Tech Skills

Cybersecurity

Ethical hacking, penetration testing, network security, CTFs and defensive security

6,828
lessons
Skills in this topic
View full skill map →
Security Basics
beginner
Fix OWASP top 10 vulnerabilities
AI Security
intermediate
Identify and patch prompt injection vulnerabilities
Network Security
intermediate
Configure a firewall with proper inbound/outbound rules
Ethical Hacking & Pen Testing
intermediate
Conduct a full pen test with Kali Linux
Cloud Security
intermediate
Implement IAM least-privilege policies on AWS/GCP
Incident Response
intermediate
Build an incident response playbook
Security Compliance
intermediate
Map controls for SOC 2 Type II compliance
Defensive AI
advanced
Build an AI-powered log anomaly detector
Keynote | Demonstrating CISO ROI with the C-Suite
Cybersecurity ⚡ AI Lesson
Keynote | Demonstrating CISO ROI with the C-Suite
SANS Institute Intermediate 2y ago
Panel | The Intersection of Cybersecurity and Law
Cybersecurity ⚡ AI Lesson
Panel | The Intersection of Cybersecurity and Law
SANS Institute Intermediate 2y ago
How Hackers Use netsh.exe For Persistence & Code Execution (Sliver C2)
Cybersecurity ⚡ AI Lesson
How Hackers Use netsh.exe For Persistence & Code Execution (Sliver C2)
John Hammond Intermediate 2y ago
Earn Your Cybersecurity Master's Degree Online | University of London
Cybersecurity
Earn Your Cybersecurity Master's Degree Online | University of London
Coursera Beginner 2y ago
Scale Your Cloud Infrastructure (Hosting CTFs)
Cybersecurity
Scale Your Cloud Infrastructure (Hosting CTFs)
John Hammond Intermediate 2y ago
5 Hacking Tools I Can't Live Without
Cybersecurity ⚡ AI Lesson
5 Hacking Tools I Can't Live Without
The Cyber Mentor Beginner 2y ago
$540 million of crypto was stolen through an unlikely loophole: LinkedIn
Cybersecurity
$540 million of crypto was stolen through an unlikely loophole: LinkedIn
Jack Rhysider Intermediate 2y ago
Top 3 Cybersecurity Career Tips (from Ex-NSA Hacker)
Cybersecurity ⚡ AI Lesson
Top 3 Cybersecurity Career Tips (from Ex-NSA Hacker)
David Bombal Beginner 2y ago
HackTheBox - Stocker
Cybersecurity ⚡ AI Lesson
HackTheBox - Stocker
IppSec Beginner 2y ago
Hacking Google Cloud?
Cybersecurity
Hacking Google Cloud?
LiveOverflow Beginner 2y ago
How does the PNPT compare to other Pentest Certifications?  #PNPT #pentester #pentesting
Cybersecurity ⚡ AI Lesson
How does the PNPT compare to other Pentest Certifications? #PNPT #pentester #pentesting
The Cyber Mentor Intermediate 2y ago
Don't use these passwords! (Too easy to crack) #shorts
Cybersecurity ⚡ AI Lesson
Don't use these passwords! (Too easy to crack) #shorts
David Bombal Beginner 2y ago
Responsive Screen Sizes 👨‍💻.  #responsive #responsivewebdesign #responsivedesign
Cybersecurity
Responsive Screen Sizes 👨‍💻. #responsive #responsivewebdesign #responsivedesign
CydexCode Beginner 2y ago
HackTheBox - Escape
Cybersecurity ⚡ AI Lesson
HackTheBox - Escape
IppSec Beginner 2y ago
Take Charge of Your Indexability: How to Optimize Your Technical Work [MozCon 2021] — Areej AbuAli
Cybersecurity
Take Charge of Your Indexability: How to Optimize Your Technical Work [MozCon 2021] — Areej AbuAli
Moz Intermediate 2y ago
Cybersecurity Live - CS50 #Reels
Cybersecurity
Cybersecurity Live - CS50 #Reels
CS50 Intermediate 2y ago
Hacking 101
Cybersecurity
Hacking 101
GeeksforGeeks Beginner 2y ago
Bert Kreischer: Comedy, Drinking, Rogan, Segura, Churchill & Kim Jong Un | Lex Fridman Podcast #382
Cybersecurity
Bert Kreischer: Comedy, Drinking, Rogan, Segura, Churchill & Kim Jong Un | Lex Fridman Podcast #382
Lex Fridman Beginner 2y ago
Cybersecurity Charisma: Unlocking Security Culture and Leadership
Cybersecurity ⚡ AI Lesson
Cybersecurity Charisma: Unlocking Security Culture and Leadership
SANS Institute Beginner 2y ago
Leading High Performing Teams During Lean Times
Cybersecurity ⚡ AI Lesson
Leading High Performing Teams During Lean Times
SANS Institute Intermediate 2y ago
This is NetWars!
