Tech Skills

Cybersecurity

Ethical hacking, penetration testing, network security, CTFs and defensive security

7,027
lessons
Skills in this topic
View full skill map →
Security Basics
beginner
Fix OWASP top 10 vulnerabilities
AI Security
intermediate
Identify and patch prompt injection vulnerabilities
Network Security
intermediate
Configure a firewall with proper inbound/outbound rules
Ethical Hacking & Pen Testing
intermediate
Conduct a full pen test with Kali Linux
Cloud Security
intermediate
Implement IAM least-privilege policies on AWS/GCP
Incident Response
intermediate
Build an incident response playbook
Security Compliance
intermediate
Map controls for SOC 2 Type II compliance
Defensive AI
advanced
Build an AI-powered log anomaly detector
HackTheBox - Mango
Cybersecurity
HackTheBox - Mango
IppSec Beginner 6y ago
C2 Matrix | SANS@MIC Talk
Cybersecurity ⚡ AI Lesson
C2 Matrix | SANS@MIC Talk
SANS Institute Intermediate 6y ago
All I need is 443? CML-P (VIRL 2)
Cybersecurity
All I need is 443? CML-P (VIRL 2)
David Bombal Beginner 6y ago
CyberSecLabs - "Secret" Walkthrough
Cybersecurity ⚡ AI Lesson
CyberSecLabs - "Secret" Walkthrough
The Cyber Mentor Beginner 6y ago
Dissecting Pokemon Red Savegame
Cybersecurity ⚡ AI Lesson
Dissecting Pokemon Red Savegame
LiveOverflow Beginner 6y ago
Check out SEC573! More Python3! More Pywars! | SANS@MIC Talk
Cybersecurity
Check out SEC573! More Python3! More Pywars! | SANS@MIC Talk
SANS Institute Beginner 6y ago
How End-to-End encryption Works?
Cybersecurity
How End-to-End encryption Works?
Hussein Nasser Advanced 6y ago
HackTheBox - Traverxec
Cybersecurity
HackTheBox - Traverxec
IppSec Beginner 6y ago
run Linux on Windows Docker containers!!
Cybersecurity ⚡ AI Lesson
run Linux on Windows Docker containers!!
NetworkChuck Intermediate 6y ago
The BEST Resource for your IT Career
Cybersecurity ⚡ AI Lesson
The BEST Resource for your IT Career
The Cyber Mentor Beginner 6y ago
you need to learn Docker RIGHT NOW!! // Docker Containers 101
Cybersecurity ⚡ AI Lesson
you need to learn Docker RIGHT NOW!! // Docker Containers 101
NetworkChuck Beginner 6y ago
BugBountyToolkit - Running Multiple Sessions With Tmux
Cybersecurity ⚡ AI Lesson
BugBountyToolkit - Running Multiple Sessions With Tmux
HackerSploit Intermediate 6y ago
Reverse Engineering Introduction Walkthrough - intro_rev/rev1 CSCG 2020
Cybersecurity
Reverse Engineering Introduction Walkthrough - intro_rev/rev1 CSCG 2020
LiveOverflow Beginner 6y ago
VPN & Remote Working - Computerphile
Cybersecurity ⚡ AI Lesson
VPN & Remote Working - Computerphile
Computerphile Intermediate 6y ago
TryHackMe! EternalBlue/MS17-010 in Metasploit
Cybersecurity ⚡ AI Lesson
TryHackMe! EternalBlue/MS17-010 in Metasploit
John Hammond Intermediate 6y ago
Becoming a more effective and impactful leader | Women Transforming Leadership Programme
Cybersecurity
Becoming a more effective and impactful leader | Women Transforming Leadership Programme
Saïd Business School, University of Oxford Intermediate 6y ago
128 Bit or 256 Bit Encryption? - Computerphile
Cybersecurity ⚡ AI Lesson
128 Bit or 256 Bit Encryption? - Computerphile
Computerphile Intermediate 6y ago
Docker - PRIVILEGE ESCALATION Technique
Cybersecurity ⚡ AI Lesson
Docker - PRIVILEGE ESCALATION Technique
John Hammond Intermediate 6y ago
Penetration Testing Bootcamp - Passive Information Gathering Techniques & Tools
Cybersecurity ⚡ AI Lesson
Penetration Testing Bootcamp - Passive Information Gathering Techniques & Tools
HackerSploit Advanced 6y ago
SQL Injection : Data Science Code
Cybersecurity
SQL Injection : Data Science Code
ritvikmath Intermediate 6y ago
How Threats are Responding to COVID-19 | STAR Webcast
Cybersecurity
How Threats are Responding to COVID-19 | STAR Webcast
SANS Institute Advanced 6y ago
Take Back The Advantage - Cyber Deception for the Win | SANS@MIC Talk
Cybersecurity
Take Back The Advantage - Cyber Deception for the Win | SANS@MIC Talk
SANS Institute Beginner 6y ago
Pen Testing ICS and Other Highly Restricted Environments | SANS@MIC Talk
Cybersecurity ⚡ AI Lesson
Pen Testing ICS and Other Highly Restricted Environments | SANS@MIC Talk
SANS Institute Advanced 6y ago
ZOMG It's ZOOM! - Don't worry, it's safe.  As long as you follow some rules. - SANS Webcast
Cybersecurity
ZOMG It's ZOOM! - Don't worry, it's safe. As long as you follow some rules. - SANS Webcast
SANS Institute Beginner 6y ago
Are You Certifiable? | SANS@MIC Talk
