Tech Skills

Cybersecurity

Ethical hacking, penetration testing, network security, CTFs and defensive security

7,031
lessons
Skills in this topic
View full skill map →
Security Basics
beginner
Fix OWASP top 10 vulnerabilities
AI Security
intermediate
Identify and patch prompt injection vulnerabilities
Network Security
intermediate
Configure a firewall with proper inbound/outbound rules
Ethical Hacking & Pen Testing
intermediate
Conduct a full pen test with Kali Linux
Cloud Security
intermediate
Implement IAM least-privilege policies on AWS/GCP
Incident Response
intermediate
Build an incident response playbook
Security Compliance
intermediate
Map controls for SOC 2 Type II compliance
Defensive AI
advanced
Build an AI-powered log anomaly detector
Chris Baker: Get A Handle On Your Vulnerabilities
Cybersecurity ⚡ AI Lesson
Chris Baker: Get A Handle On Your Vulnerabilities
SANS Institute Advanced 5y ago
Technical Discussion on VPNs - How VPNs Work, their benefits, and What happens when VPNs are Hacked
Cybersecurity ⚡ AI Lesson
Technical Discussion on VPNs - How VPNs Work, their benefits, and What happens when VPNs are Hacked
Hussein Nasser Advanced 5y ago
SANS Data Science Lightning Summit
Cybersecurity ⚡ AI Lesson
SANS Data Science Lightning Summit
SANS Institute Advanced 5y ago
"Advanced" Tips & Tricks for Capture The Flag
Cybersecurity ⚡ AI Lesson
"Advanced" Tips & Tricks for Capture The Flag
John Hammond Advanced 5y ago
learn Python, Hacking, Linux, CCNA.....hurry!! (6 deals you don't want to miss)
Cybersecurity ⚡ AI Lesson
learn Python, Hacking, Linux, CCNA.....hurry!! (6 deals you don't want to miss)
NetworkChuck Advanced 5y ago
Best OS For Pentesting & Security Research?
Cybersecurity ⚡ AI Lesson
Best OS For Pentesting & Security Research?
HackerSploit Advanced 5y ago
Wiresharking CURL - How a single GET request translates to 10 TCP Packets
Cybersecurity
Wiresharking CURL - How a single GET request translates to 10 TCP Packets
Hussein Nasser Advanced 5y ago
Penetration Testing Bootcamp - Passive Information Gathering Techniques & Tools
Cybersecurity ⚡ AI Lesson
Penetration Testing Bootcamp - Passive Information Gathering Techniques & Tools
HackerSploit Advanced 6y ago
UniFi Dream Machine - the BEST WiFi router (Review and Advanced Setup)
Cybersecurity ⚡ AI Lesson
UniFi Dream Machine - the BEST WiFi router (Review and Advanced Setup)
NetworkChuck Advanced 6y ago
SANS OnDemand Cyber Security Courses
Cybersecurity ⚡ AI Lesson
SANS OnDemand Cyber Security Courses
SANS Institute Advanced 5y ago
Part 4: Rekt Casino Hack - Pulling It All Together
Cybersecurity ⚡ AI Lesson
Part 4: Rekt Casino Hack - Pulling It All Together
SANS Institute Advanced 5y ago
Part 1: Rekt Casino Hack - Business Security Strategy, Policies, and Leadership Gone Wrong
Cybersecurity ⚡ AI Lesson
Part 1: Rekt Casino Hack - Business Security Strategy, Policies, and Leadership Gone Wrong
SANS Institute Advanced 5y ago
Move Along; Nothing to See Here… Or Is There?
Cybersecurity ⚡ AI Lesson
Move Along; Nothing to See Here… Or Is There?