Cybersecurity ⚡ AI Lesson
This is NetWars!
SANS Institute Beginner 2y ago
SANS New NetWars Core Version 9
Cybersecurity ⚡ AI Lesson
SANS New NetWars Core Version 9
SANS Institute Beginner 2y ago
Strategy 8: Leverage Tools and Support Analyst Workflow
Cybersecurity ⚡ AI Lesson
Strategy 8: Leverage Tools and Support Analyst Workflow
SANS Institute Intermediate 2y ago
Blueprint Live at the SANS Blue Team Summit 2023
Cybersecurity ⚡ AI Lesson
Blueprint Live at the SANS Blue Team Summit 2023
SANS Institute Intermediate 2y ago
Protecting the Cloud from Ransomware | Host: Ryan Chapman | June 20, 2023
Cybersecurity ⚡ AI Lesson
Protecting the Cloud from Ransomware | Host: Ryan Chapman | June 20, 2023
SANS Institute Beginner 2y ago
Strategy 7: Select and Collect the Right Data
Cybersecurity ⚡ AI Lesson
Strategy 7: Select and Collect the Right Data
SANS Institute Intermediate 2y ago
WordPress Vulnerabilities
Cybersecurity ⚡ AI Lesson
WordPress Vulnerabilities
The Cyber Mentor Beginner 2y ago
Pegasus Spyware: so dangerous that it should be banned? OTW explains...
Cybersecurity
Pegasus Spyware: so dangerous that it should be banned? OTW explains...
David Bombal Beginner 2y ago
Panel | Mastercard Trust Center
Cybersecurity ⚡ AI Lesson
Panel | Mastercard Trust Center
SANS Institute Beginner 2y ago
Panel | To Insure or Not to Insure: Debating the Value of Cyber Insurance for Small Business Success
Cybersecurity ⚡ AI Lesson
Panel | To Insure or Not to Insure: Debating the Value of Cyber Insurance for Small Business Success
SANS Institute Advanced 2y ago
How SMBs can defend against Top Threats using the CIS Critical Security Controls (Controls)
Cybersecurity ⚡ AI Lesson
How SMBs can defend against Top Threats using the CIS Critical Security Controls (Controls)
SANS Institute Beginner 2y ago
Locking It Down: Best Practices for Strong Passwords and Authentication Tools.
Cybersecurity ⚡ AI Lesson
Locking It Down: Best Practices for Strong Passwords and Authentication Tools.
