Tech Skills

Cybersecurity

Ethical hacking, penetration testing, network security, CTFs and defensive security

7,049
lessons
Skills in this topic
View full skill map โ†’
Security Basics
beginner
Fix OWASP top 10 vulnerabilities
AI Security
intermediate
Identify and patch prompt injection vulnerabilities
Network Security
intermediate
Configure a firewall with proper inbound/outbound rules
Ethical Hacking & Pen Testing
intermediate
Conduct a full pen test with Kali Linux
Cloud Security
intermediate
Implement IAM least-privilege policies on AWS/GCP
Incident Response
intermediate
Build an incident response playbook
Security Compliance
intermediate
Map controls for SOC 2 Type II compliance
Defensive AI
advanced
Build an AI-powered log anomaly detector
What is Kali Linux | Kali Linux Hacking Tutorials | Ethical Hacking Training | Edureka Rewind
Cybersecurity
What is Kali Linux | Kali Linux Hacking Tutorials | Ethical Hacking Training | Edureka Rewind
edureka! Beginner 2y ago
How to Become an Ethical Hacker | Ethical hacking certification | Ethical hacking training | Edureka
Cybersecurity
How to Become an Ethical Hacker | Ethical hacking certification | Ethical hacking training | Edureka
edureka! Beginner 2y ago
What's the Structure of a JSON Web Token?
Cybersecurity โšก AI Lesson
What's the Structure of a JSON Web Token?
The Cyber Mentor Beginner 2y ago
Remediate XXE (XML External Entity Injection)
Cybersecurity โšก AI Lesson
Remediate XXE (XML External Entity Injection)
The Cyber Mentor Beginner 2y ago
Top four entry-level roles in cybersecurity, brought to you by Sandra Liu, cybersecurity enthusiast.
Cybersecurity
Top four entry-level roles in cybersecurity, brought to you by Sandra Liu, cybersecurity enthusiast.
Coursera Beginner 2y ago
Kimbal Musk: The Art of Cooking, Tesla, SpaceX, Zip2, and Family | Lex Fridman Podcast #417
Cybersecurity
Kimbal Musk: The Art of Cooking, Tesla, SpaceX, Zip2, and Family | Lex Fridman Podcast #417
Lex Fridman Beginner 2y ago
Should you be using WiFi 7 or WPA3? Best Wi-Fi setup?
Cybersecurity โšก AI Lesson
Should you be using WiFi 7 or WPA3? Best Wi-Fi setup?
David Bombal Beginner 2y ago
Day Johnson is on a mission to decode the fusion between engineering & life.
Cybersecurity
Day Johnson is on a mission to decode the fusion between engineering & life.
Coursera Beginner 2y ago
Don't make this Wi-Fi Security Mistake! #shorts #wifi #iphone #cybersecurity
Cybersecurity
Don't make this Wi-Fi Security Mistake! #shorts #wifi #iphone #cybersecurity
David Bombal Beginner 2y ago
The Cops Had No Idea He Just Stole $1 Million Worth of Crypto๐ŸŽ™Darknet Diaries Ep. 118: Hot Swaps
Cybersecurity
The Cops Had No Idea He Just Stole $1 Million Worth of Crypto๐ŸŽ™Darknet Diaries Ep. 118: Hot Swaps
Jack Rhysider Beginner 2y ago
I Made Malware In Under 20 Minutes
Cybersecurity โšก AI Lesson
I Made Malware In Under 20 Minutes
John Hammond Beginner 2y ago
HackTheBox - CozyHosting
Cybersecurity โšก AI Lesson
HackTheBox - CozyHosting
IppSec Beginner 2y ago
Sweet New Threat Intel Just Dropped
Cybersecurity
Sweet New Threat Intel Just Dropped
John Hammond Beginner 2y ago
HackTheBox - Drive
Cybersecurity
HackTheBox - Drive
IppSec Beginner 2y ago
Marc Raibert: Boston Dynamics and the Future of Robotics | Lex Fridman Podcast #412
Cybersecurity โšก AI Lesson
Marc Raibert: Boston Dynamics and the Future of Robotics | Lex Fridman Podcast #412
Lex Fridman Beginner 2y ago
The Logo Design Technique I used for my Startup
Cybersecurity
The Logo Design Technique I used for my Startup
DesignCourse Beginner 2y ago
3 Ways to Level Up Your Hacking
Cybersecurity โšก AI Lesson
3 Ways to Level Up Your Hacking
The Cyber Mentor Beginner 2y ago
Getting Started in a Cybersecurity Career
Cybersecurity โšก AI Lesson
Getting Started in a Cybersecurity Career
The Cyber Mentor Beginner 2y ago
Build Your Own TryHackMe CTF (from start to finish)
Cybersecurity โšก AI Lesson
Build Your Own TryHackMe CTF (from start to finish)
The Cyber Mentor Beginner 2y ago
Can AI Fix Vulnerable Code?
