Tech Skills

Cybersecurity

Ethical hacking, penetration testing, network security, CTFs and defensive security

3577
lessons
Skills in this topic
View full skill map →
Security Basics
beginner
Fix OWASP top 10 vulnerabilities
AI Security
intermediate
Identify and patch prompt injection vulnerabilities
Network Security
intermediate
Configure a firewall with proper inbound/outbound rules
Ethical Hacking & Pen Testing
intermediate
Conduct a full pen test with Kali Linux
Cloud Security
intermediate
Implement IAM least-privilege policies on AWS/GCP
Incident Response
intermediate
Build an incident response playbook
Security Compliance
intermediate
Map controls for SOC 2 Type II compliance
Defensive AI
advanced
Build an AI-powered log anomaly detector
Getting Started in Firmware Analysis & IoT Reverse Engineering
Cybersecurity
Getting Started in Firmware Analysis & IoT Reverse Engineering
John Hammond Beginner 2y ago
SANS Cybersecurity Leadership Summit 2023
Cybersecurity
SANS Cybersecurity Leadership Summit 2023
SANS Institute Beginner 2y ago
Role-Play Your Way Into Cyber: Hands-On with KC7
Cybersecurity
Role-Play Your Way Into Cyber: Hands-On with KC7
SANS Institute Beginner 2y ago
Clickjacking - Hacking Web Application UIs
Cybersecurity
Clickjacking - Hacking Web Application UIs
The Cyber Mentor Beginner 2y ago
RSA Encryption From Scratch - Math & Python Code
Cybersecurity
RSA Encryption From Scratch - Math & Python Code
NeuralNine Beginner 2y ago
Hack The Box - Flight
Cybersecurity
Hack The Box - Flight
IppSec Beginner 2y ago
Windows Privilege Escalation for Beginners
Cybersecurity
Windows Privilege Escalation for Beginners
The Cyber Mentor Beginner 2y ago
Pentester Blueprint: Your road to success
Cybersecurity
Pentester Blueprint: Your road to success
David Bombal Beginner 2y ago
HackTheBox - MetaTwo
Cybersecurity
HackTheBox - MetaTwo
IppSec Beginner 2y ago
the END of VPNs?!
Cybersecurity
the END of VPNs?!
NetworkChuck Beginner 2y ago
Deep Dive OSINT (Hacking, Shodan and more!)
Cybersecurity
Deep Dive OSINT (Hacking, Shodan and more!)
David Bombal Beginner 2y ago
Tech Jobs without Degree | GeeksforGeeks
Cybersecurity
Tech Jobs without Degree | GeeksforGeeks
GeeksforGeeks Beginner 2y ago
Introduction to the Five Human Resources: Shen, Hun, Po, Yi, Zhi by Dr John McDonald.
Cybersecurity
Introduction to the Five Human Resources: Shen, Hun, Po, Yi, Zhi by Dr John McDonald.
TCM Academy Beginner 2y ago
Together, we can save the planet #shorts #earthday
Cybersecurity
Together, we can save the planet #shorts #earthday
TED-Ed Beginner 2y ago
What SECRETS are in your Clipboard?
Cybersecurity
What SECRETS are in your Clipboard?
John Hammond Beginner 2y ago
He Wanted to Fight Injustice. It Cost Him 9 Years in Prison, and Much More🎙 Ep. 70: Ghost Exodus
Cybersecurity
He Wanted to Fight Injustice. It Cost Him 9 Years in Prison, and Much More🎙 Ep. 70: Ghost Exodus
Jack Rhysider Beginner 3y ago
Cyber Security Challenge Germany (2023)
Cybersecurity
Cyber Security Challenge Germany (2023)
LiveOverflow Beginner 3y ago
From Nothing to Something: Getting Experience When You Have No Experience
Cybersecurity
From Nothing to Something: Getting Experience When You Have No Experience
SANS Institute Beginner 2y ago
11 Strategies of a World-Class Security Operations Center: Fundamentals
Cybersecurity
11 Strategies of a World-Class Security Operations Center: Fundamentals
SANS Institute Beginner 2y ago
Learn Offensive JavaScript TODAY
Cybersecurity
Learn Offensive JavaScript TODAY
The Cyber Mentor Beginner 2y ago
Live from RSAC with Melissa Bischoping, RSA Scholar | Host, Stephen A. Hart | April 27, 2023
Cybersecurity
Live from RSAC with Melissa Bischoping, RSA Scholar | Host, Stephen A. Hart | April 27, 2023
SANS Institute Beginner 2y ago
SANS Expert Line Up Live from RSAC Conference | April 26, 2023
Cybersecurity
SANS Expert Line Up Live from RSAC Conference | April 26, 2023
SANS Institute Beginner 2y ago
I want one! #shorts
