Tech Skills

Cybersecurity

Ethical hacking, penetration testing, network security, CTFs and defensive security

7,044
lessons
Skills in this topic
View full skill map โ†’
Security Basics
beginner
Fix OWASP top 10 vulnerabilities
AI Security
intermediate
Identify and patch prompt injection vulnerabilities
Network Security
intermediate
Configure a firewall with proper inbound/outbound rules
Ethical Hacking & Pen Testing
intermediate
Conduct a full pen test with Kali Linux
Cloud Security
intermediate
Implement IAM least-privilege policies on AWS/GCP
Incident Response
intermediate
Build an incident response playbook
Security Compliance
intermediate
Map controls for SOC 2 Type II compliance
Defensive AI
advanced
Build an AI-powered log anomaly detector
Black Girls Hack Too
Cybersecurity โšก AI Lesson
Black Girls Hack Too
SANS Institute Intermediate 4y ago
Windows Privilege Escalation - Token Impersonation With RoguePotato & PrintSpoofer
Cybersecurity โšก AI Lesson
Windows Privilege Escalation - Token Impersonation With RoguePotato & PrintSpoofer
HackerSploit Intermediate 4y ago
Linux Defense Evasion - Apache2 Rootkit
Cybersecurity โšก AI Lesson
Linux Defense Evasion - Apache2 Rootkit
HackerSploit Intermediate 4y ago
This lets you create complex applications on the web๐Ÿ‘ฉโ€๐Ÿ’ป #technology #programming #webdev #software
Cybersecurity
This lets you create complex applications on the web๐Ÿ‘ฉโ€๐Ÿ’ป #technology #programming #webdev #software
Coding with Lewis Intermediate 4y ago
What happens if you hack 4.5 billion BTC? // The Code Report
Cybersecurity
What happens if you hack 4.5 billion BTC? // The Code Report
Fireship Intermediate 4y ago
how to NOT be a hacking noob in 2022 // ft. John Hammond
Cybersecurity โšก AI Lesson
how to NOT be a hacking noob in 2022 // ft. John Hammond
NetworkChuck (2) Intermediate 4y ago
how to NOT be a hacking noob in 2022 // ft. John Hammond
Cybersecurity โšก AI Lesson
how to NOT be a hacking noob in 2022 // ft. John Hammond
NetworkChuck Intermediate 4y ago
SOC 2 TSCs
Cybersecurity โšก AI Lesson
SOC 2 TSCs
SANS Institute Intermediate 4y ago
How to get a Million YouTube Subscribers in 100 Seconds
Cybersecurity
How to get a Million YouTube Subscribers in 100 Seconds
Fireship Intermediate 4y ago
Don't Use innerHTML Unless You Want To Be Hacked
Cybersecurity
Don't Use innerHTML Unless You Want To Be Hacked
Web Dev Simplified Intermediate 4y ago
How I Deepfaked VTuber Gawr Gura with AI
Cybersecurity
How I Deepfaked VTuber Gawr Gura with AI
bycloud Intermediate 4y ago
Implementing Security Best Practices for Amazon WorkSpaces and Amazon AppStream 2.0
Cybersecurity
Implementing Security Best Practices for Amazon WorkSpaces and Amazon AppStream 2.0
AWS Developers Intermediate 4y ago
How To Crack ZIP & RAR Files With Hashcat
Cybersecurity โšก AI Lesson
How To Crack ZIP & RAR Files With Hashcat
HackerSploit Intermediate 4y ago
Web App Pentesting - Setting Up OWASP bWAPP With Docker
Cybersecurity โšก AI Lesson
Web App Pentesting - Setting Up OWASP bWAPP With Docker
HackerSploit Intermediate 4y ago
Windows Privilege Escalation - Exploiting Insecure GUI Apps
Cybersecurity โšก AI Lesson
Windows Privilege Escalation - Exploiting Insecure GUI Apps
HackerSploit Intermediate 4y ago
Windows Privilege Escalation - Exploiting Scheduled Tasks
Cybersecurity โšก AI Lesson
Windows Privilege Escalation - Exploiting Scheduled Tasks
