Tech Skills

Cybersecurity

Ethical hacking, penetration testing, network security, CTFs and defensive security

7,037
lessons
Skills in this topic
View full skill map →
Security Basics
beginner
Fix OWASP top 10 vulnerabilities
AI Security
intermediate
Identify and patch prompt injection vulnerabilities
Network Security
intermediate
Configure a firewall with proper inbound/outbound rules
Ethical Hacking & Pen Testing
intermediate
Conduct a full pen test with Kali Linux
Cloud Security
intermediate
Implement IAM least-privilege policies on AWS/GCP
Incident Response
intermediate
Build an incident response playbook
Security Compliance
intermediate
Map controls for SOC 2 Type II compliance
Defensive AI
advanced
Build an AI-powered log anomaly detector
Collaborative Hacking with HHC 2024
Cybersecurity
Collaborative Hacking with HHC 2024
John Hammond Intermediate 1y ago
A Holiday Hacking Dream
Cybersecurity
A Holiday Hacking Dream
John Hammond Intermediate 1y ago
What are these? #shorts #firewall #cybersecurity #pfsense #opnsense
Cybersecurity
What are these? #shorts #firewall #cybersecurity #pfsense #opnsense
David Bombal Intermediate 1y ago
From Zero to SEO Hero: Building Organic Growth for WordPress Products
Cybersecurity
From Zero to SEO Hero: Building Organic Growth for WordPress Products
Yoast Intermediate 1y ago
LIVE: C2 Hacking | Cybersecurity | TryHackMe
Cybersecurity ⚡ AI Lesson
LIVE: C2 Hacking | Cybersecurity | TryHackMe
The Cyber Mentor Intermediate 1y ago
Improve your forms with a couple lines of CSS
Cybersecurity
Improve your forms with a couple lines of CSS
Kevin Powell Intermediate 1y ago
The App that makes crypto transactions FULLY anonymous
Cybersecurity
The App that makes crypto transactions FULLY anonymous
Jack Rhysider Intermediate 1y ago
The Oldest Hacking Technique
Cybersecurity
The Oldest Hacking Technique
Jack Rhysider Intermediate 1y ago
Cisco has a Hacking Cert?!?
Cybersecurity ⚡ AI Lesson
Cisco has a Hacking Cert?!?
NetworkChuck Intermediate 1y ago
COMPLETE Cybersecurity Roadmap
Cybersecurity
COMPLETE Cybersecurity Roadmap
Sajjaad Khader Intermediate 1y ago
They hacked the Internet Archive ☹️ #shorts #news #cybersecurity #hacker #hacking
Cybersecurity
They hacked the Internet Archive ☹️ #shorts #news #cybersecurity #hacker #hacking
David Bombal Intermediate 1y ago
How to Control your Ingress & Egress Traffic Based on Location
Cybersecurity ⚡ AI Lesson
How to Control your Ingress & Egress Traffic Based on Location
AWS Developers Intermediate 1y ago
Lightning Talk: Co-bots, Not Robots: Artificial Intelligence in Security Operations
Cybersecurity ⚡ AI Lesson
Lightning Talk: Co-bots, Not Robots: Artificial Intelligence in Security Operations
SANS Institute Intermediate 1y ago
India's Historic win!
Cybersecurity
India's Historic win!
Full Disclosure Intermediate 1y ago
Healthcare - Industrial Control Security for Pharmaceuticals | Dean Parsons
Cybersecurity ⚡ AI Lesson
Healthcare - Industrial Control Security for Pharmaceuticals | Dean Parsons
SANS Institute Intermediate 1y ago
Career Spotlight: Cybersecurity Analyst
Cybersecurity
Career Spotlight: Cybersecurity Analyst
Coursera Intermediate 1y ago
AWS Network Firewall TLS Inspection: 3 Pitfalls to Avoid
Cybersecurity
AWS Network Firewall TLS Inspection: 3 Pitfalls to Avoid
AWS Developers Intermediate 1y ago
For when you can’t afford a Cybersecurity Engineer……
Cybersecurity ⚡ AI Lesson
For when you can’t afford a Cybersecurity Engineer……
NetworkChuck Intermediate 1y ago
New Way Now: Pfizer is reshaping its security DNA with Google Cloud
Cybersecurity
New Way Now: Pfizer is reshaping its security DNA with Google Cloud
Google Cloud Intermediate 1y ago
The Bangladesh Bank Cyber Heist
Cybersecurity
The Bangladesh Bank Cyber Heist
Jack Rhysider Intermediate 1y ago
Bitcoin Wallets Are Not as Private as You Think
Cybersecurity ⚡ AI Lesson
Bitcoin Wallets Are Not as Private as You Think
Jack Rhysider Intermediate 1y ago
The Infamous Love Bug Virus
Cybersecurity ⚡ AI Lesson
The Infamous Love Bug Virus
Jack Rhysider Intermediate 1y ago
Hacking Google Maps traffic
Cybersecurity
Hacking Google Maps traffic
Jack Rhysider Intermediate 1y ago
The Fake FBI Ransomware
Cybersecurity
The Fake FBI Ransomware
Jack Rhysider Intermediate 1y ago
Hacking ARP with Python and Kali Linux (and capture passwords)
Cybersecurity
Hacking ARP with Python and Kali Linux (and capture passwords)
