Tech Skills

Cybersecurity

Ethical hacking, penetration testing, network security, CTFs and defensive security

6,811
lessons
Skills in this topic
View full skill map โ†’
Security Basics
beginner
Fix OWASP top 10 vulnerabilities
AI Security
intermediate
Identify and patch prompt injection vulnerabilities
Network Security
intermediate
Configure a firewall with proper inbound/outbound rules
Ethical Hacking & Pen Testing
intermediate
Conduct a full pen test with Kali Linux
Cloud Security
intermediate
Implement IAM least-privilege policies on AWS/GCP
Incident Response
intermediate
Build an incident response playbook
Security Compliance
intermediate
Map controls for SOC 2 Type II compliance
Defensive AI
advanced
Build an AI-powered log anomaly detector
How they scammed people for downloading nothing
Cybersecurity
How they scammed people for downloading nothing
Jack Rhysider Intermediate 2y ago
the most secure OS in the world.....I hate it
Cybersecurity โšก AI Lesson
the most secure OS in the world.....I hate it
NetworkChuck Beginner 2y ago
๐Ÿ’ฐ Cybersecurity Salary, Career & More | Edureka #Shorts
Cybersecurity
๐Ÿ’ฐ Cybersecurity Salary, Career & More | Edureka #Shorts
edureka! Beginner 2y ago
The Highs and Lows of Working in Cybersecurity
Cybersecurity โšก AI Lesson
The Highs and Lows of Working in Cybersecurity
The Cyber Mentor Beginner 2y ago
I Get Paid to Trick People Into Giving Up Their Passwords๐ŸŽ™Darknet Diaries Ep. 107: Alethe
Cybersecurity
I Get Paid to Trick People Into Giving Up Their Passwords๐ŸŽ™Darknet Diaries Ep. 107: Alethe
Jack Rhysider Intermediate 2y ago
Introducing SANS Executive Cybersecurity Exercises
Cybersecurity โšก AI Lesson
Introducing SANS Executive Cybersecurity Exercises
SANS Institute Beginner 2y ago
Quick Intro to Insecure Direct Object References (IDORs) & How You Can Fix Them
Cybersecurity
Quick Intro to Insecure Direct Object References (IDORs) & How You Can Fix Them
AWS Developers Beginner 2y ago
Avoid "OR 1=1" in SQL Injections
Cybersecurity โšก AI Lesson
Avoid "OR 1=1" in SQL Injections
The Cyber Mentor Beginner 2y ago
WiFi hacking like Mr Robot (with OTW)
Cybersecurity
WiFi hacking like Mr Robot (with OTW)
David Bombal Beginner 2y ago
Ethical Hacking using Kali Linux | Ethical Hacking Tutorial | Edureka | Cybersecurity Rewind - 3
Cybersecurity
Ethical Hacking using Kali Linux | Ethical Hacking Tutorial | Edureka | Cybersecurity Rewind - 3
edureka! Beginner 2y ago
Quick Intro to Injection Attacks & How You Can Fix Them
Cybersecurity
Quick Intro to Injection Attacks & How You Can Fix Them
AWS Developers Beginner 2y ago
This Company Got Hacked... but HOW?
Cybersecurity
This Company Got Hacked... but HOW?
John Hammond Advanced 2y ago
Learn to Hack AWS & Kubernetes Clusters (for free)
Cybersecurity
Learn to Hack AWS & Kubernetes Clusters (for free)
John Hammond Beginner 2y ago
Edโ€™s Whacky Winter Wonder Holiday Bonanza | Host: Ed Skoudis | December 12, 2023
Cybersecurity โšก AI Lesson
Edโ€™s Whacky Winter Wonder Holiday Bonanza | Host: Ed Skoudis | December 12, 2023
SANS Institute Intermediate 2y ago
Network security fundamentals: Creating layered network defenses with built-in tools
Cybersecurity
Network security fundamentals: Creating layered network defenses with built-in tools
Google Cloud Beginner 2y ago
Next Gen Hacker?