SANS Institute Advanced 5y ago
A Recap from Chris Krebs's Keynote - SANS Cyber Threat Intelligence 2021
Cybersecurity ⚡ AI Lesson
A Recap from Chris Krebs's Keynote - SANS Cyber Threat Intelligence 2021
SANS Institute Advanced 5y ago
Behind The Scenes Of Law Enforcement And Private Industry Cooperation | STAR Webcawst
Cybersecurity ⚡ AI Lesson
Behind The Scenes Of Law Enforcement And Private Industry Cooperation | STAR Webcawst
SANS Institute Advanced 5y ago
PowerShell 2020: State of the Art / Hack / Infection - SANS@Mic Keynote Network Security
Cybersecurity ⚡ AI Lesson
PowerShell 2020: State of the Art / Hack / Infection - SANS@Mic Keynote Network Security
SANS Institute Advanced 5y ago
What’s New in SEC401: Security Essentials Bootcamp Style
Cybersecurity
What’s New in SEC401: Security Essentials Bootcamp Style
SANS Institute Advanced 5y ago
Introduction to Metasploit w/ Jeff McJunkin - SANS Cyber Camp
Cybersecurity
Introduction to Metasploit w/ Jeff McJunkin - SANS Cyber Camp
SANS Institute Advanced 5y ago
Need for Speed: Cracking Hashes to Pwn Passwords w/ Jason Nickola - SANS Cyber Camp: New to Cyber
Cybersecurity
Need for Speed: Cracking Hashes to Pwn Passwords w/ Jason Nickola - SANS Cyber Camp: New to Cyber
SANS Institute Advanced 5y ago
The Human Side of Threats: Why it Matters that Adversaries are Human Too | Katie Nickels
Cybersecurity
The Human Side of Threats: Why it Matters that Adversaries are Human Too | Katie Nickels
SANS Institute Advanced 5y ago
No SQL Injection in MongoDB Applications | SANS@MIC Talk
Cybersecurity
No SQL Injection in MongoDB Applications | SANS@MIC Talk
SANS Institute Advanced 5y ago
Git'ing Users for OSINT: Analysis of All GitHub Users | SANS@MIC Talk
Cybersecurity ⚡ AI Lesson
Git'ing Users for OSINT: Analysis of All GitHub Users | SANS@MIC Talk
SANS Institute Advanced 5y ago
The 14 Absolute Truths of Security | SANS@MIC Talk
Cybersecurity ⚡ AI Lesson
The 14 Absolute Truths of Security | SANS@MIC Talk
SANS Institute Advanced 5y ago
#LevelUpLabs | SANS@MIC Talk
Cybersecurity
#LevelUpLabs | SANS@MIC Talk
SANS Institute Advanced 5y ago
SEC510: Multicloud Security Assessment and Defense | SANS@MIC Talk
Cybersecurity ⚡ AI Lesson
SEC510: Multicloud Security Assessment and Defense | SANS@MIC Talk
SANS Institute Advanced 5y ago
Threat Hunting via DNS | SANS@MIC Talk
Cybersecurity
Threat Hunting via DNS | SANS@MIC Talk
SANS Institute Advanced 5y ago
No SQL Injection in MongoDB Applications | SANS@MIC Talk
Cybersecurity
No SQL Injection in MongoDB Applications | SANS@MIC Talk
SANS Institute Advanced 5y ago
The Only Constant is Change: Tracking Adversary Trends | STAR Webcast
Cybersecurity ⚡ AI Lesson
The Only Constant is Change: Tracking Adversary Trends | STAR Webcast
SANS Institute Advanced 5y ago
Shellcode Analysis 101 | SANS@MIC Talk
Cybersecurity
Shellcode Analysis 101 | SANS@MIC Talk
SANS Institute Advanced 5y ago
SANS Live Online Interactive Local Lab Demo – FOR508: Advanced Incident Response
Cybersecurity
SANS Live Online Interactive Local Lab Demo – FOR508: Advanced Incident Response
SANS Institute Advanced 5y ago
Threat Hunting and the Rise of Targeted eCrime Intrusions | STAR Webcast
Cybersecurity ⚡ AI Lesson
Threat Hunting and the Rise of Targeted eCrime Intrusions | STAR Webcast
SANS Institute Advanced 5y ago
Find_Evil - Threat Hunting | SANS@MIC Talk
Cybersecurity
Find_Evil - Threat Hunting | SANS@MIC Talk
SANS Institute Advanced 6y ago
Tricking modern endpoint security products | SANS@MIC Talk
Cybersecurity
Tricking modern endpoint security products | SANS@MIC Talk
SANS Institute Advanced 6y ago
The Hackers Apprentice | SANS@MIC Talk
Cybersecurity ⚡ AI Lesson
The Hackers Apprentice | SANS@MIC Talk
SANS Institute Advanced 6y ago
How End-to-End encryption Works?
