Tech Skills

Cybersecurity

Ethical hacking, penetration testing, network security, CTFs and defensive security

7,048
lessons
Skills in this topic
View full skill map โ†’
Security Basics
beginner
Fix OWASP top 10 vulnerabilities
AI Security
intermediate
Identify and patch prompt injection vulnerabilities
Network Security
intermediate
Configure a firewall with proper inbound/outbound rules
Ethical Hacking & Pen Testing
intermediate
Conduct a full pen test with Kali Linux
Cloud Security
intermediate
Implement IAM least-privilege policies on AWS/GCP
Incident Response
intermediate
Build an incident response playbook
Security Compliance
intermediate
Map controls for SOC 2 Type II compliance
Defensive AI
advanced
Build an AI-powered log anomaly detector
Top Tools Youโ€™ll Use in the IBM and ISC2 Cybersecurity Specialist Certificate on Coursera
Cybersecurity
Top Tools Youโ€™ll Use in the IBM and ISC2 Cybersecurity Specialist Certificate on Coursera
Coursera Beginner 1y ago
Why You Should Start Your Career With IT Help Desk
Cybersecurity โšก AI Lesson
Why You Should Start Your Career With IT Help Desk
The Cyber Mentor Beginner 1y ago
IBM Cybersecurity Certificate: Your Path to a Top Tech Career
Cybersecurity
IBM Cybersecurity Certificate: Your Path to a Top Tech Career
Coursera Intermediate 1y ago
are built-in windows programs vulnerable?
Cybersecurity โšก AI Lesson
are built-in windows programs vulnerable?
John Hammond Intermediate 1y ago
The Hacker Who Testified Before Congress & Changed Everything๐ŸŽ™Darknet Diaries Ep 155: Kingpin
Cybersecurity
The Hacker Who Testified Before Congress & Changed Everything๐ŸŽ™Darknet Diaries Ep 155: Kingpin
Jack Rhysider Intermediate 1y ago
Top 5 Common API Security Mistakes & How to Avoid Them ( Tamil )
Cybersecurity
Top 5 Common API Security Mistakes & How to Avoid Them ( Tamil )
TechArchLab Intermediate 1y ago
Top 10 HACKING Techniques (2025) | Cyber Attack Strategies | Top Hacking Methods | Edureka
Cybersecurity
Top 10 HACKING Techniques (2025) | Cyber Attack Strategies | Top Hacking Methods | Edureka
edureka! Beginner 1y ago
BREAK INTO Cybersecurity in 2025 ๐Ÿ’ฐ
Cybersecurity
BREAK INTO Cybersecurity in 2025 ๐Ÿ’ฐ
Sajjaad Khader Intermediate 1y ago
HackTheBox - Instant
Cybersecurity
HackTheBox - Instant
IppSec Beginner 1y ago
It only takes one photo
Cybersecurity โšก AI Lesson
It only takes one photo
NetworkChuck Intermediate 1y ago
You're going to get Hacked in 2025
Cybersecurity โšก AI Lesson
You're going to get Hacked in 2025
NetworkChuck Beginner 1y ago
How to Secure Your WordPress Site in 2025
Cybersecurity โšก AI Lesson
How to Secure Your WordPress Site in 2025
The Cyber Mentor Beginner 1y ago
Do you know this common Go vulnerability?
Cybersecurity โšก AI Lesson
Do you know this common Go vulnerability?
LiveOverflow Beginner 1y ago
Linus Tech Tips Cybersecurity?
Cybersecurity
Linus Tech Tips Cybersecurity?
David Bombal Beginner 1y ago
Can you handle a cyber attack? TryHackMe SOC Simulator
Cybersecurity โšก AI Lesson
Can you handle a cyber attack? TryHackMe SOC Simulator
John Hammond Advanced 1y ago
Generative AI's Greatest Flaw - Computerphile
Cybersecurity โšก AI Lesson
Generative AI's Greatest Flaw - Computerphile
Computerphile Beginner 1y ago
Sponsorship Opportunities at SANS Cyber Fest
Cybersecurity โšก AI Lesson
Sponsorship Opportunities at SANS Cyber Fest
SANS Institute Beginner 1y ago
Sponsorship Opportunities at SANS Summits
Cybersecurity โšก AI Lesson
Sponsorship Opportunities at SANS Summits
SANS Institute Beginner 1y ago
Private Key Encryption - why is it used? #shorts #encryption #hashing #password
Cybersecurity
Private Key Encryption - why is it used? #shorts #encryption #hashing #password
David Bombal Intermediate 1y ago
Computer Virus: How It Got Its Name! #facts #techintamil #scienceandtechnology
Cybersecurity
Computer Virus: How It Got Its Name! #facts #techintamil #scienceandtechnology
Arivi by HCL GUVI Intermediate 1y ago
HackTheBox - Yummy
Cybersecurity โšก AI Lesson
HackTheBox - Yummy
IppSec Beginner 1y ago
Hacking Before Computers! #facts #scienceandtechnology #techintamil
Cybersecurity
Hacking Before Computers! #facts #scienceandtechnology #techintamil
Arivi by HCL GUVI Intermediate 1y ago
Cybersecurity Full Course 2025 | Cyber Security Training for Beginners | Edureka
Cybersecurity
Cybersecurity Full Course 2025 | Cyber Security Training for Beginners | Edureka
edureka! Beginner 1y ago
Emulating FIN6 - Active Directory Enumeration Made EASY
Cybersecurity โšก AI Lesson
Emulating FIN6 - Active Directory Enumeration Made EASY
