Tech Skills

Cybersecurity

Ethical hacking, penetration testing, network security, CTFs and defensive security

6,972
lessons
Skills in this topic
View full skill map โ†’
Security Basics
beginner
Fix OWASP top 10 vulnerabilities
AI Security
intermediate
Identify and patch prompt injection vulnerabilities
Network Security
intermediate
Configure a firewall with proper inbound/outbound rules
Ethical Hacking & Pen Testing
intermediate
Conduct a full pen test with Kali Linux
Cloud Security
intermediate
Implement IAM least-privilege policies on AWS/GCP
Incident Response
intermediate
Build an incident response playbook
Security Compliance
intermediate
Map controls for SOC 2 Type II compliance
Defensive AI
advanced
Build an AI-powered log anomaly detector
Strategy 9: Communicate Clearly, Collaborate Often, Share Generously
Cybersecurity โšก AI Lesson
Strategy 9: Communicate Clearly, Collaborate Often, Share Generously
SANS Institute Intermediate 2y ago
Is Coding Still Worth It?
Cybersecurity โšก AI Lesson
Is Coding Still Worth It?
a16z Beginner 2y ago
Web App Hacking with Caido.io
Cybersecurity โšก AI Lesson
Web App Hacking with Caido.io
The Cyber Mentor Intermediate 2y ago
Which one ?                            #programming #programminglanguages #print #languages
Cybersecurity
Which one ? #programming #programminglanguages #print #languages
CydexCode Beginner 2y ago
Choose your Language ๐Ÿ‘จโ€๐Ÿ’ป #programminglanguage #languages #programming
Cybersecurity
Choose your Language ๐Ÿ‘จโ€๐Ÿ’ป #programminglanguage #languages #programming
CydexCode Beginner 2y ago
How to Write Great Bug Bounty Reports
Cybersecurity โšก AI Lesson
How to Write Great Bug Bounty Reports
The Cyber Mentor Beginner 2y ago
TryHackMe! Finding Computer Artifacts with osquery
Cybersecurity
TryHackMe! Finding Computer Artifacts with osquery
John Hammond Beginner 2y ago
The Most Important Thing I Learned About Core Values!
Cybersecurity
The Most Important Thing I Learned About Core Values!
Evan Carmichael Intermediate 2y ago
how to HACK a password // Windows Edition
Cybersecurity โšก AI Lesson
how to HACK a password // Windows Edition
NetworkChuck Beginner 2y ago
Keynote | Demonstrating CISO ROI with the C-Suite
Cybersecurity โšก AI Lesson
Keynote | Demonstrating CISO ROI with the C-Suite
SANS Institute Intermediate 2y ago
How Hackers Use netsh.exe For Persistence & Code Execution (Sliver C2)
Cybersecurity โšก AI Lesson
How Hackers Use netsh.exe For Persistence & Code Execution (Sliver C2)
John Hammond Intermediate 2y ago
Earn Your Cybersecurity Master's Degree Online | University of London
Cybersecurity
Earn Your Cybersecurity Master's Degree Online | University of London
Coursera Beginner 2y ago
$540 million of crypto was stolen through an unlikely loophole: LinkedIn
Cybersecurity
$540 million of crypto was stolen through an unlikely loophole: LinkedIn
Jack Rhysider Intermediate 2y ago
Top 3 Cybersecurity Career Tips (from Ex-NSA Hacker)
Cybersecurity โšก AI Lesson
Top 3 Cybersecurity Career Tips (from Ex-NSA Hacker)
David Bombal Beginner 2y ago
HackTheBox - Stocker
Cybersecurity โšก AI Lesson
HackTheBox - Stocker
IppSec Beginner 2y ago
Hacking Google Cloud?
Cybersecurity
Hacking Google Cloud?
