Tech Skills

Cybersecurity

Ethical hacking, penetration testing, network security, CTFs and defensive security

7,042
lessons
Skills in this topic
View full skill map โ†’
Security Basics
beginner
Fix OWASP top 10 vulnerabilities
AI Security
intermediate
Identify and patch prompt injection vulnerabilities
Network Security
intermediate
Configure a firewall with proper inbound/outbound rules
Ethical Hacking & Pen Testing
intermediate
Conduct a full pen test with Kali Linux
Cloud Security
intermediate
Implement IAM least-privilege policies on AWS/GCP
Incident Response
intermediate
Build an incident response playbook
Security Compliance
intermediate
Map controls for SOC 2 Type II compliance
Defensive AI
advanced
Build an AI-powered log anomaly detector
Kali Linux WiFi Monitor Mode: HackerD explains #shorts #wifi #kalilinux
Cybersecurity
Kali Linux WiFi Monitor Mode: HackerD explains #shorts #wifi #kalilinux
David Bombal Intermediate 2y ago
CS50 Cybersecurity - Lecture 3 - Securing Software
Cybersecurity
CS50 Cybersecurity - Lecture 3 - Securing Software
CS50 Intermediate 2y ago
Wifi Hacking with a Steam Deck and Kali Linux #shorts #wifi
Cybersecurity โšก AI Lesson
Wifi Hacking with a Steam Deck and Kali Linux #shorts #wifi
David Bombal Intermediate 2y ago
How to prepare for a career in cybersecurity with no prior experience.
Cybersecurity
How to prepare for a career in cybersecurity with no prior experience.
Coursera Intermediate 2y ago
The Penetration Test That Went Horribly Wrong๐ŸŽ™Darknet Diaries Ep. 95: Jon & Brian's Big Adventure
Cybersecurity
The Penetration Test That Went Horribly Wrong๐ŸŽ™Darknet Diaries Ep. 95: Jon & Brian's Big Adventure
Jack Rhysider Intermediate 2y ago
New "Dark Web" Generative AI Chatbots?!
Cybersecurity
New "Dark Web" Generative AI Chatbots?!
John Hammond Intermediate 2y ago
How "Mimikatz" works
Cybersecurity
How "Mimikatz" works
Jack Rhysider Intermediate 2y ago
Cybersecurity Roadmap 2023 ! #cybersecurity
Cybersecurity
Cybersecurity Roadmap 2023 ! #cybersecurity
Shweta Intermediate 2y ago
How To Pivot Through a Network with Chisel
Cybersecurity
How To Pivot Through a Network with Chisel
John Hammond Intermediate 2y ago
AI for Good Specialization: Learn AI's role in addressing real-world challenges
Cybersecurity
AI for Good Specialization: Learn AI's role in addressing real-world challenges
DeepLearningAI Intermediate 2y ago
Phases in Cybersecurity  | Cybersecurity Training | Edureka | Cybersecurity Rewind - 2
Cybersecurity
Phases in Cybersecurity | Cybersecurity Training | Edureka | Cybersecurity Rewind - 2
edureka! Intermediate 2y ago
I Learned How To Hack WiFi In 2 Days...
Cybersecurity โšก AI Lesson
I Learned How To Hack WiFi In 2 Days...
Tech With Tim Intermediate 2y ago
Bonus Episode: What does it take to author a cybersecurity book?
Cybersecurity โšก AI Lesson
Bonus Episode: What does it take to author a cybersecurity book?
SANS Institute Intermediate 2y ago
Cyber Leadership Analogies and Metaphors
Cybersecurity โšก AI Lesson
Cyber Leadership Analogies and Metaphors
SANS Institute Intermediate 2y ago
Tips to Improve eCommerce Store Security in 2023 | Virtina
Cybersecurity
Tips to Improve eCommerce Store Security in 2023 | Virtina
Virtina Intermediate 2y ago
The Evolution of Windows.    #windows #evolution #windowsos #windowsevolution
Cybersecurity
The Evolution of Windows. #windows #evolution #windowsos #windowsevolution
CydexCode Intermediate 2y ago
Web App Hacking with Caido.io
Cybersecurity โšก AI Lesson
Web App Hacking with Caido.io
The Cyber Mentor Intermediate 2y ago
The Most Important Thing I Learned About Core Values!
Cybersecurity
The Most Important Thing I Learned About Core Values!
Evan Carmichael Intermediate 2y ago
Your Windows Passwords ๐Ÿ˜ฑ #shorts #windows
Cybersecurity
Your Windows Passwords ๐Ÿ˜ฑ #shorts #windows
David Bombal Intermediate 2y ago
This scammer milked Facebook for millions
Cybersecurity
This scammer milked Facebook for millions
Jack Rhysider Intermediate 2y ago
OneCoin exposed as the biggest crypto scam!
Cybersecurity โšก AI Lesson
OneCoin exposed as the biggest crypto scam!
Jack Rhysider Intermediate 2y ago
Classify Malware with YARA
Cybersecurity
Classify Malware with YARA
John Hammond Intermediate 2y ago
Your Computer could be For Sale on the Dark Web
Cybersecurity
Your Computer could be For Sale on the Dark Web
John Hammond Intermediate 2y ago
Flipper Zero vs Alarm? (will the Bike alarm stop it?) #shorts
Cybersecurity
Flipper Zero vs Alarm? (will the Bike alarm stop it?) #shorts
David Bombal Intermediate 2y ago
Not All ZIP Files Are Equal
Cybersecurity โšก AI Lesson
Not All ZIP Files Are Equal
John Hammond Intermediate 2y ago
Flipper Zero WiFi Hacking (Fake WiFi networks) #shorts
