Tech Skills

Cybersecurity

Ethical hacking, penetration testing, network security, CTFs and defensive security

3576
lessons
Skills in this topic
View full skill map →
Security Basics
beginner
Fix OWASP top 10 vulnerabilities
AI Security
intermediate
Identify and patch prompt injection vulnerabilities
Network Security
intermediate
Configure a firewall with proper inbound/outbound rules
Ethical Hacking & Pen Testing
intermediate
Conduct a full pen test with Kali Linux
Cloud Security
intermediate
Implement IAM least-privilege policies on AWS/GCP
Incident Response
intermediate
Build an incident response playbook
Security Compliance
intermediate
Map controls for SOC 2 Type II compliance
Defensive AI
advanced
Build an AI-powered log anomaly detector
Arm®-based Video
Cybersecurity
Arm®-based Video
LiveOverflow Beginner 2y ago
Understand what actually coding is all about
Cybersecurity
Understand what actually coding is all about
Shweta Beginner 2y ago
List of top 10 programming languages of 2023, along with free resources to learn each of them!
Cybersecurity
List of top 10 programming languages of 2023, along with free resources to learn each of them!
Shweta Beginner 2y ago
Portswigger Lab: CSRF where token validation depends on request method
Cybersecurity
Portswigger Lab: CSRF where token validation depends on request method
Ali Issa Beginner 2y ago
HackThebox - Wifinetic
Cybersecurity
HackThebox - Wifinetic
IppSec Beginner 2y ago
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tutorial | Edureka Rewind
Cybersecurity
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tutorial | Edureka Rewind
edureka! Beginner 2y ago
Getting Started with Command Injection
Cybersecurity
Getting Started with Command Injection
The Cyber Mentor Beginner 2y ago
Hacking the world’s most popular database
Cybersecurity
Hacking the world’s most popular database
NetworkChuck Beginner 2y ago
"Remove the video as soon as possible"
Cybersecurity
"Remove the video as soon as possible"
LiveOverflow Beginner 2y ago
Ethical Hacking Tutorial For Beginners [2024] | Learn Ethical hacking From Scratch | Edureka Rewind
Cybersecurity
Ethical Hacking Tutorial For Beginners [2024] | Learn Ethical hacking From Scratch | Edureka Rewind
edureka! Beginner 2y ago
The 5 of the best Security Plugins for Your Website
Cybersecurity
The 5 of the best Security Plugins for Your Website
WPBeginner - WordPress Tutorials Beginner 2y ago
Ascendium partners with Mandiant experts to increase cybersecurity
Cybersecurity
Ascendium partners with Mandiant experts to increase cybersecurity
Google Cloud Beginner 2y ago
Exploring CSRF Vulnerability: Theory and Hands-On Lab using CSRF generator in Burp Suite
Cybersecurity
Exploring CSRF Vulnerability: Theory and Hands-On Lab using CSRF generator in Burp Suite
Ali Issa Beginner 2y ago
Walter Isaacson: Elon Musk, Steve Jobs, Einstein, Da Vinci & Ben Franklin | Lex Fridman Podcast #395
Cybersecurity
Walter Isaacson: Elon Musk, Steve Jobs, Einstein, Da Vinci & Ben Franklin | Lex Fridman Podcast #395
Lex Fridman Beginner 2y ago
Linux for Hackers Tutorial (And Free Courses)
Cybersecurity
Linux for Hackers Tutorial (And Free Courses)
David Bombal Beginner 2y ago
HackTheBox - Pikatwoo
Cybersecurity
HackTheBox - Pikatwoo
IppSec Beginner 2y ago
Top Cybersecurity Projects for Your Resume
Cybersecurity
Top Cybersecurity Projects for Your Resume
The Cyber Mentor Beginner 2y ago
CryptOSINT | Host: Sadie Gauthier | September 5, 2023
Cybersecurity
CryptOSINT | Host: Sadie Gauthier | September 5, 2023
SANS Institute Beginner 2y ago
MSc Cybersecurity Webinar With Dr Fauzia Idrees, University of London
Cybersecurity
MSc Cybersecurity Webinar With Dr Fauzia Idrees, University of London
Coursera Beginner 2y ago
Learn Active Directory Kerberoasting
Cybersecurity
Learn Active Directory Kerberoasting
John Hammond Beginner 2y ago
Install Kali Linux on Windows 11 for FREE
Cybersecurity
Install Kali Linux on Windows 11 for FREE
David Bombal Beginner 2y ago
FEATURE SEGMENT: Inside SANS Holiday Hack Challenge 2023 | Host: Ed Skoudis
Cybersecurity
FEATURE SEGMENT: Inside SANS Holiday Hack Challenge 2023 | Host: Ed Skoudis
SANS Institute Beginner 2y ago
Stanford Webinar - How to Get A Cybersecurity Job
Cybersecurity
Stanford Webinar - How to Get A Cybersecurity Job
Stanford Online Beginner 2y ago
The Full stack chart ! #programming
Cybersecurity
The Full stack chart ! #programming
Shweta Beginner 2y ago
List of important languages for specific career goals ! #programming
Cybersecurity
List of important languages for specific career goals ! #programming