Cybersecurity โšก AI Lesson
Can AI Fix Vulnerable Code?
The Cyber Mentor Beginner 2y ago
How to Find Cross-Site Scripting (XSS)
Cybersecurity โšก AI Lesson
How to Find Cross-Site Scripting (XSS)
The Cyber Mentor Beginner 2y ago
Getting Started with Hack The Box
Cybersecurity โšก AI Lesson
Getting Started with Hack The Box
The Cyber Mentor Beginner 2y ago
Top 10 FREE OSINT tools (with demos) for 2024 - And FREE OSINT course!
Cybersecurity
Top 10 FREE OSINT tools (with demos) for 2024 - And FREE OSINT course!
David Bombal Beginner 2y ago
A Beginners Guide to Code Review
Cybersecurity โšก AI Lesson
A Beginners Guide to Code Review
The Cyber Mentor Beginner 2y ago
Top 5 Wireshark tricks to troubleshoot SLOW networks
Cybersecurity
Top 5 Wireshark tricks to troubleshoot SLOW networks
David Bombal Beginner 2y ago
3 Common Pentesting Interview Questions You Need to Know
Cybersecurity โšก AI Lesson
3 Common Pentesting Interview Questions You Need to Know
The Cyber Mentor Beginner 2y ago
Get you started in an entry-level cybersecurity career! @collinsinfosec
Cybersecurity
Get you started in an entry-level cybersecurity career! @collinsinfosec
Coursera Beginner 2y ago
What is a Race Condition?
Cybersecurity โšก AI Lesson
What is a Race Condition?
The Cyber Mentor Beginner 2y ago
Free Hacking API courses (And how to use AI to help you hack)
Cybersecurity โšก AI Lesson
Free Hacking API courses (And how to use AI to help you hack)
David Bombal Beginner 2y ago
Practical Bug Bounty
Cybersecurity โšก AI Lesson
Practical Bug Bounty
The Cyber Mentor Beginner 2y ago
Red teaming vs. blue teaming in cybersecurity. Whatโ€™s the difference?
Cybersecurity
Red teaming vs. blue teaming in cybersecurity. Whatโ€™s the difference?
