Tech Skills

Cybersecurity

Ethical hacking, penetration testing, network security, CTFs and defensive security

7,039
lessons
Skills in this topic
View full skill map →
Security Basics
beginner
Fix OWASP top 10 vulnerabilities
AI Security
intermediate
Identify and patch prompt injection vulnerabilities
Network Security
intermediate
Configure a firewall with proper inbound/outbound rules
Ethical Hacking & Pen Testing
intermediate
Conduct a full pen test with Kali Linux
Cloud Security
intermediate
Implement IAM least-privilege policies on AWS/GCP
Incident Response
intermediate
Build an incident response playbook
Security Compliance
intermediate
Map controls for SOC 2 Type II compliance
Defensive AI
advanced
Build an AI-powered log anomaly detector
How To Hack APIs with Python
Cybersecurity
How To Hack APIs with Python
John Hammond Intermediate 2y ago
Empowering Tomorrow’s Security Leaders with the SANS Transformational Triad
Cybersecurity ⚡ AI Lesson
Empowering Tomorrow’s Security Leaders with the SANS Transformational Triad
SANS Institute Intermediate 2y ago
This Cybercrime Group Puts Its Hackers Through School
Cybersecurity
This Cybercrime Group Puts Its Hackers Through School
John Hammond Intermediate 2y ago
Kali Linux WHOIS with HackerD #shorts #kalilinux #domain #steam
Cybersecurity
Kali Linux WHOIS with HackerD #shorts #kalilinux #domain #steam
David Bombal Intermediate 2y ago
How much is your Instagram username worth?
Cybersecurity
How much is your Instagram username worth?
Jack Rhysider Intermediate 2y ago
What if Q* broke cybersecurity? How would we adapt? Deep dive! P≠NP? Here's why it's probably fine..
Cybersecurity
What if Q* broke cybersecurity? How would we adapt? Deep dive! P≠NP? Here's why it's probably fine..
David Shapiro Intermediate 2y ago
Steve Tran: Hacker, Magician, Police Officer, and CISO
Cybersecurity ⚡ AI Lesson
Steve Tran: Hacker, Magician, Police Officer, and CISO
SANS Institute Intermediate 2y ago
Multicast is just Weird.... Doesn't even know who gets it?
Cybersecurity
Multicast is just Weird.... Doesn't even know who gets it?
David Bombal Intermediate 2y ago
Indian Prime Minister's personal website was hacked?
Cybersecurity
Indian Prime Minister's personal website was hacked?
Jack Rhysider Intermediate 2y ago
ESG and Sustainable Financial Strategy Course
Cybersecurity
ESG and Sustainable Financial Strategy Course
Saïd Business School, University of Oxford Intermediate 2y ago
Guarding LLM and NLP APIs: A Trailblazing Odyssey for Enhanced Security //Ads Dawson // Podcast #190
Cybersecurity
Guarding LLM and NLP APIs: A Trailblazing Odyssey for Enhanced Security //Ads Dawson // Podcast #190
MLOps.community Intermediate 2y ago
What Can You Gain with Cybersecurity Certificates?
Cybersecurity
What Can You Gain with Cybersecurity Certificates?
Coursera Intermediate 2y ago
TryHackMe! Advent of Cyber 2023 Kick-Off
Cybersecurity
TryHackMe! Advent of Cyber 2023 Kick-Off
John Hammond Intermediate 2y ago
Capture the Flag: Hacking Yet Another Markup Language
Cybersecurity
Capture the Flag: Hacking Yet Another Markup Language
John Hammond Intermediate 2y ago
This Cybercrime Forum Is Full Of Hackers
Cybersecurity
This Cybercrime Forum Is Full Of Hackers
John Hammond Intermediate 2y ago
How Hackers Compromise Other Users
Cybersecurity
How Hackers Compromise Other Users
John Hammond Intermediate 2y ago
Wait ... your router has been online for how long??!! #shorts #cybersecurity #hacking
Cybersecurity
Wait ... your router has been online for how long??!! #shorts #cybersecurity #hacking
David Bombal Intermediate 2y ago
The MOVEit Hack In Retrospect
Cybersecurity
The MOVEit Hack In Retrospect
John Hammond Intermediate 2y ago
How a Nigerian man stole millions of dollars in tax refunds
Cybersecurity ⚡ AI Lesson
How a Nigerian man stole millions of dollars in tax refunds
Jack Rhysider Intermediate 2y ago
where do you ACTUALLY submit vulnerabilities?
Cybersecurity
where do you ACTUALLY submit vulnerabilities?
John Hammond Intermediate 2y ago
I Took Over a Microsoft Cloud Account. Again.
Cybersecurity ⚡ AI Lesson
I Took Over a Microsoft Cloud Account. Again.
John Hammond Intermediate 2y ago
Thinking Outside the Firewall: Unconventional Cybersecurity Journeys | Host: Rich Greene
Cybersecurity ⚡ AI Lesson
Thinking Outside the Firewall: Unconventional Cybersecurity Journeys | Host: Rich Greene
SANS Institute Intermediate 2y ago
Testing Your Cybersecurity Defenses
Cybersecurity
Testing Your Cybersecurity Defenses
John Hammond Intermediate 2y ago
Hacking with Bloodhound: Map Your Environment
Cybersecurity
Hacking with Bloodhound: Map Your Environment