Cybersecurity
How End-to-End encryption Works?
Hussein Nasser Advanced 6y ago
How Threats are Responding to COVID-19 | STAR Webcast
Cybersecurity
How Threats are Responding to COVID-19 | STAR Webcast
SANS Institute Advanced 6y ago
Pen Testing ICS and Other Highly Restricted Environments | SANS@MIC Talk
Cybersecurity ⚡ AI Lesson
Pen Testing ICS and Other Highly Restricted Environments | SANS@MIC Talk
SANS Institute Advanced 6y ago
The Hackers Apprentice | SANS@MIC Talk
Cybersecurity
The Hackers Apprentice | SANS@MIC Talk
SANS Institute Advanced 6y ago
xHunt - An Anime Fan's Attack Campaign in the Middle East | STAR Webcast
Cybersecurity
xHunt - An Anime Fan's Attack Campaign in the Middle East | STAR Webcast
SANS Institute Advanced 6y ago
Penetration Testing Bootcamp - Information Gathering
Cybersecurity ⚡ AI Lesson
Penetration Testing Bootcamp - Information Gathering
HackerSploit Advanced 6y ago
Penetration Testing Bootcamp - Penetration Testing Methodologies
Cybersecurity ⚡ AI Lesson
Penetration Testing Bootcamp - Penetration Testing Methodologies
HackerSploit Advanced 6y ago
Penetration Testing Bootcamp - Penetration Testing Terminology
Cybersecurity ⚡ AI Lesson
Penetration Testing Bootcamp - Penetration Testing Terminology
HackerSploit Advanced 6y ago
Cyber Threats to Electric Industry - What You Need to Know | STAR Webcast
Cybersecurity
Cyber Threats to Electric Industry - What You Need to Know | STAR Webcast
SANS Institute Advanced 6y ago
Build Effective Cybersecurity Team Skills | SANS Team-Based Training
Cybersecurity
Build Effective Cybersecurity Team Skills | SANS Team-Based Training
SANS Institute Advanced 6y ago
SPECIAL WEBCAST: What you need to know about the Crypt32.dll / CryptoAPI Flaw
Cybersecurity
SPECIAL WEBCAST: What you need to know about the Crypt32.dll / CryptoAPI Flaw
SANS Institute Advanced 6y ago
How HTTPS Work?
Cybersecurity
How HTTPS Work?
Hussein Nasser Advanced 6y ago
Latest Techniques in Hacking the Human | SANS Security Awareness Summit
Cybersecurity ⚡ AI Lesson
Latest Techniques in Hacking the Human | SANS Security Awareness Summit
SANS Institute Advanced 6y ago
Remcos RAT Review - The Most Advanced Remote Access Tool
Cybersecurity ⚡ AI Lesson
Remcos RAT Review - The Most Advanced Remote Access Tool
HackerSploit Advanced 6y ago
📚 Coursera Courses Opens on Coursera · Free to audit
1 / 3 View all →
Vulnerability Types and Concepts
📚 Coursera Course ↗
Self-paced
Vulnerability Types and Concepts
Opens on Coursera ↗
Web Security, Social Engineering & External Attacks
📚 Coursera Course ↗
Self-paced
Web Security, Social Engineering & External Attacks
Opens on Coursera ↗
Linux Security Techniques
📚 Coursera Course ↗
Self-paced
Linux Security Techniques
Opens on Coursera ↗
Introduction to Ethical Hacking Principles
📚 Coursera Course ↗
Self-paced
Introduction to Ethical Hacking Principles
Opens on Coursera ↗
Cybersecurity: Overlooked Threats to Your Strategy
📚 Coursera Course ↗
Self-paced
Cybersecurity: Overlooked Threats to Your Strategy
Opens on Coursera ↗
Security for Artificial Intelligence Software and Services
📚 Coursera Course ↗
Self-paced
Security for Artificial Intelligence Software and Services
Opens on Coursera ↗