Tech Skills

Cybersecurity

Ethical hacking, penetration testing, network security, CTFs and defensive security

7,044
lessons
Skills in this topic
View full skill map โ†’
Security Basics
beginner
Fix OWASP top 10 vulnerabilities
AI Security
intermediate
Identify and patch prompt injection vulnerabilities
Network Security
intermediate
Configure a firewall with proper inbound/outbound rules
Ethical Hacking & Pen Testing
intermediate
Conduct a full pen test with Kali Linux
Cloud Security
intermediate
Implement IAM least-privilege policies on AWS/GCP
Incident Response
intermediate
Build an incident response playbook
Security Compliance
intermediate
Map controls for SOC 2 Type II compliance
Defensive AI
advanced
Build an AI-powered log anomaly detector
BlockChain,Cloud,Devops,Data Science, Big Data, Cybersecurity- Which Technology To Select?๐Ÿ˜ฐ๐Ÿ˜ฐ๐Ÿ˜ฐ๐Ÿ˜ฐ๐Ÿ˜ฐ
Cybersecurity
BlockChain,Cloud,Devops,Data Science, Big Data, Cybersecurity- Which Technology To Select?๐Ÿ˜ฐ๐Ÿ˜ฐ๐Ÿ˜ฐ๐Ÿ˜ฐ๐Ÿ˜ฐ
Krish Naik Intermediate 4y ago
Redis in 100 Seconds
Cybersecurity โšก AI Lesson
Redis in 100 Seconds
Fireship Intermediate 4y ago
HackTheBox Beep Walkthrough - LFI Exploitation
Cybersecurity โšก AI Lesson
HackTheBox Beep Walkthrough - LFI Exploitation
HackerSploit Intermediate 4y ago
Studying Cybersecurity in USA vs. Germany | ReHacked
Cybersecurity
Studying Cybersecurity in USA vs. Germany | ReHacked
LiveUnderflow Intermediate 4y ago
HackTheBox - ScriptKiddie
Cybersecurity โšก AI Lesson
HackTheBox - ScriptKiddie
IppSec Intermediate 4y ago
PowerPoint Phishing Malware Analysis - HackTheBox Cyber Apocalypse CTF
Cybersecurity โšก AI Lesson
PowerPoint Phishing Malware Analysis - HackTheBox Cyber Apocalypse CTF
John Hammond Intermediate 4y ago
Data Visualization: Bridging the Gap Between Users and Information
Cybersecurity
Data Visualization: Bridging the Gap Between Users and Information
Microsoft Research Intermediate 4y ago
Phishing Document "Invitation" - HackTheBox Cyber Apocalypse CTF
Cybersecurity
Phishing Document "Invitation" - HackTheBox Cyber Apocalypse CTF
John Hammond Intermediate 4y ago
TryHackMe - Vulnversity Walkthrough
Cybersecurity โšก AI Lesson
TryHackMe - Vulnversity Walkthrough
HackerSploit Intermediate 4y ago
The 1% rule
Cybersecurity
The 1% rule
David Bombal Intermediate 5y ago
Network Myths: TCP/IP
Cybersecurity
Network Myths: TCP/IP
David Bombal Intermediate 5y ago
Josh Johnson: PowerShell and Defensive Automation for the Blue Team
Cybersecurity โšก AI Lesson
Josh Johnson: PowerShell and Defensive Automation for the Blue Team
SANS Institute Intermediate 5y ago
Live Office Hours for Entrepreneurs (AMA)
Cybersecurity โšก AI Lesson
Live Office Hours for Entrepreneurs (AMA)
Noah Kagan Raw Intermediate 5y ago
Russell Kane: How To Build Confidence & Stay Young | E79
Cybersecurity โšก AI Lesson
Russell Kane: How To Build Confidence & Stay Young | E79
The Diary Of A CEO Intermediate 5y ago
Live Office Hours for Entrepreneurs (AMA)
Cybersecurity
Live Office Hours for Entrepreneurs (AMA)
Noah Kagan Raw Intermediate 5y ago
Mick Douglas & Flynn Weeks: Simplifying your Logging Strategy with the What2Log Project
Cybersecurity โšก AI Lesson
Mick Douglas & Flynn Weeks: Simplifying your Logging Strategy with the What2Log Project
SANS Institute Intermediate 5y ago
Ethical Hacking in 100 Seconds // And why do we need CORS?
