Tech Skills

Cybersecurity

Ethical hacking, penetration testing, network security, CTFs and defensive security

7,036
lessons
Skills in this topic
View full skill map →
Security Basics
beginner
Fix OWASP top 10 vulnerabilities
AI Security
intermediate
Identify and patch prompt injection vulnerabilities
Network Security
intermediate
Configure a firewall with proper inbound/outbound rules
Ethical Hacking & Pen Testing
intermediate
Conduct a full pen test with Kali Linux
Cloud Security
intermediate
Implement IAM least-privilege policies on AWS/GCP
Incident Response
intermediate
Build an incident response playbook
Security Compliance
intermediate
Map controls for SOC 2 Type II compliance
Defensive AI
advanced
Build an AI-powered log anomaly detector
Panel | Mentors and Mentees: Navigating Cybersecurity's Path Together
Cybersecurity ⚡ AI Lesson
Panel | Mentors and Mentees: Navigating Cybersecurity's Path Together
SANS Institute Intermediate 1y ago
Finding Web App Vulnerabilities with AI
Cybersecurity ⚡ AI Lesson
Finding Web App Vulnerabilities with AI
John Hammond Intermediate 1y ago
RevOps: "The CRM AI did what!? I know what to do. Zapier."
Cybersecurity ⚡ AI Lesson
RevOps: "The CRM AI did what!? I know what to do. Zapier."
Zapier Intermediate 1y ago
From Special Forces to Cybersecurity: Rich Greene on Communication and Persuasion in Infosec
Cybersecurity ⚡ AI Lesson
From Special Forces to Cybersecurity: Rich Greene on Communication and Persuasion in Infosec
SANS Institute Intermediate 1y ago
How FIN6 Exfiltrates Files Over FTP
Cybersecurity ⚡ AI Lesson
How FIN6 Exfiltrates Files Over FTP
HackerSploit Intermediate 1y ago
We bought stolen election access before the hackers did
Cybersecurity ⚡ AI Lesson
We bought stolen election access before the hackers did
Weights & Biases Intermediate 1y ago
I Backdoored Cursor AI
Cybersecurity
I Backdoored Cursor AI
John Hammond Intermediate 1y ago
RevOps: "Don't worry. Zapier will wake it up."
Cybersecurity
RevOps: "Don't worry. Zapier will wake it up."
Zapier Intermediate 1y ago
Burpsuite proxy browser and App Interception
Cybersecurity
Burpsuite proxy browser and App Interception
David Bombal Intermediate 1y ago
Fraud Detection in the AI Era // Rafael Sandroni // MLOps Podcast #301
Cybersecurity ⚡ AI Lesson
Fraud Detection in the AI Era // Rafael Sandroni // MLOps Podcast #301
MLOps.community Intermediate 1y ago
Why nobody likes cybersecurity
Cybersecurity
Why nobody likes cybersecurity
Weights & Biases Intermediate 1y ago
Can you hack a hub? #shorts #hub #switch #network #wireshark #ccna
Cybersecurity
Can you hack a hub? #shorts #hub #switch #network #wireshark #ccna
David Bombal Intermediate 1y ago
Wasm on feature phones with Cloud Phone's Thomas Barrasso
Cybersecurity
Wasm on feature phones with Cloud Phone's Thomas Barrasso
Chrome for Developers Intermediate 1y ago
IBM Cybersecurity Analyst Professional Certificate: Build Critical Skills for a Thriving Career
Cybersecurity
IBM Cybersecurity Analyst Professional Certificate: Build Critical Skills for a Thriving Career
Coursera Intermediate 1y ago
Oxford Cyber Security for Business Leaders Programme
Cybersecurity
Oxford Cyber Security for Business Leaders Programme
Saïd Business School, University of Oxford Intermediate 1y ago
Hacking in Tamil Movies! Reality 🤣 #scienceandtechnology #facts #techintamil
Cybersecurity
Hacking in Tamil Movies! Reality 🤣 #scienceandtechnology #facts #techintamil
Arivi by HCL GUVI Intermediate 1y ago
Get Hired In Cybersecurity Without Previous Experience
Cybersecurity ⚡ AI Lesson
Get Hired In Cybersecurity Without Previous Experience
The Cyber Mentor Intermediate 1y ago
Burner Phone vs China's Great Firewall
Cybersecurity
Burner Phone vs China's Great Firewall
Dwarkesh Patel Intermediate 1y ago
IBM Cybersecurity Certificate: Your Path to a Top Tech Career
Cybersecurity
IBM Cybersecurity Certificate: Your Path to a Top Tech Career
Coursera Intermediate 1y ago
The Hacker Who Testified Before Congress & Changed Everything🎙Darknet Diaries Ep 155: Kingpin
Cybersecurity
The Hacker Who Testified Before Congress & Changed Everything🎙Darknet Diaries Ep 155: Kingpin
Jack Rhysider Intermediate 1y ago
Top 5 Common API Security Mistakes & How to Avoid Them ( Tamil )
Cybersecurity
Top 5 Common API Security Mistakes & How to Avoid Them ( Tamil )
TechArchLab Intermediate 1y ago
BREAK INTO Cybersecurity in 2025 💰
Cybersecurity
BREAK INTO Cybersecurity in 2025 💰
Sajjaad Khader Intermediate 1y ago
It only takes one photo
Cybersecurity ⚡ AI Lesson
It only takes one photo
NetworkChuck Intermediate 1y ago
Computer Virus: How It Got Its Name! #facts #techintamil #scienceandtechnology
Cybersecurity
Computer Virus: How It Got Its Name! #facts #techintamil #scienceandtechnology