Cybersecurity
Flipper Zero WiFi Hacking (Fake WiFi networks) #shorts
David Bombal Intermediate 2y ago
Flipper Zero WiFi Hacking (Rogue AP) #shorts
Cybersecurity
Flipper Zero WiFi Hacking (Rogue AP) #shorts
David Bombal Intermediate 2y ago
Capture the Flag at Blackhat USA 2023!
Cybersecurity
Capture the Flag at Blackhat USA 2023!
John Hammond Intermediate 2y ago
Books! Books! Books! Which author should I interview? #shorts
Cybersecurity โšก AI Lesson
Books! Books! Books! Which author should I interview? #shorts
David Bombal Intermediate 2y ago
Flipper Zero RFID Fuzzer (Fuzz RFID) #shorts
Cybersecurity
Flipper Zero RFID Fuzzer (Fuzz RFID) #shorts
David Bombal Intermediate 2y ago
Telegram Cybercrime is INSANE
Cybersecurity โšก AI Lesson
Telegram Cybercrime is INSANE
John Hammond Intermediate 2y ago
Flipper Zero WiFi Hacking #shorts
Cybersecurity โšก AI Lesson
Flipper Zero WiFi Hacking #shorts
David Bombal Intermediate 2y ago
Strategies of a World-Class SOC | Host: John Hubbard | July 18, 2023
Cybersecurity โšก AI Lesson
Strategies of a World-Class SOC | Host: John Hubbard | July 18, 2023
SANS Institute Intermediate 2y ago
Strategy 11: Turn up the Volume by Expanding SOC Functionality
Cybersecurity โšก AI Lesson
Strategy 11: Turn up the Volume by Expanding SOC Functionality
SANS Institute Intermediate 2y ago
Insider Risk & Generative AI
Cybersecurity โšก AI Lesson
Insider Risk & Generative AI
SANS Institute Intermediate 2y ago
Preserving Creativity and the Ethical Implications of AI Art Generators
Cybersecurity โšก AI Lesson
Preserving Creativity and the Ethical Implications of AI Art Generators
SANS Institute Intermediate 2y ago
Navigating the Impact of Emerging Tech on Education: A Teen's Perspective on AI and Cybersecurity
Cybersecurity โšก AI Lesson
Navigating the Impact of Emerging Tech on Education: A Teen's Perspective on AI and Cybersecurity
SANS Institute Intermediate 2y ago
AI and Its Impact on Cybersecurity
Cybersecurity โšก AI Lesson
AI and Its Impact on Cybersecurity
SANS Institute Intermediate 2y ago
New to Cyber: AI-Powered Careers
Cybersecurity โšก AI Lesson
New to Cyber: AI-Powered Careers
SANS Institute Intermediate 2y ago
Addressing Practical and Ethical Issues in AI-Assisted Threat Intelligence Analysis
Cybersecurity โšก AI Lesson
Addressing Practical and Ethical Issues in AI-Assisted Threat Intelligence Analysis
SANS Institute Intermediate 2y ago
Mass Digital Forensics & Incident Response with Velociraptor
Cybersecurity โšก AI Lesson
Mass Digital Forensics & Incident Response with Velociraptor
John Hammond Intermediate 2y ago
He made millions (illegally) hacking online poker
Cybersecurity โšก AI Lesson
He made millions (illegally) hacking online poker
Jack Rhysider Intermediate 2y ago
Strategy 10: Measure Performance to Improve Performance
Cybersecurity โšก AI Lesson
Strategy 10: Measure Performance to Improve Performance
SANS Institute Intermediate 2y ago
Strategy 9: Communicate Clearly, Collaborate Often, Share Generously
Cybersecurity โšก AI Lesson
Strategy 9: Communicate Clearly, Collaborate Often, Share Generously
SANS Institute Intermediate 2y ago
Keynote | Demonstrating CISO ROI with the C-Suite
Cybersecurity โšก AI Lesson
Keynote | Demonstrating CISO ROI with the C-Suite
SANS Institute Intermediate 2y ago
Panel | The Intersection of Cybersecurity and Law
Cybersecurity โšก AI Lesson
Panel | The Intersection of Cybersecurity and Law
SANS Institute Intermediate 2y ago
Leading High Performing Teams During Lean Times
Cybersecurity โšก AI Lesson
Leading High Performing Teams During Lean Times
SANS Institute Intermediate 2y ago
How Hackers Use netsh.exe For Persistence & Code Execution (Sliver C2)
Cybersecurity โšก AI Lesson
How Hackers Use netsh.exe For Persistence & Code Execution (Sliver C2)
John Hammond Intermediate 2y ago
๐Ÿ“š Coursera Courses Opens on Coursera ยท Free to audit
1 / 3 View all โ†’
Web Application Security Testing with Google Hacking
๐Ÿ“š Coursera Course โ†—
Self-paced
Web Application Security Testing with Google Hacking
Opens on Coursera โ†—
SC-200 Microsoft Security Operations Analyst
๐Ÿ“š Coursera Course โ†—
Self-paced
SC-200 Microsoft Security Operations Analyst
Opens on Coursera โ†—
Advanced Networking, Virtualization, and IT Security
๐Ÿ“š Coursera Course โ†—
Self-paced
Advanced Networking, Virtualization, and IT Security
Opens on Coursera โ†—
Cybersecurity for Tech Professionals
๐Ÿ“š Coursera Course โ†—
Self-paced
Cybersecurity for Tech Professionals
Opens on Coursera โ†—
Proactive Computer Security
๐Ÿ“š Coursera Course โ†—
Self-paced
Proactive Computer Security
Opens on Coursera โ†—
Game Development and Prototyping
๐Ÿ“š Coursera Course โ†—
Self-paced
Game Development and Prototyping
Opens on Coursera โ†—