Tech Skills

Cybersecurity

Ethical hacking, penetration testing, network security, CTFs and defensive security

2563
lessons
Skills in this topic
View full skill map →
Security Basics
beginner
Fix OWASP top 10 vulnerabilities
AI Security
intermediate
Identify and patch prompt injection vulnerabilities
Network Security
intermediate
Configure a firewall with proper inbound/outbound rules
Ethical Hacking & Pen Testing
intermediate
Conduct a full pen test with Kali Linux
Cloud Security
intermediate
Implement IAM least-privilege policies on AWS/GCP
Incident Response
intermediate
Build an incident response playbook
Security Compliance
intermediate
Map controls for SOC 2 Type II compliance
Defensive AI
advanced
Build an AI-powered log anomaly detector
Batch 58 Building "Create String" Function
Cybersecurity
Batch 58 Building "Create String" Function
John Hammond Intermediate 13y ago
Batch 57 String Quotations
Cybersecurity
Batch 57 String Quotations
John Hammond Intermediate 13y ago
The Android Challenge
Cybersecurity
The Android Challenge
ColdFusion Intermediate 13y ago
Batch 56 String Substitution
Cybersecurity
Batch 56 String Substitution
John Hammond Intermediate 13y ago
Batch 55 Substrings
Cybersecurity
Batch 55 Substrings
John Hammond Intermediate 13y ago
Batch 53 Changing the Prompt
Cybersecurity
Batch 53 Changing the Prompt
John Hammond Intermediate 13y ago
Batch 52 Command Prompt Properties
Cybersecurity
Batch 52 Command Prompt Properties
John Hammond Intermediate 13y ago
Batch 51 Console Color
Cybersecurity
Batch 51 Console Color
John Hammond Intermediate 13y ago
Batch 50.5 Quick Output of File
Cybersecurity
Batch 50.5 Quick Output of File
John Hammond Intermediate 13y ago
Batch 50 Deleting Files
Cybersecurity
Batch 50 Deleting Files
John Hammond Intermediate 13y ago
Batch 48 Moving and Renaming
Cybersecurity
Batch 48 Moving and Renaming
John Hammond Intermediate 13y ago
Batch 47 Working with Folders
Cybersecurity
Batch 47 Working with Folders
John Hammond Intermediate 13y ago
Batch 46 Even More Redirection
Cybersecurity
Batch 46 Even More Redirection
John Hammond Intermediate 13y ago
Batch 45 Some More Redirection
Cybersecurity
Batch 45 Some More Redirection
John Hammond Intermediate 13y ago
Batch 44 More Redirection
Cybersecurity
Batch 44 More Redirection
John Hammond Intermediate 13y ago
Batch 42 Breakin' Outta the For Loop
Cybersecurity
Batch 42 Breakin' Outta the For Loop
John Hammond Intermediate 13y ago
Batch 41 For through String
Cybersecurity
Batch 41 For through String
John Hammond Intermediate 13y ago
Batch 40 For Command Output
Cybersecurity
Batch 40 For Command Output
John Hammond Intermediate 13y ago
Batch 39 For 'EOL' Option
Cybersecurity
Batch 39 For 'EOL' Option
John Hammond Intermediate 13y ago
Batch 38 For Options
Cybersecurity
Batch 38 For Options
John Hammond Intermediate 13y ago
Batch 37 For through File Content
Cybersecurity
Batch 37 For through File Content
John Hammond Intermediate 13y ago
Batch 36 For through Files
Cybersecurity
Batch 36 For through Files
John Hammond Intermediate 13y ago
Batch 35 For through Directories
Cybersecurity
Batch 35 For through Directories
John Hammond Intermediate 13y ago
