Tech Skills

Cybersecurity

Ethical hacking, penetration testing, network security, CTFs and defensive security

3583
lessons
Skills in this topic
View full skill map →
Security Basics
beginner
Fix OWASP top 10 vulnerabilities
AI Security
intermediate
Identify and patch prompt injection vulnerabilities
Network Security
intermediate
Configure a firewall with proper inbound/outbound rules
Ethical Hacking & Pen Testing
intermediate
Conduct a full pen test with Kali Linux
Cloud Security
intermediate
Implement IAM least-privilege policies on AWS/GCP
Incident Response
intermediate
Build an incident response playbook
Security Compliance
intermediate
Map controls for SOC 2 Type II compliance
Defensive AI
advanced
Build an AI-powered log anomaly detector
Sharing the Wisdom of TCM: Alaine Duncan on Treating Trauma with Chinese Medicine
Cybersecurity
Sharing the Wisdom of TCM: Alaine Duncan on Treating Trauma with Chinese Medicine
TCM Academy Beginner 4y ago
Best CTF?
Cybersecurity
Best CTF?
David Bombal Beginner 4y ago
Tyler Cowen: Economic Growth & the Fight Against Conformity & Mediocrity | Lex Fridman Podcast #174
Cybersecurity
Tyler Cowen: Economic Growth & the Fight Against Conformity & Mediocrity | Lex Fridman Podcast #174
Lex Fridman Beginner 5y ago
HackTheBox - APT
Cybersecurity
HackTheBox - APT
IppSec Beginner 5y ago
Kali Linux TP-Link TP-WN722N
Cybersecurity
Kali Linux TP-Link TP-WN722N
David Bombal Beginner 5y ago
Developer Interview Tips from a Tech Recruiter
Cybersecurity
Developer Interview Tips from a Tech Recruiter
Scrimba Beginner 5y ago
I made every video I ever wanted to make
Cybersecurity
I made every video I ever wanted to make
LiveOverflow Beginner 5y ago
AppSec, DevOps and DevSecOps
Cybersecurity
AppSec, DevOps and DevSecOps
SANS Institute Beginner 5y ago
Top 3 Tips to Avoid Getting Hacked
Cybersecurity
Top 3 Tips to Avoid Getting Hacked
The Cyber Mentor Beginner 5y ago
Security YouTuber Drama...
Cybersecurity
Security YouTuber Drama...
LiveOverflow Beginner 5y ago
The Blue Teamer's Blueprint for Malware Triage
Cybersecurity
The Blue Teamer's Blueprint for Malware Triage
SANS Institute Beginner 5y ago
Nginx ModSecurity Tutorial | Nginx WAF
Cybersecurity
Nginx ModSecurity Tutorial | Nginx WAF
HackerSploit Beginner 5y ago
Apache2 ModSecurity Tutorial | Apache2 WAF
Cybersecurity
Apache2 ModSecurity Tutorial | Apache2 WAF
HackerSploit Beginner 5y ago
HackTheBox - Luanne
Cybersecurity
HackTheBox - Luanne
IppSec Beginner 5y ago
What is Bitcoin | How does bitcoin work | Easy Explanation of Bitcoin | Explain Bitcoin as If I am 5
Cybersecurity
What is Bitcoin | How does bitcoin work | Easy Explanation of Bitcoin | Explain Bitcoin as If I am 5
codebasics Beginner 5y ago
Sharing the Wisdom: Dr. Maimon on Confidence in Treating Cancer Patients
Cybersecurity
Sharing the Wisdom: Dr. Maimon on Confidence in Treating Cancer Patients
TCM Academy Beginner 5y ago
find social media accounts with Sherlock (in 5 MIN)
Cybersecurity
find social media accounts with Sherlock (in 5 MIN)
NetworkChuck Beginner 5y ago
how to build a HACKING lab (to become a hacker)
Cybersecurity
how to build a HACKING lab (to become a hacker)
NetworkChuck Beginner 5y ago
GuidePoint Security CTF - Custom Base64 Languages - Kirby & Alphabet
Cybersecurity
GuidePoint Security CTF - Custom Base64 Languages - Kirby & Alphabet
John Hammond Beginner 5y ago
The Only 2 Things You Need to Succeed as a Designer
Cybersecurity
The Only 2 Things You Need to Succeed as a Designer
Flux Academy Beginner 5y ago
Learner Spotlight: My Journey from Cybersecurity Professional to Data Analyst [Testimonial]
Cybersecurity
Learner Spotlight: My Journey from Cybersecurity Professional to Data Analyst [Testimonial]
DataCamp Beginner 5y ago
TryHackMe! Skynet - Wildcard Injection
Cybersecurity
TryHackMe! Skynet - Wildcard Injection
John Hammond Beginner 5y ago
Kali Linux WiFi Alfa Adapter Fix
Cybersecurity