Cybersecurity
Next Gen Hacker?
David Bombal Beginner 2y ago
HackTheBox - Authority
Cybersecurity โšก AI Lesson
HackTheBox - Authority
IppSec Beginner 2y ago
All About WEB SECURITY | Web Security for Full Stack Developers | GeeksforGeeks
Cybersecurity
All About WEB SECURITY | Web Security for Full Stack Developers | GeeksforGeeks
GeeksforGeeks Beginner 2y ago
Hacker Reacts to 23andme Data Leak
Cybersecurity โšก AI Lesson
Hacker Reacts to 23andme Data Leak
LiveOverflow Beginner 2y ago
What if Q* broke cybersecurity? How would we adapt? Deep dive! Pโ‰ NP? Here's why it's probably fine..
Cybersecurity
What if Q* broke cybersecurity? How would we adapt? Deep dive! Pโ‰ NP? Here's why it's probably fine..
David Shapiro Intermediate 2y ago
Best Games to Teach You How to Code
Cybersecurity โšก AI Lesson
Best Games to Teach You How to Code
The Cyber Mentor Beginner 2y ago
Phases in Cybersecurity  |Cybersecurity Training | Edureka | Cybersecurity Rewind - 2
Cybersecurity
Phases in Cybersecurity |Cybersecurity Training | Edureka | Cybersecurity Rewind - 2
edureka! Intermediate 2y ago
I Hacked Another File Upload Website
Cybersecurity
I Hacked Another File Upload Website
John Hammond Intermediate 2y ago
The 1st Annual TCM Invitational CTF (THIS SATURDAY!)
Cybersecurity โšก AI Lesson
The 1st Annual TCM Invitational CTF (THIS SATURDAY!)
The Cyber Mentor Beginner 2y ago
Using AI for call scams!
Cybersecurity โšก AI Lesson
Using AI for call scams!
Jack Rhysider Intermediate 2y ago
New Web Application Penetration Testing Certification
Cybersecurity โšก AI Lesson
New Web Application Penetration Testing Certification
The Cyber Mentor Beginner 2y ago
Digital Forensics with FTK Imager (TryHackMe Advent of Cyber Day 8)
Cybersecurity
Digital Forensics with FTK Imager (TryHackMe Advent of Cyber Day 8)
John Hammond Intermediate 2y ago
Writing Custom Malware: Import Address Table Hooking
Cybersecurity
Writing Custom Malware: Import Address Table Hooking
John Hammond Beginner 2y ago
How Pirate Bay claimed to be hosted in North Korea
Cybersecurity โšก AI Lesson
How Pirate Bay claimed to be hosted in North Korea
Jack Rhysider Intermediate 2y ago
How To Hack APIs with Python
Cybersecurity
How To Hack APIs with Python
John Hammond Intermediate 2y ago
Empowering Tomorrowโ€™s Security Leaders with the SANS Transformational Triad
Cybersecurity โšก AI Lesson
Empowering Tomorrowโ€™s Security Leaders with the SANS Transformational Triad
SANS Institute Intermediate 2y ago
How to Become an Ethical Hacker | Ethical hacking certification | Ethical hacking  | Edureka Rewind
Cybersecurity
How to Become an Ethical Hacker | Ethical hacking certification | Ethical hacking | Edureka Rewind
edureka! Beginner 2y ago
Ethical Hacking Tutorial For Beginners 2025 | Learn Ethical hacking From Scratch | Edureka Rewind
Cybersecurity
Ethical Hacking Tutorial For Beginners 2025 | Learn Ethical hacking From Scratch | Edureka Rewind
edureka! Beginner 2y ago
What is Kali Linux | Kali Linux Hacking Tutorials | Ethical Hacking Training | Edureka Rewind
Cybersecurity
What is Kali Linux | Kali Linux Hacking Tutorials | Ethical Hacking Training | Edureka Rewind
edureka! Beginner 2y ago
This Cybercrime Group Puts Its Hackers Through School
Cybersecurity
This Cybercrime Group Puts Its Hackers Through School
John Hammond Intermediate 2y ago
LDR551: Building and Leading Security Operations Centers | GSOM
Cybersecurity โšก AI Lesson
LDR551: Building and Leading Security Operations Centers | GSOM
SANS Institute Advanced 2y ago
Kali Linux WHOIS with HackerD #shorts #kalilinux #domain #steam
Cybersecurity
Kali Linux WHOIS with HackerD #shorts #kalilinux #domain #steam
David Bombal Intermediate 2y ago
#Trending Cybersecurity Certifications #SecureYourFuture | Edureka #Shorts
Cybersecurity
#Trending Cybersecurity Certifications #SecureYourFuture | Edureka #Shorts
edureka! Beginner 2y ago
TryHackMe! Advent of Cyber 2023 Kick-Off
Cybersecurity
TryHackMe! Advent of Cyber 2023 Kick-Off
John Hammond Intermediate 2y ago
Networking for Hackers and Cybersecurity professionals (How long until you learn something new?)
