Tech Skills

Cybersecurity

Ethical hacking, penetration testing, network security, CTFs and defensive security

6,958
lessons
Skills in this topic
View full skill map โ†’
Security Basics
beginner
Fix OWASP top 10 vulnerabilities
AI Security
intermediate
Identify and patch prompt injection vulnerabilities
Network Security
intermediate
Configure a firewall with proper inbound/outbound rules
Ethical Hacking & Pen Testing
intermediate
Conduct a full pen test with Kali Linux
Cloud Security
intermediate
Implement IAM least-privilege policies on AWS/GCP
Incident Response
intermediate
Build an incident response playbook
Security Compliance
intermediate
Map controls for SOC 2 Type II compliance
Defensive AI
advanced
Build an AI-powered log anomaly detector
Hacking with Bloodhound: Map Your Environment
Cybersecurity
Hacking with Bloodhound: Map Your Environment
John Hammond Intermediate 2y ago
Why Was Puerto Rico's Lottery Leaking Millions of Dollars a Month? ๐Ÿ’ธ Darknet Diaries Ep 101: Loterรญa
Cybersecurity
Why Was Puerto Rico's Lottery Leaking Millions of Dollars a Month? ๐Ÿ’ธ Darknet Diaries Ep 101: Loterรญa
Jack Rhysider Beginner 2y ago
How Can You Build Essential Cybersecurity Skills for Your Resume
Cybersecurity
How Can You Build Essential Cybersecurity Skills for Your Resume
Coursera Beginner 2y ago
What Can You Gain with Cybersecurity Certificates?
Cybersecurity
What Can You Gain with Cybersecurity Certificates?
Coursera Intermediate 2y ago
How Hackers Hide From Memory Scanners
Cybersecurity โšก AI Lesson
How Hackers Hide From Memory Scanners
John Hammond Beginner 2y ago
Three Cloud Security Differentiators for Leaders
Cybersecurity โšก AI Lesson
Three Cloud Security Differentiators for Leaders
SANS Institute Intermediate 2y ago
Weird Security Voyeurs Unite | Host: Ryan Chapman | Guest: Sherrod Degrippo
Cybersecurity โšก AI Lesson
Weird Security Voyeurs Unite | Host: Ryan Chapman | Guest: Sherrod Degrippo
SANS Institute Intermediate 2y ago
Getting Started with CTF's
Cybersecurity โšก AI Lesson
Getting Started with CTF's
The Cyber Mentor Beginner 2y ago
HackTheBox - Topology
Cybersecurity
HackTheBox - Topology
IppSec Beginner 2y ago
New Mobile Penetration Testing Certification
Cybersecurity โšก AI Lesson
New Mobile Penetration Testing Certification
The Cyber Mentor Beginner 2y ago
Raspberry Pi 5 Kali Linux install in 10 minutes (with WiFi hacking)
Cybersecurity
Raspberry Pi 5 Kali Linux install in 10 minutes (with WiFi hacking)
David Bombal Beginner 2y ago
How Amat Cama hacked Samsung for 3 years straight
Cybersecurity
How Amat Cama hacked Samsung for 3 years straight
Jack Rhysider Intermediate 2y ago
EXACTLY How To Negotiate Your Salary? Watch and Learn | Full Disclosure
Cybersecurity
EXACTLY How To Negotiate Your Salary? Watch and Learn | Full Disclosure
Full Disclosure Beginner 2y ago
macOS to Kali Linux to Windows 98? (back to the future copy and paste) #shorts #linux #windows
Cybersecurity
macOS to Kali Linux to Windows 98? (back to the future copy and paste) #shorts #linux #windows
David Bombal Intermediate 2y ago
CISSP Mastery Unleashed | CISSP Training | Edureka Live
Cybersecurity
CISSP Mastery Unleashed | CISSP Training | Edureka Live
edureka! Beginner 2y ago
HackTheBox - Gofer
Cybersecurity โšก AI Lesson
HackTheBox - Gofer
IppSec Beginner 2y ago
99% of SQL Users Don't Know This AMAZING Function
Cybersecurity
99% of SQL Users Don't Know This AMAZING Function
Manish Sharma Beginner 2y ago
Cybersecurity Careers by the Numbers
Cybersecurity
Cybersecurity Careers by the Numbers
Stanford Online Beginner 2y ago
Biggest Cybersecurity Job Myths
Cybersecurity โšก AI Lesson
Biggest Cybersecurity Job Myths
Stanford Online Beginner 2y ago
What is Phishing  | Learn Phishing Using Kali Linux  | Phishing Attack Explained | Edureka Rewind  1
Cybersecurity
What is Phishing | Learn Phishing Using Kali Linux | Phishing Attack Explained | Edureka Rewind 1
edureka! Beginner 2y ago
Cybersecurity Professional Certificate or Degree: Which is a Fit for You?
Cybersecurity
Cybersecurity Professional Certificate or Degree: Which is a Fit for You?
Coursera Beginner 2y ago
4 Entry-Level Cybersecurity Roles: What Do You Need to Know?
Cybersecurity
4 Entry-Level Cybersecurity Roles: What Do You Need to Know?
Coursera Beginner 2y ago
How Do Degrees and Certificates Help You in Your Cybersecurity Job Search?
Cybersecurity
How Do Degrees and Certificates Help You in Your Cybersecurity Job Search?
Coursera Beginner 2y ago
they're selling WHAT on Telegram?!?
Cybersecurity โšก AI Lesson
they're selling WHAT on Telegram?!?
John Hammond Intermediate 2y ago
Mike Melo: The Case for DSPM vs. CSPM
Cybersecurity โšก AI Lesson
Mike Melo: The Case for DSPM vs. CSPM
