Tech Skills

Cybersecurity

Ethical hacking, penetration testing, network security, CTFs and defensive security

7,081
lessons
Skills in this topic
View full skill map →
Security Basics
beginner
Fix OWASP top 10 vulnerabilities
AI Security
intermediate
Identify and patch prompt injection vulnerabilities
Network Security
intermediate
Configure a firewall with proper inbound/outbound rules
Ethical Hacking & Pen Testing
intermediate
Conduct a full pen test with Kali Linux
Cloud Security
intermediate
Implement IAM least-privilege policies on AWS/GCP
Incident Response
intermediate
Build an incident response playbook
Security Compliance
intermediate
Map controls for SOC 2 Type II compliance
Defensive AI
advanced
Build an AI-powered log anomaly detector
Kali Linux WiFi
Cybersecurity
Kali Linux WiFi
David Bombal Beginner 6y ago
Cybertalk - EP3 - Cybersecurity Certifications & Learning Resources
Cybersecurity ⚡ AI Lesson
Cybertalk - EP3 - Cybersecurity Certifications & Learning Resources
HackerSploit Beginner 6y ago
SECRET HACKER FORUM - The Place Where We Talk and Learn
Cybersecurity ⚡ AI Lesson
SECRET HACKER FORUM - The Place Where We Talk and Learn
LiveOverflow Beginner 6y ago
Funnel Hacking Live FULL Documentary - A ClickFunnels Studio Presentation
Cybersecurity ⚡ AI Lesson
Funnel Hacking Live FULL Documentary - A ClickFunnels Studio Presentation
Russell Brunson Beginner 6y ago
Burp Suite Pro Walkthrough
Cybersecurity ⚡ AI Lesson
Burp Suite Pro Walkthrough
The Cyber Mentor Beginner 6y ago
Recon-ng V5 - Introduction And New Updates
Cybersecurity ⚡ AI Lesson
Recon-ng V5 - Introduction And New Updates
HackerSploit Beginner 6y ago
Funnel Hacking LIVE Documentary Trailer - Why We Do It...
Cybersecurity
Funnel Hacking LIVE Documentary Trailer - Why We Do It...
Russell Brunson Beginner 6y ago
AES Explained (Advanced Encryption Standard) - Computerphile
Cybersecurity ⚡ AI Lesson
AES Explained (Advanced Encryption Standard) - Computerphile
Computerphile Beginner 6y ago
How to Install Ubuntu on VirtualBox using Windows 10
Cybersecurity
How to Install Ubuntu on VirtualBox using Windows 10
David Bombal Beginner 6y ago
One Encryption Standard to Rule Them All! - Computerphile
Cybersecurity ⚡ AI Lesson
One Encryption Standard to Rule Them All! - Computerphile
Computerphile Beginner 6y ago
Not giving credit where credit is due - Common Cybersecurity Writing Mistakes
Cybersecurity ⚡ AI Lesson
Not giving credit where credit is due - Common Cybersecurity Writing Mistakes
SANS Institute Beginner 6y ago
Including details most readers don't need - Common Cybersecurity Writing Mistakes
Cybersecurity
Including details most readers don't need - Common Cybersecurity Writing Mistakes
SANS Institute Beginner 6y ago
How To Apply Reverse Engineering To Learn Data Science
Cybersecurity
How To Apply Reverse Engineering To Learn Data Science
Krish Naik Beginner 6y ago
Pentesting for n00bs: Episode 10 - Netmon
Cybersecurity ⚡ AI Lesson
Pentesting for n00bs: Episode 10 - Netmon
The Cyber Mentor Beginner 6y ago
Reading Player Position with DLL Injection - Pwn Adventure 3
Cybersecurity ⚡ AI Lesson
Reading Player Position with DLL Injection - Pwn Adventure 3
LiveOverflow Beginner 6y ago
Escalating tensions in difficult situations - Common Cybersecurity Writing Mistakes
Cybersecurity ⚡ AI Lesson
Escalating tensions in difficult situations - Common Cybersecurity Writing Mistakes
SANS Institute Beginner 6y ago
Using FUD to cause anxiety - Common Cybersecurity Writing Mistakes
Cybersecurity
Using FUD to cause anxiety - Common Cybersecurity Writing Mistakes
SANS Institute Beginner 6y ago
Not using parallel structure - Common Cybersecurity Writing Mistakes
Cybersecurity
Not using parallel structure - Common Cybersecurity Writing Mistakes
SANS Institute Beginner 6y ago
Using more words than necessary - Common Cybersecurity Writing Mistakes
Cybersecurity
Using more words than necessary - Common Cybersecurity Writing Mistakes
SANS Institute Beginner 6y ago
Applying Inconsistent formatting - Common Cybersecurity Writing Mistakes
Cybersecurity
Applying Inconsistent formatting - Common Cybersecurity Writing Mistakes
SANS Institute Beginner 6y ago
Including indecipherable graphics - Common Cybersecurity Writing Mistakes
Cybersecurity
Including indecipherable graphics - Common Cybersecurity Writing Mistakes
SANS Institute Beginner 6y ago
Burying the Main Point - Common Cybersecurity Writing Mistakes
Cybersecurity ⚡ AI Lesson
Burying the Main Point - Common Cybersecurity Writing Mistakes
SANS Institute Beginner 6y ago
Linux Essentials For Hackers - #14 - Networking (ifconfig, netstat & netdiscover)
Cybersecurity ⚡ AI Lesson
Linux Essentials For Hackers - #14 - Networking (ifconfig, netstat & netdiscover)
HackerSploit Beginner 6y ago
Kali Linux: Hacking DHCP and MITM
Cybersecurity
Kali Linux: Hacking DHCP and MITM
David Bombal Beginner 6y ago
Kali Linux: Hacking Networks Part 2
