Tech Skills

Cybersecurity

Ethical hacking, penetration testing, network security, CTFs and defensive security

7,029
lessons
Skills in this topic
View full skill map โ†’
Security Basics
beginner
Fix OWASP top 10 vulnerabilities
AI Security
intermediate
Identify and patch prompt injection vulnerabilities
Network Security
intermediate
Configure a firewall with proper inbound/outbound rules
Ethical Hacking & Pen Testing
intermediate
Conduct a full pen test with Kali Linux
Cloud Security
intermediate
Implement IAM least-privilege policies on AWS/GCP
Incident Response
intermediate
Build an incident response playbook
Security Compliance
intermediate
Map controls for SOC 2 Type II compliance
Defensive AI
advanced
Build an AI-powered log anomaly detector
Ever been run over by a robot? I have โ€” for science!
Cybersecurity
Ever been run over by a robot? I have โ€” for science!
The Verge Advanced 1w ago
Operation Sindoor: How Pahalgam Attack Was Revenged | Amit Dubey Podcast, Cyber Security
Cybersecurity
Operation Sindoor: How Pahalgam Attack Was Revenged | Amit Dubey Podcast, Cyber Security
Switch Advanced 1w ago
3 Keys to Weather the Autonomous Attack Storm
Cybersecurity
3 Keys to Weather the Autonomous Attack Storm
SANS Institute Intermediate 1w ago
How the Coalition for Secure AI Prepares Defenders
Cybersecurity
How the Coalition for Secure AI Prepares Defenders
SANS Institute Beginner 1w ago
Germany Was Just Deleted From The Internet
Cybersecurity
Germany Was Just Deleted From The Internet
Brodie Robertson Beginner 2w ago
Ethical Hacking Full Course 2026 [FREE] | Ethical Hacking Tutorial For Beginners | Simplilearn
Cybersecurity
Ethical Hacking Full Course 2026 [FREE] | Ethical Hacking Tutorial For Beginners | Simplilearn
Simplilearn Beginner 2w ago
Ethical Hacking Full Course 2026 [FREE] | Ethical Hacking Tutorial For Beginners | Simplilearn
Cybersecurity
Ethical Hacking Full Course 2026 [FREE] | Ethical Hacking Tutorial For Beginners | Simplilearn
Simplilearn Beginner 2w ago
Hacking on the PDP1 Raspberry Pi Emulator - Computerphile
Cybersecurity
Hacking on the PDP1 Raspberry Pi Emulator - Computerphile
Computerphile Intermediate 2w ago
Can EVMs Be Hacked, How Secure, Safe Are EVMs? | West Bengal Election Results 2026 | Mamata Banerjee
Cybersecurity
Can EVMs Be Hacked, How Secure, Safe Are EVMs? | West Bengal Election Results 2026 | Mamata Banerjee
Switch Advanced 2w ago
The Only Cure For This Malware Is to Throw Your Router in the Trash ๐Ÿ”Œ Episode 174: Pacific Rim
Cybersecurity
The Only Cure For This Malware Is to Throw Your Router in the Trash ๐Ÿ”Œ Episode 174: Pacific Rim
Jack Rhysider Intermediate 2w ago
Fedora Is Replacing Ubuntu Linux As The Default
Cybersecurity
Fedora Is Replacing Ubuntu Linux As The Default
Brodie Robertson Intermediate 2w ago
May the force help you troubleshoot ...
Cybersecurity
May the force help you troubleshoot ...