Cybersecurity
I want one! #shorts
David Bombal Beginner 2y ago
Top 3 Programming Languages for Cybersecurity in 2023
Cybersecurity
Top 3 Programming Languages for Cybersecurity in 2023
The Cyber Mentor Beginner 2y ago
The best Hacking Cert just got updated (OSCP PEN-200)
Cybersecurity
The best Hacking Cert just got updated (OSCP PEN-200)
David Bombal Beginner 2y ago
HackTheBox - Investigation
Cybersecurity
HackTheBox - Investigation
IppSec Beginner 2y ago
Hacking IoT devices with Python (it's too easy to take control)
Cybersecurity
Hacking IoT devices with Python (it's too easy to take control)
David Bombal Beginner 2y ago
Learn WebApp Pentesting: 2023 edition
Cybersecurity
Learn WebApp Pentesting: 2023 edition
The Cyber Mentor Beginner 2y ago
HackTheBox - Encoding
Cybersecurity
HackTheBox - Encoding
IppSec Beginner 2y ago
SANS Small Business Cyber Summit 2023
Cybersecurity
SANS Small Business Cyber Summit 2023
SANS Institute Beginner 2y ago
Cybersecurity Labs (FOR FREE) - Linux Backdoor Analysis
Cybersecurity
Cybersecurity Labs (FOR FREE) - Linux Backdoor Analysis
John Hammond Beginner 2y ago
How to Hack MFA (Multi-Factor Authentication)
Cybersecurity
How to Hack MFA (Multi-Factor Authentication)
The Cyber Mentor Beginner 3y ago
HackTheBox - BroScience
Cybersecurity
HackTheBox - BroScience
IppSec Beginner 3y ago
Top 3 Most Dangerous Lines of Code
Cybersecurity
Top 3 Most Dangerous Lines of Code
The Cyber Mentor Beginner 3y ago
How FAST Can You Write a Pentest Report?
Cybersecurity
How FAST Can You Write a Pentest Report?
John Hammond Beginner 3y ago
Attacking JWT - Header Injections
Cybersecurity
Attacking JWT - Header Injections
The Cyber Mentor Beginner 3y ago
HackTheBox - Sekhmet
Cybersecurity
HackTheBox - Sekhmet
IppSec Beginner 3y ago
A Cybersecurity Extortion Tale
Cybersecurity
A Cybersecurity Extortion Tale
The Cyber Mentor Beginner 3y ago
500K Subscriber Celebration!
Cybersecurity
500K Subscriber Celebration!
The Cyber Mentor Beginner 3y ago
SANS Neurodiversity in Cybersecurity Summit 2023
Cybersecurity
SANS Neurodiversity in Cybersecurity Summit 2023
SANS Institute Beginner 3y ago
Solving the Pickle Rick CTF
Cybersecurity
Solving the Pickle Rick CTF
The Cyber Mentor Beginner 3y ago
Must-See Keynote Returns to RSAC 2023: The Five Most Dangerous New Attack Techniques
Cybersecurity
Must-See Keynote Returns to RSAC 2023: The Five Most Dangerous New Attack Techniques
SANS Institute Beginner 3y ago
HackTheBox - Vessel
Cybersecurity
HackTheBox - Vessel
IppSec Beginner 3y ago
Linus Tech Tips Hack Explained
Cybersecurity
Linus Tech Tips Hack Explained
The Cyber Mentor Beginner 3y ago
Transparency from a CISO's Perspective
Cybersecurity
Transparency from a CISO's Perspective
SANS Institute Beginner 3y ago
CI/CD GOAT: Mad Hatter Capture The Flag
Cybersecurity
CI/CD GOAT: Mad Hatter Capture The Flag
John Hammond Beginner 3y ago
HTTP Fundamentals in 10 Minutes
Cybersecurity
HTTP Fundamentals in 10 Minutes
The Cyber Mentor Beginner 3y ago
HackTheBox - Extension
Cybersecurity
HackTheBox - Extension
IppSec Beginner 3y ago
📚 Coursera Courses Opens on Coursera · Free to audit
1 / 3 View all →
Introduction to Cybersecurity Foundations
📚 Coursera Course ↗
Self-paced
Introduction to Cybersecurity Foundations
Opens on Coursera ↗
Introduction to Cybersecurity Careers
📚 Coursera Course ↗
Self-paced
Introduction to Cybersecurity Careers
Opens on Coursera ↗
Security Command Center: Identify and Prioritize Risks
📚 Coursera Course ↗
Self-paced
Security Command Center: Identify and Prioritize Risks
Opens on Coursera ↗
Network Monitoring and Analysis
📚 Coursera Course ↗
Self-paced
Network Monitoring and Analysis
Opens on Coursera ↗
Cybersecurity and Secure Software Design
📚 Coursera Course ↗
Self-paced
Cybersecurity and Secure Software Design
Opens on Coursera ↗
Nessus Scanner - Network Scanning from Beginner to Advanced
📚 Coursera Course ↗
Self-paced
Nessus Scanner - Network Scanning from Beginner to Advanced
Opens on Coursera ↗