Tech Skills

Cybersecurity

Ethical hacking, penetration testing, network security, CTFs and defensive security

7,045
lessons
Skills in this topic
View full skill map →
Security Basics
beginner
Fix OWASP top 10 vulnerabilities
AI Security
intermediate
Identify and patch prompt injection vulnerabilities
Network Security
intermediate
Configure a firewall with proper inbound/outbound rules
Ethical Hacking & Pen Testing
intermediate
Conduct a full pen test with Kali Linux
Cloud Security
intermediate
Implement IAM least-privilege policies on AWS/GCP
Incident Response
intermediate
Build an incident response playbook
Security Compliance
intermediate
Map controls for SOC 2 Type II compliance
Defensive AI
advanced
Build an AI-powered log anomaly detector
Nmap - TCP Connect & Stealth (SYN) Scanning
Cybersecurity ⚡ AI Lesson
Nmap - TCP Connect & Stealth (SYN) Scanning
HackerSploit Intermediate 5y ago
Nmap - OS And Service Version Scanning
Cybersecurity ⚡ AI Lesson
Nmap - OS And Service Version Scanning
HackerSploit Intermediate 5y ago
Free CCNP 350-401 ENCOR Complete Course: 6.4: REST APIs Part 6
Cybersecurity
Free CCNP 350-401 ENCOR Complete Course: 6.4: REST APIs Part 6
David Bombal Intermediate 5y ago
Free CCNP 350-401 ENCOR Complete Course: 6.4: REST APIs Part 5
Cybersecurity
Free CCNP 350-401 ENCOR Complete Course: 6.4: REST APIs Part 5
David Bombal Intermediate 5y ago
Moving Past Just Googling It: Harvesting and Using OSINT | SANS@MIC Talk
Cybersecurity
Moving Past Just Googling It: Harvesting and Using OSINT | SANS@MIC Talk
SANS Institute Intermediate 6y ago
Running CTFs with Docker (VirSecCon CTF Recap)
Cybersecurity ⚡ AI Lesson
Running CTFs with Docker (VirSecCon CTF Recap)
John Hammond Intermediate 6y ago
TryHackMe! Buffer Overflow & Penetration Testing
Cybersecurity
TryHackMe! Buffer Overflow & Penetration Testing
John Hammond Intermediate 6y ago
Incident Response in ICS in times of Lockdown | SANS@MIC Talk
Cybersecurity ⚡ AI Lesson
Incident Response in ICS in times of Lockdown | SANS@MIC Talk
SANS Institute Intermediate 6y ago
Why MissingNo Multiplies Items!
Cybersecurity ⚡ AI Lesson
Why MissingNo Multiplies Items!
LiveOverflow Intermediate 6y ago
BUILDING AN 8-BIT COMPUTER FROM SCRATCH #4 (Full Stream)
Cybersecurity
BUILDING AN 8-BIT COMPUTER FROM SCRATCH #4 (Full Stream)
LiveUnderflow Intermediate 6y ago
BUILDING AN 8-BIT COMPUTER FROM SCRATCH #3 (Full Stream)
Cybersecurity
BUILDING AN 8-BIT COMPUTER FROM SCRATCH #3 (Full Stream)
LiveUnderflow Intermediate 6y ago
run Linux on Windows Docker containers!!
Cybersecurity ⚡ AI Lesson
run Linux on Windows Docker containers!!
