Tech Skills

Cybersecurity

Ethical hacking, penetration testing, network security, CTFs and defensive security

2563
lessons
Skills in this topic
View full skill map →
Security Basics
beginner
Fix OWASP top 10 vulnerabilities
AI Security
intermediate
Identify and patch prompt injection vulnerabilities
Network Security
intermediate
Configure a firewall with proper inbound/outbound rules
Ethical Hacking & Pen Testing
intermediate
Conduct a full pen test with Kali Linux
Cloud Security
intermediate
Implement IAM least-privilege policies on AWS/GCP
Incident Response
intermediate
Build an incident response playbook
Security Compliance
intermediate
Map controls for SOC 2 Type II compliance
Defensive AI
advanced
Build an AI-powered log anomaly detector
Batch 09 Command Arguments
Cybersecurity
Batch 09 Command Arguments
John Hammond Intermediate 13y ago
Batch 00 The Windows Command-Line
Cybersecurity
Batch 00 The Windows Command-Line
John Hammond Intermediate 13y ago
Batch 01 Commands
Cybersecurity
Batch 01 Commands
John Hammond Intermediate 13y ago
Batch 02 Data Types
Cybersecurity
Batch 02 Data Types
John Hammond Intermediate 13y ago
Batch 03 Variables
Cybersecurity
Batch 03 Variables
John Hammond Intermediate 13y ago
Batch 04 Environment Variables
Cybersecurity
Batch 04 Environment Variables
John Hammond Intermediate 13y ago
Batch 05 String "Concatenation"
Cybersecurity
Batch 05 String "Concatenation"
John Hammond Intermediate 13y ago
Batch 06 Scripts
Cybersecurity
Batch 06 Scripts
John Hammond Intermediate 13y ago
Batch 07 Notepad to Notepad++
Cybersecurity
Batch 07 Notepad to Notepad++
John Hammond Intermediate 13y ago
Batch 08 Output with Echo
Cybersecurity
Batch 08 Output with Echo
John Hammond Intermediate 13y ago
Source SDK Maps, what?
Cybersecurity
Source SDK Maps, what?
John Hammond Intermediate 14y ago
Python 74 List Remove
Cybersecurity
Python 74 List Remove
John Hammond Intermediate 14y ago
Python 73 List Insert
Cybersecurity
Python 73 List Insert
John Hammond Intermediate 14y ago
Python 72 List Index
Cybersecurity
Python 72 List Index
John Hammond Intermediate 14y ago
Python 71 List Count
Cybersecurity
Python 71 List Count
John Hammond Intermediate 14y ago
Python 70 List Append
Cybersecurity
Python 70 List Append
John Hammond Intermediate 14y ago
Python 69 String zfill
Cybersecurity
Python 69 String zfill
John Hammond Intermediate 14y ago
Python 68 String To Upper
Cybersecurity
Python 68 String To Upper
John Hammond Intermediate 14y ago
Python 67 String Swapcase
Cybersecurity
Python 67 String Swapcase
John Hammond Intermediate 14y ago
Python 66 String Split Lines
Cybersecurity
Python 66 String Split Lines
John Hammond Intermediate 14y ago
Python 64 String Right Strip
Cybersecurity
Python 64 String Right Strip
John Hammond Intermediate 14y ago
Python 65 String Split
Cybersecurity
Python 65 String Split
John Hammond Intermediate 14y ago
Python 63 String Right Justify
Cybersecurity
Python 63 String Right Justify
John Hammond Intermediate 14y ago
Python 62 String Right Find
Cybersecurity
Python 62 String Right Find
John Hammond Intermediate 14y ago
Python 61 String Replace
Cybersecurity
Python 61 String Replace
John Hammond Intermediate 14y ago
Python 60 String Left Strip
Cybersecurity
Python 60 String Left Strip
John Hammond Intermediate 14y ago
Python 59 String to Lowercase
Cybersecurity
Python 59 String to Lowercase
John Hammond Intermediate 14y ago
Python 58 String Left Justify
Cybersecurity
Python 58 String Left Justify
John Hammond Intermediate 14y ago
Python 57 String Join
Cybersecurity
Python 57 String Join
John Hammond Intermediate 14y ago
Python 56 String is Space
Cybersecurity
Python 56 String is Space
John Hammond Intermediate 14y ago
Python 55 String Is Uppercase
Cybersecurity
Python 55 String Is Uppercase
John Hammond Intermediate 14y ago
Python 54 String is Lowercase
Cybersecurity
Python 54 String is Lowercase
John Hammond Intermediate 14y ago
Python 53 String is Full of Digits
Cybersecurity
Python 53 String is Full of Digits
John Hammond Intermediate 14y ago
Python 52 String is Alphabetical
Cybersecurity
Python 52 String is Alphabetical
John Hammond Intermediate 14y ago
Python 51 String Find
Cybersecurity
Python 51 String Find
John Hammond Intermediate 14y ago
Python 49 String Count
Cybersecurity
Python 49 String Count
John Hammond Intermediate 14y ago
Python 48 String Center
Cybersecurity
Python 48 String Center
John Hammond Intermediate 14y ago
Python 47 String Capitalize
Cybersecurity
Python 47 String Capitalize
John Hammond Intermediate 14y ago
Python 46 Sorted Function
Cybersecurity
Python 46 Sorted Function
John Hammond Intermediate 14y ago
Python 45 Sum Function
Cybersecurity
Python 45 Sum Function
John Hammond Intermediate 14y ago
Python 44 Range Function
Cybersecurity
Python 44 Range Function
John Hammond Intermediate 14y ago
Python 43 Absolute Value Function
Cybersecurity
Python 43 Absolute Value Function
John Hammond Intermediate 14y ago
Python 42 Power Function
Cybersecurity
Python 42 Power Function
John Hammond Intermediate 14y ago
Python 41 Maximum Value
Cybersecurity
Python 41 Maximum Value
John Hammond Intermediate 14y ago
Python 40 Minimum Value
Cybersecurity
Python 40 Minimum Value
John Hammond Intermediate 14y ago
Python 39 Multiple Lengths
Cybersecurity
Python 39 Multiple Lengths
John Hammond Intermediate 14y ago
Python 38 Getting Length
Cybersecurity
Python 38 Getting Length
John Hammond Intermediate 14y ago
Python 37 Getting Help
Cybersecurity
Python 37 Getting Help
John Hammond Intermediate 14y ago
📚 Coursera Courses Opens on Coursera · Free to audit
1 / 3 View all →
Blockchain and Cryptography Overview
📚 Coursera Course ↗
Self-paced
Blockchain and Cryptography Overview
Opens on Coursera ↗
Advanced Security and Troubleshooting
📚 Coursera Course ↗
Self-paced
Advanced Security and Troubleshooting
Opens on Coursera ↗
Effective .NET Memory Management
📚 Coursera Course ↗
Self-paced
Effective .NET Memory Management
Opens on Coursera ↗
Security Operations
📚 Coursera Course ↗
Self-paced
Security Operations
Opens on Coursera ↗
Ethical Hacking Parte 2
📚 Coursera Course ↗
Self-paced
Ethical Hacking Parte 2
Opens on Coursera ↗
Security Operations
📚 Coursera Course ↗
Self-paced
Security Operations
Opens on Coursera ↗