Tech Skills

Cybersecurity

Ethical hacking, penetration testing, network security, CTFs and defensive security

7,042
lessons
Skills in this topic
View full skill map →
Security Basics
beginner
Fix OWASP top 10 vulnerabilities
AI Security
intermediate
Identify and patch prompt injection vulnerabilities
Network Security
intermediate
Configure a firewall with proper inbound/outbound rules
Ethical Hacking & Pen Testing
intermediate
Conduct a full pen test with Kali Linux
Cloud Security
intermediate
Implement IAM least-privilege policies on AWS/GCP
Incident Response
intermediate
Build an incident response playbook
Security Compliance
intermediate
Map controls for SOC 2 Type II compliance
Defensive AI
advanced
Build an AI-powered log anomaly detector
Scale Your Cloud Infrastructure (Hosting CTFs)
Cybersecurity
Scale Your Cloud Infrastructure (Hosting CTFs)
John Hammond Intermediate 2y ago
Strategy 8: Leverage Tools and Support Analyst Workflow
Cybersecurity ⚡ AI Lesson
Strategy 8: Leverage Tools and Support Analyst Workflow
SANS Institute Intermediate 2y ago
$540 million of crypto was stolen through an unlikely loophole: LinkedIn
Cybersecurity
$540 million of crypto was stolen through an unlikely loophole: LinkedIn
Jack Rhysider Intermediate 2y ago
How does the PNPT compare to other Pentest Certifications?  #PNPT #pentester #pentesting
Cybersecurity ⚡ AI Lesson
How does the PNPT compare to other Pentest Certifications? #PNPT #pentester #pentesting
The Cyber Mentor Intermediate 2y ago
Blueprint Live at the SANS Blue Team Summit 2023
Cybersecurity ⚡ AI Lesson
Blueprint Live at the SANS Blue Team Summit 2023
SANS Institute Intermediate 2y ago
Take Charge of Your Indexability: How to Optimize Your Technical Work [MozCon 2021] — Areej AbuAli
Cybersecurity
Take Charge of Your Indexability: How to Optimize Your Technical Work [MozCon 2021] — Areej AbuAli
Moz Intermediate 2y ago
How Hackers Evade Program Allowlists with DLLs
Cybersecurity
How Hackers Evade Program Allowlists with DLLs
John Hammond Intermediate 2y ago
Cybersecurity Live - CS50 #Reels
Cybersecurity
Cybersecurity Live - CS50 #Reels
CS50 Intermediate 2y ago
I got Pwned ... and so did you! (you're likely in the 12 Billion)
Cybersecurity ⚡ AI Lesson
I got Pwned ... and so did you! (you're likely in the 12 Billion)
David Bombal Intermediate 2y ago
Three ways to level up your Windows Privilege Escalation skills #windows  #privesc #techtok #infosec
Cybersecurity ⚡ AI Lesson
Three ways to level up your Windows Privilege Escalation skills #windows #privesc #techtok #infosec
The Cyber Mentor Intermediate 2y ago
AI Voice Scams are on the RISE!
Cybersecurity
AI Voice Scams are on the RISE!
1littlecoder Intermediate 3y ago
Who Is Hacking the World's Best Online Poker Players?🎙Darknet Diaries Ep. 74: Mikko
Cybersecurity
Who Is Hacking the World's Best Online Poker Players?🎙Darknet Diaries Ep. 74: Mikko
Jack Rhysider Intermediate 3y ago
3 HACKING gadgets you have to TRY!!
Cybersecurity ⚡ AI Lesson
3 HACKING gadgets you have to TRY!!
NetworkChuck Intermediate 3y ago
Strategy 7: Select and Collect the Right Data
Cybersecurity ⚡ AI Lesson
Strategy 7: Select and Collect the Right Data
SANS Institute Intermediate 2y ago
Locking It Down: Best Practices for Strong Passwords and Authentication Tools.
Cybersecurity ⚡ AI Lesson
Locking It Down: Best Practices for Strong Passwords and Authentication Tools.