LiveOverflow Beginner 2y ago
Don't use these passwords! (Too easy to crack) #shorts
Cybersecurity โšก AI Lesson
Don't use these passwords! (Too easy to crack) #shorts
David Bombal Beginner 2y ago
HackTheBox - Escape
Cybersecurity โšก AI Lesson
HackTheBox - Escape
IppSec Beginner 2y ago
Take Charge of Your Indexability: How to Optimize Your Technical Work [MozCon 2021] โ€” Areej AbuAli
Cybersecurity
Take Charge of Your Indexability: How to Optimize Your Technical Work [MozCon 2021] โ€” Areej AbuAli
Moz Intermediate 2y ago
Cybersecurity Live - CS50 #Reels
Cybersecurity
Cybersecurity Live - CS50 #Reels
CS50 Intermediate 2y ago
Directory Traversal Attacks Made Easy
Cybersecurity โšก AI Lesson
Directory Traversal Attacks Made Easy
The Cyber Mentor Beginner 2y ago
Panel | The Intersection of Cybersecurity and Law
Cybersecurity โšก AI Lesson
Panel | The Intersection of Cybersecurity and Law
SANS Institute Intermediate 2y ago
Cybersecurity Charisma: Unlocking Security Culture and Leadership
Cybersecurity โšก AI Lesson
Cybersecurity Charisma: Unlocking Security Culture and Leadership
SANS Institute Beginner 2y ago
Leading High Performing Teams During Lean Times
Cybersecurity โšก AI Lesson
Leading High Performing Teams During Lean Times
SANS Institute Intermediate 2y ago
This is NetWars!
Cybersecurity โšก AI Lesson
This is NetWars!
SANS Institute Beginner 2y ago
SANS New NetWars Core Version 9
Cybersecurity โšก AI Lesson
SANS New NetWars Core Version 9
SANS Institute Beginner 2y ago
Scale Your Cloud Infrastructure (Hosting CTFs)
Cybersecurity
Scale Your Cloud Infrastructure (Hosting CTFs)
John Hammond Intermediate 2y ago
Strategy 8: Leverage Tools and Support Analyst Workflow
Cybersecurity โšก AI Lesson
Strategy 8: Leverage Tools and Support Analyst Workflow
SANS Institute Intermediate 2y ago
5 Hacking Tools I Can't Live Without
Cybersecurity โšก AI Lesson
5 Hacking Tools I Can't Live Without
The Cyber Mentor Beginner 2y ago
How does the PNPT compare to other Pentest Certifications?  #PNPT #pentester #pentesting
Cybersecurity โšก AI Lesson
How does the PNPT compare to other Pentest Certifications? #PNPT #pentester #pentesting
The Cyber Mentor Intermediate 2y ago
Blueprint Live at the SANS Blue Team Summit 2023
Cybersecurity โšก AI Lesson
Blueprint Live at the SANS Blue Team Summit 2023
SANS Institute Intermediate 2y ago
Responsive Screen Sizes ๐Ÿ‘จโ€๐Ÿ’ป.  #responsive #responsivewebdesign #responsivedesign
Cybersecurity
Responsive Screen Sizes ๐Ÿ‘จโ€๐Ÿ’ป. #responsive #responsivewebdesign #responsivedesign
CydexCode Beginner 2y ago
Protecting the Cloud from Ransomware | Host: Ryan Chapman | June 20, 2023
Cybersecurity โšก AI Lesson
Protecting the Cloud from Ransomware | Host: Ryan Chapman | June 20, 2023
SANS Institute Beginner 2y ago
Strategy 7: Select and Collect the Right Data
Cybersecurity โšก AI Lesson
Strategy 7: Select and Collect the Right Data
SANS Institute Intermediate 2y ago
WordPress Vulnerabilities
Cybersecurity โšก AI Lesson
WordPress Vulnerabilities
The Cyber Mentor Beginner 2y ago
Pegasus Spyware: so dangerous that it should be banned? OTW explains...
Cybersecurity
Pegasus Spyware: so dangerous that it should be banned? OTW explains...
