Tech Skills

Cybersecurity

Ethical hacking, penetration testing, network security, CTFs and defensive security

6393
lessons
Skills in this topic
View full skill map โ†’
Security Basics
beginner
Fix OWASP top 10 vulnerabilities
AI Security
intermediate
Identify and patch prompt injection vulnerabilities
Network Security
intermediate
Configure a firewall with proper inbound/outbound rules
Ethical Hacking & Pen Testing
intermediate
Conduct a full pen test with Kali Linux
Cloud Security
intermediate
Implement IAM least-privilege policies on AWS/GCP
Incident Response
intermediate
Build an incident response playbook
Security Compliance
intermediate
Map controls for SOC 2 Type II compliance
Defensive AI
advanced
Build an AI-powered log anomaly detector
๐Ÿ”ฅ Cybersecurity Certification | Top 5 Cybersecurity Certifications To Get In 2025 | Edureka
Cybersecurity
๐Ÿ”ฅ Cybersecurity Certification | Top 5 Cybersecurity Certifications To Get In 2025 | Edureka
edureka! Beginner 1y ago
Start Web App Pentesting for FREE (Legally!)
Cybersecurity
Start Web App Pentesting for FREE (Legally!)
The Cyber Mentor Beginner 1y ago
Lightning Talk: Co-bots, Not Robots: Artificial Intelligence in Security Operations
Cybersecurity
Lightning Talk: Co-bots, Not Robots: Artificial Intelligence in Security Operations
SANS Institute Intermediate 1y ago
They Say This Malware is INSANE
Cybersecurity
They Say This Malware is INSANE
John Hammond Beginner 1y ago
mobman 2
Cybersecurity
mobman 2
Jack Rhysider Intermediate 1y ago
Hacking from Cloud to Endpoint (and vice versa)
Cybersecurity
Hacking from Cloud to Endpoint (and vice versa)
John Hammond Beginner 1y ago
HackTheBox - EvilCUPS
Cybersecurity
HackTheBox - EvilCUPS
IppSec Beginner 1y ago
Bug Bounty explained in 40 seconds | Best Websites
Cybersecurity
Bug Bounty explained in 40 seconds | Best Websites
GeeksforGeeks Beginner 1y ago
India's Historic win!
Cybersecurity
India's Historic win!
Full Disclosure Intermediate 1y ago
Are phones and cars next? Hacker explains: The Cybersecurity threat you need to worry about?
Cybersecurity
Are phones and cars next? Hacker explains: The Cybersecurity threat you need to worry about?
David Bombal Beginner 1y ago
Stanford's Neil Daswani Shares the Top 5 Cybersecurity Job Myths
Cybersecurity
Stanford's Neil Daswani Shares the Top 5 Cybersecurity Job Myths
Stanford Online Beginner 1y ago
Learn Regex in 15 Minutes
Cybersecurity
Learn Regex in 15 Minutes
The Cyber Mentor Beginner 1y ago
Hack a network and capture passwords using Python and Kali Linux // FREE CCNA 200-301 Course
Cybersecurity
Hack a network and capture passwords using Python and Kali Linux // FREE CCNA 200-301 Course
David Bombal Beginner 1y ago
SANS Threat Analysis Rundown with Katie Nickels | Sep. 2024 Edition
Cybersecurity
SANS Threat Analysis Rundown with Katie Nickels | Sep. 2024 Edition
SANS Institute Beginner 1y ago
15 Essential Skills Every Cybersecurity Analyst Needs
Cybersecurity
15 Essential Skills Every Cybersecurity Analyst Needs
Coursera Beginner 1y ago
he hacked my websites
Cybersecurity
he hacked my websites
NetworkChuck Beginner 1y ago
CS50x 2025 - Lecture 2 - Arrays
Cybersecurity
CS50x 2025 - Lecture 2 - Arrays
CS50 Beginner 1y ago
Hide your files like a hacker (5 Ways)
Cybersecurity
Hide your files like a hacker (5 Ways)
NetworkChuck Beginner 1y ago
Darknet Diaries ๐™ฒ๐šˆ๐™ฑ๐™ด๐š๐š†๐™ฐ๐š…๐™ด Remix
Cybersecurity
Darknet Diaries ๐™ฒ๐šˆ๐™ฑ๐™ด๐š๐š†๐™ฐ๐š…๐™ด Remix
Jack Rhysider Intermediate 1y ago
HackTheBox - Intuition
Cybersecurity
HackTheBox - Intuition
IppSec Beginner 1y ago
Gregory Aldrete: The Roman Empire - Rise and Fall of Ancient Rome | Lex Fridman Podcast #443
Cybersecurity
Gregory Aldrete: The Roman Empire - Rise and Fall of Ancient Rome | Lex Fridman Podcast #443
Lex Fridman Beginner 1y ago
Career Spotlight: Cybersecurity Analyst
Cybersecurity
Career Spotlight: Cybersecurity Analyst
Coursera Intermediate 1y ago
AWS Network Firewall TLS Inspection: 3 Pitfalls to Avoid
Cybersecurity
AWS Network Firewall TLS Inspection: 3 Pitfalls to Avoid
AWS Developers Intermediate 1y ago
How I Find Fail-Proof SEO Niches
Cybersecurity
How I Find Fail-Proof SEO Niches
Matt Diggity Beginner 1y ago
Top web series every techie must watch | Netflix
