Tech Skills

Cybersecurity

Ethical hacking, penetration testing, network security, CTFs and defensive security

3576
lessons
Skills in this topic
View full skill map โ†’
Security Basics
beginner
Fix OWASP top 10 vulnerabilities
AI Security
intermediate
Identify and patch prompt injection vulnerabilities
Network Security
intermediate
Configure a firewall with proper inbound/outbound rules
Ethical Hacking & Pen Testing
intermediate
Conduct a full pen test with Kali Linux
Cloud Security
intermediate
Implement IAM least-privilege policies on AWS/GCP
Incident Response
intermediate
Build an incident response playbook
Security Compliance
intermediate
Map controls for SOC 2 Type II compliance
Defensive AI
advanced
Build an AI-powered log anomaly detector
Finding Vulnerabilities in IoT Firmware
Cybersecurity
Finding Vulnerabilities in IoT Firmware
The Cyber Mentor Beginner 2y ago
WordPress Vulnerabilities Part 2
Cybersecurity
WordPress Vulnerabilities Part 2
The Cyber Mentor Beginner 2y ago
Real World Hacking with OTW (Privacy and Cybersecurity IoT warning)
Cybersecurity
Real World Hacking with OTW (Privacy and Cybersecurity IoT warning)
David Bombal Beginner 2y ago
Modding Your Switch Can Land You In Prison๐ŸŽ™Darknet Diaries Ep. 136: Team Xecuter
Cybersecurity
Modding Your Switch Can Land You In Prison๐ŸŽ™Darknet Diaries Ep. 136: Team Xecuter
Jack Rhysider Beginner 2y ago
No Experience Required โ€“ Gaining Clarity for a Career in Cybersecurity
Cybersecurity
No Experience Required โ€“ Gaining Clarity for a Career in Cybersecurity
SANS Institute Beginner 2y ago
The Five Critical Controls for ICS | Host: Robert M. Lee | August 1, 2023
Cybersecurity
The Five Critical Controls for ICS | Host: Robert M. Lee | August 1, 2023
SANS Institute Beginner 2y ago
Elisabeth Rochat de la Vallรฉe. "The master phrase of the Daodejing is Bu Zheng"
Cybersecurity
Elisabeth Rochat de la Vallรฉe. "The master phrase of the Daodejing is Bu Zheng"
TCM Academy Beginner 2y ago
Real World Hacking Tools Tutorial (Target: Tesla)
Cybersecurity
Real World Hacking Tools Tutorial (Target: Tesla)
David Bombal Beginner 2y ago
HackTheBox - Cerberus
Cybersecurity
HackTheBox - Cerberus
IppSec Beginner 2y ago
Building a Career in Cybersecurity
Cybersecurity
Building a Career in Cybersecurity
NVIDIA Developer Beginner 2y ago
Earn a Cybersecurity Degree | University of London MSc Cybersecurity
Cybersecurity
Earn a Cybersecurity Degree | University of London MSc Cybersecurity
Coursera Beginner 2y ago
The Secret Version of the Internet
Cybersecurity
The Secret Version of the Internet
Jack Rhysider Beginner 2y ago
Start your IT Journey in 2023 RIGHT NOW
Cybersecurity
Start your IT Journey in 2023 RIGHT NOW
NetworkChuck Beginner 2y ago
Zimbra ZCS 0-day Exploited In The Wild
Cybersecurity
Zimbra ZCS 0-day Exploited In The Wild
John Hammond Beginner 2y ago
HackTheBox - Derailed
Cybersecurity
HackTheBox - Derailed
IppSec Beginner 2y ago
Local Root Exploit in HospitalRun Software
Cybersecurity
Local Root Exploit in HospitalRun Software
LiveOverflow Beginner 2y ago
CS50 Cybersecurity - Introduction
Cybersecurity
CS50 Cybersecurity - Introduction
CS50 Beginner 2y ago
you need this FREE CyberSecurity tool
Cybersecurity
you need this FREE CyberSecurity tool
NetworkChuck Beginner 2y ago
Day-18 Career Path in Tech | Navigating Job Market | Priya Vajpeyi
Cybersecurity
Day-18 Career Path in Tech | Navigating Job Market | Priya Vajpeyi
GeeksforGeeks Beginner 2y ago
Dark Web Dumpster Diving (Hunting Infostealer Malware)
Cybersecurity
Dark Web Dumpster Diving (Hunting Infostealer Malware)
John Hammond Beginner 2y ago
Is Coding Still Worth It?
Cybersecurity
Is Coding Still Worth It?
a16z Beginner 2y ago
Which one ?                            #programming #programminglanguages #print #languages
Cybersecurity
Which one ? #programming #programminglanguages #print #languages
CydexCode Beginner 2y ago
Choose your Language ๐Ÿ‘จโ€๐Ÿ’ป #programminglanguage #languages #programming
Cybersecurity
Choose your Language ๐Ÿ‘จโ€๐Ÿ’ป #programminglanguage #languages #programming
CydexCode Beginner 2y ago
Hacking Active Directory for Beginners (over 5 hours of content!)
Cybersecurity