Cybersecurity
Kali Linux: Hacking Networks Part 2
David Bombal Beginner 6y ago
John Hubbard - How were you introduced to SANS?
Cybersecurity
John Hubbard - How were you introduced to SANS?
SANS Institute Beginner 6y ago
John Hubbard -If you’ve completed a 500-level course should you still give thought to taking SEC450?
Cybersecurity
John Hubbard -If you’ve completed a 500-level course should you still give thought to taking SEC450?
SANS Institute Beginner 6y ago
John Hubbard - How to determine whether SEC401 or SEC450 is best?
Cybersecurity
John Hubbard - How to determine whether SEC401 or SEC450 is best?
SANS Institute Beginner 6y ago
John Hubbard - Will SEC 450 carry a certification?
Cybersecurity
John Hubbard - Will SEC 450 carry a certification?
SANS Institute Beginner 6y ago
John Hubbard - At the end of the SEC450 course, what do students come away with?
Cybersecurity ⚡ AI Lesson
John Hubbard - At the end of the SEC450 course, what do students come away with?
SANS Institute Beginner 6y ago
John Hubbard - What are some of the key tools covered in SEC450?
Cybersecurity
John Hubbard - What are some of the key tools covered in SEC450?
SANS Institute Beginner 6y ago
John Hubbard - A high level walk through of each day of the SEC450 course
Cybersecurity
John Hubbard - A high level walk through of each day of the SEC450 course
SANS Institute Beginner 6y ago
John Hubbard - Who exactly was the SEC450 course designed for?
Cybersecurity ⚡ AI Lesson
John Hubbard - Who exactly was the SEC450 course designed for?
SANS Institute Beginner 6y ago
John Hubbard – About the SEC450: Blue Team Fundamentals course
Cybersecurity ⚡ AI Lesson
John Hubbard – About the SEC450: Blue Team Fundamentals course
SANS Institute Beginner 6y ago
John Hubbard - How long did it actually take you to write the SEC450 course?
Cybersecurity
John Hubbard - How long did it actually take you to write the SEC450 course?
SANS Institute Beginner 6y ago
John Hubbard - Did you interview other analysts and dial back to your days as an analyst?
Cybersecurity
John Hubbard - Did you interview other analysts and dial back to your days as an analyst?
SANS Institute Beginner 6y ago
John Hubbard - Why were you the one to create a course for new Blue Teamers?
Cybersecurity
John Hubbard - Why were you the one to create a course for new Blue Teamers?
SANS Institute Beginner 6y ago
John Hubbard - How did teaching at SANS come about?
Cybersecurity ⚡ AI Lesson
John Hubbard - How did teaching at SANS come about?
SANS Institute Beginner 6y ago
John Hubbard - key things that helped him rise from being an analyst to becoming a SOC manager
Cybersecurity
John Hubbard - key things that helped him rise from being an analyst to becoming a SOC manager
SANS Institute Beginner 6y ago
John Hubbard - some of the early challenges as a young SOC analyst
Cybersecurity ⚡ AI Lesson
John Hubbard - some of the early challenges as a young SOC analyst
SANS Institute Beginner 6y ago
John Hubbard - aspirations of becoming an engineer
Cybersecurity
John Hubbard - aspirations of becoming an engineer
SANS Institute Beginner 6y ago
Introducing John Hubbard
Cybersecurity
Introducing John Hubbard
SANS Institute Beginner 6y ago
Linux Essentials For Hackers - #1 - Introduction
Cybersecurity ⚡ AI Lesson
Linux Essentials For Hackers - #1 - Introduction
HackerSploit Beginner 6y ago
Kali Linux: Hacking Networks Part 1
Cybersecurity
Kali Linux: Hacking Networks Part 1
David Bombal Beginner 6y ago
What to Expect in an Ethical Hacking Interview
Cybersecurity ⚡ AI Lesson
What to Expect in an Ethical Hacking Interview
The Cyber Mentor Beginner 6y ago
Kali Linux Install: Ethical hacking getting started guide
Cybersecurity
Kali Linux Install: Ethical hacking getting started guide
David Bombal Beginner 6y ago
I Am So Nervous...Big Changes Ahead! | FHTV Ep 120
Cybersecurity
I Am So Nervous...Big Changes Ahead! | FHTV Ep 120
Russell Brunson Beginner 6y ago
Packet Tracer Installation: macOS Catalina
Cybersecurity
Packet Tracer Installation: macOS Catalina
David Bombal Beginner 6y ago
📚 Coursera Courses Opens on Coursera · Free to audit
1 / 3 View all →
Ethical Password Cracking
📚 Coursera Course ↗
Self-paced
Ethical Password Cracking
Opens on Coursera ↗
Cybersecurity Technology and Response Strategies
📚 Coursera Course ↗
Self-paced
Cybersecurity Technology and Response Strategies
Opens on Coursera ↗
Beginning Security
📚 Coursera Course ↗
Self-paced
Beginning Security
Opens on Coursera ↗
Managing Resources, Security, and Networking in Windows 2025
📚 Coursera Course ↗
Self-paced
Managing Resources, Security, and Networking in Windows 2025
Opens on Coursera ↗
Network Implementations and Operations
📚 Coursera Course ↗
Self-paced
Network Implementations and Operations
Opens on Coursera ↗
Block Cipher Modes of Operation Training
📚 Coursera Course ↗
Self-paced
Block Cipher Modes of Operation Training
Opens on Coursera ↗