Tech Skills

Cybersecurity

Ethical hacking, penetration testing, network security, CTFs and defensive security

3577
lessons
Skills in this topic
View full skill map →
Security Basics
beginner
Fix OWASP top 10 vulnerabilities
AI Security
intermediate
Identify and patch prompt injection vulnerabilities
Network Security
intermediate
Configure a firewall with proper inbound/outbound rules
Ethical Hacking & Pen Testing
intermediate
Conduct a full pen test with Kali Linux
Cloud Security
intermediate
Implement IAM least-privilege policies on AWS/GCP
Incident Response
intermediate
Build an incident response playbook
Security Compliance
intermediate
Map controls for SOC 2 Type II compliance
Defensive AI
advanced
Build an AI-powered log anomaly detector
Kali Purple 2023.1 Review
Cybersecurity
Kali Purple 2023.1 Review
The Cyber Mentor Beginner 3y ago
Free Hacking APIs Course (APISEC University!)
Cybersecurity
Free Hacking APIs Course (APISEC University!)
John Hammond Beginner 3y ago
Build, Break, and Hack WebSockets
Cybersecurity
Build, Break, and Hack WebSockets
The Cyber Mentor Beginner 3y ago
100% Scholarship Opportunities in Cybersecurity for Black American College Students
Cybersecurity
100% Scholarship Opportunities in Cybersecurity for Black American College Students
SANS Institute Beginner 3y ago
Unraveling Discord Token Stealer (python MALWARE)
Cybersecurity
Unraveling Discord Token Stealer (python MALWARE)
John Hammond Beginner 3y ago
The best Hacking Courses & Certs (not all these)? Your roadmap to Pentester success.
Cybersecurity
The best Hacking Courses & Certs (not all these)? Your roadmap to Pentester success.
David Bombal Beginner 3y ago
HackTheBox - Forgot
Cybersecurity
HackTheBox - Forgot
IppSec Beginner 3y ago
Demo: ControlPlane’s Capture The Flag - Hacking Kubernetes
Cybersecurity
Demo: ControlPlane’s Capture The Flag - Hacking Kubernetes
The New Stack Beginner 3y ago
Cryptographic Computing: Protecting Data in Use - AWS Online Tech Talks
Cybersecurity
Cryptographic Computing: Protecting Data in Use - AWS Online Tech Talks
AWS Developers Beginner 3y ago
Deep Dive into Parsing SSH Keys To Exploit Improperly Sanitized Screenshots
Cybersecurity
Deep Dive into Parsing SSH Keys To Exploit Improperly Sanitized Screenshots
IppSec Beginner 3y ago
【MINECRAFT】 I am playing the block game
Cybersecurity
【MINECRAFT】 I am playing the block game
Ceres Fauna Ch. hololive-EN Beginner 3y ago
He Fell Asleep Hacking Sea World and Woke Up in a World of Trouble🎙 Darknet Diaries Ep. 62: Cam
Cybersecurity
He Fell Asleep Hacking Sea World and Woke Up in a World of Trouble🎙 Darknet Diaries Ep. 62: Cam
Jack Rhysider Beginner 3y ago
CyberTalk Live #1 -  Trying Out BlackBuntu & Q&A
Cybersecurity
CyberTalk Live #1 - Trying Out BlackBuntu & Q&A
HackerSploit Beginner 3y ago
CyberTalk Live #1 -  Trying Out BlackBuntu & Q&A
Cybersecurity
CyberTalk Live #1 - Trying Out BlackBuntu & Q&A
HackerSploit Beginner 3y ago
【Pokémon Violet】 Beating the game so I can get a shiny sandwich and get my dang tea cup | #9
Cybersecurity
【Pokémon Violet】 Beating the game so I can get a shiny sandwich and get my dang tea cup | #9
Ceres Fauna Ch. hololive-EN Beginner 3y ago
Tim Dodd: SpaceX, Starship, Rocket Engines, and Future of Space Travel | Lex Fridman Podcast #356
Cybersecurity
Tim Dodd: SpaceX, Starship, Rocket Engines, and Future of Space Travel | Lex Fridman Podcast #356
Lex Fridman Beginner 3y ago
Characteristics of successful CISO
Cybersecurity
Characteristics of successful CISO
SANS Institute Beginner 3y ago
Practical Junior Malware Researcher (PJMR) Exam Overview
Cybersecurity
Practical Junior Malware Researcher (PJMR) Exam Overview
The Cyber Mentor Beginner 3y ago
Hacking APIs: Fuzzing 101
Cybersecurity
Hacking APIs: Fuzzing 101
The Cyber Mentor Beginner 3y ago
Is This Website LEAKING?
Cybersecurity
Is This Website LEAKING?
John Hammond Beginner 3y ago
Strange File in Downloads Folder? Gootloader Malware Analysis
Cybersecurity
Strange File in Downloads Folder? Gootloader Malware Analysis
John Hammond Beginner 3y ago
Carving Exfiltrated Network Data from a Hack (Python & Scapy)
Cybersecurity
Carving Exfiltrated Network Data from a Hack (Python & Scapy)
John Hammond Beginner 3y ago
Password Cracking Primer
Cybersecurity
