Tech Skills

Cybersecurity

Ethical hacking, penetration testing, network security, CTFs and defensive security

7,039
lessons
Skills in this topic
View full skill map โ†’
Security Basics
beginner
Fix OWASP top 10 vulnerabilities
AI Security
intermediate
Identify and patch prompt injection vulnerabilities
Network Security
intermediate
Configure a firewall with proper inbound/outbound rules
Ethical Hacking & Pen Testing
intermediate
Conduct a full pen test with Kali Linux
Cloud Security
intermediate
Implement IAM least-privilege policies on AWS/GCP
Incident Response
intermediate
Build an incident response playbook
Security Compliance
intermediate
Map controls for SOC 2 Type II compliance
Defensive AI
advanced
Build an AI-powered log anomaly detector
Video Game Cheaters Are in an Eternal Arms Race๐ŸŽ™Darknet Diaries Ep. 115: Player Cheater Dev Spy
Cybersecurity
Video Game Cheaters Are in an Eternal Arms Race๐ŸŽ™Darknet Diaries Ep. 115: Player Cheater Dev Spy
Jack Rhysider Intermediate 2y ago
Tracking down a cybercriminal through network logs
Cybersecurity โšก AI Lesson
Tracking down a cybercriminal through network logs
Jack Rhysider Intermediate 2y ago
Healthcare Software Exploit: CVE-2023-43208
Cybersecurity โšก AI Lesson
Healthcare Software Exploit: CVE-2023-43208
John Hammond Intermediate 2y ago
Run this script with Eval
Cybersecurity
Run this script with Eval
John Hammond Intermediate 2y ago
2024 Artificial Intelligence Security Trends and Predictions
Cybersecurity โšก AI Lesson
2024 Artificial Intelligence Security Trends and Predictions
SANS Institute Intermediate 2y ago
Top 10 Study Habits 2024
Cybersecurity โšก AI Lesson
Top 10 Study Habits 2024
NetworkChuck Intermediate 2y ago
Is Hashing Encryption? #shorts #encryption #hashing #password
Cybersecurity
Is Hashing Encryption? #shorts #encryption #hashing #password
David Bombal Intermediate 2y ago
How to prepare for a career in cybersecurity with no prior experience.
Cybersecurity
How to prepare for a career in cybersecurity with no prior experience.
Coursera Intermediate 2y ago
Do you know the difference between the encryption algorithms? #shorts #encryption #tls #vpn
Cybersecurity
Do you know the difference between the encryption algorithms? #shorts #encryption #tls #vpn
David Bombal Intermediate 2y ago
Begin your journey into DFIR, Blue Team, Malware and Threat Hunting with Mary Ellen Kennel
Cybersecurity โšก AI Lesson
Begin your journey into DFIR, Blue Team, Malware and Threat Hunting with Mary Ellen Kennel
The Cyber Mentor Intermediate 2y ago
2024 Cyber Defense Trends and Predictions
Cybersecurity โšก AI Lesson
2024 Cyber Defense Trends and Predictions
SANS Institute Intermediate 2y ago
Cyber Security Question and Answers  | CyberSecurity Interview Tips  | Edureka Rewind - 1
Cybersecurity
Cyber Security Question and Answers | CyberSecurity Interview Tips | Edureka Rewind - 1
edureka! Intermediate 2y ago
Go FROM business ZERO to a growth hacking HERO.
Cybersecurity
Go FROM business ZERO to a growth hacking HERO.
Adam Erhart Intermediate 2y ago
cybersecurity vs software engineering ๐Ÿ˜ฑ๐Ÿ˜ฑ๐Ÿ˜ฑ
Cybersecurity
cybersecurity vs software engineering ๐Ÿ˜ฑ๐Ÿ˜ฑ๐Ÿ˜ฑ
Sajjaad Khader Intermediate 2y ago
Phases in Cybersecurity  |Cybersecurity Training | Edureka | Cybersecurity Rewind - 2
Cybersecurity
Phases in Cybersecurity |Cybersecurity Training | Edureka | Cybersecurity Rewind - 2
edureka! Intermediate 2y ago
Chinese hackers stealing American technology?
Cybersecurity โšก AI Lesson
Chinese hackers stealing American technology?
Jack Rhysider Intermediate 2y ago
Debug with JS-Beautify
Cybersecurity
Debug with JS-Beautify
John Hammond Intermediate 2y ago
Debug with Visual Studio
Cybersecurity
Debug with Visual Studio
John Hammond Intermediate 2y ago
Exploring the BIGGEST SCAMS in the Dark Web
Cybersecurity โšก AI Lesson
Exploring the BIGGEST SCAMS in the Dark Web
John Hammond Intermediate 2y ago
Welcome back, Ryan Chapman
Cybersecurity
Welcome back, Ryan Chapman
John Hammond Intermediate 2y ago
Hacker vs. Hacker: Why EVERYONE Hated His Genius Malware Kit๐ŸŽ™Darknet Diaries Ep. 114: HD
Cybersecurity
Hacker vs. Hacker: Why EVERYONE Hated His Genius Malware Kit๐ŸŽ™Darknet Diaries Ep. 114: HD
Jack Rhysider Intermediate 2y ago
PikaBot Malware Analysis: Debugging in Visual Studio
Cybersecurity
PikaBot Malware Analysis: Debugging in Visual Studio
John Hammond Intermediate 2y ago
Make Malware Analysis FASTER with Binary Emulation
Cybersecurity
Make Malware Analysis FASTER with Binary Emulation
John Hammond Intermediate 2y ago
Dig Deeper and Faster with AI
Cybersecurity
Dig Deeper and Faster with AI
John Hammond Intermediate 2y ago
I Made a Custom Threat Intel Feed (Connecting Apps with n8n)