David Bombal Intermediate 1y ago
Will they also ban this after banning the Flipper Zero? #shorts #flipperzero #cars #cybersecurity
Cybersecurity
Will they also ban this after banning the Flipper Zero? #shorts #flipperzero #cars #cybersecurity
David Bombal Intermediate 1y ago
Darknet Diaries 𝙲𝚈𝙱𝙴𝚁𝚆𝙰𝚅𝙴 Remix
Cybersecurity ⚡ AI Lesson
Darknet Diaries 𝙲𝚈𝙱𝙴𝚁𝚆𝙰𝚅𝙴 Remix
Jack Rhysider Intermediate 1y ago
Your information is not safe in the hands of authorities
Cybersecurity
Your information is not safe in the hands of authorities
Jack Rhysider Intermediate 1y ago
WiFi Hacking Watch (WiFi Deauther)
Cybersecurity
WiFi Hacking Watch (WiFi Deauther)
David Bombal Intermediate 1y ago
Thieves stole NFTs with Instagram
Cybersecurity ⚡ AI Lesson
Thieves stole NFTs with Instagram
Jack Rhysider Intermediate 1y ago
Mini-Stories Vol. 3
Cybersecurity
Mini-Stories Vol. 3
Jack Rhysider Intermediate 1y ago
The Secret CIA Backdoor
Cybersecurity
The Secret CIA Backdoor
Jack Rhysider Intermediate 1y ago
How military hackers destroyed 90% of ISIS's media online
Cybersecurity
How military hackers destroyed 90% of ISIS's media online
Jack Rhysider Intermediate 1y ago
The terrorist who mistakenly revealed his plans online
Cybersecurity
The terrorist who mistakenly revealed his plans online
Jack Rhysider Intermediate 1y ago
The FBI monitors criminals through their phones
Cybersecurity
The FBI monitors criminals through their phones
Jack Rhysider Intermediate 1y ago
WiFi WPA2/WPA3 Wireshark Capture #shorts #wifi #wpa2 #iphone #android
Cybersecurity
WiFi WPA2/WPA3 Wireshark Capture #shorts #wifi #wpa2 #iphone #android
David Bombal Intermediate 1y ago
The Phone with decoy apps and secret chats
Cybersecurity ⚡ AI Lesson
The Phone with decoy apps and secret chats
Jack Rhysider Intermediate 1y ago
Your Samsung Smart TV is spying on you
Cybersecurity
Your Samsung Smart TV is spying on you
Jack Rhysider Intermediate 1y ago
Gamers are losing money to crypto scams
Cybersecurity
Gamers are losing money to crypto scams
Jack Rhysider Intermediate 1y ago
Kali Linux Rust install (latest version) #shorts #kalilinux #linux #rust
Cybersecurity
Kali Linux Rust install (latest version) #shorts #kalilinux #linux #rust
David Bombal Intermediate 1y ago
Is that link safe to click? #shorts #privacy #iphone #android #vpn
Cybersecurity ⚡ AI Lesson
Is that link safe to click? #shorts #privacy #iphone #android #vpn
David Bombal Intermediate 1y ago
Do you want to see my IP address? #shorts #iphone #android #starlink #vpn
Cybersecurity
Do you want to see my IP address? #shorts #iphone #android #starlink #vpn
David Bombal Intermediate 1y ago
A Winning Partnership in Cybersecurity Talent Development
Cybersecurity ⚡ AI Lesson
A Winning Partnership in Cybersecurity Talent Development
SANS Institute Intermediate 1y ago
Hacking Tools
Cybersecurity ⚡ AI Lesson
Hacking Tools
NetworkChuck Intermediate 1y ago
You need these skills to become a hacker
Cybersecurity ⚡ AI Lesson
You need these skills to become a hacker
NetworkChuck Intermediate 1y ago
True story: They banned him from using a computer ... that didn't stop him #shorts #linux
Cybersecurity
True story: They banned him from using a computer ... that didn't stop him #shorts #linux
David Bombal Intermediate 1y ago
Cracking WiFi WPA2 Handshakes (And does it work with WPA3?)
Cybersecurity
Cracking WiFi WPA2 Handshakes (And does it work with WPA3?)
David Bombal Intermediate 1y ago
Hacking Ninja’s PayPal
Cybersecurity ⚡ AI Lesson
Hacking Ninja’s PayPal
Jack Rhysider Intermediate 1y ago
📚 Coursera Courses Opens on Coursera · Free to audit
1 / 3 View all →
Cybersecurity Policy Foundations
📚 Coursera Course ↗
Self-paced
Cybersecurity Policy Foundations
Opens on Coursera ↗
Industrial Cybersecurity
📚 Coursera Course ↗
Self-paced
Industrial Cybersecurity
Opens on Coursera ↗
Ethical Hacking - Capture the Flag Walkthroughs - v2
📚 Coursera Course ↗
Self-paced
Ethical Hacking - Capture the Flag Walkthroughs - v2
Opens on Coursera ↗
Pentesting Fundamentals for Beginners
📚 Coursera Course ↗
Self-paced
Pentesting Fundamentals for Beginners
Opens on Coursera ↗
Incident Response and Risk Management
📚 Coursera Course ↗
Self-paced
Incident Response and Risk Management
Opens on Coursera ↗
Understanding Cisco Cybersecurity Operations Fundamentals
📚 Coursera Course ↗
Self-paced
Understanding Cisco Cybersecurity Operations Fundamentals
Opens on Coursera ↗