Tech Skills

Cybersecurity

Ethical hacking, penetration testing, network security, CTFs and defensive security

7,046
lessons
Skills in this topic
View full skill map →
Security Basics
beginner
Fix OWASP top 10 vulnerabilities
AI Security
intermediate
Identify and patch prompt injection vulnerabilities
Network Security
intermediate
Configure a firewall with proper inbound/outbound rules
Ethical Hacking & Pen Testing
intermediate
Conduct a full pen test with Kali Linux
Cloud Security
intermediate
Implement IAM least-privilege policies on AWS/GCP
Incident Response
intermediate
Build an incident response playbook
Security Compliance
intermediate
Map controls for SOC 2 Type II compliance
Defensive AI
advanced
Build an AI-powered log anomaly detector
LIVE: Hacking, AppSec and Cybersecurity | GraphQL | Ask Me Anything
Cybersecurity ⚡ AI Lesson
LIVE: Hacking, AppSec and Cybersecurity | GraphQL | Ask Me Anything
The Cyber Mentor Beginner 1y ago
D-Link says “just buy a new router” after 9.8 critical vulnerability…
Cybersecurity ⚡ AI Lesson
D-Link says “just buy a new router” after 9.8 critical vulnerability…
Fireship Beginner 1y ago
Build Your Own Wi-Fi Pen Testing Device: ESP-32 Marauder
Cybersecurity ⚡ AI Lesson
Build Your Own Wi-Fi Pen Testing Device: ESP-32 Marauder
The Cyber Mentor Beginner 1y ago
Exploring Cybersecurity as a Career: Is it Worth it? | Pros & Cons of Cybersecurity Career | Edureka
Cybersecurity
Exploring Cybersecurity as a Career: Is it Worth it? | Pros & Cons of Cybersecurity Career | Edureka
edureka! Beginner 1y ago
What is AI for Good?
Cybersecurity ⚡ AI Lesson
What is AI for Good?
DeepLearningAI Beginner 1y ago
Cybersecurity Projects for Beginners | Top 10 Cybersecurity Project Ideas | Edureka
Cybersecurity
Cybersecurity Projects for Beginners | Top 10 Cybersecurity Project Ideas | Edureka
edureka! Beginner 1y ago
Hacker unlocks Cryptography secrets (hashing, encryption and more)
Cybersecurity
Hacker unlocks Cryptography secrets (hashing, encryption and more)
David Bombal Beginner 1y ago
HackTheBox - Axlle
Cybersecurity
HackTheBox - Axlle
IppSec Beginner 1y ago
Kali Linux USB persistence the right way
Cybersecurity
Kali Linux USB persistence the right way
David Bombal Beginner 1y ago
World Building for SANS Holiday Hack Challenge
Cybersecurity
World Building for SANS Holiday Hack Challenge
John Hammond Beginner 1y ago
Cities Skylines II Malware [FULL REVERSE ENGINEERING ANALYSIS]
Cybersecurity ⚡ AI Lesson
Cities Skylines II Malware [FULL REVERSE ENGINEERING ANALYSIS]
John Hammond Beginner 1y ago
HackTheBox - Blazorized
Cybersecurity ⚡ AI Lesson
HackTheBox - Blazorized
IppSec Beginner 1y ago
Malleable Encryption - Computerphile
Cybersecurity ⚡ AI Lesson
Malleable Encryption - Computerphile
Computerphile Beginner 1y ago
25 crazy software bugs explained
Cybersecurity
25 crazy software bugs explained
Fireship Beginner 1y ago
You're going to be hacked. But here's how to avoid a cybersecurity disaster | TC Disrupt 2024
Cybersecurity ⚡ AI Lesson
You're going to be hacked. But here's how to avoid a cybersecurity disaster | TC Disrupt 2024
TechCrunch Beginner 1y ago
5 Levels of AI Marketing Mastery: How to Level-Up Your Use of AI
Cybersecurity ⚡ AI Lesson
5 Levels of AI Marketing Mastery: How to Level-Up Your Use of AI
AI Explored Beginner 1y ago
From Compliance to Leadership: What Every CISO Needs to Know
Cybersecurity ⚡ AI Lesson
From Compliance to Leadership: What Every CISO Needs to Know
SANS Institute Beginner 1y ago
Security Best Practices for Production Applications
Cybersecurity
Security Best Practices for Production Applications
GeeksforGeeks Beginner 1y ago
Data Quality Management Techniques - The Complete Guide
Cybersecurity ⚡ AI Lesson
Data Quality Management Techniques - The Complete Guide
MLOps.community Beginner 1y ago
TCM Security Black Friday / Cyber Monday Deals 2024
Cybersecurity ⚡ AI Lesson
TCM Security Black Friday / Cyber Monday Deals 2024
The Cyber Mentor Beginner 1y ago
LIVE: Hacking, AppSec and Cybersecurity | TryHackMe
Cybersecurity ⚡ AI Lesson
LIVE: Hacking, AppSec and Cybersecurity | TryHackMe
The Cyber Mentor Beginner 1y ago
TCM Security 2024 Black Friday Cyber Monday Sale is Here!
Cybersecurity ⚡ AI Lesson
TCM Security 2024 Black Friday Cyber Monday Sale is Here!
The Cyber Mentor Beginner 1y ago
Build Your Own Wi-Fi Hacking Tool (ESP32 Marauder)
Cybersecurity ⚡ AI Lesson
Build Your Own Wi-Fi Hacking Tool (ESP32 Marauder)
The Cyber Mentor Beginner 1y ago
