Tech Skills

Cybersecurity

Ethical hacking, penetration testing, network security, CTFs and defensive security

3580
lessons
Skills in this topic
View full skill map →
Security Basics
beginner
Fix OWASP top 10 vulnerabilities
AI Security
intermediate
Identify and patch prompt injection vulnerabilities
Network Security
intermediate
Configure a firewall with proper inbound/outbound rules
Ethical Hacking & Pen Testing
intermediate
Conduct a full pen test with Kali Linux
Cloud Security
intermediate
Implement IAM least-privilege policies on AWS/GCP
Incident Response
intermediate
Build an incident response playbook
Security Compliance
intermediate
Map controls for SOC 2 Type II compliance
Defensive AI
advanced
Build an AI-powered log anomaly detector
Charles Hoskinson: Cardano | Lex Fridman Podcast #192
Cybersecurity
Charles Hoskinson: Cardano | Lex Fridman Podcast #192
Lex Fridman Beginner 4y ago
Slow the Revolving Door of Talent. Creative Ways to Keep Your Existing Cyber Talent in Your Org
Cybersecurity
Slow the Revolving Door of Talent. Creative Ways to Keep Your Existing Cyber Talent in Your Org
SANS Institute Beginner 4y ago
HackTheBox - Tenet
Cybersecurity
HackTheBox - Tenet
IppSec Beginner 4y ago
Information Stealer - Malware Analysis (PowerShell to .NET)
Cybersecurity
Information Stealer - Malware Analysis (PowerShell to .NET)
John Hammond Beginner 4y ago
Kali Linux 2021.2 zero to WiFi (Free install)
Cybersecurity
Kali Linux 2021.2 zero to WiFi (Free install)
David Bombal Beginner 4y ago
AES-CTR Cryptography: Reused Key Weakness - HackTheBox Cyber Apocalypse CTF
Cybersecurity
AES-CTR Cryptography: Reused Key Weakness - HackTheBox Cyber Apocalypse CTF
John Hammond Beginner 4y ago
Ransomware - Do You Pay It Or Not? - Experts debate the costs ethics around paying ransomware - SANS
Cybersecurity
Ransomware - Do You Pay It Or Not? - Experts debate the costs ethics around paying ransomware - SANS
SANS Institute Beginner 4y ago
Heavenly Moxibustion: The Medicinal Qualities of Common Herbs & Spices
Cybersecurity
Heavenly Moxibustion: The Medicinal Qualities of Common Herbs & Spices
TCM Academy Beginner 4y ago
Security Myths: Your locked laptop keeps you safe // hak5 Bash Bunny
Cybersecurity
Security Myths: Your locked laptop keeps you safe // hak5 Bash Bunny
David Bombal Beginner 4y ago
Frank Wilczek: Physics of Quarks, Dark Matter, Complexity, Life & Aliens | Lex Fridman Podcast #187
Cybersecurity
Frank Wilczek: Physics of Quarks, Dark Matter, Complexity, Life & Aliens | Lex Fridman Podcast #187
Lex Fridman Beginner 4y ago
HackTheBox - Cereal
Cybersecurity
HackTheBox - Cereal
IppSec Beginner 4y ago
The Effects of Laser Acupuncture for Chronic Central Type Facial Paralysis, Part 1: Introduction
Cybersecurity
The Effects of Laser Acupuncture for Chronic Central Type Facial Paralysis, Part 1: Introduction
TCM Academy Beginner 4y ago
Advanced Growth Tactics - Steal The Top-Performing Tech Companies' Best-Kept Secrets
Cybersecurity
Advanced Growth Tactics - Steal The Top-Performing Tech Companies' Best-Kept Secrets
Neil Patel Beginner 4y ago
Windows Privilege Escalation Tutorial For Beginners
Cybersecurity
Windows Privilege Escalation Tutorial For Beginners
HackerSploit Beginner 4y ago
Pentesting vs. Bug Bounty vs. Pentesting ???