Hacking Active Directory for Beginners (over 5 hours of content!)
The Cyber Mentor Beginner 2y ago
Our Best Bug Bounty Tips
Cybersecurity
Our Best Bug Bounty Tips
The Cyber Mentor Beginner 2y ago
The Top Open-Source Vulnerabilities (and how to fix them)
Cybersecurity
The Top Open-Source Vulnerabilities (and how to fix them)
The Cyber Mentor Beginner 2y ago
The next PNPT Accelerated Skill Camp beginning August 18, 2023!
Cybersecurity
The next PNPT Accelerated Skill Camp beginning August 18, 2023!
The Cyber Mentor Beginner 2y ago
How I Found My First Bug (now you can too)
Cybersecurity
How I Found My First Bug (now you can too)
The Cyber Mentor Beginner 2y ago
Hacking Web Applications (2+ hours of content)
Cybersecurity
Hacking Web Applications (2+ hours of content)
The Cyber Mentor Beginner 2y ago
SQL Injection Hacking Tutorial (Beginner to Advanced)
Cybersecurity
SQL Injection Hacking Tutorial (Beginner to Advanced)
David Bombal Beginner 2y ago
AI for Red Team & Malware Development
Cybersecurity
AI for Red Team & Malware Development
SANS Institute Beginner 2y ago
HackTheBox - Socket
Cybersecurity
HackTheBox - Socket
IppSec Beginner 2y ago
Appsec Careers in 2023
Cybersecurity
Appsec Careers in 2023
The Cyber Mentor Beginner 2y ago
Free Training & Courses (Cybersecurity, Cloud, DevOps, Networking) ๐Ÿคฏ #shorts
Cybersecurity
Free Training & Courses (Cybersecurity, Cloud, DevOps, Networking) ๐Ÿคฏ #shorts
David Bombal Beginner 2y ago
intro to cloud hacking (leaky buckets)
Cybersecurity
intro to cloud hacking (leaky buckets)
NetworkChuck Beginner 2y ago
College Degrees and Your Cybersecurity Career
Cybersecurity
College Degrees and Your Cybersecurity Career
The Cyber Mentor Beginner 2y ago
Dumping Data with NoSQL Injection via Regex and Python
Cybersecurity
Dumping Data with NoSQL Injection via Regex and Python
IppSec Beginner 2y ago
Real World Hacking Demo with OTW
Cybersecurity
Real World Hacking Demo with OTW
David Bombal Beginner 2y ago
HackTheBox - Inject
Cybersecurity
HackTheBox - Inject
IppSec Beginner 2y ago
Hands-on guide to CORS
Cybersecurity
Hands-on guide to CORS
The Cyber Mentor Beginner 2y ago
2023 Path to Hacking Success: Top 3 Bug Bounty Tips
Cybersecurity
2023 Path to Hacking Success: Top 3 Bug Bounty Tips
David Bombal Beginner 2y ago
How to Write Great Bug Bounty Reports
Cybersecurity
How to Write Great Bug Bounty Reports
The Cyber Mentor Beginner 2y ago
TryHackMe! Finding Computer Artifacts with osquery
Cybersecurity
TryHackMe! Finding Computer Artifacts with osquery
John Hammond Beginner 2y ago
how to HACK a password // Windows Edition
Cybersecurity
how to HACK a password // Windows Edition
NetworkChuck Beginner 2y ago
Directory Traversal Attacks Made Easy
Cybersecurity
Directory Traversal Attacks Made Easy
The Cyber Mentor Beginner 2y ago
Cybersecurity Charisma: Unlocking Security Culture and Leadership
Cybersecurity
Cybersecurity Charisma: Unlocking Security Culture and Leadership
SANS Institute Beginner 2y ago
you NEED to learn Windows RIGHT NOW!!
Cybersecurity
you NEED to learn Windows RIGHT NOW!!
NetworkChuck Beginner 2y ago
This is NetWars!
Cybersecurity
This is NetWars!
SANS Institute Beginner 2y ago
๐Ÿ“š Coursera Courses Opens on Coursera ยท Free to audit
1 / 3 View all โ†’
Introduction to Software-Defined (SD) Branch
๐Ÿ“š Coursera Course โ†—
Self-paced
Introduction to Software-Defined (SD) Branch
Opens on Coursera โ†—
Palo Alto Networks Cybersecurity Fundamentals
๐Ÿ“š Coursera Course โ†—
Self-paced
Palo Alto Networks Cybersecurity Fundamentals
Opens on Coursera โ†—
Into the Trenches: Security Operations Center
๐Ÿ“š Coursera Course โ†—
Self-paced
Into the Trenches: Security Operations Center
Opens on Coursera โ†—
Technical Deep Dive with Incident Response Tools
๐Ÿ“š Coursera Course โ†—
Self-paced
Technical Deep Dive with Incident Response Tools
Opens on Coursera โ†—
VPN Tunneling with OpenVPN: Secure Network Connections
๐Ÿ“š Coursera Course โ†—
Self-paced
VPN Tunneling with OpenVPN: Secure Network Connections
Opens on Coursera โ†—
Memory, Encryption, and Protecting Data in iOS
๐Ÿ“š Coursera Course โ†—
Self-paced
Memory, Encryption, and Protecting Data in iOS
Opens on Coursera โ†—