Tech Skills

Cybersecurity

Ethical hacking, penetration testing, network security, CTFs and defensive security

7,046
lessons
Skills in this topic
View full skill map →
Security Basics
beginner
Fix OWASP top 10 vulnerabilities
AI Security
intermediate
Identify and patch prompt injection vulnerabilities
Network Security
intermediate
Configure a firewall with proper inbound/outbound rules
Ethical Hacking & Pen Testing
intermediate
Conduct a full pen test with Kali Linux
Cloud Security
intermediate
Implement IAM least-privilege policies on AWS/GCP
Incident Response
intermediate
Build an incident response playbook
Security Compliance
intermediate
Map controls for SOC 2 Type II compliance
Defensive AI
advanced
Build an AI-powered log anomaly detector
Billionaire Pavel Durov arrested... The truth about Telegram
Cybersecurity ⚡ AI Lesson
Billionaire Pavel Durov arrested... The truth about Telegram
Fireship Beginner 1y ago
HackTheBox - Runner
Cybersecurity
HackTheBox - Runner
IppSec Beginner 1y ago
3 Recommended Burp Suite Plugins
Cybersecurity ⚡ AI Lesson
3 Recommended Burp Suite Plugins
The Cyber Mentor Beginner 1y ago
Intro to Game Hacking: DEFCON 32
Cybersecurity
Intro to Game Hacking: DEFCON 32
John Hammond Beginner 1y ago
Why Cybersecurity Professionals Need to Understand AI
Cybersecurity
Why Cybersecurity Professionals Need to Understand AI
Coursera Beginner 1y ago
HackTheBox - FormulaX
Cybersecurity
HackTheBox - FormulaX
IppSec Beginner 1y ago
How To Network At Conferences
Cybersecurity ⚡ AI Lesson
How To Network At Conferences
The Cyber Mentor Beginner 1y ago
Craig Jones: Jiu Jitsu, $2 Million Prize, CJI, ADCC, Ukraine & Trolling | Lex Fridman Podcast #439
Cybersecurity
Craig Jones: Jiu Jitsu, $2 Million Prize, CJI, ADCC, Ukraine & Trolling | Lex Fridman Podcast #439
Lex Fridman Beginner 1y ago
The Phishing Website that Hacked Linus Tech Tips
Cybersecurity
The Phishing Website that Hacked Linus Tech Tips
John Hammond Beginner 1y ago
CEH V12 Exam Preparation | How to Prepare for CEH V12 Exam | Edureka
Cybersecurity
CEH V12 Exam Preparation | How to Prepare for CEH V12 Exam | Edureka
edureka! Beginner 1y ago
Hacking the Colony
Cybersecurity ⚡ AI Lesson
Hacking the Colony
Data Skeptic Beginner 1y ago
HCLTech Helps Global Customer Base Protect Data with Google Cloud Security
Cybersecurity
HCLTech Helps Global Customer Base Protect Data with Google Cloud Security
Google Cloud Beginner 1y ago
Cybersecurity for Beginners | Basics of Cybersecurity | Edureka
Cybersecurity
Cybersecurity for Beginners | Basics of Cybersecurity | Edureka
edureka! Beginner 1y ago
Reverse Engineering 101 tutorial with the amazing Stephen Sims!
Cybersecurity ⚡ AI Lesson
Reverse Engineering 101 tutorial with the amazing Stephen Sims!
David Bombal Beginner 1y ago
New Cybersecurity Certification?
Cybersecurity ⚡ AI Lesson
New Cybersecurity Certification?
David Bombal Beginner 1y ago
Supply Chain Compromises Pt. 2 | The Incident Commander Series Ep. 4
Cybersecurity ⚡ AI Lesson
Supply Chain Compromises Pt. 2 | The Incident Commander Series Ep. 4
SANS Institute Beginner 1y ago
Supporting Thinking outside The Box-Allyship for neurodiverse colleagues
Cybersecurity ⚡ AI Lesson
Supporting Thinking outside The Box-Allyship for neurodiverse colleagues
SANS Institute Beginner 1y ago
I'm going to be a hacker
Cybersecurity ⚡ AI Lesson
I'm going to be a hacker
NetworkChuck Beginner 1y ago
Planning Red Team Operations | Scope, ROE & Reporting
Cybersecurity ⚡ AI Lesson
Planning Red Team Operations | Scope, ROE & Reporting
HackerSploit Beginner 1y ago
What is dark web? 🤔 | What if your movements are tracked? 🫨 | Dark Web | Cyber threat | GFG
Cybersecurity
What is dark web? 🤔 | What if your movements are tracked? 🫨 | Dark Web | Cyber threat | GFG
GeeksforGeeks Beginner 1y ago
He DROPPED cybersecurity to start an AI company + content
Cybersecurity
He DROPPED cybersecurity to start an AI company + content
Sajjaad Khader Beginner 1y ago
Mapping APT TTPs With MITRE ATT&CK Navigator
Cybersecurity ⚡ AI Lesson
Mapping APT TTPs With MITRE ATT&CK Navigator
HackerSploit Beginner 1y ago
3 Must-Have Skills for SOC Analysts
Cybersecurity ⚡ AI Lesson
3 Must-Have Skills for SOC Analysts
The Cyber Mentor Beginner 1y ago
HackTheBox - Usage
