Tech Skills

Cybersecurity

Ethical hacking, penetration testing, network security, CTFs and defensive security

3583
lessons
Skills in this topic
View full skill map →
Security Basics
beginner
Fix OWASP top 10 vulnerabilities
AI Security
intermediate
Identify and patch prompt injection vulnerabilities
Network Security
intermediate
Configure a firewall with proper inbound/outbound rules
Ethical Hacking & Pen Testing
intermediate
Conduct a full pen test with Kali Linux
Cloud Security
intermediate
Implement IAM least-privilege policies on AWS/GCP
Incident Response
intermediate
Build an incident response playbook
Security Compliance
intermediate
Map controls for SOC 2 Type II compliance
Defensive AI
advanced
Build an AI-powered log anomaly detector
Pentest Tales 001: You Spent How Much On Security?
Cybersecurity
Pentest Tales 001: You Spent How Much On Security?
The Cyber Mentor Beginner 5y ago
Keynote: The Language of Equality | Lodrina Cherne
Cybersecurity
Keynote: The Language of Equality | Lodrina Cherne
SANS Institute Beginner 5y ago
Phishing attacks are SCARY easy to do!! (let me show you!) // FREE Security+ // EP 2
Cybersecurity
Phishing attacks are SCARY easy to do!! (let me show you!) // FREE Security+ // EP 2
NetworkChuck Beginner 5y ago
Cain and Abel Install Windows 10
Cybersecurity
Cain and Abel Install Windows 10
David Bombal Beginner 5y ago
I own your WiFi
Cybersecurity
I own your WiFi
David Bombal Beginner 5y ago
HackTheBox - Dyplesher
Cybersecurity
HackTheBox - Dyplesher
IppSec Beginner 5y ago
Raising the Tide: Driving Improvement in Security By Being a Good Human | David Bianco
Cybersecurity
Raising the Tide: Driving Improvement in Security By Being a Good Human | David Bianco
SANS Institute Beginner 5y ago
George Hotz: Hacking the Simulation & Learning to Drive with Neural Nets | Lex Fridman Podcast #132
Cybersecurity
George Hotz: Hacking the Simulation & Learning to Drive with Neural Nets | Lex Fridman Podcast #132
Lex Fridman Beginner 5y ago
Top 7 Most Elite Nation State Hackers
Cybersecurity
Top 7 Most Elite Nation State Hackers
Jack Rhysider Beginner 5y ago
how to become a Network Developer at Amazon (AWS)
Cybersecurity
how to become a Network Developer at Amazon (AWS)
NetworkChuck Beginner 5y ago
Guessing vs. Not Knowing in Hacking and CTFs
Cybersecurity
Guessing vs. Not Knowing in Hacking and CTFs
LiveOverflow Beginner 5y ago
The Truth About Impostor Syndrome
Cybersecurity
The Truth About Impostor Syndrome
The Cyber Mentor Beginner 5y ago
HackTheBox - Blunder
Cybersecurity
HackTheBox - Blunder
IppSec Beginner 5y ago
What Lives Behind The Blue Screen | Human Readable
Cybersecurity
What Lives Behind The Blue Screen | Human Readable
Jack Rhysider Beginner 5y ago
Linux Security - SSH Security Essentials
Cybersecurity
Linux Security - SSH Security Essentials
HackerSploit Beginner 5y ago
James Gosling: Java, JVM, Emacs, and the Early Days of Computing | Lex Fridman Podcast #126
Cybersecurity
James Gosling: Java, JVM, Emacs, and the Early Days of Computing | Lex Fridman Podcast #126
Lex Fridman Beginner 5y ago
Stopping DNS "ANY" Queries - DownUnderCTF
Cybersecurity
Stopping DNS "ANY" Queries - DownUnderCTF
John Hammond Beginner 5y ago
XSS on the Wrong Domain T_T - Tech Support (web) Google CTF 2020
Cybersecurity
XSS on the Wrong Domain T_T - Tech Support (web) Google CTF 2020
LiveOverflow Beginner 5y ago
3 More Unique and Impactful Projects to get a Data Science Job
Cybersecurity
3 More Unique and Impactful Projects to get a Data Science Job
Tina Huang Beginner 5y ago
3 Hacking Skills EVERYONE has // FREE Security+ // EP 1
Cybersecurity
3 Hacking Skills EVERYONE has // FREE Security+ // EP 1
NetworkChuck Beginner 5y ago
HackTheBox - Cache
Cybersecurity
HackTheBox - Cache
IppSec Beginner 5y ago
Hexadecimal to Decimal made EASY! | Free CCNA 200-301 Course | Video #16
Cybersecurity
Hexadecimal to Decimal made EASY! | Free CCNA 200-301 Course | Video #16
David Bombal Beginner 5y ago
FREE CompTIA Security+ Course // SY0-501 vs SY0-601 // EP 0
Cybersecurity
FREE CompTIA Security+ Course // SY0-501 vs SY0-601 // EP 0
NetworkChuck Beginner 5y ago
Kali Linux 2020.3 install Windows 10 (for free)
Cybersecurity