Coursera Beginner 2y ago
Malware Analysis Made Easy: Cloud Investigations
Cybersecurity โšก AI Lesson
Malware Analysis Made Easy: Cloud Investigations
John Hammond Beginner 2y ago
Calculating Smart Contract Vulnerability Impact: Low To Critical
Cybersecurity
Calculating Smart Contract Vulnerability Impact: Low To Critical
John Hammond Beginner 2y ago
Get started in cybersecurity! @collinsinfosec
Cybersecurity
Get started in cybersecurity! @collinsinfosec
Coursera Beginner 2y ago
Can a professional certificate help you get a job? @CyberWithBen
Cybersecurity
Can a professional certificate help you get a job? @CyberWithBen
Coursera Beginner 2y ago
Turbocharging Your Recon Using ChatGPT
Cybersecurity โšก AI Lesson
Turbocharging Your Recon Using ChatGPT
The Cyber Mentor Beginner 2y ago
Linux for Hackers: LINUX commands you need to know (with OTW) // Ep 6
Cybersecurity โšก AI Lesson
Linux for Hackers: LINUX commands you need to know (with OTW) // Ep 6
David Bombal Beginner 2y ago
Advanced Network Security Techniques | Introduction to Network Security | Edureka Rewind
Cybersecurity
Advanced Network Security Techniques | Introduction to Network Security | Edureka Rewind
edureka! Beginner 2y ago
Cybersecurity Career Paths | Career in Cyber Security - Salary, Jobs and Skills | Edureka
Cybersecurity
Cybersecurity Career Paths | Career in Cyber Security - Salary, Jobs and Skills | Edureka
edureka! Beginner 2y ago
HackTheBox - Builder
Cybersecurity โšก AI Lesson
HackTheBox - Builder
IppSec Beginner 2y ago
Start Your Cybersecurity Career in 2024
Cybersecurity โšก AI Lesson
Start Your Cybersecurity Career in 2024
The Cyber Mentor Beginner 2y ago
How to Pass the Practical Network Penetration Tester Exam (PNPT)
Cybersecurity โšก AI Lesson
How to Pass the Practical Network Penetration Tester Exam (PNPT)
The Cyber Mentor Beginner 2y ago
Ethical Hacker Salary ๐Ÿค‘ | How Much Do Ethical Hackers Make | Ethical Hacking Career | Edureka
Cybersecurity
Ethical Hacker Salary ๐Ÿค‘ | How Much Do Ethical Hackers Make | Ethical Hacking Career | Edureka
edureka! Beginner 2y ago
Learning Entra ID (Azure Active Directory)
Cybersecurity
Learning Entra ID (Azure Active Directory)
John Hammond Beginner 2y ago
Cybersecurity Roadmap | Cybersecurity Career Roadmap For Beginners | Edureka
Cybersecurity
Cybersecurity Roadmap | Cybersecurity Career Roadmap For Beginners | Edureka
edureka! Beginner 2y ago
Network Threat Hunting Made Easy (Finding Hackers)
Cybersecurity
Network Threat Hunting Made Easy (Finding Hackers)
John Hammond Beginner 2y ago
Burp Extension Development Part 3 - Singletons & Scope
Cybersecurity โšก AI Lesson
Burp Extension Development Part 3 - Singletons & Scope
The Cyber Mentor Beginner 2y ago
Top 3 Cyber Security Certifications for 2025 | Cyber Security Certifications for Beginners | Edureka
Cybersecurity
Top 3 Cyber Security Certifications for 2025 | Cyber Security Certifications for Beginners | Edureka
edureka! Beginner 2y ago
๐Ÿ“š Coursera Courses Opens on Coursera ยท Free to audit
1 / 3 View all โ†’
Cloud Security, Resiliency, and Vulnerability Management
๐Ÿ“š Coursera Course โ†—
Self-paced
Cloud Security, Resiliency, and Vulnerability Management
Opens on Coursera โ†—
Classical Cryptosystems and Core Concepts
๐Ÿ“š Coursera Course โ†—
Self-paced
Classical Cryptosystems and Core Concepts
Opens on Coursera โ†—
The Cybersecurity Culture Blueprint: A Proactive Approach
๐Ÿ“š Coursera Course โ†—
Self-paced
The Cybersecurity Culture Blueprint: A Proactive Approach
Opens on Coursera โ†—
 Advanced Cybersecurity Techniques
๐Ÿ“š Coursera Course โ†—
Self-paced
Advanced Cybersecurity Techniques
Opens on Coursera โ†—
CISSP Certified Information Security Professional Exam Guide
๐Ÿ“š Coursera Course โ†—
Self-paced
CISSP Certified Information Security Professional Exam Guide
Opens on Coursera โ†—
Foundations of Information Security and Incident Handling
๐Ÿ“š Coursera Course โ†—
Self-paced
Foundations of Information Security and Incident Handling
Opens on Coursera โ†—