Tech Skills

Cybersecurity

Ethical hacking, penetration testing, network security, CTFs and defensive security

6,963
lessons
Skills in this topic
View full skill map โ†’
Security Basics
beginner
Fix OWASP top 10 vulnerabilities
AI Security
intermediate
Identify and patch prompt injection vulnerabilities
Network Security
intermediate
Configure a firewall with proper inbound/outbound rules
Ethical Hacking & Pen Testing
intermediate
Conduct a full pen test with Kali Linux
Cloud Security
intermediate
Implement IAM least-privilege policies on AWS/GCP
Incident Response
intermediate
Build an incident response playbook
Security Compliance
intermediate
Map controls for SOC 2 Type II compliance
Defensive AI
advanced
Build an AI-powered log anomaly detector
VULNERABLE Kernel Drivers for Security Research
Cybersecurity โšก AI Lesson
VULNERABLE Kernel Drivers for Security Research
John Hammond Advanced 2y ago
15 Web Developer-Related Career Paths
Cybersecurity โšก AI Lesson
15 Web Developer-Related Career Paths
Traversy Media Beginner 2y ago
The Penetration Test That Went Horribly Wrong๐ŸŽ™Darknet Diaries Ep. 95: Jon & Brian's Big Adventure
Cybersecurity
The Penetration Test That Went Horribly Wrong๐ŸŽ™Darknet Diaries Ep. 95: Jon & Brian's Big Adventure
Jack Rhysider Intermediate 2y ago
New "Dark Web" Generative AI Chatbots?!
Cybersecurity
New "Dark Web" Generative AI Chatbots?!
John Hammond Intermediate 2y ago
Cybersecurity Catalysts: The Difference Makers | Host: Rob T. Lee
Cybersecurity โšก AI Lesson
Cybersecurity Catalysts: The Difference Makers | Host: Rob T. Lee
SANS Institute Beginner 2y ago
Your Windows Passwords ๐Ÿ˜ฑ #shorts #windows
Cybersecurity
Your Windows Passwords ๐Ÿ˜ฑ #shorts #windows
David Bombal Intermediate 2y ago
LEEROY fรคllt auf HACKER rein?
Cybersecurity โšก AI Lesson
LEEROY fรคllt auf HACKER rein?
LiveOverflow Beginner 2y ago
Find and Exploit Server-Side Template Injection (SSTI)
Cybersecurity โšก AI Lesson
Find and Exploit Server-Side Template Injection (SSTI)
The Cyber Mentor Beginner 2y ago
He Hacked NASA in 60 seconds (Real World Tutorial)
Cybersecurity
He Hacked NASA in 60 seconds (Real World Tutorial)
David Bombal Beginner 2y ago
How to make good HACKING videos
Cybersecurity โšก AI Lesson
How to make good HACKING videos
LiveOverflow Beginner 2y ago
How "Mimikatz" works
Cybersecurity
How "Mimikatz" works
Jack Rhysider Intermediate 2y ago
How to Automate Password Hacking
Cybersecurity โšก AI Lesson
How to Automate Password Hacking
The Cyber Mentor Beginner 2y ago
You came with *that* plan? You're braver than I thought!
Cybersecurity โšก AI Lesson
You came with *that* plan? You're braver than I thought!
SANS Institute Advanced 2y ago
Understand what actually coding is all about
Cybersecurity
Understand what actually coding is all about
Shweta Beginner 2y ago
List of top 10 programming languages of 2023, along with free resources to learn each of them!
Cybersecurity
List of top 10 programming languages of 2023, along with free resources to learn each of them!
Shweta Beginner 2y ago
Portswigger Lab: CSRF where token validation depends on request method
Cybersecurity
Portswigger Lab: CSRF where token validation depends on request method
Ali Issa Beginner 2y ago
HackThebox - Wifinetic
Cybersecurity
HackThebox - Wifinetic
IppSec Beginner 2y ago
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tutorial | Edureka Rewind
Cybersecurity
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tutorial | Edureka Rewind
edureka! Beginner 2y ago
Hacking the worldโ€™s most popular database
Cybersecurity โšก AI Lesson
Hacking the worldโ€™s most popular database
NetworkChuck Beginner 2y ago
Ethical Hacking Tutorial For Beginners [2024] | Learn Ethical hacking From Scratch | Edureka Rewind
Cybersecurity
Ethical Hacking Tutorial For Beginners [2024] | Learn Ethical hacking From Scratch | Edureka Rewind
edureka! Beginner 2y ago
The 5 of the best Security Plugins for Your Website
Cybersecurity
The 5 of the best Security Plugins for Your Website
WPBeginner - WordPress Tutorials Beginner 2y ago
Ascendium partners with Mandiant experts to increase cybersecurity
Cybersecurity
Ascendium partners with Mandiant experts to increase cybersecurity
Google Cloud Beginner 2y ago
Exploring CSRF Vulnerability: Theory and Hands-On Lab using CSRF generator in Burp Suite
Cybersecurity
Exploring CSRF Vulnerability: Theory and Hands-On Lab using CSRF generator in Burp Suite
Ali Issa Beginner 2y ago
Walter Isaacson: Elon Musk, Steve Jobs, Einstein, Da Vinci & Ben Franklin | Lex Fridman Podcast #395
Cybersecurity
Walter Isaacson: Elon Musk, Steve Jobs, Einstein, Da Vinci & Ben Franklin | Lex Fridman Podcast #395