Kali Linux WiFi Alfa Adapter Fix
David Bombal Beginner 5y ago
Can I hack WiFi with this adapter?
Cybersecurity
Can I hack WiFi with this adapter?
David Bombal Beginner 5y ago
Best WiFi Hacking Adapters in 2021 (Kali Linux / Parrot OS)
Cybersecurity
Best WiFi Hacking Adapters in 2021 (Kali Linux / Parrot OS)
David Bombal Beginner 5y ago
Born to hack?
Cybersecurity
Born to hack?
David Bombal Beginner 5y ago
Python WiFi DoS  (Denial of Service) attack
Cybersecurity
Python WiFi DoS (Denial of Service) attack
David Bombal Beginner 5y ago
Skilling the Gap: Creative Ways to Recruit Top Cyber Talent
Cybersecurity
Skilling the Gap: Creative Ways to Recruit Top Cyber Talent
SANS Institute Beginner 5y ago
HackTheBox - Crossfit
Cybersecurity
HackTheBox - Crossfit
IppSec Beginner 5y ago
Hacking: Too easy?
Cybersecurity
Hacking: Too easy?
David Bombal Beginner 5y ago
Part 3: Rekt Casino Hack - Security Operations Center Ill-equipped and Unprepared
Cybersecurity
Part 3: Rekt Casino Hack - Security Operations Center Ill-equipped and Unprepared
SANS Institute Beginner 5y ago
Python nmap port scanner
Cybersecurity
Python nmap port scanner
David Bombal Beginner 5y ago
HackTheBox - Reel2
Cybersecurity
HackTheBox - Reel2
IppSec Beginner 5y ago
Python WiFi scanner
Cybersecurity
Python WiFi scanner
David Bombal Beginner 5y ago
Any future for Network Engineers?
Cybersecurity
Any future for Network Engineers?
David Bombal Beginner 5y ago
Making sense of SolarWinds through the lens of MITRE ATT&CK | STAR Webcast
Cybersecurity
Making sense of SolarWinds through the lens of MITRE ATT&CK | STAR Webcast
SANS Institute Beginner 5y ago
SANS Institute Celebrates International Women's Day
Cybersecurity
SANS Institute Celebrates International Women's Day
SANS Institute Beginner 5y ago
Start of Cyber Security Challenge Germany 2021 #shorts
Cybersecurity
Start of Cyber Security Challenge Germany 2021 #shorts
LiveOverflow Beginner 5y ago
5 Types of Depression: Introduction
Cybersecurity
5 Types of Depression: Introduction
TCM Academy Beginner 5y ago
Top 5 Hacking Books: Blue Team Edition
Cybersecurity
Top 5 Hacking Books: Blue Team Edition
David Bombal Beginner 5y ago
Your first hacking cert?
Cybersecurity
Your first hacking cert?
David Bombal Beginner 5y ago
HackTheBox - Academy
Cybersecurity
HackTheBox - Academy
IppSec Beginner 5y ago
How to get your first Cybersecurity job
Cybersecurity
How to get your first Cybersecurity job
David Bombal Beginner 5y ago
Cyberwar jobs are here
Cybersecurity
Cyberwar jobs are here
David Bombal Beginner 5y ago
HackTheBox - Feline
Cybersecurity
HackTheBox - Feline
IppSec Beginner 5y ago
How CPUs Access Hardware - Another SerenityOS Exploit
Cybersecurity
How CPUs Access Hardware - Another SerenityOS Exploit
LiveOverflow Beginner 5y ago
Best hacking laptop and OS?
Cybersecurity
Best hacking laptop and OS?
David Bombal Beginner 5y ago
Top 5 hacking books
Cybersecurity
Top 5 hacking books
David Bombal Beginner 5y ago
📚 Coursera Courses Opens on Coursera · Free to audit
1 / 3 View all →
Defending Against AI-Driven Phishing and Social Engineering
📚 Coursera Course ↗
Self-paced
Defending Against AI-Driven Phishing and Social Engineering
Opens on Coursera ↗
Ethical Hacking Practice Project & Questions
📚 Coursera Course ↗
Self-paced
Ethical Hacking Practice Project & Questions
Opens on Coursera ↗
Web Application Security Testing with Google Hacking
📚 Coursera Course ↗
Self-paced
Web Application Security Testing with Google Hacking
Opens on Coursera ↗
Web Application Security Crash Training
📚 Coursera Course ↗
Self-paced
Web Application Security Crash Training
Opens on Coursera ↗
Leading Teams Effectively: Skills for Impactful Leadership
📚 Coursera Course ↗
Self-paced
Leading Teams Effectively: Skills for Impactful Leadership
Opens on Coursera ↗
Foundations and Reconnaissance Techniques
📚 Coursera Course ↗
Self-paced
Foundations and Reconnaissance Techniques
Opens on Coursera ↗