Cybersecurity
Ethical Hacking in 100 Seconds // And why do we need CORS?
Fireship Intermediate 5y ago
HackTheBox - Laboratory
Cybersecurity โšก AI Lesson
HackTheBox - Laboratory
IppSec Intermediate 5y ago
Securing Backend Applications (OWASP recommendations)
Cybersecurity
Securing Backend Applications (OWASP recommendations)
Hussein Nasser Intermediate 5y ago
This is why we can't have nice things
Cybersecurity โšก AI Lesson
This is why we can't have nice things
Veritasium Intermediate 5y ago
Okta series by TNS - How a Security-Minded Culture Can Change Bad Habits
Cybersecurity โšก AI Lesson
Okta series by TNS - How a Security-Minded Culture Can Change Bad Habits
The New Stack Intermediate 5y ago
Live Virtual Mock Interview For Data Science Role
Cybersecurity
Live Virtual Mock Interview For Data Science Role
Krish Naik Intermediate 5y ago
Prime Numbers & RSA Encryption Algorithm - Computerphile
Cybersecurity โšก AI Lesson
Prime Numbers & RSA Encryption Algorithm - Computerphile
Computerphile Intermediate 5y ago
Touchless interfaces for gaming and kiosks - Made with TensorFlow.js
Cybersecurity โšก AI Lesson
Touchless interfaces for gaming and kiosks - Made with TensorFlow.js
TensorFlow Intermediate 5y ago
Nodejs Nunjucks Template Injection - HackTheBox Cyber Apocalypse CTF
Cybersecurity
Nodejs Nunjucks Template Injection - HackTheBox Cyber Apocalypse CTF
John Hammond Intermediate 4y ago
Blind MongoDB NoSQL Injection - HackTheBox Cyber Apocalypse CTF
Cybersecurity
Blind MongoDB NoSQL Injection - HackTheBox Cyber Apocalypse CTF
John Hammond Intermediate 5y ago
VulnOS V2 - VulnHub Walkthrough - Boot-To-Root
Cybersecurity โšก AI Lesson
VulnOS V2 - VulnHub Walkthrough - Boot-To-Root
HackerSploit Intermediate 5y ago
Anonymize Your Traffic With Proxychains & Tor
Cybersecurity โšก AI Lesson
Anonymize Your Traffic With Proxychains & Tor
HackerSploit Intermediate 5y ago
PwnLab VulnHub Walkthrough - Boot-To-Root
Cybersecurity โšก AI Lesson
PwnLab VulnHub Walkthrough - Boot-To-Root
HackerSploit Intermediate 5y ago
SQL Injection
Cybersecurity
SQL Injection
David Bombal Intermediate 5y ago
Live Office Hours for Entrepreneurs (AMA)
Cybersecurity โšก AI Lesson
Live Office Hours for Entrepreneurs (AMA)
Noah Kagan Raw Intermediate 5y ago
HTA JScript to PowerShell - Novter Malware Analysis
Cybersecurity
HTA JScript to PowerShell - Novter Malware Analysis
John Hammond Intermediate 5y ago
TryHackMe - OSCP Voucher GIVEAWAY & Presentation
Cybersecurity
TryHackMe - OSCP Voucher GIVEAWAY & Presentation
John Hammond Intermediate 5y ago
Live Office Hours for Entrepreneurs w/ Neville Medhora
Cybersecurity โšก AI Lesson
Live Office Hours for Entrepreneurs w/ Neville Medhora
Noah Kagan Raw Intermediate 5y ago
Rob van Os: Maturing your Cyber Defense
Cybersecurity โšก AI Lesson
Rob van Os: Maturing your Cyber Defense
SANS Institute Intermediate 5y ago
$2 MILLION DOLLARS STOLEN in Bitcoin/Ethereum - JScript Malware Analysis
Cybersecurity
$2 MILLION DOLLARS STOLEN in Bitcoin/Ethereum - JScript Malware Analysis
John Hammond Intermediate 5y ago
SOC Metrics: Measuring Success and Preventing Burnout
Cybersecurity โšก AI Lesson
SOC Metrics: Measuring Success and Preventing Burnout
SANS Institute Intermediate 5y ago
Your path to success || Network Engineer in 2021
Cybersecurity
Your path to success || Network Engineer in 2021
David Bombal Intermediate 5y ago
SANS Institute Stay Sharp Training
Cybersecurity โšก AI Lesson
SANS Institute Stay Sharp Training
SANS Institute Intermediate 5y ago
Will they never learn?
