Tech Skills

Cybersecurity

Ethical hacking, penetration testing, network security, CTFs and defensive security

6,958
lessons
Skills in this topic
View full skill map →
Security Basics
beginner
Fix OWASP top 10 vulnerabilities
AI Security
intermediate
Identify and patch prompt injection vulnerabilities
Network Security
intermediate
Configure a firewall with proper inbound/outbound rules
Ethical Hacking & Pen Testing
intermediate
Conduct a full pen test with Kali Linux
Cloud Security
intermediate
Implement IAM least-privilege policies on AWS/GCP
Incident Response
intermediate
Build an incident response playbook
Security Compliance
intermediate
Map controls for SOC 2 Type II compliance
Defensive AI
advanced
Build an AI-powered log anomaly detector
Bryan Johnson: Kernel Brain-Computer Interfaces | Lex Fridman Podcast #186
Cybersecurity ⚡ AI Lesson
Bryan Johnson: Kernel Brain-Computer Interfaces | Lex Fridman Podcast #186
Lex Fridman Beginner 4y ago
Advanced Growth Tactics - Steal The Top-Performing Tech Companies' Best-Kept Secrets
Cybersecurity
Advanced Growth Tactics - Steal The Top-Performing Tech Companies' Best-Kept Secrets
Neil Patel Beginner 4y ago
Passwords: Am i a joke to you?
Cybersecurity
Passwords: Am i a joke to you?
David Bombal Beginner 4y ago
I Want to Work in Cybersecurity...Whatever That Means!
Cybersecurity ⚡ AI Lesson
I Want to Work in Cybersecurity...Whatever That Means!
SANS Institute Advanced 5y ago
Windows Privilege Escalation Tutorial For Beginners
Cybersecurity ⚡ AI Lesson
Windows Privilege Escalation Tutorial For Beginners
HackerSploit Beginner 5y ago
IFrame Parent XSS - HackTheBox Cyber Apocalypse CTF
Cybersecurity ⚡ AI Lesson
IFrame Parent XSS - HackTheBox Cyber Apocalypse CTF
John Hammond Beginner 5y ago
Pentesting vs. Bug Bounty vs. Pentesting ???
Cybersecurity
Pentesting vs. Bug Bounty vs. Pentesting ???
LiveOverflow Beginner 5y ago
HackTheBox - Ready
Cybersecurity ⚡ AI Lesson
HackTheBox - Ready
IppSec Beginner 5y ago
Blind MongoDB NoSQL Injection - HackTheBox Cyber Apocalypse CTF
Cybersecurity
Blind MongoDB NoSQL Injection - HackTheBox Cyber Apocalypse CTF
John Hammond Intermediate 5y ago
The 1% rule
Cybersecurity
The 1% rule
David Bombal Intermediate 5y ago
VulnOS V2 - VulnHub Walkthrough - Boot-To-Root
Cybersecurity ⚡ AI Lesson
VulnOS V2 - VulnHub Walkthrough - Boot-To-Root
HackerSploit Intermediate 5y ago
Josh Johnson: PowerShell and Defensive Automation for the Blue Team
Cybersecurity ⚡ AI Lesson
Josh Johnson: PowerShell and Defensive Automation for the Blue Team
SANS Institute Intermediate 5y ago
Live Office Hours for Entrepreneurs (AMA)
Cybersecurity ⚡ AI Lesson
Live Office Hours for Entrepreneurs (AMA)
Noah Kagan Raw Intermediate 5y ago
Russell Kane: How To Build Confidence & Stay Young | E79
Cybersecurity ⚡ AI Lesson
Russell Kane: How To Build Confidence & Stay Young | E79
The Diary Of A CEO Intermediate 5y ago
HackTheBox - Sharp
Cybersecurity
HackTheBox - Sharp
IppSec Beginner 5y ago
Live Office Hours for Entrepreneurs (AMA)
Cybersecurity
Live Office Hours for Entrepreneurs (AMA)
Noah Kagan Raw Intermediate 5y ago
Twitter OSiNT (Ethical Hacking)
Cybersecurity ⚡ AI Lesson
Twitter OSiNT (Ethical Hacking)
NetworkChuck Beginner 5y ago
FaceTiming Funnel Hacking Live Speakers (Reactions!) 🤯😱😭
Cybersecurity
FaceTiming Funnel Hacking Live Speakers (Reactions!) 🤯😱😭
Russell Brunson Beginner 5y ago
Technical Discussion on VPNs - How VPNs Work, their benefits, and What happens when VPNs are Hacked
Cybersecurity ⚡ AI Lesson
Technical Discussion on VPNs - How VPNs Work, their benefits, and What happens when VPNs are Hacked
Hussein Nasser Advanced 5y ago
Ethical Hacking in 100 Seconds // And why do we need CORS?
Cybersecurity
Ethical Hacking in 100 Seconds // And why do we need CORS?
Fireship Intermediate 5y ago
HELP!! (for when you suck at Linux) // Linux for Hackers // EP3
Cybersecurity ⚡ AI Lesson
HELP!! (for when you suck at Linux) // Linux for Hackers // EP3
NetworkChuck Beginner 5y ago
HackTheBox CA CTF - Using Snyk to Find & Fix Vulnerabilities
Cybersecurity
HackTheBox CA CTF - Using Snyk to Find & Fix Vulnerabilities
John Hammond Beginner 5y ago
XML Object Exfiltration - HackTheBox Cyber Apocalypse CTF "E. Tree"
Cybersecurity
XML Object Exfiltration - HackTheBox Cyber Apocalypse CTF "E. Tree"
John Hammond Beginner 5y ago
Network Myths: TCP/IP
Cybersecurity