Cybersecurity โšก AI Lesson
Networking for Hackers and Cybersecurity professionals (How long until you learn something new?)
David Bombal Beginner 2y ago
Incident Response: Azure Log Analysis
Cybersecurity โšก AI Lesson
Incident Response: Azure Log Analysis
John Hammond Advanced 2y ago
How much is your Instagram username worth?
Cybersecurity
How much is your Instagram username worth?
Jack Rhysider Intermediate 2y ago
Can ChatGPT Find Smart Contract Vulnerabilities?
Cybersecurity โšก AI Lesson
Can ChatGPT Find Smart Contract Vulnerabilities?
John Hammond Beginner 2y ago
Career Transition Series - Episode 27 | Cyber security Career Transition | Edureka Reviews
Cybersecurity
Career Transition Series - Episode 27 | Cyber security Career Transition | Edureka Reviews
edureka! Advanced 2y ago
Capture the Flag: Hacking Yet Another Markup Language
Cybersecurity
Capture the Flag: Hacking Yet Another Markup Language
John Hammond Intermediate 2y ago
Hacking and Attacking Active Directory LIVE
Cybersecurity โšก AI Lesson
Hacking and Attacking Active Directory LIVE
The Cyber Mentor Beginner 2y ago
Steve Tran: Hacker, Magician, Police Officer, and CISO
Cybersecurity โšก AI Lesson
Steve Tran: Hacker, Magician, Police Officer, and CISO
SANS Institute Intermediate 2y ago
This Cybercrime Forum Is Full Of Hackers
Cybersecurity
This Cybercrime Forum Is Full Of Hackers
John Hammond Intermediate 2y ago
๐Ÿ“š Coursera Courses Opens on Coursera ยท Free to audit
1 / 3 View all โ†’
AWS: Security and Key Management
๐Ÿ“š Coursera Course โ†—
Self-paced
AWS: Security and Key Management
Opens on Coursera โ†—
Foundations of Security Engineering
๐Ÿ“š Coursera Course โ†—
Self-paced
Foundations of Security Engineering
Opens on Coursera โ†—
Cybersecurity Governance and Compliance
๐Ÿ“š Coursera Course โ†—
Self-paced
Cybersecurity Governance and Compliance
Opens on Coursera โ†—
Cloud Security for IT Professionals
๐Ÿ“š Coursera Course โ†—
Self-paced
Cloud Security for IT Professionals
Opens on Coursera โ†—
Cloud Security Basics
๐Ÿ“š Coursera Course โ†—
Self-paced
Cloud Security Basics
Opens on Coursera โ†—
Cybersecurity Foundations & Threat Mitigation
๐Ÿ“š Coursera Course โ†—
Self-paced
Cybersecurity Foundations & Threat Mitigation
Opens on Coursera โ†—