SaaS apps are vulnerable too!!! (ServiceNow Exploitation)
Cybersecurity ⚡ AI Lesson
SaaS apps are vulnerable too!!! (ServiceNow Exploitation)
John Hammond Beginner 1y ago
Cybersecurity Interview Questions | Top 30 Cybersecurity Interview Questions & Answers | Edureka
Cybersecurity
Cybersecurity Interview Questions | Top 30 Cybersecurity Interview Questions & Answers | Edureka
edureka! Beginner 1y ago
Car Hacking: With or Without a Flipper Zero
Cybersecurity ⚡ AI Lesson
Car Hacking: With or Without a Flipper Zero
The Cyber Mentor Beginner 1y ago
LIVE: Ransomware Memory Forensics | Cybersecurity | Blue Team
Cybersecurity ⚡ AI Lesson
LIVE: Ransomware Memory Forensics | Cybersecurity | Blue Team
The Cyber Mentor Beginner 1y ago
How Hackers Persist & Privesc in Microsoft 365
Cybersecurity ⚡ AI Lesson
How Hackers Persist & Privesc in Microsoft 365
John Hammond Beginner 1y ago
Cybersecurity Tutorial for Beginners | Cybersecurity Tutorial | Networking & Cryptography | Edureka
Cybersecurity
Cybersecurity Tutorial for Beginners | Cybersecurity Tutorial | Networking & Cryptography | Edureka
edureka! Beginner 1y ago
Learn Open-Source Intelligence (OSINT)!
Cybersecurity
Learn Open-Source Intelligence (OSINT)!
John Hammond Beginner 1y ago
Holiday Hack Challenge   Ed Skoudis Interview
Cybersecurity ⚡ AI Lesson
Holiday Hack Challenge Ed Skoudis Interview
John Hammond Beginner 1y ago
Have you been hacked? Hacker explains how to find out!
Cybersecurity
Have you been hacked? Hacker explains how to find out!
David Bombal Beginner 1y ago
HackTheBox - PermX
Cybersecurity
HackTheBox - PermX
IppSec Beginner 1y ago
Secure Browser Isolation in 10 Minutes With Keeper
Cybersecurity ⚡ AI Lesson
Secure Browser Isolation in 10 Minutes With Keeper
The Cyber Mentor Beginner 1y ago
How Often Should You Write Code?
Cybersecurity ⚡ AI Lesson
How Often Should You Write Code?
The Cyber Mentor Beginner 1y ago
How to Be an Ethical Hacker in 2025
Cybersecurity ⚡ AI Lesson
How to Be an Ethical Hacker in 2025
The Cyber Mentor Beginner 1y ago
Are You ready for these 2025 threats?
Cybersecurity
Are You ready for these 2025 threats?
David Bombal Beginner 1y ago
HackTheBox - Mist
Cybersecurity
HackTheBox - Mist
IppSec Beginner 1y ago
Malware Demo and Tutorial
Cybersecurity
Malware Demo and Tutorial
David Bombal Beginner 1y ago
Exploring the Wiz Cloud Security Platform
Cybersecurity ⚡ AI Lesson
Exploring the Wiz Cloud Security Platform
John Hammond Beginner 1y ago
Cybersecurity Roadmap 2025 | How To Become A Cybersecurity Expert | Edureka
Cybersecurity
Cybersecurity Roadmap 2025 | How To Become A Cybersecurity Expert | Edureka
edureka! Beginner 1y ago
Windows Servers Can Expose PowerShell on the Web
Cybersecurity ⚡ AI Lesson
Windows Servers Can Expose PowerShell on the Web
John Hammond Beginner 1y ago
Can this Mind Blowing 🤯 Reverse Shell be stopped? (Powershell Hack)
Cybersecurity ⚡ AI Lesson
Can this Mind Blowing 🤯 Reverse Shell be stopped? (Powershell Hack)
David Bombal Beginner 1y ago
HackTheBox - Editorial
Cybersecurity
HackTheBox - Editorial
IppSec Beginner 1y ago
How Does Prototype Pollution Actually Work?
Cybersecurity ⚡ AI Lesson
How Does Prototype Pollution Actually Work?
The Cyber Mentor Beginner 1y ago
Hackers Abuse MeshCentral for a RAT
Cybersecurity
Hackers Abuse MeshCentral for a RAT
John Hammond Beginner 1y ago
CEH v13 Certification | What’s New in CEH v13 AI? | CEH v13 Exam Details | Edureka
Cybersecurity
CEH v13 Certification | What’s New in CEH v13 AI? | CEH v13 Exam Details | Edureka
edureka! Beginner 1y ago
REAL Ransomware Chat Logs
Cybersecurity
REAL Ransomware Chat Logs
John Hammond Beginner 1y ago
📚 Coursera Courses Opens on Coursera · Free to audit
1 / 3 View all →
Fundamentals of Cyber Defense
📚 Coursera Course ↗
Self-paced
Fundamentals of Cyber Defense
Opens on Coursera ↗
Advanced Network Security and Analysis
📚 Coursera Course ↗
Self-paced
Advanced Network Security and Analysis
Opens on Coursera ↗
Cyber Security: Data Security and Information Privacy
📚 Coursera Course ↗
Self-paced
Cyber Security: Data Security and Information Privacy
Opens on Coursera ↗
Cryptography
📚 Coursera Course ↗
Self-paced
Cryptography
Opens on Coursera ↗
Ethical Hacking Practice Project & Questions
📚 Coursera Course ↗
Self-paced
Ethical Hacking Practice Project & Questions
Opens on Coursera ↗
Implementing Security in IoT and Edge Devices
📚 Coursera Course ↗
Self-paced
Implementing Security in IoT and Edge Devices
Opens on Coursera ↗