SANS Institute Intermediate 2y ago
Strategy 6: Illuminate Adversaries with Cyber Threat Intelligence
Cybersecurity ⚡ AI Lesson
Strategy 6: Illuminate Adversaries with Cyber Threat Intelligence
SANS Institute Intermediate 2y ago
Strategy 5: Prioritize Incident Response
Cybersecurity ⚡ AI Lesson
Strategy 5: Prioritize Incident Response
SANS Institute Intermediate 2y ago
Rapid Windows Memory Analysis with Volatility 3
Cybersecurity
Rapid Windows Memory Analysis with Volatility 3
John Hammond Intermediate 2y ago
Exploring the Latest Dark Web Onion Sites
Cybersecurity
Exploring the Latest Dark Web Onion Sites
John Hammond Intermediate 2y ago
Strategy 4: Hire AND Grow Quality Staff
Cybersecurity ⚡ AI Lesson
Strategy 4: Hire AND Grow Quality Staff
SANS Institute Intermediate 2y ago
Experience a Real Pentest with the PNPT Exam #pentesting  #ethicalhacking   #pnpt
Cybersecurity ⚡ AI Lesson
Experience a Real Pentest with the PNPT Exam #pentesting #ethicalhacking #pnpt
The Cyber Mentor Intermediate 2y ago
Keynote | Neurodivergent Associates are an Asset: A CISO’s Perspective on Retention and Inclusion
Cybersecurity ⚡ AI Lesson
Keynote | Neurodivergent Associates are an Asset: A CISO’s Perspective on Retention and Inclusion
SANS Institute Intermediate 2y ago
Opening Keynote | Investing in Neurodiversity
Cybersecurity ⚡ AI Lesson
Opening Keynote | Investing in Neurodiversity
SANS Institute Intermediate 2y ago
Strategy 3: Build a SOC Structure to Match Your Organizational Needs
Cybersecurity ⚡ AI Lesson
Strategy 3: Build a SOC Structure to Match Your Organizational Needs
SANS Institute Intermediate 2y ago
Here's a quick look at a path to becoming a webapp pentester! #webapp #pentesting #cybersecurity
Cybersecurity ⚡ AI Lesson
Here's a quick look at a path to becoming a webapp pentester! #webapp #pentesting #cybersecurity
The Cyber Mentor Intermediate 3y ago
Strategy 2: Give the SOC the Authority to Do Its Job
Cybersecurity ⚡ AI Lesson
Strategy 2: Give the SOC the Authority to Do Its Job
SANS Institute Intermediate 3y ago
Are you getting ready for Summer? So are hackers! #passwordchange  #ethicalhacking #cybersecurity
Cybersecurity ⚡ AI Lesson
Are you getting ready for Summer? So are hackers! #passwordchange #ethicalhacking #cybersecurity
The Cyber Mentor Intermediate 3y ago
L2CODE like a hacker #programming #python #rust #cybersecurity
Cybersecurity ⚡ AI Lesson
L2CODE like a hacker #programming #python #rust #cybersecurity
The Cyber Mentor Intermediate 3y ago
Hide a Hacker's Reverse Shell in ONE Command
Cybersecurity ⚡ AI Lesson
Hide a Hacker's Reverse Shell in ONE Command
John Hammond Intermediate 3y ago
Dangerous Code in Seconds: Eval the evil #webapp  #infosec  #cybersecurity  #ethicalhacking
Cybersecurity ⚡ AI Lesson
Dangerous Code in Seconds: Eval the evil #webapp #infosec #cybersecurity #ethicalhacking
The Cyber Mentor Intermediate 3y ago
SANS Neurodiversity in Cybersecurity Summit 2023 Graphic Illustrations
Cybersecurity ⚡ AI Lesson
SANS Neurodiversity in Cybersecurity Summit 2023 Graphic Illustrations
SANS Institute Intermediate 3y ago
NICE Career: Discovering Career Pathways
Cybersecurity ⚡ AI Lesson
NICE Career: Discovering Career Pathways
SANS Institute Intermediate 3y ago
Cybersecurity Role Finder: Navigating Your Personal Path into Cybersecurity Careers
Cybersecurity ⚡ AI Lesson
Cybersecurity Role Finder: Navigating Your Personal Path into Cybersecurity Careers
SANS Institute Intermediate 3y ago
Going the Distance: Lessons from The Last Mile Education Fund
Cybersecurity ⚡ AI Lesson
Going the Distance: Lessons from The Last Mile Education Fund
SANS Institute Intermediate 3y ago
Hacking Complex Passwords with Rules & Munging
Cybersecurity ⚡ AI Lesson
Hacking Complex Passwords with Rules & Munging
John Hammond Intermediate 3y ago
Strategy 1: Know What You Are Protecting and Why
Cybersecurity ⚡ AI Lesson
Strategy 1: Know What You Are Protecting and Why
SANS Institute Intermediate 3y ago
Living Off The Land - Windows Disk Cleaner Persistence
Cybersecurity
Living Off The Land - Windows Disk Cleaner Persistence
John Hammond Intermediate 3y ago
Get Ready, A Very Special Season 4 Is On the Way!