David Bombal Beginner 2y ago
Panel | Mastercard Trust Center
Cybersecurity โšก AI Lesson
Panel | Mastercard Trust Center
SANS Institute Beginner 2y ago
Panel | To Insure or Not to Insure: Debating the Value of Cyber Insurance for Small Business Success
Cybersecurity โšก AI Lesson
Panel | To Insure or Not to Insure: Debating the Value of Cyber Insurance for Small Business Success
SANS Institute Advanced 2y ago
How SMBs can defend against Top Threats using the CIS Critical Security Controls (Controls)
Cybersecurity โšก AI Lesson
How SMBs can defend against Top Threats using the CIS Critical Security Controls (Controls)
SANS Institute Beginner 2y ago
Locking It Down: Best Practices for Strong Passwords and Authentication Tools.
Cybersecurity โšก AI Lesson
Locking It Down: Best Practices for Strong Passwords and Authentication Tools.
SANS Institute Intermediate 2y ago
MOVEit Vulnerability CVE-2023-34362 Breach Deep Dive
Cybersecurity โšก AI Lesson
MOVEit Vulnerability CVE-2023-34362 Breach Deep Dive
The Cyber Mentor Beginner 2y ago
WiFi hacking with a Raspberry Pi and Parrot OS
Cybersecurity
WiFi hacking with a Raspberry Pi and Parrot OS
David Bombal Beginner 2y ago
How Hackers Evade Program Allowlists with DLLs
Cybersecurity
How Hackers Evade Program Allowlists with DLLs
John Hammond Intermediate 2y ago
The Dark Knight of OSINT, Matt Edmondson | Host: Rob Lee | June 13, 2023
Cybersecurity โšก AI Lesson
The Dark Knight of OSINT, Matt Edmondson | Host: Rob Lee | June 13, 2023
SANS Institute Beginner 2y ago
Ethical Hacking: Bypass Passwords with Linux PAM Degradation Attack
Cybersecurity
Ethical Hacking: Bypass Passwords with Linux PAM Degradation Attack
John Hammond Beginner 2y ago
Strategy 6: Illuminate Adversaries with Cyber Threat Intelligence
Cybersecurity โšก AI Lesson
Strategy 6: Illuminate Adversaries with Cyber Threat Intelligence
SANS Institute Intermediate 2y ago
the CHEAPEST path to becoming an ethical hacker
Cybersecurity โšก AI Lesson
the CHEAPEST path to becoming an ethical hacker
The Cyber Mentor Beginner 2y ago
The Emerging Technologies of AI, Edge and Quantum computing that are important to know about...
Cybersecurity
The Emerging Technologies of AI, Edge and Quantum computing that are important to know about...
David Bombal Beginner 2y ago
๐Ÿ“š Coursera Courses Opens on Coursera ยท Free to audit
1 / 3 View all โ†’
Security Foundations, Threats, and Network Protection
๐Ÿ“š Coursera Course โ†—
Self-paced
Security Foundations, Threats, and Network Protection
Opens on Coursera โ†—
Risk Management and Incident Response
๐Ÿ“š Coursera Course โ†—
Self-paced
Risk Management and Incident Response
Opens on Coursera โ†—
Advanced Security Architecture
๐Ÿ“š Coursera Course โ†—
Self-paced
Advanced Security Architecture
Opens on Coursera โ†—
Biohacking Your Brain's Health
๐Ÿ“š Coursera Course โ†—
Self-paced
Biohacking Your Brain's Health
Opens on Coursera โ†—
Implementing MPLS VPNs
๐Ÿ“š Coursera Course โ†—
Self-paced
Implementing MPLS VPNs
Opens on Coursera โ†—
IT Infrastructure and Emerging Trends
๐Ÿ“š Coursera Course โ†—
Self-paced
IT Infrastructure and Emerging Trends
Opens on Coursera โ†—