Tech Skills

Cybersecurity

Ethical hacking, penetration testing, network security, CTFs and defensive security

3583
lessons
Skills in this topic
View full skill map →
Security Basics
beginner
Fix OWASP top 10 vulnerabilities
AI Security
intermediate
Identify and patch prompt injection vulnerabilities
Network Security
intermediate
Configure a firewall with proper inbound/outbound rules
Ethical Hacking & Pen Testing
intermediate
Conduct a full pen test with Kali Linux
Cloud Security
intermediate
Implement IAM least-privilege policies on AWS/GCP
Incident Response
intermediate
Build an incident response playbook
Security Compliance
intermediate
Map controls for SOC 2 Type II compliance
Defensive AI
advanced
Build an AI-powered log anomaly detector
learn to HACK (the best way) // ft. John Hammond
Cybersecurity
learn to HACK (the best way) // ft. John Hammond
NetworkChuck Beginner 5y ago
WiFi Explained (CCNA Part 1)
Cybersecurity
WiFi Explained (CCNA Part 1)
David Bombal Beginner 5y ago
TryHackMe Advent of Cyber Day 14: Where's Rudolph?
Cybersecurity
TryHackMe Advent of Cyber Day 14: Where's Rudolph?
The Cyber Mentor Beginner 5y ago
HackTheBox - OpenKeyS
Cybersecurity
HackTheBox - OpenKeyS
IppSec Beginner 5y ago
hydra
Cybersecurity
hydra
David Bombal Beginner 5y ago
My Journey to Cybersecurity (CIA Keynote)
Cybersecurity
My Journey to Cybersecurity (CIA Keynote)
The Cyber Mentor Beginner 5y ago
Bug Bounty (how to make money HACKING!!) // ft. STÖK
Cybersecurity
Bug Bounty (how to make money HACKING!!) // ft. STÖK
NetworkChuck Beginner 5y ago
HackTheBox - Unbalanced
Cybersecurity
HackTheBox - Unbalanced
IppSec Beginner 5y ago
White Hat & Black Hat SEO / Linking - Are these Labels Still Relevant?
Cybersecurity
White Hat & Black Hat SEO / Linking - Are these Labels Still Relevant?
Search Engine Journal Beginner 5y ago
SANS Foundations - What's James Lyne's favorite part of the new course - Interview with the author
Cybersecurity
SANS Foundations - What's James Lyne's favorite part of the new course - Interview with the author
SANS Institute Beginner 5y ago
SANS Foundations - How do you balance theory and practical? - An Interview with James Lyne
Cybersecurity
SANS Foundations - How do you balance theory and practical? - An Interview with James Lyne
SANS Institute Beginner 5y ago
HackTheBox Blue Walkthrough - Learn Windows Enumeration
Cybersecurity
HackTheBox Blue Walkthrough - Learn Windows Enumeration
HackerSploit Beginner 5y ago
Nested JavaScript Obfuscation - GuidePoint Security CTF Challenge
Cybersecurity
Nested JavaScript Obfuscation - GuidePoint Security CTF Challenge
John Hammond Beginner 5y ago
Custom Wordlists & SQL Injection - GuidePoint Security CTF (Belle)
Cybersecurity
Custom Wordlists & SQL Injection - GuidePoint Security CTF (Belle)
John Hammond Beginner 5y ago
7 REAL LINK BUILDING CAMPAIGNS Analyzed (And Why They Work) (Ep. 237)
Cybersecurity
7 REAL LINK BUILDING CAMPAIGNS Analyzed (And Why They Work) (Ep. 237)
Authority Hacker Podcast Beginner 5y ago
Yaron Brook: Ayn Rand and the Philosophy of Objectivism | Lex Fridman Podcast #138
Cybersecurity
Yaron Brook: Ayn Rand and the Philosophy of Objectivism | Lex Fridman Podcast #138
Lex Fridman Beginner 5y ago
Journey to Paradise: Immortality, Hun and Po - The Ma Wang Dui Funeral Banner
Cybersecurity
Journey to Paradise: Immortality, Hun and Po - The Ma Wang Dui Funeral Banner
TCM Academy Beginner 5y ago
How Hacking Actually Looks Like - ALLES! CTF Team in Real Time
Cybersecurity
How Hacking Actually Looks Like - ALLES! CTF Team in Real Time
LiveOverflow Beginner 5y ago
Healing the Eyes with Acupuncture and Chinese Medicine, with Julian Scott
Cybersecurity
Healing the Eyes with Acupuncture and Chinese Medicine, with Julian Scott
TCM Academy Beginner 5y ago
Best Ways To Learn Linux
Cybersecurity
Best Ways To Learn Linux
HackerSploit Beginner 5y ago
Destroying VNC with Cain and Abel
Cybersecurity
Destroying VNC with Cain and Abel
David Bombal Beginner 5y ago
rockyou
Cybersecurity
rockyou
David Bombal Beginner 5y ago
let's hack your home network // FREE CCNA // EP 9
Cybersecurity
let's hack your home network // FREE CCNA // EP 9
NetworkChuck Beginner 5y ago
It's too easy to own a WiFi network
Cybersecurity
It's too easy to own a WiFi network
David Bombal Beginner 5y ago