Cybersecurity
Will they never learn?
David Bombal Intermediate 5y ago
FAKE Antivirus? Malware Analysis of Decoy 'kaspersky.exe'
Cybersecurity
FAKE Antivirus? Malware Analysis of Decoy 'kaspersky.exe'
John Hammond Intermediate 5y ago
NahamCon is COMING BACK!
Cybersecurity
NahamCon is COMING BACK!
John Hammond Intermediate 5y ago
Is THIS a VIRUS? Finding a Remcos RAT - Malware Analysis
Cybersecurity
Is THIS a VIRUS? Finding a Remcos RAT - Malware Analysis
John Hammond Intermediate 5y ago
MALWARE ANALYSIS - VBScript Decoding & Deobfuscating
Cybersecurity
MALWARE ANALYSIS - VBScript Decoding & Deobfuscating
John Hammond Intermediate 5y ago
The Role Of AI In Cyber Security
Cybersecurity โšก AI Lesson
The Role Of AI In Cyber Security
HackerSploit Intermediate 5y ago
Am I too old to get into Cybersecurity?
Cybersecurity
Am I too old to get into Cybersecurity?
David Bombal Intermediate 5y ago
Top 5 Networking Certs for 2021
Cybersecurity
Top 5 Networking Certs for 2021
David Bombal Intermediate 5y ago
Top 5 programming languages for 2021
Cybersecurity
Top 5 programming languages for 2021
David Bombal Intermediate 5y ago
๐Ÿ“š Coursera Courses Opens on Coursera ยท Free to audit
1 / 3 View all โ†’
AI & Cybersecurity Threats, Global Actors, and Trends
๐Ÿ“š Coursera Course โ†—
Self-paced
AI & Cybersecurity Threats, Global Actors, and Trends
Opens on Coursera โ†—
Practical Cyber Hacking Skills for Beginners
๐Ÿ“š Coursera Course โ†—
Self-paced
Practical Cyber Hacking Skills for Beginners
Opens on Coursera โ†—
Leading Teams Effectively: Skills for Impactful Leadership
๐Ÿ“š Coursera Course โ†—
Self-paced
Leading Teams Effectively: Skills for Impactful Leadership
Opens on Coursera โ†—
Demystifying Oracle Cloud Infrastructure (OCI) Security
๐Ÿ“š Coursera Course โ†—
Self-paced
Demystifying Oracle Cloud Infrastructure (OCI) Security
Opens on Coursera โ†—
Cybersecurity and the Internet of Things
๐Ÿ“š Coursera Course โ†—
Self-paced
Cybersecurity and the Internet of Things
Opens on Coursera โ†—
Secure Mobile, IoT & Secure Applications
๐Ÿ“š Coursera Course โ†—
Self-paced
Secure Mobile, IoT & Secure Applications
Opens on Coursera โ†—