Password Cracking Primer
The Cyber Mentor Beginner 3y ago
Get a cybersecurity job just by doing this
Cybersecurity
Get a cybersecurity job just by doing this
The Cyber Mentor Beginner 3y ago
Exploiting ChatGPT Code
Cybersecurity
Exploiting ChatGPT Code
The Cyber Mentor Beginner 3y ago
PNPT + PCRP for Your Hacking Career
Cybersecurity
PNPT + PCRP for Your Hacking Career
The Cyber Mentor Beginner 3y ago
Web Application Hacking - File Upload Attacks Explained
Cybersecurity
Web Application Hacking - File Upload Attacks Explained
The Cyber Mentor Beginner 3y ago
HackTheBox - Photobomb
Cybersecurity
HackTheBox - Photobomb
IppSec Beginner 3y ago
ChatGPT Built Me a Hacking Tool...
Cybersecurity
ChatGPT Built Me a Hacking Tool...
The Cyber Mentor Beginner 3y ago
Cracking JSON Web Tokens
Cybersecurity
Cracking JSON Web Tokens
The Cyber Mentor Beginner 3y ago
Linux Privilege Escalation for Beginners
Cybersecurity
Linux Privilege Escalation for Beginners
The Cyber Mentor Beginner 3y ago
3 Year Cybersecurity Career Roadmap
Cybersecurity
3 Year Cybersecurity Career Roadmap
HackerSploit Beginner 3y ago
Find and Exploit NoSQL Injection
Cybersecurity
Find and Exploit NoSQL Injection
The Cyber Mentor Beginner 3y ago
HackTheBox - Ambassador
Cybersecurity
HackTheBox - Ambassador
IppSec Beginner 3y ago
Warflying! Hack WiFi from the Sky
Cybersecurity
Warflying! Hack WiFi from the Sky
The Cyber Mentor Beginner 3y ago
【MINECRAFT】 KIRIN MUST BUILD
Cybersecurity
【MINECRAFT】 KIRIN MUST BUILD
Ceres Fauna Ch. hololive-EN Beginner 3y ago
【MINECRAFT】 *kirin joins your new minecraft server*
Cybersecurity
【MINECRAFT】 *kirin joins your new minecraft server*
Ceres Fauna Ch. hololive-EN Beginner 3y ago
Broken Object Level Authorization (BOLA) Explained
Cybersecurity
Broken Object Level Authorization (BOLA) Explained
The Cyber Mentor Beginner 3y ago
TCMS Exam Platform Preview
Cybersecurity
TCMS Exam Platform Preview
The Cyber Mentor Beginner 3y ago
【Pokémon Violet】 This is my daughter and she will beat you up | #7
Cybersecurity
【Pokémon Violet】 This is my daughter and she will beat you up | #7
Ceres Fauna Ch. hololive-EN Beginner 3y ago
Find and Exploit Server-Side Request Forgery (SSRF)
Cybersecurity
Find and Exploit Server-Side Request Forgery (SSRF)
The Cyber Mentor Beginner 3y ago
PNPT Giveaway
Cybersecurity
PNPT Giveaway
The Cyber Mentor Beginner 3y ago
【Penumbra Overture】 Kirin Plays Classic Horror Game By Herself and Regrets Her Decisions
Cybersecurity
【Penumbra Overture】 Kirin Plays Classic Horror Game By Herself and Regrets Her Decisions
Ceres Fauna Ch. hololive-EN Beginner 3y ago
【Cities: Skylines】 Building The City of Your Nightmares
Cybersecurity
【Cities: Skylines】 Building The City of Your Nightmares
Ceres Fauna Ch. hololive-EN Beginner 3y ago
Wireless Passwords are Stored in Cleartext #shorts #cybersecurity #hacker
Cybersecurity
Wireless Passwords are Stored in Cleartext #shorts #cybersecurity #hacker
The Cyber Mentor Beginner 3y ago
How to Be An Ethical Hacker: 2023 Edition
Cybersecurity
How to Be An Ethical Hacker: 2023 Edition
The Cyber Mentor Beginner 3y ago
【Pokémon Violet】 Ara ara, who do we have here? | #6
Cybersecurity
【Pokémon Violet】 Ara ara, who do we have here? | #6
Ceres Fauna Ch. hololive-EN Beginner 3y ago
Should Help Desk be Your First IT Job?
Cybersecurity
Should Help Desk be Your First IT Job?
The Cyber Mentor Beginner 3y ago
📚 Coursera Courses Opens on Coursera · Free to audit
1 / 3 View all →
Linux Security Basics and Beyond: Unit 4
📚 Coursera Course ↗
Self-paced
Linux Security Basics and Beyond: Unit 4
Opens on Coursera ↗
AWS: Data Protection and Security Governance
📚 Coursera Course ↗
Self-paced
AWS: Data Protection and Security Governance
Opens on Coursera ↗
Intermediate Ethical Hacking Hands-on Training
📚 Coursera Course ↗
Self-paced
Intermediate Ethical Hacking Hands-on Training
Opens on Coursera ↗
Cybersecurity Solutions and Microsoft Defender
📚 Coursera Course ↗
Self-paced
Cybersecurity Solutions and Microsoft Defender
Opens on Coursera ↗
Network Security, Troubleshooting, & Certification Prep
📚 Coursera Course ↗
Self-paced
Network Security, Troubleshooting, & Certification Prep
Opens on Coursera ↗
Network Security Principles
📚 Coursera Course ↗
Self-paced
Network Security Principles
Opens on Coursera ↗