SANS Foundations - How did you pick the course topics?  An interview with the Author, James Lyne
Cybersecurity
SANS Foundations - How did you pick the course topics? An interview with the Author, James Lyne
SANS Institute Beginner 5y ago
Kali Linux Wifite Troubleshooting
Cybersecurity
Kali Linux Wifite Troubleshooting
David Bombal Beginner 5y ago
I will own your WiFi with one Kali Linux command
Cybersecurity
I will own your WiFi with one Kali Linux command
David Bombal Beginner 5y ago
Python keylogger
Cybersecurity
Python keylogger
David Bombal Beginner 5y ago
phpMyAdmin Local File Inclusion - GuidePoint Security CTF (Jeffrey)
Cybersecurity
phpMyAdmin Local File Inclusion - GuidePoint Security CTF (Jeffrey)
John Hammond Beginner 5y ago
HackTheBox - SneakyMailer
Cybersecurity
HackTheBox - SneakyMailer
IppSec Beginner 5y ago
SANS Foundations overview by course author James Lyne
Cybersecurity
SANS Foundations overview by course author James Lyne
SANS Institute Beginner 5y ago
Hunting Usernames and Accounts (OSINT)
Cybersecurity
Hunting Usernames and Accounts (OSINT)
The Cyber Mentor Beginner 5y ago
you’re about to get hacked!! (7 reasons why) // FREE Security+ // EP 6
Cybersecurity
you’re about to get hacked!! (7 reasons why) // FREE Security+ // EP 6
NetworkChuck Beginner 5y ago
i scheduled the OSCP exam / kenneth copeland got hacked / new Kali 2020.4 release
Cybersecurity
i scheduled the OSCP exam / kenneth copeland got hacked / new Kali 2020.4 release
NetworkChuck Beginner 5y ago
my beard isn’t real // FREE Security+ // EP 5
Cybersecurity
my beard isn’t real // FREE Security+ // EP 5
NetworkChuck Beginner 5y ago
SANS Cyber Security Foundations Course
Cybersecurity
SANS Cyber Security Foundations Course
SANS Institute Beginner 5y ago
your favorite websites can be HACKED! (watering holes, typo squatting) // FREE Security+ // EP 4
Cybersecurity
your favorite websites can be HACKED! (watering holes, typo squatting) // FREE Security+ // EP 4
NetworkChuck Beginner 5y ago
Discovering Email Addresses (OSINT)
Cybersecurity
Discovering Email Addresses (OSINT)
The Cyber Mentor Beginner 5y ago
Basic Buffer Overflow - VulnServer TRUN
Cybersecurity
Basic Buffer Overflow - VulnServer TRUN
John Hammond Beginner 5y ago
how Hackers SNiFF (capture) network traffic // MiTM attack
Cybersecurity
how Hackers SNiFF (capture) network traffic // MiTM attack
NetworkChuck Beginner 5y ago
HackTheBox - Intense
Cybersecurity
HackTheBox - Intense
IppSec Beginner 5y ago
Creating Sock Puppet Accounts
Cybersecurity
Creating Sock Puppet Accounts
The Cyber Mentor Beginner 5y ago
Credit card cloning is too easy!
Cybersecurity
Credit card cloning is too easy!
David Bombal Beginner 5y ago
i hacked my grandma (social engineering and pretexting) // FREE Security+ // EP 3
Cybersecurity
i hacked my grandma (social engineering and pretexting) // FREE Security+ // EP 3
NetworkChuck Beginner 5y ago
Bypassing SQL Filters (picoCTF Web Gauntlet)
Cybersecurity
Bypassing SQL Filters (picoCTF Web Gauntlet)
The Cyber Mentor Beginner 5y ago
Wait, what? Only 2 seconds to open a safe?
Cybersecurity
Wait, what? Only 2 seconds to open a safe?
David Bombal Beginner 5y ago
A Word On The YouTube Community Guidelines
Cybersecurity
A Word On The YouTube Community Guidelines
HackerSploit Beginner 5y ago
HackTheBox - Fuse
Cybersecurity
HackTheBox - Fuse
IppSec Beginner 5y ago
📚 Coursera Courses Opens on Coursera · Free to audit
1 / 3 View all →
Managing Information System Security Architecture
📚 Coursera Course ↗
Self-paced
Managing Information System Security Architecture
Opens on Coursera ↗
Web Hacker's Toolbox - Tools Used by Successful Hackers
📚 Coursera Course ↗
Self-paced
Web Hacker's Toolbox - Tools Used by Successful Hackers
Opens on Coursera ↗
Introduction to Information Technology and AWS Cloud
📚 Coursera Course ↗
Self-paced
Introduction to Information Technology and AWS Cloud
Opens on Coursera ↗
Advanced Exploitation and Scripting Techniques
📚 Coursera Course ↗
Self-paced
Advanced Exploitation and Scripting Techniques
Opens on Coursera ↗
Cybersecurity with Python: Beginner to Advanced
📚 Coursera Course ↗
Self-paced
Cybersecurity with Python: Beginner to Advanced
Opens on Coursera ↗
Cyber Security: Applied Cryptography
📚 Coursera Course ↗
Self-paced
Cyber Security: Applied Cryptography
Opens on Coursera ↗