Batch 34 For through Numbers
Cybersecurity
Batch 34 For through Numbers
John Hammond Intermediate 13y ago
Batch 33.5 The "Set"
Cybersecurity
Batch 33.5 The "Set"
John Hammond Intermediate 13y ago
Batch 32 "While Loop"
Cybersecurity
Batch 32 "While Loop"
John Hammond Intermediate 13y ago
Batch 31 Delayed Variable Expansion
Cybersecurity
Batch 31 Delayed Variable Expansion
John Hammond Intermediate 13y ago
Batch 30 Nesting
Cybersecurity
Batch 30 Nesting
John Hammond Intermediate 13y ago
Batch 29 Else Statement
Cybersecurity
Batch 29 Else Statement
John Hammond Intermediate 13y ago
Batch 28 Comparison Operators
Cybersecurity
Batch 28 Comparison Operators
John Hammond Intermediate 13y ago
Batch 27 If Statement
Cybersecurity
Batch 27 If Statement
John Hammond Intermediate 13y ago
Batch 26 Returning Passed in Variables
Cybersecurity
Batch 26 Returning Passed in Variables
John Hammond Intermediate 13y ago
Batch 25 "Return" in Local Functions
Cybersecurity
Batch 25 "Return" in Local Functions
John Hammond Intermediate 13y ago
Batch 24 Script Local Scope
Cybersecurity
Batch 24 Script Local Scope
John Hammond Intermediate 13y ago
Batch 23 Function Local Scope
Cybersecurity
Batch 23 Function Local Scope
John Hammond Intermediate 13y ago
Batch 22 Function "Return"
Cybersecurity
Batch 22 Function "Return"
John Hammond Intermediate 13y ago
Batch 21 Function Arguments
Cybersecurity
Batch 21 Function Arguments
John Hammond Intermediate 13y ago
Batch 20 Basic Functions
Cybersecurity
Batch 20 Basic Functions
John Hammond Intermediate 13y ago
Batch 19 Comments
Cybersecurity
Batch 19 Comments
John Hammond Intermediate 13y ago
Batch 18 Goto
Cybersecurity
Batch 18 Goto
John Hammond Intermediate 13y ago
Batch 17 Labels
Cybersecurity
Batch 17 Labels
John Hammond Intermediate 13y ago
Batch 16 Input
Cybersecurity
Batch 16 Input
John Hammond Intermediate 13y ago
Batch 15 Modulus Operator [whoops]
Cybersecurity
Batch 15 Modulus Operator [whoops]
John Hammond Intermediate 13y ago
Batch 14 Mathematical Expressions
Cybersecurity
Batch 14 Mathematical Expressions
John Hammond Intermediate 13y ago
Batch 13 "Escape Characters"
Cybersecurity
Batch 13 "Escape Characters"
John Hammond Intermediate 13y ago
Batch 12 Echo Off
Cybersecurity
Batch 12 Echo Off
John Hammond Intermediate 13y ago
Batch 11 The @ Symbol
Cybersecurity
Batch 11 The @ Symbol
John Hammond Intermediate 13y ago
Batch 10 Parameter Help
Cybersecurity
Batch 10 Parameter Help
John Hammond Intermediate 13y ago
📚 Coursera Courses Opens on Coursera · Free to audit
1 / 3 View all →
Security Hardening
📚 Coursera Course ↗
Self-paced
Security Hardening
Opens on Coursera ↗
OWASP Top 10
📚 Coursera Course ↗
Self-paced
OWASP Top 10
Opens on Coursera ↗
CISSP Domain 7: Security Operations
📚 Coursera Course ↗
Self-paced
CISSP Domain 7: Security Operations
Opens on Coursera ↗
AWS: Infrastructure Security
📚 Coursera Course ↗
Self-paced
AWS: Infrastructure Security
Opens on Coursera ↗
Connect and Protect: Networks and Network Security
📚 Coursera Course ↗
Self-paced
Connect and Protect: Networks and Network Security
Opens on Coursera ↗
Previous OWASP Risks
📚 Coursera Course ↗
Self-paced
Previous OWASP Risks
Opens on Coursera ↗