Arivi by HCL GUVI Intermediate 1y ago
How to get a job in IT (2025)
Cybersecurity ⚡ AI Lesson
How to get a job in IT (2025)
NetworkChuck Intermediate 1y ago
The SECRET to Embedding Metasploit Payloads in VBA Macros
Cybersecurity ⚡ AI Lesson
The SECRET to Embedding Metasploit Payloads in VBA Macros
HackerSploit Intermediate 1y ago
A Wild Website Where People Lose Millions of Dollars
Cybersecurity
A Wild Website Where People Lose Millions of Dollars
Jack Rhysider Intermediate 1y ago
New Way Now: Dunelm delivers style to homes securely with Google Cloud
Cybersecurity
New Way Now: Dunelm delivers style to homes securely with Google Cloud
Google Cloud Intermediate 1y ago
TOP Cybersecurity Jobs in 2025
Cybersecurity
TOP Cybersecurity Jobs in 2025
Sajjaad Khader Intermediate 1y ago
Turn Your Hard-Earned Experience into Impact
Cybersecurity ⚡ AI Lesson
Turn Your Hard-Earned Experience into Impact
SANS Institute Intermediate 1y ago
this MP3 file is malware
Cybersecurity
this MP3 file is malware
John Hammond Intermediate 1y ago
the CRITICAL 9.1 severity Next.js vulnerability
Cybersecurity ⚡ AI Lesson
the CRITICAL 9.1 severity Next.js vulnerability
John Hammond Intermediate 1y ago
WSL Setup (GPU WiFi Cracking, Wireshark, Remote Desktop and a lot more)
Cybersecurity ⚡ AI Lesson
WSL Setup (GPU WiFi Cracking, Wireshark, Remote Desktop and a lot more)
David Bombal Intermediate 1y ago
Linux for Windows?
Cybersecurity ⚡ AI Lesson
Linux for Windows?
David Bombal Intermediate 1y ago
ms teams is now a C2 (command-and-control)
Cybersecurity
ms teams is now a C2 (command-and-control)
John Hammond Intermediate 1y ago
they tried to hack me so i confronted them
Cybersecurity ⚡ AI Lesson
they tried to hack me so i confronted them
John Hammond Intermediate 1y ago
LOCAL Private Telephone System (PBX) with USA number for $1 a month
Cybersecurity
LOCAL Private Telephone System (PBX) with USA number for $1 a month
David Bombal Intermediate 1y ago
the tools that real hackers use
Cybersecurity ⚡ AI Lesson
the tools that real hackers use
John Hammond Intermediate 1y ago
are built-in windows programs vulnerable?
Cybersecurity ⚡ AI Lesson
are built-in windows programs vulnerable?
John Hammond Intermediate 1y ago
The Snyk Fetch the Flag CTF is LIVE right now!!
Cybersecurity ⚡ AI Lesson
The Snyk Fetch the Flag CTF is LIVE right now!!
John Hammond Intermediate 1y ago
Private Key Encryption - why is it used? #shorts #encryption #hashing #password
Cybersecurity
Private Key Encryption - why is it used? #shorts #encryption #hashing #password
David Bombal Intermediate 1y ago
The real world Iron Man? #shorts #ironman #mcu #cosplay #cybersecurity #zerotrust
Cybersecurity ⚡ AI Lesson
The real world Iron Man? #shorts #ironman #mcu #cosplay #cybersecurity #zerotrust
David Bombal Intermediate 1y ago
Hacking Before Computers! #facts #scienceandtechnology #techintamil
Cybersecurity
Hacking Before Computers! #facts #scienceandtechnology #techintamil
Arivi by HCL GUVI Intermediate 1y ago
Firewalls vs Firewalling #shorts #firewall #cisco #hack
Cybersecurity
Firewalls vs Firewalling #shorts #firewall #cisco #hack
David Bombal Intermediate 1y ago
Exploring Offensive Cybersecurity: Threat Emulation | John Rodriguez
Cybersecurity ⚡ AI Lesson
Exploring Offensive Cybersecurity: Threat Emulation | John Rodriguez
SANS Institute Intermediate 1y ago
A Day in the Life of a Network Security Engineer | Sanjay Poddar
Cybersecurity ⚡ AI Lesson
A Day in the Life of a Network Security Engineer | Sanjay Poddar
SANS Institute Intermediate 1y ago
Is DeepSeek Lying to you? #shorts #wireshark #deepseek #privacy #cybersecurity
Cybersecurity
Is DeepSeek Lying to you? #shorts #wireshark #deepseek #privacy #cybersecurity
David Bombal Intermediate 1y ago
Offensive VBA 0x4 - Reverse Shell Macro with Powercat
Cybersecurity ⚡ AI Lesson
Offensive VBA 0x4 - Reverse Shell Macro with Powercat
HackerSploit Intermediate 1y ago
📚 Coursera Courses Opens on Coursera · Free to audit
1 / 3 View all →
Orchestrate, Analyze, and Evaluate AI Deployments
📚 Coursera Course ↗
Self-paced
Orchestrate, Analyze, and Evaluate AI Deployments
Opens on Coursera ↗
Detecting and Mitigating Cyber Threats and Attacks
📚 Coursera Course ↗
Self-paced
Detecting and Mitigating Cyber Threats and Attacks
Opens on Coursera ↗
Encryption and Cryptography Essentials
📚 Coursera Course ↗
Self-paced
Encryption and Cryptography Essentials
Opens on Coursera ↗
Securing AI Data and Applications
📚 Coursera Course ↗
Self-paced
Securing AI Data and Applications
Opens on Coursera ↗
Network Defense Essentials (NDE)
📚 Coursera Course ↗
Self-paced
Network Defense Essentials (NDE)
Opens on Coursera ↗
Digital Marketing Trends
📚 Coursera Course ↗
Self-paced
Digital Marketing Trends
Opens on Coursera ↗