Cybersecurity
HackTheBox - Usage
IppSec Beginner 1y ago
Cyber Security for Beginners | Introduction to Cyber Security | Cyber Security | Edureka
Cybersecurity
Cyber Security for Beginners | Introduction to Cyber Security | Cyber Security | Edureka
edureka! Beginner 1y ago
How To Pass Any Cybersecurity Certification
Cybersecurity ⚡ AI Lesson
How To Pass Any Cybersecurity Certification
The Cyber Mentor Beginner 1y ago
HackTheBox - iClean
Cybersecurity ⚡ AI Lesson
HackTheBox - iClean
IppSec Beginner 1y ago
OSINT Deep Dive: Decoding Location Data Hidden in Photos
Cybersecurity ⚡ AI Lesson
OSINT Deep Dive: Decoding Location Data Hidden in Photos
The Cyber Mentor Beginner 1y ago
He Passed CISSP At Age 23
Cybersecurity
He Passed CISSP At Age 23
John Hammond Beginner 1y ago
What Their Computer Looked Like Right As They Got Hacked
Cybersecurity
What Their Computer Looked Like Right As They Got Hacked
John Hammond Beginner 1y ago
Hack a Smart Safe at the DEF CON IoT Village!
Cybersecurity ⚡ AI Lesson
Hack a Smart Safe at the DEF CON IoT Village!
The Cyber Mentor Beginner 1y ago
Hacking a Docker Container Registry
Cybersecurity
Hacking a Docker Container Registry
John Hammond Beginner 1y ago
What to Know About Becoming a Pentester
Cybersecurity ⚡ AI Lesson
What to Know About Becoming a Pentester
The Cyber Mentor Beginner 1y ago
Real World OSINT and Cyber Threat Intelligence Tips and Tricks
Cybersecurity
Real World OSINT and Cyber Threat Intelligence Tips and Tricks
David Bombal Beginner 1y ago
Master DOM Invader in 60 Seconds
Cybersecurity ⚡ AI Lesson
Master DOM Invader in 60 Seconds
The Cyber Mentor Beginner 1y ago
Permission to Hack You: Illicit Consent Grant Attack
Cybersecurity ⚡ AI Lesson
Permission to Hack You: Illicit Consent Grant Attack
John Hammond Beginner 1y ago
SQL injection | SQL Injection Attack Tutorial | Cybersecurity Training | Edureka Rewind
Cybersecurity
SQL injection | SQL Injection Attack Tutorial | Cybersecurity Training | Edureka Rewind
edureka! Beginner 1y ago
The Best and Worst of Hack The Box
Cybersecurity ⚡ AI Lesson
The Best and Worst of Hack The Box
The Cyber Mentor Beginner 1y ago
HackTheBox - Headless
Cybersecurity
HackTheBox - Headless
IppSec Beginner 1y ago
Exploit Failed. Now What?
Cybersecurity ⚡ AI Lesson
Exploit Failed. Now What?
The Cyber Mentor Beginner 1y ago
How to Upgrade a Shell on Meterpreter
Cybersecurity ⚡ AI Lesson
How to Upgrade a Shell on Meterpreter
The Cyber Mentor Beginner 1y ago
Introduction To The MITRE ATT&CK Framework
Cybersecurity ⚡ AI Lesson
Introduction To The MITRE ATT&CK Framework
HackerSploit Beginner 1y ago
Red Team Frameworks & Methodologies
Cybersecurity ⚡ AI Lesson
Red Team Frameworks & Methodologies
HackerSploit Beginner 1y ago
Could AI Take Our Jobs?
Cybersecurity ⚡ AI Lesson
Could AI Take Our Jobs?
The Cyber Mentor Beginner 1y ago
Hacking Windows TrustedInstaller (GOD MODE)
Cybersecurity ⚡ AI Lesson
Hacking Windows TrustedInstaller (GOD MODE)
John Hammond Beginner 1y ago
How to be Invisible Online using Expert OSINT techniques
Cybersecurity
How to be Invisible Online using Expert OSINT techniques
David Bombal Beginner 1y ago
HackTheBox - Corporate (FIXED)
Cybersecurity
HackTheBox - Corporate (FIXED)
IppSec Beginner 1y ago
When to Start Your Cybersecurity Career
Cybersecurity ⚡ AI Lesson
When to Start Your Cybersecurity Career
The Cyber Mentor Beginner 1y ago
📚 Coursera Courses Opens on Coursera · Free to audit
1 / 3 View all →
Mastering BFSI Interviews: Resumes & Mock Interviews
📚 Coursera Course ↗
Self-paced
Mastering BFSI Interviews: Resumes & Mock Interviews
Opens on Coursera ↗
Secure Mobile AI Models Against Attacks
📚 Coursera Course ↗
Self-paced
Secure Mobile AI Models Against Attacks
Opens on Coursera ↗
Cybersecurity Fundamentals – ISC2 Certification Prep
📚 Coursera Course ↗
Self-paced
Cybersecurity Fundamentals – ISC2 Certification Prep
Opens on Coursera ↗
Secure Networking in Azure
📚 Coursera Course ↗
Self-paced
Secure Networking in Azure
Opens on Coursera ↗
Memory, Encryption, and Protecting Data in iOS
📚 Coursera Course ↗
Self-paced
Memory, Encryption, and Protecting Data in iOS
Opens on Coursera ↗
AWS Wickr Getting Started
📚 Coursera Course ↗
Self-paced
AWS Wickr Getting Started
Opens on Coursera ↗