Tech Skills

Cybersecurity

Ethical hacking, penetration testing, network security, CTFs and defensive security

6,967
lessons
Skills in this topic
View full skill map →
Security Basics
beginner
Fix OWASP top 10 vulnerabilities
AI Security
intermediate
Identify and patch prompt injection vulnerabilities
Network Security
intermediate
Configure a firewall with proper inbound/outbound rules
Ethical Hacking & Pen Testing
intermediate
Conduct a full pen test with Kali Linux
Cloud Security
intermediate
Implement IAM least-privilege policies on AWS/GCP
Incident Response
intermediate
Build an incident response playbook
Security Compliance
intermediate
Map controls for SOC 2 Type II compliance
Defensive AI
advanced
Build an AI-powered log anomaly detector
CyberSecLabs - "Secret" Walkthrough
Cybersecurity ⚡ AI Lesson
CyberSecLabs - "Secret" Walkthrough
The Cyber Mentor Beginner 6y ago
Dissecting Pokemon Red Savegame
Cybersecurity ⚡ AI Lesson
Dissecting Pokemon Red Savegame
LiveOverflow Beginner 6y ago
Check out SEC573! More Python3! More Pywars! | SANS@MIC Talk
Cybersecurity
Check out SEC573! More Python3! More Pywars! | SANS@MIC Talk
SANS Institute Beginner 6y ago
How End-to-End encryption Works?
Cybersecurity
How End-to-End encryption Works?
Hussein Nasser Advanced 6y ago
HackTheBox - Traverxec
Cybersecurity
HackTheBox - Traverxec
IppSec Beginner 6y ago
How Threats are Responding to COVID-19 | STAR Webcast
Cybersecurity
How Threats are Responding to COVID-19 | STAR Webcast
SANS Institute Advanced 6y ago
run Linux on Windows Docker containers!!
Cybersecurity ⚡ AI Lesson
run Linux on Windows Docker containers!!
NetworkChuck Intermediate 6y ago
The BEST Resource for your IT Career
Cybersecurity ⚡ AI Lesson
The BEST Resource for your IT Career
The Cyber Mentor Beginner 6y ago
you need to learn Docker RIGHT NOW!! // Docker Containers 101
Cybersecurity ⚡ AI Lesson
you need to learn Docker RIGHT NOW!! // Docker Containers 101
NetworkChuck Beginner 6y ago
VulnHub - DC-9
Cybersecurity ⚡ AI Lesson
VulnHub - DC-9
IppSec Beginner 6y ago
BugBountyToolkit - Running Multiple Sessions With Tmux
Cybersecurity ⚡ AI Lesson
BugBountyToolkit - Running Multiple Sessions With Tmux
HackerSploit Intermediate 6y ago
Reverse Engineering Introduction Walkthrough - intro_rev/rev1 CSCG 2020
Cybersecurity
Reverse Engineering Introduction Walkthrough - intro_rev/rev1 CSCG 2020
LiveOverflow Beginner 6y ago
VPN & Remote Working - Computerphile
Cybersecurity ⚡ AI Lesson
VPN & Remote Working - Computerphile
Computerphile Intermediate 6y ago
TryHackMe! EternalBlue/MS17-010 in Metasploit
Cybersecurity ⚡ AI Lesson
TryHackMe! EternalBlue/MS17-010 in Metasploit
John Hammond Intermediate 6y ago
Becoming a more effective and impactful leader | Women Transforming Leadership Programme
Cybersecurity
Becoming a more effective and impactful leader | Women Transforming Leadership Programme
Saïd Business School, University of Oxford Intermediate 6y ago
128 Bit or 256 Bit Encryption? - Computerphile
Cybersecurity ⚡ AI Lesson
128 Bit or 256 Bit Encryption? - Computerphile
Computerphile Intermediate 6y ago
Docker - PRIVILEGE ESCALATION Technique
Cybersecurity ⚡ AI Lesson
Docker - PRIVILEGE ESCALATION Technique
John Hammond Intermediate 6y ago
Penetration Testing Bootcamp - Passive Information Gathering Techniques & Tools
Cybersecurity ⚡ AI Lesson
Penetration Testing Bootcamp - Passive Information Gathering Techniques & Tools
HackerSploit Advanced 6y ago
SQL Injection : Data Science Code
Cybersecurity
SQL Injection : Data Science Code
ritvikmath Intermediate 6y ago
How Not To Act When Prince Ea DM's You...
Cybersecurity
How Not To Act When Prince Ea DM's You...
Russell Brunson Beginner 6y ago
Take Back The Advantage - Cyber Deception for the Win | SANS@MIC Talk
Cybersecurity
Take Back The Advantage - Cyber Deception for the Win | SANS@MIC Talk
SANS Institute Beginner 6y ago
Pen Testing ICS and Other Highly Restricted Environments | SANS@MIC Talk
Cybersecurity ⚡ AI Lesson
Pen Testing ICS and Other Highly Restricted Environments | SANS@MIC Talk
SANS Institute Advanced 6y ago
ZOMG It's ZOOM! - Don't worry, it's safe.  As long as you follow some rules. - SANS Webcast
Cybersecurity
ZOMG It's ZOOM! - Don't worry, it's safe. As long as you follow some rules. - SANS Webcast
SANS Institute Beginner 6y ago
Are You Certifiable? | SANS@MIC Talk
Cybersecurity
Are You Certifiable? | SANS@MIC Talk
SANS Institute Intermediate 6y ago