David Bombal Beginner 2w ago
Dual Boot Windows and Ubuntu Linux in 10 Minutes (2026)
Cybersecurity
Dual Boot Windows and Ubuntu Linux in 10 Minutes (2026)
David Bombal Intermediate 2w ago
A Guide to LNK File Forensics
Cybersecurity
A Guide to LNK File Forensics
The Cyber Mentor Beginner 2w ago
Stanford's youngest instructor on InfoSec, AI, catching cheaters - Rachel Fernandez [Podcast #217]
Cybersecurity
Stanford's youngest instructor on InfoSec, AI, catching cheaters - Rachel Fernandez [Podcast #217]
freeCodeCamp.org Intermediate 2w ago
Stop account hijacks with Google Ads passkeys
Cybersecurity
Stop account hijacks with Google Ads passkeys
Google Ads Intermediate 3w ago
Securing the Agentic Enterprise
Cybersecurity
Securing the Agentic Enterprise
Google Cloud Intermediate 3w ago
Linus Torvalds Reveals Why He Clashes With Security Experts #shorts #linux #programming #security
Cybersecurity
Linus Torvalds Reveals Why He Clashes With Security Experts #shorts #linux #programming #security
WebKnower Advanced 3w ago
Peer-to-Peer Encrypted Chat (No Logs, No Servers)
Cybersecurity
Peer-to-Peer Encrypted Chat (No Logs, No Servers)
Real Python Beginner 3w ago
Josh Mason | Real Folks of Cyber | DITL
Cybersecurity
Josh Mason | Real Folks of Cyber | DITL
The Cyber Mentor Intermediate 3w ago
Finding Hardware Bugs - Computerphile
Cybersecurity
Finding Hardware Bugs - Computerphile
Computerphile Beginner 3w ago
Inside the world's most elite student hackathon โ€“ Full Documentary on Stanford Tree Hacks 2026
Cybersecurity
Inside the world's most elite student hackathon โ€“ Full Documentary on Stanford Tree Hacks 2026
freeCodeCamp.org Intermediate 3w ago
Securing Azure Cosmos DB: The Right Way | Sudhanshu Khera | Azure Cosmos DB Conf 2026
Cybersecurity
Securing Azure Cosmos DB: The Right Way | Sudhanshu Khera | Azure Cosmos DB Conf 2026
Microsoft Developer Intermediate 3w ago
Counter-Swarm Defense
Cybersecurity
Counter-Swarm Defense
Y Combinator Beginner 3w ago
JHT Course Launch: Web App Junior Analyst!
Cybersecurity
JHT Course Launch: Web App Junior Analyst!
John Hammond Beginner 3w ago
How to Become a Penetration Tester
Cybersecurity
How to Become a Penetration Tester
Coursera Beginner 3w ago
Securing agents
Cybersecurity
Securing agents
Google Cloud Intermediate 3w ago
From alleged hairdryer hacking to insider #trading, prediction markets are getting messy fast.
Cybersecurity
From alleged hairdryer hacking to insider #trading, prediction markets are getting messy fast.
Business Insider Intermediate 3w ago
FAKE Zoom Taxes MALWARE
Cybersecurity
FAKE Zoom Taxes MALWARE
John Hammond Advanced 3w ago
Is Ethical Hacking A Good Career In 2026 | Skills, Salary And Roadmap | #Shorts | #Simplilearn
Cybersecurity
Is Ethical Hacking A Good Career In 2026 | Skills, Salary And Roadmap | #Shorts | #Simplilearn
Simplilearn Beginner 2w ago
Cybersecurity Roadmap | Cybersecurity Skills | How To Become A Cybersecurity Engineer | Simplilearn
Cybersecurity
Cybersecurity Roadmap | Cybersecurity Skills | How To Become A Cybersecurity Engineer | Simplilearn
Simplilearn Advanced 2w ago
Lightning Talk: What Got Us Here Will Get Us There
Cybersecurity
Lightning Talk: What Got Us Here Will Get Us There
SANS Institute Beginner 2w ago
Lightning Talk: Why AI for ICS Needs IT/OT Integration
Cybersecurity
