Hacking
Cybersecurity โšก AI Lesson
3 Ways to Level Up Your Hacking
The Cyber Mentor Beginner 2y ago
Don't Use CyberChef. Use This Instead.
Cybersecurity โšก AI Lesson
Don't Use CyberChef. Use This Instead.
John Hammond Advanced 2y ago
The BlackBerry attack
Cybersecurity
The BlackBerry attack
Jack Rhysider Intermediate 2y ago
Getting Started in a Cybersecurity Career
Cybersecurity โšก AI Lesson
Getting Started in a Cybersecurity Career
The Cyber Mentor Beginner 2y ago
The Pig Butchering Scam
Cybersecurity โšก AI Lesson
The Pig Butchering Scam
Jack Rhysider Intermediate 2y ago
The Secrets of The Tor Browser
Cybersecurity
The Secrets of The Tor Browser
John Hammond Intermediate 2y ago
Build Your Own TryHackMe CTF (from start to finish)
Cybersecurity โšก AI Lesson
Build Your Own TryHackMe CTF (from start to finish)
The Cyber Mentor Beginner 2y ago
Why does this work or not work? #shorts #iphone #android #starlink #vpn
Cybersecurity
Why does this work or not work? #shorts #iphone #android #starlink #vpn
David Bombal Intermediate 2y ago
Should you be using WiFi 7 or WPA3? Best Wi-Fi setup?
Cybersecurity โšก AI Lesson
Should you be using WiFi 7 or WPA3? Best Wi-Fi setup?
David Bombal Beginner 2y ago
Can AI Fix Vulnerable Code?
Cybersecurity โšก AI Lesson
Can AI Fix Vulnerable Code?
The Cyber Mentor Beginner 2y ago
The government spyware used to catch criminals
Cybersecurity
The government spyware used to catch criminals
Jack Rhysider Intermediate 2y ago
Don't make this Wi-Fi Security Mistake! #shorts #wifi #iphone #cybersecurity
Cybersecurity
Don't make this Wi-Fi Security Mistake! #shorts #wifi #iphone #cybersecurity
David Bombal Beginner 2y ago
Can a PDF File be Malware?
Cybersecurity
Can a PDF File be Malware?
John Hammond Intermediate 2y ago
The Cops Had No Idea He Just Stole $1 Million Worth of Crypto๐ŸŽ™Darknet Diaries Ep. 118: Hot Swaps
Cybersecurity
The Cops Had No Idea He Just Stole $1 Million Worth of Crypto๐ŸŽ™Darknet Diaries Ep. 118: Hot Swaps
Jack Rhysider Beginner 2y ago
I Made Malware In Under 20 Minutes
Cybersecurity โšก AI Lesson
I Made Malware In Under 20 Minutes
John Hammond Beginner 2y ago
How the police spied on Europe's top criminal
Cybersecurity
How the police spied on Europe's top criminal
Jack Rhysider Intermediate 2y ago
How to Find Cross-Site Scripting (XSS)
Cybersecurity โšก AI Lesson
How to Find Cross-Site Scripting (XSS)
The Cyber Mentor Beginner 2y ago
๐Ÿ“š Coursera Courses Opens on Coursera ยท Free to audit
1 / 3 View all โ†’
Offensive Cyber Operations
๐Ÿ“š Coursera Course โ†—
Self-paced
Offensive Cyber Operations
Opens on Coursera โ†—
Cryptography
๐Ÿ“š Coursera Course โ†—
Self-paced
Cryptography
Opens on Coursera โ†—
Network Traffic Analysis with Wireshark
๐Ÿ“š Coursera Course โ†—
Self-paced
Network Traffic Analysis with Wireshark
Opens on Coursera โ†—
Proactive Computer Security
๐Ÿ“š Coursera Course โ†—
Self-paced
Proactive Computer Security
Opens on Coursera โ†—
Cloud Security Basics
๐Ÿ“š Coursera Course โ†—
Self-paced
Cloud Security Basics
Opens on Coursera โ†—
Security Operations
๐Ÿ“š Coursera Course โ†—
Self-paced
Security Operations
Opens on Coursera โ†—