Cybersecurity
Are You Certifiable? | SANS@MIC Talk
SANS Institute Intermediate 6y ago
The Hackers Apprentice | SANS@MIC Talk
Cybersecurity
The Hackers Apprentice | SANS@MIC Talk
SANS Institute Advanced 6y ago
help me BREAK a network!! (Destroy a CCNA lab!!)
Cybersecurity ⚡ AI Lesson
help me BREAK a network!! (Destroy a CCNA lab!!)
NetworkChuck Beginner 6y ago
Stealth persistence strategies | SANS@MIC Talk
Cybersecurity
Stealth persistence strategies | SANS@MIC Talk
SANS Institute Intermediate 6y ago
VulnHub - DC-9
Cybersecurity ⚡ AI Lesson
VulnHub - DC-9
IppSec Beginner 6y ago
HackTheBox - Sniper
Cybersecurity
HackTheBox - Sniper
IppSec Beginner 6y ago
Attacking Serverless Servers: Reverse Engineering the AWS, Azure, and GCP Function Runtime
Cybersecurity ⚡ AI Lesson
Attacking Serverless Servers: Reverse Engineering the AWS, Azure, and GCP Function Runtime
SANS Institute Intermediate 6y ago
xHunt - An Anime Fan's Attack Campaign in the Middle East | STAR Webcast
Cybersecurity
xHunt - An Anime Fan's Attack Campaign in the Middle East | STAR Webcast
SANS Institute Advanced 6y ago
HackTheBox - Forest
Cybersecurity
HackTheBox - Forest
IppSec Beginner 6y ago
Understanding SANS CyberCast - So Much More Than Live Virtual Training
Cybersecurity ⚡ AI Lesson
Understanding SANS CyberCast - So Much More Than Live Virtual Training
SANS Institute Intermediate 6y ago
Moving Past Just Googling It: Harvesting and Using OSINT | SANS@MIC Talk
Cybersecurity
Moving Past Just Googling It: Harvesting and Using OSINT | SANS@MIC Talk
SANS Institute Intermediate 6y ago
HackTheBox - Postman
Cybersecurity
HackTheBox - Postman
IppSec Beginner 6y ago
we PASSED the CCNA!! (how to pass the CCNA in 2020)
Cybersecurity ⚡ AI Lesson
we PASSED the CCNA!! (how to pass the CCNA in 2020)
NetworkChuck Beginner 6y ago
KING OF THE HILL - BsidesNoVA CTF 1ST PLACE
Cybersecurity
KING OF THE HILL - BsidesNoVA CTF 1ST PLACE
John Hammond Intermediate 6y ago
Penetration Testing Bootcamp - Information Gathering
Cybersecurity ⚡ AI Lesson
Penetration Testing Bootcamp - Information Gathering
HackerSploit Advanced 6y ago
HackTheBox - BankRobber
Cybersecurity
HackTheBox - BankRobber
IppSec Intermediate 6y ago
Penetration Testing Bootcamp - Setting Up A Pentesting Lab
Cybersecurity ⚡ AI Lesson
Penetration Testing Bootcamp - Setting Up A Pentesting Lab
HackerSploit Intermediate 6y ago
TryHackMe! Basic Penetration Testing
Cybersecurity
TryHackMe! Basic Penetration Testing
John Hammond Intermediate 6y ago
This Will Never Work: Tales from Disappointingly Successful Pen Tests | SANS SOC Summit 2019
Cybersecurity
This Will Never Work: Tales from Disappointingly Successful Pen Tests | SANS SOC Summit 2019
SANS Institute Beginner 6y ago
Installing Katana - Automatic CTF Solver
Cybersecurity
Installing Katana - Automatic CTF Solver
John Hammond Intermediate 6y ago
HackTheBox - Scavenger
Cybersecurity
HackTheBox - Scavenger
IppSec Intermediate 6y ago
How to Setup a Raspberry Pi LEARNING Desktop (Linux, Hacking, Coding)
Cybersecurity ⚡ AI Lesson
How to Setup a Raspberry Pi LEARNING Desktop (Linux, Hacking, Coding)
NetworkChuck Beginner 6y ago
Penetration Testing Bootcamp - Penetration Testing Methodologies
Cybersecurity ⚡ AI Lesson
Penetration Testing Bootcamp - Penetration Testing Methodologies
HackerSploit Advanced 6y ago
Penetration Testing Bootcamp - Penetration Testing Terminology
Cybersecurity ⚡ AI Lesson
Penetration Testing Bootcamp - Penetration Testing Terminology
HackerSploit Advanced 6y ago
📚 Coursera Courses Opens on Coursera · Free to audit
1 / 3 View all →
Securing Industrial Control and Safety Instrumented Systems
📚 Coursera Course ↗
Self-paced
Securing Industrial Control and Safety Instrumented Systems
Opens on Coursera ↗
Penetration Testing and Vulnerability Scanning
📚 Coursera Course ↗
Self-paced
Penetration Testing and Vulnerability Scanning
Opens on Coursera ↗
Network Defense Essentials (NDE)
📚 Coursera Course ↗
Self-paced
Network Defense Essentials (NDE)
Opens on Coursera ↗
Introduction to Google Security Operations (SIEM)
📚 Coursera Course ↗
Self-paced
Introduction to Google Security Operations (SIEM)
Opens on Coursera ↗
Homeland Security and Cybersecurity Future
📚 Coursera Course ↗
Self-paced
Homeland Security and Cybersecurity Future
Opens on Coursera ↗
Digital Forensics for Pentesters - Hands-On Learning
📚 Coursera Course ↗
Self-paced
Digital Forensics for Pentesters - Hands-On Learning
Opens on Coursera ↗