NetworkChuck Intermediate 6y ago
VPN & Remote Working - Computerphile
Cybersecurity ⚡ AI Lesson
VPN & Remote Working - Computerphile
Computerphile Intermediate 6y ago
Becoming a more effective and impactful leader | Women Transforming Leadership Programme
Cybersecurity
Becoming a more effective and impactful leader | Women Transforming Leadership Programme
Saïd Business School, University of Oxford Intermediate 6y ago
128 Bit or 256 Bit Encryption? - Computerphile
Cybersecurity ⚡ AI Lesson
128 Bit or 256 Bit Encryption? - Computerphile
Computerphile Intermediate 6y ago
HackTheBox - BankRobber
Cybersecurity
HackTheBox - BankRobber
IppSec Intermediate 6y ago
SQL Injection : Data Science Code
Cybersecurity
SQL Injection : Data Science Code
ritvikmath Intermediate 6y ago
HackTheBox - Scavenger
Cybersecurity
HackTheBox - Scavenger
IppSec Intermediate 6y ago
Nmap - Host Discovery With Ping Sweep
Cybersecurity ⚡ AI Lesson
Nmap - Host Discovery With Ping Sweep
HackerSploit Intermediate 5y ago
Network Scanning - TCP Flags & TCP 3-Way Handshake
Cybersecurity ⚡ AI Lesson
Network Scanning - TCP Flags & TCP 3-Way Handshake
HackerSploit Intermediate 5y ago
Free CCNP 350-401 ENCOR Complete Course: 6.4: REST APIs Part 4
Cybersecurity
Free CCNP 350-401 ENCOR Complete Course: 6.4: REST APIs Part 4
David Bombal Intermediate 6y ago
TryHackMe! Wget for Privilege Escalation
Cybersecurity ⚡ AI Lesson
TryHackMe! Wget for Privilege Escalation
John Hammond Intermediate 6y ago
Free CCNP 350-401 ENCOR Complete Course: 6.4: REST APIs Part 3
Cybersecurity
Free CCNP 350-401 ENCOR Complete Course: 6.4: REST APIs Part 3
David Bombal Intermediate 6y ago
DNS Bruteforcing And Subdomain Enumeration With Fierce & Nmap
Cybersecurity ⚡ AI Lesson
DNS Bruteforcing And Subdomain Enumeration With Fierce & Nmap
HackerSploit Intermediate 6y ago
DNS Enumeration And Zone Transfers
Cybersecurity ⚡ AI Lesson
DNS Enumeration And Zone Transfers
HackerSploit Intermediate 6y ago
Free CCNP 350-401 ENCOR Complete Course: 6.4: REST APIs Part 1
Cybersecurity
Free CCNP 350-401 ENCOR Complete Course: 6.4: REST APIs Part 1
David Bombal Intermediate 6y ago
Information Security Misconceptions 2020 | SANS@MIC Talk
Cybersecurity
Information Security Misconceptions 2020 | SANS@MIC Talk
SANS Institute Intermediate 6y ago
HackPack CTF - Forging Python Flask Session Cookies
Cybersecurity
HackPack CTF - Forging Python Flask Session Cookies
John Hammond Intermediate 6y ago
Free CCNP 350-401 ENCOR Complete Course: 6.2 JSON
Cybersecurity
Free CCNP 350-401 ENCOR Complete Course: 6.2 JSON
David Bombal Intermediate 6y ago
BUILDING AN 8-BIT COMPUTER FROM SCRATCH #1 (Full Stream)
Cybersecurity
BUILDING AN 8-BIT COMPUTER FROM SCRATCH #1 (Full Stream)
LiveUnderflow Intermediate 6y ago
TryHackMe! KENOBI - Linux Pentest: Samba Shares
Cybersecurity
TryHackMe! KENOBI - Linux Pentest: Samba Shares
John Hammond Intermediate 6y ago
Self-Compiling Malware | SANS@MIC Talk
Cybersecurity
Self-Compiling Malware | SANS@MIC Talk
SANS Institute Intermediate 6y ago
Passive Reconnaissance - OSINT With Maltego
Cybersecurity ⚡ AI Lesson
Passive Reconnaissance - OSINT With Maltego
HackerSploit Intermediate 6y ago