SANS Institute Advanced 2y ago
ChatGPT Learns the Rust Programming Language
Cybersecurity
ChatGPT Learns the Rust Programming Language
John Hammond Beginner 2y ago
I Stole a Microsoft 365 Account. Here's How.
Cybersecurity
I Stole a Microsoft 365 Account. Here's How.
John Hammond Intermediate 2y ago
Applying the Science of Human Behavior to Cybersecurity
Cybersecurity โšก AI Lesson
Applying the Science of Human Behavior to Cybersecurity
SANS Institute Beginner 2y ago
Does an in-demand role in a high-growth field like cybersecurity sound exciting?
Cybersecurity
Does an in-demand role in a high-growth field like cybersecurity sound exciting?
Coursera Beginner 2y ago
this Cybersecurity Platform is FREE
Cybersecurity
this Cybersecurity Platform is FREE
John Hammond Intermediate 2y ago
Building a Winning Team Culture
Cybersecurity โšก AI Lesson
Building a Winning Team Culture
The Cyber Mentor Beginner 2y ago
Hacking Websites: NodeJS Server-Side Template Injection
Cybersecurity
Hacking Websites: NodeJS Server-Side Template Injection
John Hammond Intermediate 2y ago
Jadee Hanson: Balancing CISO, CIO, and Product Leadership
Cybersecurity โšก AI Lesson
Jadee Hanson: Balancing CISO, CIO, and Product Leadership
SANS Institute Intermediate 2y ago
The Russian cyberattack that crippled Ukraine
Cybersecurity
The Russian cyberattack that crippled Ukraine
Jack Rhysider Intermediate 2y ago
How to Use Docker in 2023
Cybersecurity โšก AI Lesson
How to Use Docker in 2023
The Cyber Mentor Beginner 2y ago
Fetch the Flag CTF is Live Right Now
Cybersecurity
Fetch the Flag CTF is Live Right Now
John Hammond Intermediate 2y ago
The 3CX Hack In Retrospect
Cybersecurity
The 3CX Hack In Retrospect
John Hammond Intermediate 2y ago
Cloud Security with Microsoft 365 Developer Tenants
Cybersecurity โšก AI Lesson
Cloud Security with Microsoft 365 Developer Tenants
John Hammond Intermediate 2y ago
Let's Settle This in the Cyber Range | Host: Ed Skoudis | October 24, 2023
Cybersecurity โšก AI Lesson
Let's Settle This in the Cyber Range | Host: Ed Skoudis | October 24, 2023
SANS Institute Beginner 2y ago
Did the World Bankโ€™s servers get breached?
Cybersecurity
Did the World Bankโ€™s servers get breached?
Jack Rhysider Intermediate 2y ago
WARNING: Don't be this guy! (HackerD explains) #shorts #cybersecurity #hacker
Cybersecurity โšก AI Lesson
WARNING: Don't be this guy! (HackerD explains) #shorts #cybersecurity #hacker
David Bombal Beginner 2y ago
RagnarLocker Ransomware Seized by Law Enforcement
Cybersecurity โšก AI Lesson
RagnarLocker Ransomware Seized by Law Enforcement
John Hammond Intermediate 2y ago
Password Managers and Secure Passwords
Cybersecurity โšก AI Lesson
Password Managers and Secure Passwords
The Cyber Mentor Beginner 2y ago
Brett Cumming: Saying Yes Led to a Career in Cybersecurity
Cybersecurity โšก AI Lesson
Brett Cumming: Saying Yes Led to a Career in Cybersecurity
SANS Institute Intermediate 2y ago
Linux Networking that you need to know (Episode 3)
Cybersecurity โšก AI Lesson
Linux Networking that you need to know (Episode 3)
David Bombal Beginner 2y ago
Ethical Hacking Tutorial For Beginners | Learn Ethical hacking From Scratch | Edureka Rewind
Cybersecurity
Ethical Hacking Tutorial For Beginners | Learn Ethical hacking From Scratch | Edureka Rewind
edureka! Beginner 2y ago
What is Kali Linux | Kali Linux Hacking Tutorials | Ethical Hacking Training | Edureka Rewind
Cybersecurity
What is Kali Linux | Kali Linux Hacking Tutorials | Ethical Hacking Training | Edureka Rewind
edureka! Beginner 2y ago
Learn Python in Under 30 Minutes
Cybersecurity โšก AI Lesson
Learn Python in Under 30 Minutes
The Cyber Mentor Beginner 2y ago
๐Ÿ“š Coursera Courses Opens on Coursera ยท Free to audit
1 / 3 View all โ†’
Advanced Penetration Testing with Kali Linux
๐Ÿ“š Coursera Course โ†—
Self-paced
Advanced Penetration Testing with Kali Linux
Opens on Coursera โ†—
Analyze Network Traffic with TCPDump: Build a Logging Tool
๐Ÿ“š Coursera Course โ†—
Self-paced
Analyze Network Traffic with TCPDump: Build a Logging Tool
Opens on Coursera โ†—
Beginning Security
๐Ÿ“š Coursera Course โ†—
Self-paced
Beginning Security
Opens on Coursera โ†—
Homeland Security & Cybersecurity Connection - It's Not About the Terrorists
๐Ÿ“š Coursera Course โ†—
Self-paced
Homeland Security & Cybersecurity Connection - It's Not About the Terrorists
Opens on Coursera โ†—
Windows Server 2025 Admin โ€“ Hands-On Labs
๐Ÿ“š Coursera Course โ†—
Self-paced
Windows Server 2025 Admin โ€“ Hands-On Labs
Opens on Coursera โ†—
Advanced Strategic Threat Intelligence Research & Reporting
๐Ÿ“š Coursera Course โ†—
Self-paced
Advanced Strategic Threat Intelligence Research & Reporting
Opens on Coursera โ†—