HackerSploit Intermediate 4y ago
Hacker Simulator Walkthrough - Episode 5 - Almost Getting Jailed
Cybersecurity โšก AI Lesson
Hacker Simulator Walkthrough - Episode 5 - Almost Getting Jailed
HackerSploit Intermediate 4y ago
HEK.SI 2022 - Bypassing UAC With UACMe
Cybersecurity โšก AI Lesson
HEK.SI 2022 - Bypassing UAC With UACMe
HackerSploit Intermediate 4y ago
EternalBlue - MS17-010 - Manual Exploitation
Cybersecurity โšก AI Lesson
EternalBlue - MS17-010 - Manual Exploitation
HackerSploit Intermediate 4y ago
Windows Post Exploitation - Dumping & Cracking NTLM Hashes
Cybersecurity โšก AI Lesson
Windows Post Exploitation - Dumping & Cracking NTLM Hashes
HackerSploit Intermediate 4y ago
Windows Privilege Escalation - Using Stored Credentials
Cybersecurity โšก AI Lesson
Windows Privilege Escalation - Using Stored Credentials
HackerSploit Intermediate 4y ago
Hacker Simulator Walkthrough - Episode 4 - Joining CloudSec!
Cybersecurity โšก AI Lesson
Hacker Simulator Walkthrough - Episode 4 - Joining CloudSec!
HackerSploit Intermediate 4y ago
Windows Privilege Escalation - Searching For Passwords In Windows Registry
Cybersecurity โšก AI Lesson
Windows Privilege Escalation - Searching For Passwords In Windows Registry
HackerSploit Intermediate 4y ago
Windows Privilege Escalation - Exploiting AlwaysInstallElevated
Cybersecurity โšก AI Lesson
Windows Privilege Escalation - Exploiting AlwaysInstallElevated
HackerSploit Intermediate 4y ago
Windows Privilege Escalation - Exploiting AutoRun Programs
Cybersecurity โšก AI Lesson
Windows Privilege Escalation - Exploiting AutoRun Programs
HackerSploit Intermediate 4y ago
Retrospectiva Cyber 2021 - Painel Principal como Presidente do Painel Rob T. Lee
Cybersecurity โšก AI Lesson
Retrospectiva Cyber 2021 - Painel Principal como Presidente do Painel Rob T. Lee
SANS Institute Intermediate 4y ago
Revisiting Parrot OS
Cybersecurity โšก AI Lesson
Revisiting Parrot OS
HackerSploit Intermediate 4y ago
Hacker Simulator Walkthrough - Episode 3 - Phi$hing Frenzy!
Cybersecurity โšก AI Lesson
Hacker Simulator Walkthrough - Episode 3 - Phi$hing Frenzy!
HackerSploit Intermediate 4y ago
Windows Privilege Escalation - Insecure Service Executables
Cybersecurity โšก AI Lesson
Windows Privilege Escalation - Insecure Service Executables
HackerSploit Intermediate 4y ago
Hacker Simulator Walkthrough - Episode 2 - Leveling Up
Cybersecurity โšก AI Lesson
Hacker Simulator Walkthrough - Episode 2 - Leveling Up
HackerSploit Intermediate 4y ago
Hacker Simulator Walkthrough - Episode 1 - The Journey Begins
Cybersecurity โšก AI Lesson
Hacker Simulator Walkthrough - Episode 1 - The Journey Begins
HackerSploit Intermediate 4y ago
Windows Privilege Escalation - Weak Registry Permissions
Cybersecurity โšก AI Lesson
Windows Privilege Escalation - Weak Registry Permissions
HackerSploit Intermediate 4y ago
Windows Privilege Escalation - Unquoted Service Paths
Cybersecurity โšก AI Lesson
Windows Privilege Escalation - Unquoted Service Paths
HackerSploit Intermediate 4y ago
Windows Privilege Escalation - Exploiting Insecure Service Permissions
Cybersecurity โšก AI Lesson
Windows Privilege Escalation - Exploiting Insecure Service Permissions
HackerSploit Intermediate 4y ago
Windows Enumeration With winPEAS
Cybersecurity โšก AI Lesson
Windows Enumeration With winPEAS
HackerSploit Intermediate 4y ago
What do you need to know about the log4j (Log4Shell) vulnerability?
