Tech Skills

Cybersecurity

Ethical hacking, penetration testing, network security, CTFs and defensive security

7,037
lessons
Skills in this topic
View full skill map →
Security Basics
beginner
Fix OWASP top 10 vulnerabilities
AI Security
intermediate
Identify and patch prompt injection vulnerabilities
Network Security
intermediate
Configure a firewall with proper inbound/outbound rules
Ethical Hacking & Pen Testing
intermediate
Conduct a full pen test with Kali Linux
Cloud Security
intermediate
Implement IAM least-privilege policies on AWS/GCP
Incident Response
intermediate
Build an incident response playbook
Security Compliance
intermediate
Map controls for SOC 2 Type II compliance
Defensive AI
advanced
Build an AI-powered log anomaly detector
Cybersecurity v Computer Science 2025 ‼️
Cybersecurity
Cybersecurity v Computer Science 2025 ‼️
Sajjaad Khader Intermediate 1y ago
How Hackers Target a Victim
Cybersecurity ⚡ AI Lesson
How Hackers Target a Victim
Jack Rhysider Intermediate 1y ago
From IT Support to Cybersecurity Leader: Jay James’ Keynote Journey
Cybersecurity ⚡ AI Lesson
From IT Support to Cybersecurity Leader: Jay James’ Keynote Journey
SANS Institute Intermediate 1y ago
Non-Technical to Technical: Breaking into Reverse Engineering | Alex Perotti
Cybersecurity ⚡ AI Lesson
Non-Technical to Technical: Breaking into Reverse Engineering | Alex Perotti
SANS Institute Intermediate 1y ago
What Cybersecurity, AI or other questions do you want me to ask them? #cybersecurity #ai #ciscolive
Cybersecurity ⚡ AI Lesson
What Cybersecurity, AI or other questions do you want me to ask them? #cybersecurity #ai #ciscolive
David Bombal Intermediate 1y ago
Pentesting Methodologies & CTF Challenges!
Cybersecurity ⚡ AI Lesson
Pentesting Methodologies & CTF Challenges!
John Hammond Intermediate 1y ago
I hope to see you in person! #shorts #ztw25 #cybersecurity #threatlocker
Cybersecurity
I hope to see you in person! #shorts #ztw25 #cybersecurity #threatlocker
David Bombal Intermediate 1y ago
Why AI Product Management is the Future? | Andrew Ng Insights
Cybersecurity ⚡ AI Lesson
Why AI Product Management is the Future? | Andrew Ng Insights
Analytics Vidhya Intermediate 1y ago
Emulating FIN6 - Gaining Initial Access (Office Word Macro)
Cybersecurity ⚡ AI Lesson
Emulating FIN6 - Gaining Initial Access (Office Word Macro)
HackerSploit Intermediate 1y ago
Cybersecurity in 2025 👀
Cybersecurity
Cybersecurity in 2025 👀
Sajjaad Khader Intermediate 1y ago
Sneaky Botnets!
Cybersecurity
Sneaky Botnets!
Jack Rhysider Intermediate 1y ago
Cybersecurity, in SPACE!!
Cybersecurity ⚡ AI Lesson
Cybersecurity, in SPACE!!
NetworkChuck Intermediate 1y ago
Unpacking Code for CTF Challenges: Create Your Dirty Image
Cybersecurity ⚡ AI Lesson
Unpacking Code for CTF Challenges: Create Your Dirty Image
John Hammond Intermediate 1y ago
Mastering Persistence: Using an Apache2 Rootkit for Stealth and Defense Evasion
Cybersecurity ⚡ AI Lesson
Mastering Persistence: Using an Apache2 Rootkit for Stealth and Defense Evasion
HackerSploit Intermediate 1y ago
As cyber attacks become more sophisticated, what role will AI play?
Cybersecurity
As cyber attacks become more sophisticated, what role will AI play?
Google Cloud Intermediate 1y ago
Hackers have hacked AI  - Cisco Defense protects organizations #shorts #ai #cybersecurity #cisco
Cybersecurity
Hackers have hacked AI - Cisco Defense protects organizations #shorts #ai #cybersecurity #cisco
David Bombal Intermediate 1y ago
Are you using a Hacked AI system?
Cybersecurity
Are you using a Hacked AI system?
David Bombal Intermediate 1y ago
Do you know this about TCP (TCP Three-Way Handshake)? #shorts #tcp #wireshark #cybersecurity
Cybersecurity
Do you know this about TCP (TCP Three-Way Handshake)? #shorts #tcp #wireshark #cybersecurity
David Bombal Intermediate 1y ago
2025 Ethical Hacker Roadmap with lots of free training (NOT Sponsored)
Cybersecurity ⚡ AI Lesson
2025 Ethical Hacker Roadmap with lots of free training (NOT Sponsored)
David Bombal Intermediate 1y ago
FREE Ethical Hacking course (70 hours & includes Kali Linux labs)
Cybersecurity ⚡ AI Lesson
FREE Ethical Hacking course (70 hours & includes Kali Linux labs)
David Bombal Intermediate 1y ago
This Hidden Army of Bots is Stealing Your Data
Cybersecurity
This Hidden Army of Bots is Stealing Your Data
Jack Rhysider Intermediate 1y ago
What are Money Mules?
Cybersecurity ⚡ AI Lesson
What are Money Mules?
Jack Rhysider Intermediate 1y ago
How the French Hacked Criminal Networks
Cybersecurity
How the French Hacked Criminal Networks
Jack Rhysider Intermediate 1y ago
Hackers vs. The World
Cybersecurity
Hackers vs. The World