Lightning Talk: Why AI for ICS Needs IT/OT Integration
SANS Institute Beginner 2w ago
Lightning Talk: AI vs. AI: They're Already Inside
Cybersecurity
Lightning Talk: AI vs. AI: They're Already Inside
SANS Institute Beginner 2w ago
Lightning Talk: AI as the Attack: Weaponizing APIs
Cybersecurity
Lightning Talk: AI as the Attack: Weaponizing APIs
SANS Institute Beginner 2w ago
Keynote: Integrous AI
Cybersecurity
Keynote: Integrous AI
SANS Institute Beginner 2w ago
Keynote: Every Doorknob, All At Once: AI Cyber Lessons
Cybersecurity
Keynote: Every Doorknob, All At Once: AI Cyber Lessons
SANS Institute Intermediate 2w ago
Which Apps, Communication System Was Used in Pahalgam Attack | Cyber Security Podcast | Amit Dubey
Cybersecurity
Which Apps, Communication System Was Used in Pahalgam Attack | Cyber Security Podcast | Amit Dubey
Switch Advanced 2w ago
Linux Ricing Brings Back Steam Skins With Millennium
Cybersecurity
Linux Ricing Brings Back Steam Skins With Millennium
Brodie Robertson Intermediate 2w ago
Bringing AI Securely Online with Florence Mottay
Cybersecurity
Bringing AI Securely Online with Florence Mottay
SANS Institute Advanced 2w ago
CopyFail Compromises The Last 9 Years Of Linux Distros
Cybersecurity
CopyFail Compromises The Last 9 Years Of Linux Distros
Brodie Robertson Intermediate 2w ago
Top Cybersecurity Certifications 2026 | Best Cybersecurity Certifications | #Shorts | #Simplilearn
Cybersecurity
Top Cybersecurity Certifications 2026 | Best Cybersecurity Certifications | #Shorts | #Simplilearn
Simplilearn Intermediate 2w ago
They got hacked and now you will get attacked โ˜น๏ธ
Cybersecurity
They got hacked and now you will get attacked โ˜น๏ธ
David Bombal Beginner 3w ago
Top 5 Ethical Hacking Gadgets In 2026 | Best Ethical Hacking Gadgets In 2026 | #Shorts #Simplilearn
Cybersecurity
Top 5 Ethical Hacking Gadgets In 2026 | Best Ethical Hacking Gadgets In 2026 | #Shorts #Simplilearn
Simplilearn Intermediate 3w ago
Securing the Agentic Enterprise
Cybersecurity
Securing the Agentic Enterprise
Google Cloud Intermediate 3w ago
Protect Your Linux Desktop From Malicious USB Devices
Cybersecurity
Protect Your Linux Desktop From Malicious USB Devices
Brodie Robertson Intermediate 3w ago
Security in 22 seconds!
Cybersecurity
Security in 22 seconds!
Google Cloud Intermediate 3w ago
The best way to install Linux or other operating systems? (Ventoy)
Cybersecurity
The best way to install Linux or other operating systems? (Ventoy)
David Bombal Intermediate 3w ago
๐Ÿ“š Coursera Courses Opens on Coursera ยท Free to audit
1 / 3 View all โ†’
Implementing MPLS VPNs
๐Ÿ“š Coursera Course โ†—
Self-paced
Implementing MPLS VPNs
Opens on Coursera โ†—
Security Architecture & Operations
๐Ÿ“š Coursera Course โ†—
Self-paced
Security Architecture & Operations
Opens on Coursera โ†—
Number Theory and Cryptography
๐Ÿ“š Coursera Course โ†—
Self-paced
Number Theory and Cryptography
Opens on Coursera โ†—
Network Security
๐Ÿ“š Coursera Course โ†—
Self-paced
Network Security
Opens on Coursera โ†—
Verbal Communications and Presentation Skills
๐Ÿ“š Coursera Course โ†—
Self-paced
Verbal Communications and Presentation Skills
Opens on Coursera โ†—
Quantum Computing For Everyone - An Introduction
๐Ÿ“š Coursera Course โ†—
Self-paced
Quantum Computing For Everyone - An Introduction
Opens on Coursera โ†—