SANS Institute Intermediate 2y ago
MOVEit Vulnerability CVE-2023-34362 Breach Deep Dive
Cybersecurity ⚡ AI Lesson
MOVEit Vulnerability CVE-2023-34362 Breach Deep Dive
The Cyber Mentor Beginner 2y ago
WiFi hacking with a Raspberry Pi and Parrot OS
Cybersecurity
WiFi hacking with a Raspberry Pi and Parrot OS
David Bombal Beginner 2y ago
How Hackers Evade Program Allowlists with DLLs
Cybersecurity
How Hackers Evade Program Allowlists with DLLs
John Hammond Intermediate 2y ago
The Dark Knight of OSINT, Matt Edmondson | Host: Rob Lee | June 13, 2023
Cybersecurity ⚡ AI Lesson
The Dark Knight of OSINT, Matt Edmondson | Host: Rob Lee | June 13, 2023
SANS Institute Beginner 2y ago
Ethical Hacking: Bypass Passwords with Linux PAM Degradation Attack
Cybersecurity
Ethical Hacking: Bypass Passwords with Linux PAM Degradation Attack
John Hammond Beginner 2y ago
Strategy 6: Illuminate Adversaries with Cyber Threat Intelligence
Cybersecurity ⚡ AI Lesson
Strategy 6: Illuminate Adversaries with Cyber Threat Intelligence
SANS Institute Intermediate 2y ago
the CHEAPEST path to becoming an ethical hacker
Cybersecurity ⚡ AI Lesson
the CHEAPEST path to becoming an ethical hacker
The Cyber Mentor Beginner 2y ago
The Emerging Technologies of AI, Edge and Quantum computing that are important to know about...
Cybersecurity
The Emerging Technologies of AI, Edge and Quantum computing that are important to know about...
David Bombal Beginner 2y ago
HackTheBox - Soccer
Cybersecurity
HackTheBox - Soccer
IppSec Beginner 2y ago
Blind SQL Injection Made Easy
Cybersecurity ⚡ AI Lesson
Blind SQL Injection Made Easy
The Cyber Mentor Beginner 2y ago
Cybersecurity's BIG Problem. Why it needs to change.
Cybersecurity ⚡ AI Lesson
Cybersecurity's BIG Problem. Why it needs to change.
David Bombal Beginner 2y ago
SANS Live Training Student Success Story: Mackenize Morris
Cybersecurity ⚡ AI Lesson
SANS Live Training Student Success Story: Mackenize Morris
SANS Institute Beginner 2y ago
HackTheBox - TwoMillion
Cybersecurity
HackTheBox - TwoMillion
IppSec Beginner 2y ago
Next Level API Hacking with Kiterunner
Cybersecurity ⚡ AI Lesson
Next Level API Hacking with Kiterunner
The Cyber Mentor Beginner 2y ago
Strategy 5: Prioritize Incident Response
Cybersecurity ⚡ AI Lesson
Strategy 5: Prioritize Incident Response
SANS Institute Intermediate 2y ago
I got Pwned ... and so did you! (you're likely in the 12 Billion)
Cybersecurity ⚡ AI Lesson
I got Pwned ... and so did you! (you're likely in the 12 Billion)
David Bombal Intermediate 2y ago
📚 Coursera Courses Opens on Coursera · Free to audit
1 / 3 View all →
Ransomware Playbook - A Complete Guide for IT Professionals
📚 Coursera Course ↗
Self-paced
Ransomware Playbook - A Complete Guide for IT Professionals
Opens on Coursera ↗
Execution, persistence, privilege escalation and evasion
📚 Coursera Course ↗
Self-paced
Execution, persistence, privilege escalation and evasion
Opens on Coursera ↗
Threat Hunting Techniques
📚 Coursera Course ↗
Self-paced
Threat Hunting Techniques
Opens on Coursera ↗
Detecting and Mitigating Cyber Threats and Attacks
📚 Coursera Course ↗
Self-paced
Detecting and Mitigating Cyber Threats and Attacks
Opens on Coursera ↗
Introduction to reCAPTCHA
📚 Coursera Course ↗
Self-paced
Introduction to reCAPTCHA
Opens on Coursera ↗
CISSP Domain 1: Security and Risk Management
📚 Coursera Course ↗
Self-paced
CISSP Domain 1: Security and Risk Management
Opens on Coursera ↗