Jack Rhysider Intermediate 1y ago
Fake University HACKED Their Students
Cybersecurity
Fake University HACKED Their Students
Jack Rhysider Intermediate 1y ago
How Hackers Are Using Game Cheats to Steal Your Info
Cybersecurity
How Hackers Are Using Game Cheats to Steal Your Info
Jack Rhysider Intermediate 1y ago
Preventing Session Hijacking: Essential Cybersecurity Strategies
Cybersecurity
Preventing Session Hijacking: Essential Cybersecurity Strategies
John Hammond Intermediate 1y ago
Unlocking Secrets: Hacking With InfoStealer Malware
Cybersecurity
Unlocking Secrets: Hacking With InfoStealer Malware
John Hammond Intermediate 1y ago
The Stock Market Scam Fooling People With Fake Predictions
Cybersecurity
The Stock Market Scam Fooling People With Fake Predictions
Jack Rhysider Intermediate 1y ago
Hacking a Reddit Account: A Step-by-Step Demonstration
Cybersecurity
Hacking a Reddit Account: A Step-by-Step Demonstration
John Hammond Intermediate 1y ago
How Skrillex's Skype Password Got Leaked
Cybersecurity
How Skrillex's Skype Password Got Leaked
Jack Rhysider Intermediate 1y ago
Did You Fall for This Fake Bank Email Scam?
Cybersecurity
Did You Fall for This Fake Bank Email Scam?
Jack Rhysider Intermediate 1y ago
The Malware That Could Be Draining Your Bank
Cybersecurity ⚡ AI Lesson
The Malware That Could Be Draining Your Bank
Jack Rhysider Intermediate 1y ago
This Trojan is Stealing Identities Across the Web
Cybersecurity
This Trojan is Stealing Identities Across the Web
Jack Rhysider Intermediate 1y ago
How They Steal Company Secrets in Minutes
Cybersecurity
How They Steal Company Secrets in Minutes
Jack Rhysider Intermediate 1y ago
Linux Challenges for Holiday Hacking
Cybersecurity
Linux Challenges for Holiday Hacking
John Hammond Intermediate 1y ago
Inside the Registry Challenge: CTF Zone Finals 2024
Cybersecurity ⚡ AI Lesson
Inside the Registry Challenge: CTF Zone Finals 2024
John Hammond Intermediate 1y ago
This Hacking Tool Tricks Windows Into Sharing Passwords
Cybersecurity
This Hacking Tool Tricks Windows Into Sharing Passwords
Jack Rhysider Intermediate 1y ago
How Zapier Can Be Used Against You
Cybersecurity
How Zapier Can Be Used Against You
Jack Rhysider Intermediate 1y ago
The Secret Backdoor Hackers Use to Access Your Accounts
Cybersecurity
The Secret Backdoor Hackers Use to Access Your Accounts
Jack Rhysider Intermediate 1y ago
From Novice to Pro: Unleashing Hacking Genius
Cybersecurity
From Novice to Pro: Unleashing Hacking Genius
John Hammond Intermediate 1y ago
Unlock Your Cybersecurity Potential with Hands-On Labs
Cybersecurity ⚡ AI Lesson
Unlock Your Cybersecurity Potential with Hands-On Labs
John Hammond Intermediate 1y ago
Hack WiFi with a phone? (Kali Linux Nethunter Pro)
Cybersecurity ⚡ AI Lesson
Hack WiFi with a phone? (Kali Linux Nethunter Pro)
David Bombal Intermediate 1y ago
Unlocking Privilege Escalation in EntraID: The Essentials
Cybersecurity
Unlocking Privilege Escalation in EntraID: The Essentials
John Hammond Intermediate 1y ago
How Email Spam Fueled a Dirty Online Economy
Cybersecurity
How Email Spam Fueled a Dirty Online Economy
Jack Rhysider Intermediate 1y ago
Exposing Vulnerabilities in EntraID: Ethical Hacking Insights
Cybersecurity
Exposing Vulnerabilities in EntraID: Ethical Hacking Insights
John Hammond Intermediate 1y ago
Hacking Everyday Items: The Truth Behind Suitcase Locks
Cybersecurity
Hacking Everyday Items: The Truth Behind Suitcase Locks
John Hammond Intermediate 1y ago
WARNING: Make sure your family and colleagues are aware #shorts #ai #iphone #android #cybersecurity
Cybersecurity ⚡ AI Lesson
WARNING: Make sure your family and colleagues are aware #shorts #ai #iphone #android #cybersecurity
David Bombal Intermediate 1y ago
📚 Coursera Courses Opens on Coursera · Free to audit
1 / 3 View all →
Penetration Testing and Vulnerability Scanning
📚 Coursera Course ↗
Self-paced
Penetration Testing and Vulnerability Scanning
Opens on Coursera ↗
Cybersecurity Essentials : from Risk to Resilience
📚 Coursera Course ↗
Self-paced
Cybersecurity Essentials : from Risk to Resilience
Opens on Coursera ↗
Introduction to Information Technology and AWS Cloud
📚 Coursera Course ↗
Self-paced
Introduction to Information Technology and AWS Cloud
Opens on Coursera ↗
IT & Cloud Audit Masterclass – Fundamentals to Advanced
📚 Coursera Course ↗
Self-paced
IT & Cloud Audit Masterclass – Fundamentals to Advanced
Opens on Coursera ↗
Security & Compliance: Crypto, Risk, and Response
📚 Coursera Course ↗
Self-paced
Security & Compliance: Crypto, Risk, and Response
Opens on Coursera ↗
Physical Red Teaming
📚 Coursera Course ↗
Self-paced
Physical Red Teaming
Opens on Coursera ↗