Cybersecurity โšก AI Lesson
What do you need to know about the log4j (Log4Shell) vulnerability?
SANS Institute Intermediate 4y ago
What Keeps You Up At Night?
Cybersecurity โšก AI Lesson
What Keeps You Up At Night?
SANS Institute Intermediate 4y ago
Windows Post Exploitation - Persistence With Metasploit
Cybersecurity โšก AI Lesson
Windows Post Exploitation - Persistence With Metasploit
HackerSploit Intermediate 4y ago
Active Directory Enumeration With Server Manager
Cybersecurity โšก AI Lesson
Active Directory Enumeration With Server Manager
HackerSploit Intermediate 4y ago
Cybersecurity Career Roadmap
Cybersecurity โšก AI Lesson
Cybersecurity Career Roadmap
HackerSploit Intermediate 4y ago
Application Security: Web Apps, APIs & Microservices | #Replay
Cybersecurity โšก AI Lesson
Application Security: Web Apps, APIs & Microservices | #Replay
SANS Institute Intermediate 4y ago
Windows Red Team Credential Access Techniques | Mimikatz & WCE
Cybersecurity โšก AI Lesson
Windows Red Team Credential Access Techniques | Mimikatz & WCE
HackerSploit Intermediate 4y ago
Cleaning Up Our Cyber Hygiene
Cybersecurity โšก AI Lesson
Cleaning Up Our Cyber Hygiene
SANS Institute Intermediate 4y ago
What Keeps You Up At Night?
Cybersecurity โšก AI Lesson
What Keeps You Up At Night?
SANS Institute Intermediate 4y ago
Linux Red Team Exploitation Techniques | Exploiting WordPress & MySQL
Cybersecurity โšก AI Lesson
Linux Red Team Exploitation Techniques | Exploiting WordPress & MySQL
HackerSploit Intermediate 4y ago
Windows Red Team Exploitation Techniques | Luckystrike & PowerShell Empire
Cybersecurity โšก AI Lesson
Windows Red Team Exploitation Techniques | Luckystrike & PowerShell Empire
HackerSploit Intermediate 4y ago
Red Team Reconnaissance Techniques
Cybersecurity โšก AI Lesson
Red Team Reconnaissance Techniques
HackerSploit Intermediate 4y ago
Red Team Adversary Emulation With Caldera
Cybersecurity โšก AI Lesson
Red Team Adversary Emulation With Caldera
HackerSploit Intermediate 4y ago
๐Ÿ“š Coursera Courses Opens on Coursera ยท Free to audit
1 / 3 View all โ†’
CISSP Domain 6: Security Assessment and Testing
๐Ÿ“š Coursera Course โ†—
Self-paced
CISSP Domain 6: Security Assessment and Testing
Opens on Coursera โ†—
Network and Communications Security
๐Ÿ“š Coursera Course โ†—
Self-paced
Network and Communications Security
Opens on Coursera โ†—
Seguranรงa de TI: Defesa Contra as Artes Obscuras do Mundo Digital
๐Ÿ“š Coursera Course โ†—
Self-paced
Seguranรงa de TI: Defesa Contra as Artes Obscuras do Mundo Digital
Opens on Coursera โ†—
Penetration Testing, Threat Hunting, and Cryptography
๐Ÿ“š Coursera Course โ†—
Self-paced
Penetration Testing, Threat Hunting, and Cryptography
Opens on Coursera โ†—
Endpoints and Systems
๐Ÿ“š Coursera Course โ†—
Self-paced
Endpoints and Systems
Opens on Coursera โ†—
Marketing Management Essentials:The Marketing Plan Structure
๐Ÿ“š Coursera Course โ†—
Self-paced
Marketing Management Essentials:The Marketing Plan Structure
Opens on Coursera โ†—