Cybersecurity
Pentesting vs. Bug Bounty vs. Pentesting ???
LiveOverflow Beginner 4y ago
Twitter OSiNT (Ethical Hacking)
Cybersecurity
Twitter OSiNT (Ethical Hacking)
NetworkChuck Beginner 4y ago
FaceTiming Funnel Hacking Live Speakers (Reactions!) 🤯😱😭
Cybersecurity
FaceTiming Funnel Hacking Live Speakers (Reactions!) 🤯😱😭
Russell Brunson Beginner 4y ago
HELP!! (for when you suck at Linux) // Linux for Hackers // EP3
Cybersecurity
HELP!! (for when you suck at Linux) // Linux for Hackers // EP3
NetworkChuck Beginner 4y ago
Mark Morowczynski & Thomas Detzner: Microsoft Incident Response Playbooks
Cybersecurity
Mark Morowczynski & Thomas Detzner: Microsoft Incident Response Playbooks
SANS Institute Beginner 4y ago
Cloudflare CDN CSP - XSS Bypass / HackTheBox Cyber Apocalypse CTF
Cybersecurity
Cloudflare CDN CSP - XSS Bypass / HackTheBox Cyber Apocalypse CTF
John Hammond Beginner 4y ago
AJ Yawn: Cloud, Compliance and Automating Security
Cybersecurity
AJ Yawn: Cloud, Compliance and Automating Security
SANS Institute Beginner 4y ago
Bryan Johnson: Kernel Brain-Computer Interfaces | Lex Fridman Podcast #186
Cybersecurity
Bryan Johnson: Kernel Brain-Computer Interfaces | Lex Fridman Podcast #186
Lex Fridman Beginner 4y ago
Passwords: Am i a joke to you?
Cybersecurity
Passwords: Am i a joke to you?
David Bombal Beginner 4y ago
IFrame Parent XSS - HackTheBox Cyber Apocalypse CTF
Cybersecurity
IFrame Parent XSS - HackTheBox Cyber Apocalypse CTF
John Hammond Beginner 4y ago
HackTheBox - Ready
Cybersecurity
HackTheBox - Ready
IppSec Beginner 4y ago
HackTheBox CA CTF - Using Snyk to Find & Fix Vulnerabilities
Cybersecurity
HackTheBox CA CTF - Using Snyk to Find & Fix Vulnerabilities
John Hammond Beginner 4y ago
XML Object Exfiltration - HackTheBox Cyber Apocalypse CTF "E. Tree"
Cybersecurity
XML Object Exfiltration - HackTheBox Cyber Apocalypse CTF "E. Tree"
John Hammond Beginner 4y ago
SQLite Blind SQL Injection - HackTheBox Cyber Apocalypse CTF
Cybersecurity
SQLite Blind SQL Injection - HackTheBox Cyber Apocalypse CTF
John Hammond Beginner 4y ago
Sharing the Wisdom of TCM: Women's Health, TCM and Integration, With Karin Kedar
Cybersecurity
Sharing the Wisdom of TCM: Women's Health, TCM and Integration, With Karin Kedar
TCM Academy Beginner 4y ago
Metasploit
Cybersecurity
Metasploit
David Bombal Beginner 4y ago
HTB Cyber Apocalypse - cURL As a Service
Cybersecurity
HTB Cyber Apocalypse - cURL As a Service
John Hammond Beginner 4y ago
CTF Walkthrough with John Hammond
Cybersecurity
CTF Walkthrough with John Hammond
David Bombal Beginner 4y ago
HackTheBox - Sharp
Cybersecurity
HackTheBox - Sharp
IppSec Beginner 4y ago
Are CTFs even real? Featuring John Hammond.
Cybersecurity
Are CTFs even real? Featuring John Hammond.