Lex Fridman Beginner 2y ago
Exploring the Latest Malware Samples
Cybersecurity โšก AI Lesson
Exploring the Latest Malware Samples
John Hammond Advanced 2y ago
Hacking a vice presidential Yahoo account
Cybersecurity
Hacking a vice presidential Yahoo account
Jack Rhysider Beginner 2y ago
I Explored Ransomware Cybercrime on the Dark Web
Cybersecurity โšก AI Lesson
I Explored Ransomware Cybercrime on the Dark Web
John Hammond Beginner 2y ago
Hacker Tweets Explained
Cybersecurity
Hacker Tweets Explained
LiveOverflow Beginner 2y ago
FEATURE SEGMENT: Detection Engineering: The Blue Team Cheat Code
Cybersecurity โšก AI Lesson
FEATURE SEGMENT: Detection Engineering: The Blue Team Cheat Code
SANS Institute Advanced 2y ago
How to Navigate the Dark Web Safely
Cybersecurity โšก AI Lesson
How to Navigate the Dark Web Safely
The Cyber Mentor Beginner 2y ago
Armยฎ-based Video
Cybersecurity โšก AI Lesson
Armยฎ-based Video
LiveOverflow Beginner 2y ago
Cybersecurity Roadmap 2023 ! #cybersecurity
Cybersecurity
Cybersecurity Roadmap 2023 ! #cybersecurity
Shweta Intermediate 2y ago
The Full stack chart ! #programming
Cybersecurity
The Full stack chart ! #programming
Shweta Beginner 2y ago
This scammer milked Facebook for millions
Cybersecurity
This scammer milked Facebook for millions
Jack Rhysider Intermediate 2y ago
List of important languages for specific career goals ! #programming
Cybersecurity
List of important languages for specific career goals ! #programming
Shweta Beginner 2y ago
Best Youtube Channels for Programming #programming
Cybersecurity
Best Youtube Channels for Programming #programming
Shweta Beginner 2y ago
Learn About different types of Data types in programming !
Cybersecurity
Learn About different types of Data types in programming !
Shweta Beginner 2y ago
Learn When Popular Programming came into existence ! #programming
Cybersecurity
Learn When Popular Programming came into existence ! #programming
Shweta Beginner 2y ago
Getting Started with Command Injection
Cybersecurity โšก AI Lesson
Getting Started with Command Injection
The Cyber Mentor Beginner 2y ago
How To Pivot Through a Network with Chisel
Cybersecurity
How To Pivot Through a Network with Chisel
John Hammond Intermediate 2y ago
"Remove the video as soon as possible"
Cybersecurity โšก AI Lesson
"Remove the video as soon as possible"
LiveOverflow Beginner 2y ago
What is Kali Linux | Kali Linux Hacking Tutorials | Ethical Hacking Training | Edureka Rewind
Cybersecurity
What is Kali Linux | Kali Linux Hacking Tutorials | Ethical Hacking Training | Edureka Rewind
edureka! Beginner 2y ago
OneCoin exposed as the biggest crypto scam!
Cybersecurity โšก AI Lesson
OneCoin exposed as the biggest crypto scam!
Jack Rhysider Intermediate 2y ago
What is Phishing  | Learn Phishing Using Kali Linux  | Phishing Attack Explained | Edureka Rewind  1
Cybersecurity
What is Phishing | Learn Phishing Using Kali Linux | Phishing Attack Explained | Edureka Rewind 1
edureka! Beginner 2y ago
Classify Malware with YARA
Cybersecurity
Classify Malware with YARA
John Hammond Intermediate 2y ago
Detection Engineering: The Blue Team Cheat Code | Host: Mark Orlando | September 12, 2023
Cybersecurity โšก AI Lesson
Detection Engineering: The Blue Team Cheat Code | Host: Mark Orlando | September 12, 2023
SANS Institute Advanced 2y ago
Linux for Hackers Tutorial (And Free Courses)
Cybersecurity โšก AI Lesson
Linux for Hackers Tutorial (And Free Courses)
David Bombal Beginner 2y ago
Do Hackers Need To Know Algorithms and Data Structures?
Cybersecurity โšก AI Lesson
Do Hackers Need To Know Algorithms and Data Structures?
LiveOverflow Beginner 2y ago
๐Ÿ“š Coursera Courses Opens on Coursera ยท Free to audit
1 / 3 View all โ†’
Cybersecurity Policy for Water and Electricity Infrastructures
๐Ÿ“š Coursera Course โ†—
Self-paced
Cybersecurity Policy for Water and Electricity Infrastructures
Opens on Coursera โ†—
Physical Red Teaming
๐Ÿ“š Coursera Course โ†—
Self-paced
Physical Red Teaming
Opens on Coursera โ†—
Incident Response for Windows
๐Ÿ“š Coursera Course โ†—
Self-paced
Incident Response for Windows
Opens on Coursera โ†—
Azure: Create a Virtual Machine and Deploy a Web Server
๐Ÿ“š Coursera Course โ†—
Self-paced
Azure: Create a Virtual Machine and Deploy a Web Server
Opens on Coursera โ†—
Ethical Hacking with Kali Linux: Analyze & Defend
๐Ÿ“š Coursera Course โ†—
Self-paced
Ethical Hacking with Kali Linux: Analyze & Defend
Opens on Coursera โ†—
Advanced Security Strategies and Incident Response
๐Ÿ“š Coursera Course โ†—
Self-paced
Advanced Security Strategies and Incident Response
Opens on Coursera โ†—