Network Myths: TCP/IP
David Bombal Intermediate 5y ago
SQLite Blind SQL Injection - HackTheBox Cyber Apocalypse CTF
Cybersecurity
SQLite Blind SQL Injection - HackTheBox Cyber Apocalypse CTF
John Hammond Beginner 5y ago
Anonymize Your Traffic With Proxychains & Tor
Cybersecurity ⚡ AI Lesson
Anonymize Your Traffic With Proxychains & Tor
HackerSploit Intermediate 5y ago
PwnLab VulnHub Walkthrough - Boot-To-Root
Cybersecurity ⚡ AI Lesson
PwnLab VulnHub Walkthrough - Boot-To-Root
HackerSploit Intermediate 5y ago
Metasploit
Cybersecurity
Metasploit
David Bombal Beginner 5y ago
HTB Cyber Apocalypse - cURL As a Service
Cybersecurity
HTB Cyber Apocalypse - cURL As a Service
John Hammond Beginner 5y ago
CTF Walkthrough with John Hammond
Cybersecurity
CTF Walkthrough with John Hammond
David Bombal Beginner 5y ago
Chris Baker: Get A Handle On Your Vulnerabilities
Cybersecurity ⚡ AI Lesson
Chris Baker: Get A Handle On Your Vulnerabilities
SANS Institute Advanced 5y ago
SQL Injection
Cybersecurity
SQL Injection
David Bombal Intermediate 5y ago
Are CTFs even real? Featuring John Hammond.
Cybersecurity
Are CTFs even real? Featuring John Hammond.
David Bombal Beginner 5y ago
Mick Douglas & Flynn Weeks: Simplifying your Logging Strategy with the What2Log Project
Cybersecurity ⚡ AI Lesson
Mick Douglas & Flynn Weeks: Simplifying your Logging Strategy with the What2Log Project
SANS Institute Intermediate 5y ago
HackTheBox - Bucket
Cybersecurity ⚡ AI Lesson
HackTheBox - Bucket
IppSec Beginner 5y ago
Live Office Hours for Entrepreneurs (AMA)
Cybersecurity ⚡ AI Lesson
Live Office Hours for Entrepreneurs (AMA)
Noah Kagan Raw Intermediate 5y ago
HTA JScript to PowerShell - Novter Malware Analysis
Cybersecurity
HTA JScript to PowerShell - Novter Malware Analysis
John Hammond Intermediate 5y ago
Cybersecurity hacking path
Cybersecurity
Cybersecurity hacking path
David Bombal Beginner 5y ago
TryHackMe - OSCP Voucher GIVEAWAY & Presentation
Cybersecurity
TryHackMe - OSCP Voucher GIVEAWAY & Presentation
John Hammond Intermediate 5y ago
The Foundation of Accelerating your Cybersecurity Career - SANS@Mic Keynote w/ James Lyne
Cybersecurity ⚡ AI Lesson
The Foundation of Accelerating your Cybersecurity Career - SANS@Mic Keynote w/ James Lyne
SANS Institute Beginner 5y ago
Do you need a Cybersecurity home lab?
Cybersecurity
Do you need a Cybersecurity home lab?
David Bombal Beginner 5y ago
BEGINNER Capture The Flag - PicoCTF 2021 001 "Obedient Cat"
Cybersecurity
BEGINNER Capture The Flag - PicoCTF 2021 001 "Obedient Cat"
John Hammond Beginner 5y ago
Knowing Your Applicants. How to Stay Current to Best Assess your Cyber Applicants w/ Kevin Garvey
Cybersecurity ⚡ AI Lesson
Knowing Your Applicants. How to Stay Current to Best Assess your Cyber Applicants w/ Kevin Garvey
SANS Institute Beginner 5y ago
HackTheBox - Laboratory
Cybersecurity ⚡ AI Lesson
HackTheBox - Laboratory
IppSec Intermediate 5y ago
Live Office Hours for Entrepreneurs w/ Neville Medhora
Cybersecurity ⚡ AI Lesson
Live Office Hours for Entrepreneurs w/ Neville Medhora
Noah Kagan Raw Intermediate 5y ago
Cybersecurity jobs replaced by AI?
Cybersecurity
Cybersecurity jobs replaced by AI?
David Bombal Beginner 5y ago
SANS New to Cyber Summit 2021
Cybersecurity ⚡ AI Lesson
SANS New to Cyber Summit 2021
SANS Institute Beginner 5y ago
Rob van Os: Maturing your Cyber Defense
Cybersecurity ⚡ AI Lesson
Rob van Os: Maturing your Cyber Defense
SANS Institute Intermediate 5y ago
📚 Coursera Courses Opens on Coursera · Free to audit
1 / 3 View all →
Design security solutions for applications and data
📚 Coursera Course ↗
Self-paced
Design security solutions for applications and data
Opens on Coursera ↗
Securing Hosts, Network, and Edge in AWS
📚 Coursera Course ↗
Self-paced
Securing Hosts, Network, and Edge in AWS
Opens on Coursera ↗
Database Essentials and Vulnerabilities
📚 Coursera Course ↗
Self-paced
Database Essentials and Vulnerabilities
Opens on Coursera ↗
CCNP and CCIE Security Core SCOR 350-701(Exam Blueprint 1.1)
📚 Coursera Course ↗
Self-paced
CCNP and CCIE Security Core SCOR 350-701(Exam Blueprint 1.1)
Opens on Coursera ↗
Data Center Security Management with Microsoft System Center
📚 Coursera Course ↗
Self-paced
Data Center Security Management with Microsoft System Center
Opens on Coursera ↗
What Is Cybersecurity?
📚 Coursera Course ↗
Self-paced
What Is Cybersecurity?
Opens on Coursera ↗