HackerSploit Beginner 1y ago
The BEST Facebook Ad Creatives for 2025
Cybersecurity
The BEST Facebook Ad Creatives for 2025
Chase Chappell Beginner 1y ago
How IBM and ISC2 Can Help You Prepare for a Career in Cybersecurity
Cybersecurity
How IBM and ISC2 Can Help You Prepare for a Career in Cybersecurity
Coursera Beginner 1y ago
Compare Your Options to Find the Right Cybersecurity Credential for You on Coursera
Cybersecurity
Compare Your Options to Find the Right Cybersecurity Credential for You on Coursera
Coursera Advanced 1y ago
The Snyk Fetch the Flag CTF is LIVE right now!!
Cybersecurity โšก AI Lesson
The Snyk Fetch the Flag CTF is LIVE right now!!
John Hammond Intermediate 1y ago
LIVE: Web Hacking | Pentesting | AppSec | Cybersecurity | TryHackme | AMA
Cybersecurity โšก AI Lesson
LIVE: Web Hacking | Pentesting | AppSec | Cybersecurity | TryHackme | AMA
The Cyber Mentor Beginner 1y ago
How PNPT Accelerated Camp Will Change Your Career Forever!
Cybersecurity โšก AI Lesson
How PNPT Accelerated Camp Will Change Your Career Forever!
The Cyber Mentor Beginner 1y ago
Trust No One by default!
Cybersecurity โšก AI Lesson
Trust No One by default!
David Bombal Beginner 1y ago
my shortest video ever
Cybersecurity
my shortest video ever
John Hammond Beginner 1y ago
Chat with Microsoft about NEW Scareware Blocker
Cybersecurity
Chat with Microsoft about NEW Scareware Blocker
John Hammond Beginner 1y ago
Must Have Blue Team Tools for SOC Analysts in 2026
Cybersecurity โšก AI Lesson
Must Have Blue Team Tools for SOC Analysts in 2026
The Cyber Mentor Beginner 1y ago
Top Skills Youโ€™ll Build with the Google Cybersecurity Certificate on Coursera
Cybersecurity
Top Skills Youโ€™ll Build with the Google Cybersecurity Certificate on Coursera
Coursera Beginner 1y ago
The real world Iron Man? #shorts #ironman #mcu #cosplay #cybersecurity #zerotrust
Cybersecurity โšก AI Lesson
The real world Iron Man? #shorts #ironman #mcu #cosplay #cybersecurity #zerotrust
David Bombal Intermediate 1y ago
but is it malware?
Cybersecurity
but is it malware?
John Hammond Beginner 1y ago
LIVE: Web Hacking | Pentesting | AppSec | Cybersecurity | TryHackme | AMA
Cybersecurity โšก AI Lesson
LIVE: Web Hacking | Pentesting | AppSec | Cybersecurity | TryHackme | AMA
The Cyber Mentor Beginner 1y ago
Who Can Benefit from Googleโ€™s Cybersecurity Certificate?
Cybersecurity
Who Can Benefit from Googleโ€™s Cybersecurity Certificate?
Coursera Beginner 1y ago
microsoft edge did something awesome
Cybersecurity
microsoft edge did something awesome
John Hammond Beginner 1y ago
stop falling for this (disable Win+R run dialog)
Cybersecurity
stop falling for this (disable Win+R run dialog)
John Hammond Advanced 1y ago
Supply Chain Horror Stories
Cybersecurity
Supply Chain Horror Stories
John Hammond Beginner 1y ago
HackTheBox - Cicada
Cybersecurity
HackTheBox - Cicada
IppSec Beginner 1y ago
Defeat the OWASP Top 10 With These 5 Tips!
Cybersecurity โšก AI Lesson
Defeat the OWASP Top 10 With These 5 Tips!
The Cyber Mentor Beginner 1y ago
REPORT THIS ACCOUNT
Cybersecurity โšก AI Lesson
REPORT THIS ACCOUNT
John Hammond Beginner 1y ago
How I Got Malware From Discord!
Cybersecurity โšก AI Lesson
How I Got Malware From Discord!
The Cyber Mentor Beginner 1y ago
How to get a job in IT (2025)
Cybersecurity โšก AI Lesson
How to get a job in IT (2025)
NetworkChuck Intermediate 1y ago
LIVE: Blue Team | MyDFIR | AMA | Cybersecurity
Cybersecurity โšก AI Lesson
LIVE: Blue Team | MyDFIR | AMA | Cybersecurity
The Cyber Mentor Beginner 1y ago
๐Ÿ“š Coursera Courses Opens on Coursera ยท Free to audit
1 / 3 View all โ†’
Intro to Secure Coding and Input Validation in Android
๐Ÿ“š Coursera Course โ†—
Self-paced
Intro to Secure Coding and Input Validation in Android
Opens on Coursera โ†—
Red Hat Enterprise Linux 8
๐Ÿ“š Coursera Course โ†—
Self-paced
Red Hat Enterprise Linux 8
Opens on Coursera โ†—
Advanced Penetration Testing with Kali Linux
๐Ÿ“š Coursera Course โ†—
Self-paced
Advanced Penetration Testing with Kali Linux
Opens on Coursera โ†—
Cloud Next Generation Firewallย : รฉvaluer vos besoins
๐Ÿ“š Coursera Course โ†—
Self-paced
Cloud Next Generation Firewallย : รฉvaluer vos besoins
Opens on Coursera โ†—
Modelling Threats - Strategies in Threat Modelling
๐Ÿ“š Coursera Course โ†—
Self-paced
Modelling Threats - Strategies in Threat Modelling
Opens on Coursera โ†—
CISA Certified Information Systems Auditor: Unit 5
๐Ÿ“š Coursera Course โ†—
Self-paced
CISA Certified Information Systems Auditor: Unit 5
Opens on Coursera โ†—