Cybersecurity
Top web series every techie must watch | Netflix
GeeksforGeeks Beginner 1y ago
Where Does Malware Go On Your Computer?
Cybersecurity
Where Does Malware Go On Your Computer?
John Hammond Beginner 1y ago
Hacking ALL Levels in this Game!
Cybersecurity
Hacking ALL Levels in this Game!
John Hammond Beginner 1y ago
Healthcare - Industrial Control Security for Pharmaceuticals | Dean Parsons
Cybersecurity
Healthcare - Industrial Control Security for Pharmaceuticals | Dean Parsons
SANS Institute Intermediate 1y ago
Enhanced Vendor Risk Assessment | Tony Turner
Cybersecurity
Enhanced Vendor Risk Assessment | Tony Turner
SANS Institute Advanced 1y ago
Never access the Dark Web without doing this! (Tor and Telegram demos)
Cybersecurity
Never access the Dark Web without doing this! (Tor and Telegram demos)
David Bombal Beginner 1y ago
Detect Intruders and Fix Vulnerabilities With One Free Solution
Cybersecurity
Detect Intruders and Fix Vulnerabilities With One Free Solution
The Cyber Mentor Beginner 1y ago
Cracking Active Directory Passwords & MFA Fatigue
Cybersecurity
Cracking Active Directory Passwords & MFA Fatigue
John Hammond Beginner 1y ago
LIVE: Blue Team with @MalwareCube | New Cert? | Cybersecurity | SOC | PJSA
Cybersecurity
LIVE: Blue Team with @MalwareCube | New Cert? | Cybersecurity | SOC | PJSA
The Cyber Mentor Beginner 1y ago
How to Scrape Telegram with Python
Cybersecurity
How to Scrape Telegram with Python
John Hammond Beginner 1y ago
Fake CAPTCHA Runs Malware
Cybersecurity
Fake CAPTCHA Runs Malware
John Hammond Beginner 1y ago
SANS Hacker Tools & Incident Handling Training Course: SEC504 with Kevin Tyers
Cybersecurity
SANS Hacker Tools & Incident Handling Training Course: SEC504 with Kevin Tyers
SANS Institute Advanced 1y ago
SANS Compliance Countdown 2024
Cybersecurity
SANS Compliance Countdown 2024
SANS Institute Beginner 1y ago
Ransomware In Action: MedusaLocker ReadText34
Cybersecurity
Ransomware In Action: MedusaLocker ReadText34
John Hammond Advanced 1y ago
LIVE: Ransomware Investigation | Cybersecurity | Splunk | Blue Team |
Cybersecurity
LIVE: Ransomware Investigation | Cybersecurity | Splunk | Blue Team |
The Cyber Mentor Beginner 1y ago
Your information is not safe in the hands of authorities
Cybersecurity
Your information is not safe in the hands of authorities
Jack Rhysider Intermediate 1y ago
WiFi Hacking Watch (WiFi Deauther)
Cybersecurity
WiFi Hacking Watch (WiFi Deauther)
David Bombal Intermediate 1y ago
HackTheBox - Mailing
Cybersecurity
HackTheBox - Mailing
IppSec Beginner 1y ago
Thieves stole NFTs with Instagram
Cybersecurity
Thieves stole NFTs with Instagram
Jack Rhysider Intermediate 1y ago
Caido: The Hacking Tool You Didn't Know You Needed
Cybersecurity
Caido: The Hacking Tool You Didn't Know You Needed
The Cyber Mentor Beginner 1y ago
Mini-Stories Vol. 3
Cybersecurity
Mini-Stories Vol. 3
Jack Rhysider Intermediate 1y ago
The Hacker with Hardware Implants (interview)
Cybersecurity
The Hacker with Hardware Implants (interview)
John Hammond Beginner 1y ago
The Secret CIA Backdoor
Cybersecurity
The Secret CIA Backdoor
Jack Rhysider Intermediate 1y ago
Hacking Games with MelonLoader
Cybersecurity
Hacking Games with MelonLoader
John Hammond Beginner 1y ago
๐Ÿ“š Coursera Courses Opens on Coursera ยท Free to audit
1 / 3 View all โ†’
CyberSec First Responder (CFR-310)
๐Ÿ“š Coursera Course โ†—
Self-paced
CyberSec First Responder (CFR-310)
Opens on Coursera โ†—
Practical Blockchain and Cryptocurrency
๐Ÿ“š Coursera Course โ†—
Self-paced
Practical Blockchain and Cryptocurrency
Opens on Coursera โ†—
VPN Tunneling with OpenVPN: Secure Network Connections
๐Ÿ“š Coursera Course โ†—
Self-paced
VPN Tunneling with OpenVPN: Secure Network Connections
Opens on Coursera โ†—
Cybersecurity Compliance Framework, Standards & Regulations
๐Ÿ“š Coursera Course โ†—
Self-paced
Cybersecurity Compliance Framework, Standards & Regulations
Opens on Coursera โ†—
CCNA: Network Security, Automation, and Troubleshooting
๐Ÿ“š Coursera Course โ†—
Self-paced
CCNA: Network Security, Automation, and Troubleshooting
Opens on Coursera โ†—
Legal and Ethical Cyber Investigations
๐Ÿ“š Coursera Course โ†—
Self-paced
Legal and Ethical Cyber Investigations
Opens on Coursera โ†—