Passive Reconnaissance - Email Harvesting With theHarvester
Cybersecurity ⚡ AI Lesson
Passive Reconnaissance - Email Harvesting With theHarvester
HackerSploit Intermediate 6y ago
C2 Matrix | SANS@MIC Talk
Cybersecurity ⚡ AI Lesson
C2 Matrix | SANS@MIC Talk
SANS Institute Intermediate 6y ago
Are You Certifiable? | SANS@MIC Talk
Cybersecurity
Are You Certifiable? | SANS@MIC Talk
SANS Institute Intermediate 6y ago
Stealth persistence strategies | SANS@MIC Talk
Cybersecurity
Stealth persistence strategies | SANS@MIC Talk
SANS Institute Intermediate 6y ago
BugBountyToolkit - Running Multiple Sessions With Tmux
Cybersecurity ⚡ AI Lesson
BugBountyToolkit - Running Multiple Sessions With Tmux
HackerSploit Intermediate 6y ago
Attacking Serverless Servers: Reverse Engineering the AWS, Azure, and GCP Function Runtime
Cybersecurity ⚡ AI Lesson
Attacking Serverless Servers: Reverse Engineering the AWS, Azure, and GCP Function Runtime
SANS Institute Intermediate 6y ago
TryHackMe! EternalBlue/MS17-010 in Metasploit
Cybersecurity ⚡ AI Lesson
TryHackMe! EternalBlue/MS17-010 in Metasploit
John Hammond Intermediate 6y ago
Understanding SANS CyberCast - So Much More Than Live Virtual Training
Cybersecurity ⚡ AI Lesson
Understanding SANS CyberCast - So Much More Than Live Virtual Training
SANS Institute Intermediate 6y ago
Moving Past Just Googling It: Harvesting and Using OSINT | SANS@MIC Talk
Cybersecurity
Moving Past Just Googling It: Harvesting and Using OSINT | SANS@MIC Talk
SANS Institute Intermediate 6y ago
Docker - PRIVILEGE ESCALATION Technique
Cybersecurity ⚡ AI Lesson
Docker - PRIVILEGE ESCALATION Technique
John Hammond Intermediate 6y ago
KING OF THE HILL - BsidesNoVA CTF 1ST PLACE
Cybersecurity
KING OF THE HILL - BsidesNoVA CTF 1ST PLACE
John Hammond Intermediate 6y ago
Penetration Testing Bootcamp - Setting Up A Pentesting Lab
Cybersecurity ⚡ AI Lesson
Penetration Testing Bootcamp - Setting Up A Pentesting Lab
HackerSploit Intermediate 6y ago
TryHackMe! Basic Penetration Testing
Cybersecurity
TryHackMe! Basic Penetration Testing
John Hammond Intermediate 6y ago
Installing Katana - Automatic CTF Solver
Cybersecurity
Installing Katana - Automatic CTF Solver
John Hammond Intermediate 6y ago
HackTheBox - Zetta
Cybersecurity
HackTheBox - Zetta
IppSec Intermediate 6y ago
📚 Coursera Courses Opens on Coursera · Free to audit
1 / 3 View all →
Red Hat Enterprise Linux 8
📚 Coursera Course ↗
Self-paced
Red Hat Enterprise Linux 8
Opens on Coursera ↗
IT Infrastructure and Emerging Trends
📚 Coursera Course ↗
Self-paced
IT Infrastructure and Emerging Trends
Opens on Coursera ↗
Data Privacy and Protection
📚 Coursera Course ↗
Self-paced
Data Privacy and Protection
Opens on Coursera ↗
Python Hacking: Apply, Implement & Analyze
📚 Coursera Course ↗
Self-paced
Python Hacking: Apply, Implement & Analyze
Opens on Coursera ↗
Network Security, Troubleshooting, & Certification Prep
📚 Coursera Course ↗
Self-paced
Network Security, Troubleshooting, & Certification Prep
Opens on Coursera ↗
CyberSec First Responder – Advanced (CFR-A): Attack
📚 Coursera Course ↗
Self-paced
CyberSec First Responder – Advanced (CFR-A): Attack
Opens on Coursera ↗