The Hackers Apprentice | SANS@MIC Talk
Cybersecurity
The Hackers Apprentice | SANS@MIC Talk
SANS Institute Advanced 6y ago
help me BREAK a network!! (Destroy a CCNA lab!!)
Cybersecurity ⚡ AI Lesson
help me BREAK a network!! (Destroy a CCNA lab!!)
NetworkChuck Beginner 6y ago
Stealth persistence strategies | SANS@MIC Talk
Cybersecurity
Stealth persistence strategies | SANS@MIC Talk
SANS Institute Intermediate 6y ago
HackTheBox - Sniper
Cybersecurity
HackTheBox - Sniper
IppSec Beginner 6y ago
Attacking Serverless Servers: Reverse Engineering the AWS, Azure, and GCP Function Runtime
Cybersecurity ⚡ AI Lesson
Attacking Serverless Servers: Reverse Engineering the AWS, Azure, and GCP Function Runtime
SANS Institute Intermediate 6y ago
xHunt - An Anime Fan's Attack Campaign in the Middle East | STAR Webcast
Cybersecurity
xHunt - An Anime Fan's Attack Campaign in the Middle East | STAR Webcast
SANS Institute Advanced 6y ago
HackTheBox - Forest
Cybersecurity
HackTheBox - Forest
IppSec Beginner 6y ago
Understanding SANS CyberCast - So Much More Than Live Virtual Training
Cybersecurity ⚡ AI Lesson
Understanding SANS CyberCast - So Much More Than Live Virtual Training
SANS Institute Intermediate 6y ago
Moving Past Just Googling It: Harvesting and Using OSINT | SANS@MIC Talk
Cybersecurity
Moving Past Just Googling It: Harvesting and Using OSINT | SANS@MIC Talk
SANS Institute Intermediate 6y ago
HackTheBox - Postman
Cybersecurity
HackTheBox - Postman
IppSec Beginner 6y ago
we PASSED the CCNA!! (how to pass the CCNA in 2020)
Cybersecurity ⚡ AI Lesson
we PASSED the CCNA!! (how to pass the CCNA in 2020)
NetworkChuck Beginner 6y ago
KING OF THE HILL - BsidesNoVA CTF 1ST PLACE
Cybersecurity
KING OF THE HILL - BsidesNoVA CTF 1ST PLACE
John Hammond Intermediate 6y ago
Penetration Testing Bootcamp - Information Gathering
Cybersecurity ⚡ AI Lesson
Penetration Testing Bootcamp - Information Gathering
HackerSploit Advanced 6y ago
HackTheBox - BankRobber
Cybersecurity
HackTheBox - BankRobber
IppSec Intermediate 6y ago
Penetration Testing Bootcamp - Setting Up A Pentesting Lab
Cybersecurity ⚡ AI Lesson
Penetration Testing Bootcamp - Setting Up A Pentesting Lab
HackerSploit Intermediate 6y ago
TryHackMe! Basic Penetration Testing
Cybersecurity
TryHackMe! Basic Penetration Testing
John Hammond Intermediate 6y ago
This Will Never Work: Tales from Disappointingly Successful Pen Tests | SANS SOC Summit 2019
Cybersecurity
This Will Never Work: Tales from Disappointingly Successful Pen Tests | SANS SOC Summit 2019
SANS Institute Beginner 6y ago
Installing Katana - Automatic CTF Solver
Cybersecurity
Installing Katana - Automatic CTF Solver
John Hammond Intermediate 6y ago
HackTheBox - Scavenger
Cybersecurity
HackTheBox - Scavenger
IppSec Intermediate 6y ago
How to Setup a Raspberry Pi LEARNING Desktop (Linux, Hacking, Coding)
Cybersecurity ⚡ AI Lesson
How to Setup a Raspberry Pi LEARNING Desktop (Linux, Hacking, Coding)
NetworkChuck Beginner 6y ago
Penetration Testing Bootcamp - Penetration Testing Methodologies
Cybersecurity ⚡ AI Lesson
Penetration Testing Bootcamp - Penetration Testing Methodologies
HackerSploit Advanced 6y ago
Penetration Testing Bootcamp - Penetration Testing Terminology
Cybersecurity ⚡ AI Lesson
Penetration Testing Bootcamp - Penetration Testing Terminology
HackerSploit Advanced 6y ago
GOODBYE Microsoft certifications!! (killing off the MCSA, MCSE, MCSD)
Cybersecurity ⚡ AI Lesson
GOODBYE Microsoft certifications!! (killing off the MCSA, MCSE, MCSD)
NetworkChuck Beginner 6y ago
HackTheBox - Zetta
Cybersecurity
HackTheBox - Zetta
IppSec Intermediate 6y ago
📚 Coursera Courses Opens on Coursera · Free to audit
1 / 3 View all →
CISSP Domain 5: Identity and Access Management (IAM)
📚 Coursera Course ↗
Self-paced
CISSP Domain 5: Identity and Access Management (IAM)
Opens on Coursera ↗
Practical Cybersecurity Fundamentals: Unit 4
📚 Coursera Course ↗
Self-paced
Practical Cybersecurity Fundamentals: Unit 4
Opens on Coursera ↗
Memory, Encryption, and Protecting Data in Android
📚 Coursera Course ↗
Self-paced
Memory, Encryption, and Protecting Data in Android
Opens on Coursera ↗
Mastering BFSI Interviews: Resumes & Mock Interviews
📚 Coursera Course ↗
Self-paced
Mastering BFSI Interviews: Resumes & Mock Interviews
Opens on Coursera ↗
Cryptography
📚 Coursera Course ↗
Self-paced
Cryptography
Opens on Coursera ↗
Introduction to SIEM (Splunk)
📚 Coursera Course ↗
Self-paced
Introduction to SIEM (Splunk)
Opens on Coursera ↗