John Hammond Intermediate 2y ago
Three Cloud Security Differentiators for Leaders
Cybersecurity ⚡ AI Lesson
Three Cloud Security Differentiators for Leaders
SANS Institute Intermediate 2y ago
Weird Security Voyeurs Unite | Host: Ryan Chapman | Guest: Sherrod Degrippo
Cybersecurity ⚡ AI Lesson
Weird Security Voyeurs Unite | Host: Ryan Chapman | Guest: Sherrod Degrippo
SANS Institute Intermediate 2y ago
they're selling WHAT on Telegram?!?
Cybersecurity ⚡ AI Lesson
they're selling WHAT on Telegram?!?
John Hammond Intermediate 2y ago
How Amat Cama hacked Samsung for 3 years straight
Cybersecurity
How Amat Cama hacked Samsung for 3 years straight
Jack Rhysider Intermediate 2y ago
I Stole a Microsoft 365 Account. Here's How.
Cybersecurity
I Stole a Microsoft 365 Account. Here's How.
John Hammond Intermediate 2y ago
macOS to Kali Linux to Windows 98? (back to the future copy and paste) #shorts #linux #windows
Cybersecurity
macOS to Kali Linux to Windows 98? (back to the future copy and paste) #shorts #linux #windows
David Bombal Intermediate 2y ago
this Cybersecurity Platform is FREE
Cybersecurity
this Cybersecurity Platform is FREE
John Hammond Intermediate 2y ago
Hacking Websites: NodeJS Server-Side Template Injection
Cybersecurity
Hacking Websites: NodeJS Server-Side Template Injection
John Hammond Intermediate 2y ago
Jadee Hanson: Balancing CISO, CIO, and Product Leadership
Cybersecurity ⚡ AI Lesson
Jadee Hanson: Balancing CISO, CIO, and Product Leadership
SANS Institute Intermediate 2y ago
The Russian cyberattack that crippled Ukraine
Cybersecurity
The Russian cyberattack that crippled Ukraine
Jack Rhysider Intermediate 2y ago
Fetch the Flag CTF is Live Right Now
Cybersecurity
Fetch the Flag CTF is Live Right Now
John Hammond Intermediate 2y ago
The 3CX Hack In Retrospect
Cybersecurity
The 3CX Hack In Retrospect
John Hammond Intermediate 2y ago
Cloud Security with Microsoft 365 Developer Tenants
Cybersecurity ⚡ AI Lesson
Cloud Security with Microsoft 365 Developer Tenants
John Hammond Intermediate 2y ago
Did the World Bank’s servers get breached?
Cybersecurity
Did the World Bank’s servers get breached?
Jack Rhysider Intermediate 2y ago
RagnarLocker Ransomware Seized by Law Enforcement
Cybersecurity ⚡ AI Lesson
RagnarLocker Ransomware Seized by Law Enforcement
John Hammond Intermediate 2y ago
Brett Cumming: Saying Yes Led to a Career in Cybersecurity
Cybersecurity ⚡ AI Lesson
Brett Cumming: Saying Yes Led to a Career in Cybersecurity
SANS Institute Intermediate 2y ago
They Made QR Codes LONGER?!?
Cybersecurity
They Made QR Codes LONGER?!?
John Hammond Intermediate 2y ago
How these hackers won a Tesla using a web browser
Cybersecurity
How these hackers won a Tesla using a web browser
Jack Rhysider Intermediate 2y ago
Building the Security Culture Dream Team | Host: Lance Spitzner | Guest: Molly McLain
Cybersecurity ⚡ AI Lesson
Building the Security Culture Dream Team | Host: Lance Spitzner | Guest: Molly McLain
SANS Institute Intermediate 2y ago
3 FREE Resources for Cyber Defenders
Cybersecurity ⚡ AI Lesson
3 FREE Resources for Cyber Defenders
John Hammond Intermediate 2y ago
Kali Linux WiFi Managed Mode (from Monitor mode) : HackerD explains #shorts #wifi #kalilinux
Cybersecurity
Kali Linux WiFi Managed Mode (from Monitor mode) : HackerD explains #shorts #wifi #kalilinux
David Bombal Intermediate 2y ago
Hunting for Hackers with Sigma Rules
Cybersecurity
Hunting for Hackers with Sigma Rules
John Hammond Intermediate 2y ago
Website Vulnerabilities to Fully Hacked Server
Cybersecurity
Website Vulnerabilities to Fully Hacked Server
John Hammond Intermediate 2y ago
Detect Hackers & Malware on your Computer (literally for free)
Cybersecurity
Detect Hackers & Malware on your Computer (literally for free)
John Hammond Intermediate 2y ago
📚 Coursera Courses Opens on Coursera · Free to audit
1 / 3 View all →
Cybersecurity Essentials : from Risk to Resilience
📚 Coursera Course ↗
Self-paced
Cybersecurity Essentials : from Risk to Resilience
Opens on Coursera ↗
AI Agents for Cybersecurity
📚 Coursera Course ↗
Self-paced
AI Agents for Cybersecurity
Opens on Coursera ↗
Introduction to SIEM (Splunk)
📚 Coursera Course ↗
Self-paced
Introduction to SIEM (Splunk)
Opens on Coursera ↗
CompTIA Server+ (SK0-005)
📚 Coursera Course ↗
Self-paced
CompTIA Server+ (SK0-005)
Opens on Coursera ↗
Incident Response, Risk Management, and Compliance
📚 Coursera Course ↗
Self-paced
Incident Response, Risk Management, and Compliance
Opens on Coursera ↗
Foundations of Site Reliability Engineering Training
📚 Coursera Course ↗
Self-paced
Foundations of Site Reliability Engineering Training
Opens on Coursera ↗