Cybersecurity ⚡ AI Lesson
Get Ready, A Very Special Season 4 Is On the Way!
SANS Institute Intermediate 3y ago
How To Test Your Security with Atomic Red Team
Cybersecurity ⚡ AI Lesson
How To Test Your Security with Atomic Red Team
John Hammond Intermediate 3y ago
winget: Install ROGUE Software & Packages?
Cybersecurity ⚡ AI Lesson
winget: Install ROGUE Software & Packages?
John Hammond Intermediate 3y ago
Kubernetes Hacking: From Weak Applications to Cluster Control
Cybersecurity ⚡ AI Lesson
Kubernetes Hacking: From Weak Applications to Cluster Control
John Hammond Intermediate 3y ago
Python Pwntools Hacking: ret2libc GOT & PLT
Cybersecurity
Python Pwntools Hacking: ret2libc GOT & PLT
John Hammond Intermediate 3y ago
Password Hacking in Kali Linux
Cybersecurity ⚡ AI Lesson
Password Hacking in Kali Linux
John Hammond Intermediate 3y ago
When You Can't Breach the Network, Hack the Humans🎙Darknet Diaries Ep. 69: Human Hacker
Cybersecurity
When You Can't Breach the Network, Hack the Humans🎙Darknet Diaries Ep. 69: Human Hacker
Jack Rhysider Intermediate 3y ago
Hackers Bypass Google Two-Factor Authentication (2FA) SMS
Cybersecurity ⚡ AI Lesson
Hackers Bypass Google Two-Factor Authentication (2FA) SMS
John Hammond Intermediate 3y ago
Mom Hacked a Prison With a Clipboard & USB Stick🎙Darknet Diaries Ep. 67: The Big House
Cybersecurity
Mom Hacked a Prison With a Clipboard & USB Stick🎙Darknet Diaries Ep. 67: The Big House
Jack Rhysider Intermediate 3y ago
Hacking CI/CD (Basic Pipeline Poisoning)
Cybersecurity
Hacking CI/CD (Basic Pipeline Poisoning)
John Hammond Intermediate 3y ago
"I rob banks for a living," but it's all totally legal🎙Darknet Diaries Ep. 66: Freakyclown
Cybersecurity
"I rob banks for a living," but it's all totally legal🎙Darknet Diaries Ep. 66: Freakyclown
Jack Rhysider Intermediate 3y ago
📚 Coursera Courses Opens on Coursera · Free to audit
1 / 3 View all →
Routing, Network Devices, and Security
📚 Coursera Course ↗
Self-paced
Routing, Network Devices, and Security
Opens on Coursera ↗
 An Employee's Guide to Cybersecurity
📚 Coursera Course ↗
Self-paced
An Employee's Guide to Cybersecurity
Opens on Coursera ↗
Protege GKE con Cloud Next Generation Firewall
📚 Coursera Course ↗
Self-paced
Protege GKE con Cloud Next Generation Firewall
Opens on Coursera ↗
Managing Information System Security Architecture
📚 Coursera Course ↗
Self-paced
Managing Information System Security Architecture
Opens on Coursera ↗
Incident Response and Risk Management
📚 Coursera Course ↗
Self-paced
Incident Response and Risk Management
Opens on Coursera ↗
Ethical Hacking
📚 Coursera Course ↗
Self-paced
Ethical Hacking
Opens on Coursera ↗