David Bombal Beginner 4y ago
HackTheBox - Bucket
Cybersecurity
HackTheBox - Bucket
IppSec Beginner 4y ago
Chinese Facial Diagnosis & Gynecology with Lillian Pearl Bridges
Cybersecurity
Chinese Facial Diagnosis & Gynecology with Lillian Pearl Bridges
TCM Academy Beginner 4y ago
Cybersecurity hacking path
Cybersecurity
Cybersecurity hacking path
David Bombal Beginner 4y ago
The Foundation of Accelerating your Cybersecurity Career - SANS@Mic Keynote w/ James Lyne
Cybersecurity
The Foundation of Accelerating your Cybersecurity Career - SANS@Mic Keynote w/ James Lyne
SANS Institute Beginner 4y ago
Do you need a Cybersecurity home lab?
Cybersecurity
Do you need a Cybersecurity home lab?
David Bombal Beginner 4y ago
BEGINNER Capture The Flag - PicoCTF 2021 001 "Obedient Cat"
Cybersecurity
BEGINNER Capture The Flag - PicoCTF 2021 001 "Obedient Cat"
John Hammond Beginner 4y ago
Knowing Your Applicants. How to Stay Current to Best Assess your Cyber Applicants w/ Kevin Garvey
Cybersecurity
Knowing Your Applicants. How to Stay Current to Best Assess your Cyber Applicants w/ Kevin Garvey
SANS Institute Beginner 4y ago
Heart and Stomach: Fire in the Digestive System, TCM Course with Izabela Mietka
Cybersecurity
Heart and Stomach: Fire in the Digestive System, TCM Course with Izabela Mietka
TCM Academy Beginner 4y ago
How Does Acupuncture Works, Sharing the Wisdom of TCM with Dr. John McDonald, PhD
Cybersecurity
How Does Acupuncture Works, Sharing the Wisdom of TCM with Dr. John McDonald, PhD
TCM Academy Beginner 4y ago
Cybersecurity jobs replaced by AI?
Cybersecurity
Cybersecurity jobs replaced by AI?
David Bombal Beginner 4y ago
SANS New to Cyber Summit 2021
Cybersecurity
SANS New to Cyber Summit 2021
SANS Institute Beginner 4y ago
Sharing the Wisdom of TCM: Alaine Duncan on Treating Trauma with Chinese Medicine
Cybersecurity
Sharing the Wisdom of TCM: Alaine Duncan on Treating Trauma with Chinese Medicine
TCM Academy Beginner 4y ago
Best CTF?
Cybersecurity
Best CTF?
David Bombal Beginner 4y ago
Tyler Cowen: Economic Growth & the Fight Against Conformity & Mediocrity | Lex Fridman Podcast #174
Cybersecurity
Tyler Cowen: Economic Growth & the Fight Against Conformity & Mediocrity | Lex Fridman Podcast #174
Lex Fridman Beginner 5y ago
📚 Coursera Courses Opens on Coursera · Free to audit
1 / 3 View all →
Cybersecurity Foundations: Threats Networks, and IoT Protection
📚 Coursera Course ↗
Self-paced
Cybersecurity Foundations: Threats Networks, and IoT Protection
Opens on Coursera ↗
Telecom & Enterprise Cybersecurity Essentials
📚 Coursera Course ↗
Self-paced
Telecom & Enterprise Cybersecurity Essentials
Opens on Coursera ↗
Advanced Security and Troubleshooting
📚 Coursera Course ↗
Self-paced
Advanced Security and Troubleshooting
Opens on Coursera ↗
Network Security
📚 Coursera Course ↗
Self-paced
Network Security
Opens on Coursera ↗
Computer Networks and Network Security
📚 Coursera Course ↗
Self-paced
Computer Networks and Network Security
Opens on Coursera ↗
Intermediate Ethical Hacking Techniques
📚 Coursera Course ↗
Self-paced
Intermediate Ethical Hacking Techniques
Opens on Coursera ↗