Shweta Beginner 2y ago
Best Youtube Channels for Programming #programming
Cybersecurity
Best Youtube Channels for Programming #programming
Shweta Beginner 2y ago
Learn About different types of Data types in programming !
Cybersecurity
Learn About different types of Data types in programming !
Shweta Beginner 2y ago
Learn When Popular Programming came into existence ! #programming
Cybersecurity
Learn When Popular Programming came into existence ! #programming
Shweta Beginner 2y ago
What is Kali Linux | Kali Linux Hacking Tutorials | Ethical Hacking Training | Edureka Rewind
Cybersecurity
What is Kali Linux | Kali Linux Hacking Tutorials | Ethical Hacking Training | Edureka Rewind
edureka! Beginner 2y ago
What is Phishing  | Learn Phishing Using Kali Linux  | Phishing Attack Explained | Edureka Rewind  1
Cybersecurity
What is Phishing | Learn Phishing Using Kali Linux | Phishing Attack Explained | Edureka Rewind 1
edureka! Beginner 2y ago
Do Hackers Need To Know Algorithms and Data Structures?
Cybersecurity
Do Hackers Need To Know Algorithms and Data Structures?
LiveOverflow Beginner 2y ago
HackTheBox - MonitorsTwo
Cybersecurity
HackTheBox - MonitorsTwo
IppSec Beginner 2y ago
Its Okay to Quit
Cybersecurity
Its Okay to Quit
The Cyber Mentor Beginner 2y ago
Exploit Blind SSRF with Out-of-Band Detection
Cybersecurity
Exploit Blind SSRF with Out-of-Band Detection
The Cyber Mentor Beginner 2y ago
Ethical Hacking using Kali Linux | Ethical Hacking Tutorial | Edureka | Cybersecurity Rewind - 3
Cybersecurity
Ethical Hacking using Kali Linux | Ethical Hacking Tutorial | Edureka | Cybersecurity Rewind - 3
edureka! Beginner 2y ago
Cybersecurity Frameworks Tutorial | Cybersecurity Training | Edureka | Cybersecurity Rewind- 2
Cybersecurity
Cybersecurity Frameworks Tutorial | Cybersecurity Training | Edureka | Cybersecurity Rewind- 2
edureka! Beginner 2y ago
HackTheBox - OnlyForYou
Cybersecurity
HackTheBox - OnlyForYou
IppSec Beginner 2y ago
Best Computer for Hacking in 2023
Cybersecurity
Best Computer for Hacking in 2023
The Cyber Mentor Beginner 2y ago
Kali Linux USB Live Boot with Persistence (in 5 minutes)
Cybersecurity
Kali Linux USB Live Boot with Persistence (in 5 minutes)
David Bombal Beginner 2y ago
HackTheBox - Mailroom
Cybersecurity
HackTheBox - Mailroom
IppSec Beginner 2y ago
2023 Roadmap To Your First Cybersecurity Job
Cybersecurity
2023 Roadmap To Your First Cybersecurity Job
The Cyber Mentor Beginner 2y ago
Analysis on legit tools abused in human-operated ransomware
Cybersecurity
Analysis on legit tools abused in human-operated ransomware
SANS Institute Beginner 2y ago
A RaaS-ipe for Disaster: The Evolving RaaS Space, as Told Through Tools, Techniques, and Procedures
Cybersecurity
A RaaS-ipe for Disaster: The Evolving RaaS Space, as Told Through Tools, Techniques, and Procedures
SANS Institute Beginner 2y ago
Are you looking for live PNPT training with virtual labs? Look no further!
Cybersecurity
Are you looking for live PNPT training with virtual labs? Look no further!
The Cyber Mentor Beginner 2y ago
NICE Workforce for Cyber Security: Recruiting, Developing, and Planning Your Cybersecurity Workforce
Cybersecurity
NICE Workforce for Cyber Security: Recruiting, Developing, and Planning Your Cybersecurity Workforce
SANS Institute Beginner 2y ago
Google Cybersecurity Certificate - First Thoughts
Cybersecurity
Google Cybersecurity Certificate - First Thoughts
The Cyber Mentor Beginner 2y ago
Buffer Overflow Hacking Tutorial (Bypass Passwords)
Cybersecurity
Buffer Overflow Hacking Tutorial (Bypass Passwords)
David Bombal Beginner 2y ago
HackTheBox - Busqueda
Cybersecurity
HackTheBox - Busqueda
IppSec Beginner 2y ago
📚 Coursera Courses Opens on Coursera · Free to audit
1 / 3 View all →
Cloud Computing Law: Transactions
📚 Coursera Course ↗
Self-paced
Cloud Computing Law: Transactions
Opens on Coursera ↗
Introduction à Cloud Next Generation Firewall
📚 Coursera Course ↗
Self-paced
Introduction à Cloud Next Generation Firewall
Opens on Coursera ↗
CompTIA Security+ 701
📚 Coursera Course ↗
Self-paced
CompTIA Security+ 701
Opens on Coursera ↗
Cybersecurity Governance and Compliance
📚 Coursera Course ↗
Self-paced
Cybersecurity Governance and Compliance
Opens on Coursera ↗
Ethical Hacking Capstone Project: Breach, Response, AI
📚 Coursera Course ↗
Self-paced
Ethical Hacking Capstone Project: Breach, Response, AI
Opens on Coursera ↗
Network Security, Troubleshooting, & Certification Prep
📚 Coursera Course ↗
Self-paced
Network Security, Troubleshooting, & Certification Prep
Opens on Coursera ↗