Tech Skills

Cybersecurity

Ethical hacking, penetration testing, network security, CTFs and defensive security

7,121
lessons
Skills in this topic
View full skill map →
Security Basics
beginner
Fix OWASP top 10 vulnerabilities
AI Security
intermediate
Identify and patch prompt injection vulnerabilities
Network Security
intermediate
Configure a firewall with proper inbound/outbound rules
Ethical Hacking & Pen Testing
intermediate
Conduct a full pen test with Kali Linux
Cloud Security
intermediate
Implement IAM least-privilege policies on AWS/GCP
Incident Response
intermediate
Build an incident response playbook
Security Compliance
intermediate
Map controls for SOC 2 Type II compliance
Defensive AI
advanced
Build an AI-powered log anomaly detector
Python 00 Installing IDLE on Linux
Cybersecurity
Python 00 Installing IDLE on Linux
John Hammond Intermediate 13y ago
XBee Basics - Lesson 5 - API mode: Send Digital Output to a Rmote XBee
Cybersecurity
XBee Basics - Lesson 5 - API mode: Send Digital Output to a Rmote XBee
Jack Rhysider Beginner 13y ago
XBee Basics - Lesson 4 - API mode: Reading analog data from remote XBee
Cybersecurity
XBee Basics - Lesson 4 - API mode: Reading analog data from remote XBee
Jack Rhysider Beginner 13y ago
Python [hashlib] 02 Algorithms
Cybersecurity
Python [hashlib] 02 Algorithms
John Hammond Intermediate 13y ago
The Nervous System - CrashCourse Biology #26
Cybersecurity
The Nervous System - CrashCourse Biology #26
CrashCourse Beginner 13y ago
Animal Behavior - CrashCourse Biology #25
Cybersecurity
Animal Behavior - CrashCourse Biology #25
CrashCourse Beginner 13y ago
The Android Challenge
Cybersecurity ⚡ AI Lesson
The Android Challenge
ColdFusion Intermediate 14y ago
XBee Basics - Lesson 3 - API Mode: Digital Input from Remote Sensor
Cybersecurity
XBee Basics - Lesson 3 - API Mode: Digital Input from Remote Sensor
Jack Rhysider Beginner 13y ago
Batch 90 Array Reverse
Cybersecurity
Batch 90 Array Reverse
John Hammond Intermediate 13y ago
Batch 89 Array Remove
Cybersecurity
Batch 89 Array Remove
John Hammond Intermediate 13y ago
Batch 88 Array Insert
Cybersecurity
Batch 88 Array Insert
John Hammond Intermediate 13y ago
Batch 87 Array Index
Cybersecurity
Batch 87 Array Index
John Hammond Intermediate 13y ago
Batch 86 Array Count
Cybersecurity
Batch 86 Array Count
John Hammond Intermediate 13y ago
Batch 85 Array Append
Cybersecurity
Batch 85 Array Append
John Hammond Intermediate 13y ago
Batch 14 Mathematical Expressions
Cybersecurity
Batch 14 Mathematical Expressions
John Hammond Intermediate 14y ago
Python 26 Object Oriented Programming
Cybersecurity
Python 26 Object Oriented Programming
John Hammond Intermediate 14y ago
Python 08 Programming Style and Comments
Cybersecurity
Python 08 Programming Style and Comments
John Hammond Intermediate 14y ago
HTML, Net Shares, GML!
Cybersecurity
HTML, Net Shares, GML!
John Hammond Intermediate 14y ago
HTML Tables in Python!
Cybersecurity
HTML Tables in Python!
John Hammond Intermediate 14y ago
JavaScript Splits The URL!
Cybersecurity
JavaScript Splits The URL!
John Hammond Intermediate 14y ago
Variable Naming in Python! Happy Birthday, Linux! Nokia N900!
Cybersecurity
Variable Naming in Python! Happy Birthday, Linux! Nokia N900!
John Hammond Intermediate 14y ago
Code Commentaries? PHP to JavaScript in Bash and PHP!
Cybersecurity
Code Commentaries? PHP to JavaScript in Bash and PHP!
John Hammond Intermediate 14y ago
📚 Coursera Courses Opens on Coursera · Free to audit
1 / 3 View all →
Making Accessible Designs
📚 Coursera Course ↗
Self-paced
Making Accessible Designs
Opens on Coursera ↗
A+ Core 2 V15 - Pearson Cert Prep: Unit 4
📚 Coursera Course ↗
Self-paced
A+ Core 2 V15 - Pearson Cert Prep: Unit 4
Opens on Coursera ↗
Python Hacking: Apply, Implement & Analyze
📚 Coursera Course ↗
Self-paced
Python Hacking: Apply, Implement & Analyze
Opens on Coursera ↗
Foundations and Reconnaissance Techniques
📚 Coursera Course ↗
Self-paced
Foundations and Reconnaissance Techniques
Opens on Coursera ↗
Information Security Incident Management
📚 Coursera Course ↗
Self-paced
Information Security Incident Management
Opens on Coursera ↗
Technical Deep Dive with Incident Response Tools
📚 Coursera Course ↗
Self-paced
Technical Deep Dive with Incident Response Tools
Opens on Coursera ↗