Cybersecurity โšก AI Lesson
I Made a Custom Threat Intel Feed (Connecting Apps with n8n)
John Hammond Intermediate 2y ago
NetworkChuck's Life Hack
Cybersecurity
NetworkChuck's Life Hack
John Hammond Intermediate 2y ago
How to Extract Plaintext Wi-Fi Passwords (with Rust)
Cybersecurity
How to Extract Plaintext Wi-Fi Passwords (with Rust)
John Hammond Intermediate 2y ago
This Computer Malware Steals Your Information
Cybersecurity
This Computer Malware Steals Your Information
John Hammond Intermediate 2y ago
Enhancing Your Environment
Cybersecurity
Enhancing Your Environment
John Hammond Intermediate 2y ago
Kernel Level Exploits
Cybersecurity
Kernel Level Exploits
John Hammond Intermediate 2y ago
Getting Ahead in the Industry
Cybersecurity
Getting Ahead in the Industry
John Hammond Intermediate 2y ago
Cyber Defense is Literally Free
Cybersecurity โšก AI Lesson
Cyber Defense is Literally Free
John Hammond Intermediate 2y ago
How hackers infiltrated the CIA director's email #shorts #cybersecurity
Cybersecurity
How hackers infiltrated the CIA director's email #shorts #cybersecurity
Jack Rhysider Intermediate 2y ago
How Hackers Move Through Networks (with Ligolo)
Cybersecurity โšก AI Lesson
How Hackers Move Through Networks (with Ligolo)
John Hammond Intermediate 2y ago
True or False? Your IP address gives your location? #shorts #iphone #android #starlink #vpn
Cybersecurity
True or False? Your IP address gives your location? #shorts #iphone #android #starlink #vpn
David Bombal Intermediate 2y ago
How hackers breach iPhone security
Cybersecurity โšก AI Lesson
How hackers breach iPhone security
Jack Rhysider Intermediate 2y ago
This Windows Program can CLONE ITSELF
Cybersecurity
This Windows Program can CLONE ITSELF
John Hammond Intermediate 2y ago
Over 30,000 Indian websites hacked by Pakistani hackers #shorts #cybersecurity
Cybersecurity
Over 30,000 Indian websites hacked by Pakistani hackers #shorts #cybersecurity
Jack Rhysider Intermediate 2y ago
They Hacked Govts and Celebs, But Their Downfall Will Gut You๐ŸŽ™Darknet Diaries Ep. 109 TeaMp0isoN
Cybersecurity
They Hacked Govts and Celebs, But Their Downfall Will Gut You๐ŸŽ™Darknet Diaries Ep. 109 TeaMp0isoN
Jack Rhysider Intermediate 2y ago
How phone calls can hack a bank
Cybersecurity
How phone calls can hack a bank
Jack Rhysider Intermediate 2y ago
The mysterious virus that erases its own tracks
Cybersecurity
The mysterious virus that erases its own tracks
Jack Rhysider Intermediate 2y ago
How they scammed people for downloading nothing
Cybersecurity
How they scammed people for downloading nothing
Jack Rhysider Intermediate 2y ago
I Get Paid to Trick People Into Giving Up Their Passwords๐ŸŽ™Darknet Diaries Ep. 107: Alethe
Cybersecurity
I Get Paid to Trick People Into Giving Up Their Passwords๐ŸŽ™Darknet Diaries Ep. 107: Alethe
Jack Rhysider Intermediate 2y ago
Edโ€™s Whacky Winter Wonder Holiday Bonanza | Host: Ed Skoudis | December 12, 2023
Cybersecurity โšก AI Lesson
Edโ€™s Whacky Winter Wonder Holiday Bonanza | Host: Ed Skoudis | December 12, 2023
SANS Institute Intermediate 2y ago
I Hacked Another File Upload Website
Cybersecurity
I Hacked Another File Upload Website
John Hammond Intermediate 2y ago
Using AI for call scams!
Cybersecurity โšก AI Lesson
Using AI for call scams!
Jack Rhysider Intermediate 2y ago
Digital Forensics with FTK Imager (TryHackMe Advent of Cyber Day 8)
Cybersecurity
Digital Forensics with FTK Imager (TryHackMe Advent of Cyber Day 8)
John Hammond Intermediate 2y ago
How Pirate Bay claimed to be hosted in North Korea
Cybersecurity โšก AI Lesson
How Pirate Bay claimed to be hosted in North Korea
Jack Rhysider Intermediate 2y ago
๐Ÿ“š Coursera Courses Opens on Coursera ยท Free to audit
1 / 3 View all โ†’
Security for Artificial Intelligence Software and Services
๐Ÿ“š Coursera Course โ†—
Self-paced
Security for Artificial Intelligence Software and Services
Opens on Coursera โ†—
Digital Forensics for Pentesters - Hands-On Learning
๐Ÿ“š Coursera Course โ†—
Self-paced
Digital Forensics for Pentesters - Hands-On Learning
Opens on Coursera โ†—
Introduction to Google Security Operations (SIEM)
๐Ÿ“š Coursera Course โ†—
Self-paced
Introduction to Google Security Operations (SIEM)
Opens on Coursera โ†—
Ethical Hacking Practice Project & Questions
๐Ÿ“š Coursera Course โ†—
Self-paced
Ethical Hacking Practice Project & Questions
Opens on Coursera โ†—
Linux Security Basics and Beyond: Unit 4
๐Ÿ“š Coursera Course โ†—
Self-paced
Linux Security Basics and Beyond: Unit 4
Opens on Coursera โ†—
Consultative Selling and Buyer Engagement
๐Ÿ“š Coursera Course โ†—
Self-paced
Consultative Selling and Buyer Engagement
Opens on Coursera โ†—