Kali Linux 2020.3 install Windows 10 (for free)
David Bombal Beginner 5y ago
O.MG: From zero to hero
Cybersecurity
O.MG: From zero to hero
David Bombal Beginner 5y ago
ZeroLogon Exploit - Abusing CVE-2020-1472
Cybersecurity
ZeroLogon Exploit - Abusing CVE-2020-1472
The Cyber Mentor Beginner 5y ago
HackTheBox - Blackfield
Cybersecurity
HackTheBox - Blackfield
IppSec Beginner 5y ago
i bought a DDoS attack on the DARK WEB (don't do this)
Cybersecurity
i bought a DDoS attack on the DARK WEB (don't do this)
NetworkChuck Beginner 5y ago
I will own you in 3 seconds. Never do this!
Cybersecurity
I will own you in 3 seconds. Never do this!
David Bombal Beginner 5y ago
Kali Linux install macOS in 10 min (Free VMware)
Cybersecurity
Kali Linux install macOS in 10 min (Free VMware)
David Bombal Beginner 5y ago
Put a Lid on Those AWS S3 Buckets | Lily Lee and Melisa Napoles
Cybersecurity
Put a Lid on Those AWS S3 Buckets | Lily Lee and Melisa Napoles
SANS Institute Beginner 5y ago
Easy GNS3 Install
Cybersecurity
Easy GNS3 Install
David Bombal Beginner 5y ago
Kali Linux on Windows 10 (it just got BETTER!!)
Cybersecurity
Kali Linux on Windows 10 (it just got BETTER!!)
NetworkChuck Beginner 5y ago
HackTheBox - Multimaster
Cybersecurity
HackTheBox - Multimaster
IppSec Beginner 5y ago
Attackive Directory Walkthrough (TryHackMe)
Cybersecurity
Attackive Directory Walkthrough (TryHackMe)
The Cyber Mentor Beginner 5y ago
How to learn rapidly
Cybersecurity
How to learn rapidly
David Bombal Beginner 5y ago
How Hackers hide files on Windows 10 and Linux
Cybersecurity
How Hackers hide files on Windows 10 and Linux
NetworkChuck Beginner 5y ago
Cyber Camp Panel - SANS Cyber Camp
Cybersecurity
Cyber Camp Panel - SANS Cyber Camp
SANS Institute Beginner 5y ago
Introduction to Network Analysis Workshop - SANS Cyber Camp
Cybersecurity
Introduction to Network Analysis Workshop - SANS Cyber Camp
SANS Institute Beginner 5y ago
Introduction to SANS Cyber Camp
Cybersecurity
Introduction to SANS Cyber Camp
SANS Institute Beginner 5y ago
The Hidden Information in Photos - SANS Cyber Camp
Cybersecurity
The Hidden Information in Photos - SANS Cyber Camp
SANS Institute Beginner 5y ago
Thinking Like a Forensicator - SANS Cyber Camp
Cybersecurity
Thinking Like a Forensicator - SANS Cyber Camp
SANS Institute Beginner 5y ago
Cybersecurity for Social Good - SANS Cyber Camp
Cybersecurity
Cybersecurity for Social Good - SANS Cyber Camp
SANS Institute Beginner 5y ago
Introduction to Programming Workshop - SANS Cyber Camp
Cybersecurity
Introduction to Programming Workshop - SANS Cyber Camp
SANS Institute Beginner 5y ago
Hexadecimal, ARP and MAC address learning
Cybersecurity
Hexadecimal, ARP and MAC address learning
David Bombal Beginner 5y ago
Becoming the Adversary: Creating a Defensive Lab to Understand the Offense
Cybersecurity
Becoming the Adversary: Creating a Defensive Lab to Understand the Offense
SANS Institute Beginner 5y ago
XSS a Paste Service - Pasteurize (web) Google CTF 2020
Cybersecurity
XSS a Paste Service - Pasteurize (web) Google CTF 2020
LiveOverflow Beginner 5y ago
David Fravor: UFOs, Aliens, Fighter Jets, and Aerospace Engineering | Lex Fridman Podcast #122
Cybersecurity
David Fravor: UFOs, Aliens, Fighter Jets, and Aerospace Engineering | Lex Fridman Podcast #122
Lex Fridman Beginner 5y ago
📚 Coursera Courses Opens on Coursera · Free to audit
1 / 3 View all →
Fundamentals of Integrated Brand Promotion
📚 Coursera Course ↗
Self-paced
Fundamentals of Integrated Brand Promotion
Opens on Coursera ↗
Cybersecurity Champion: Be a Change Leader with AI
📚 Coursera Course ↗
Self-paced
Cybersecurity Champion: Be a Change Leader with AI
Opens on Coursera ↗
Wireshark 101: Packet Analysis Essentials
📚 Coursera Course ↗
Self-paced
Wireshark 101: Packet Analysis Essentials
Opens on Coursera ↗
Gen AI in Cybersecurity
📚 Coursera Course ↗
Self-paced
Gen AI in Cybersecurity
Opens on Coursera ↗
Learn Man in the Middle Attacks from Scratch
📚 Coursera Course ↗
Self-paced
Learn Man in the Middle Attacks from Scratch
Opens on Coursera ↗
The Embedded Linux Security Handbook
📚 Coursera Course ↗
Self-paced
The Embedded Linux Security Handbook
Opens on Coursera ↗