Tech Skills

Cybersecurity

Ethical hacking, penetration testing, network security, CTFs and defensive security

7,052
lessons
Skills in this topic
View full skill map โ†’
Security Basics
beginner
Fix OWASP top 10 vulnerabilities
AI Security
intermediate
Identify and patch prompt injection vulnerabilities
Network Security
intermediate
Configure a firewall with proper inbound/outbound rules
Ethical Hacking & Pen Testing
intermediate
Conduct a full pen test with Kali Linux
Cloud Security
intermediate
Implement IAM least-privilege policies on AWS/GCP
Incident Response
intermediate
Build an incident response playbook
Security Compliance
intermediate
Map controls for SOC 2 Type II compliance
Defensive AI
advanced
Build an AI-powered log anomaly detector
COMPLETE Cybersecurity Roadmap
Cybersecurity
COMPLETE Cybersecurity Roadmap
Sajjaad Khader Intermediate 1y ago
Bitcoin Wallets Are Not as Private as You Think
Cybersecurity โšก AI Lesson
Bitcoin Wallets Are Not as Private as You Think
Jack Rhysider Intermediate 1y ago
Malware Demo and Tutorial
Cybersecurity
Malware Demo and Tutorial
David Bombal Beginner 1y ago
Exploring the Wiz Cloud Security Platform
Cybersecurity โšก AI Lesson
Exploring the Wiz Cloud Security Platform
John Hammond Beginner 1y ago
The Infamous Love Bug Virus
Cybersecurity โšก AI Lesson
The Infamous Love Bug Virus
Jack Rhysider Intermediate 1y ago
Cybersecurity Roadmap 2025 | How To Become A Cybersecurity Expert | Edureka
Cybersecurity
Cybersecurity Roadmap 2025 | How To Become A Cybersecurity Expert | Edureka
edureka! Beginner 1y ago
Windows Servers Can Expose PowerShell on the Web
Cybersecurity โšก AI Lesson
Windows Servers Can Expose PowerShell on the Web
John Hammond Beginner 1y ago
Can this Mind Blowing ๐Ÿคฏ Reverse Shell be stopped? (Powershell Hack)
Cybersecurity โšก AI Lesson
Can this Mind Blowing ๐Ÿคฏ Reverse Shell be stopped? (Powershell Hack)
David Bombal Beginner 1y ago
HackTheBox - Editorial
Cybersecurity
HackTheBox - Editorial
IppSec Beginner 1y ago
How Does Prototype Pollution Actually Work?
Cybersecurity โšก AI Lesson
How Does Prototype Pollution Actually Work?
The Cyber Mentor Beginner 1y ago
How to Control your Ingress & Egress Traffic Based on Location
Cybersecurity โšก AI Lesson
How to Control your Ingress & Egress Traffic Based on Location
AWS Developers Intermediate 1y ago
Career Transition Episode 48 | Cyber security Career Transition | Edureka Reviews
Cybersecurity
Career Transition Episode 48 | Cyber security Career Transition | Edureka Reviews
edureka! Advanced 1y ago
5 Levels of AI Marketing Mastery: How to Level-Up Your Use of AI
Cybersecurity โšก AI Lesson
5 Levels of AI Marketing Mastery: How to Level-Up Your Use of AI
AI Explored Beginner 1y ago
From Compliance to Leadership: What Every CISO Needs to Know
Cybersecurity โšก AI Lesson
From Compliance to Leadership: What Every CISO Needs to Know
SANS Institute Beginner 1y ago
Security Best Practices for Production Applications
Cybersecurity
Security Best Practices for Production Applications
GeeksforGeeks Beginner 1y ago
Data Quality Management Techniques - The Complete Guide
Cybersecurity โšก AI Lesson
Data Quality Management Techniques - The Complete Guide
MLOps.community Beginner 1y ago
Lightning Talk: AI for SOC Teams - Enhancing Incident Response and Vulnerability Management
Cybersecurity โšก AI Lesson
Lightning Talk: AI for SOC Teams - Enhancing Incident Response and Vulnerability Management
SANS Institute Beginner 1y ago
Start Web App Pentesting for FREE (Legally!)
Cybersecurity โšก AI Lesson
Start Web App Pentesting for FREE (Legally!)
The Cyber Mentor Beginner 1y ago
HackTheBox - EvilCUPS
Cybersecurity โšก AI Lesson
HackTheBox - EvilCUPS
IppSec Beginner 1y ago
Bug Bounty explained in 40 seconds | Best Websites
Cybersecurity
Bug Bounty explained in 40 seconds | Best Websites
GeeksforGeeks Beginner 1y ago
India's Historic win!
Cybersecurity
India's Historic win!
Full Disclosure Intermediate 1y ago
Stanford's Neil Daswani Shares the Top 5 Cybersecurity Job Myths
Cybersecurity
Stanford's Neil Daswani Shares the Top 5 Cybersecurity Job Myths
Stanford Online Beginner 1y ago
15 Essential Skills Every Cybersecurity Analyst Needs
Cybersecurity
15 Essential Skills Every Cybersecurity Analyst Needs
Coursera Beginner 1y ago
They hacked the Internet Archive โ˜น๏ธ #shorts #news #cybersecurity #hacker #hacking
Cybersecurity
They hacked the Internet Archive โ˜น๏ธ #shorts #news #cybersecurity #hacker #hacking
David Bombal Intermediate 1y ago
Hacking Google Maps traffic
Cybersecurity
Hacking Google Maps traffic
Jack Rhysider Intermediate 1y ago
Hackers Abuse MeshCentral for a RAT
Cybersecurity
Hackers Abuse MeshCentral for a RAT
John Hammond Beginner 1y ago
The Fake FBI Ransomware
Cybersecurity
The Fake FBI Ransomware
Jack Rhysider Intermediate 1y ago
Hacking ARP with Python and Kali Linux (and capture passwords)
Cybersecurity
Hacking ARP with Python and Kali Linux (and capture passwords)
David Bombal Intermediate 1y ago
CEH v13 Certification | Whatโ€™s New in CEH v13 AI? | CEH v13 Exam Details | Edureka
Cybersecurity
CEH v13 Certification | Whatโ€™s New in CEH v13 AI? | CEH v13 Exam Details | Edureka
edureka! Beginner 1y ago
Bruteforcing Windows Defender Exclusions
Cybersecurity โšก AI Lesson
Bruteforcing Windows Defender Exclusions
John Hammond Advanced 1y ago
REAL Ransomware Chat Logs
Cybersecurity
REAL Ransomware Chat Logs
John Hammond Beginner 1y ago
Will they also ban this after banning the Flipper Zero? #shorts #flipperzero #cars #cybersecurity
Cybersecurity
Will they also ban this after banning the Flipper Zero? #shorts #flipperzero #cars #cybersecurity
David Bombal Intermediate 1y ago
Github Intentionally Lets You Read Deleted & Private Commits
Cybersecurity
Github Intentionally Lets You Read Deleted & Private Commits
John Hammond Beginner 1y ago
Three Ways to Hack Mobile Apps
Cybersecurity
Three Ways to Hack Mobile Apps
John Hammond Beginner 1y ago
๐Ÿ”ฅ Cybersecurity Certification | Top 5 Cybersecurity Certifications To Get In 2025 | Edureka
Cybersecurity
๐Ÿ”ฅ Cybersecurity Certification | Top 5 Cybersecurity Certifications To Get In 2025 | Edureka
edureka! Beginner 1y ago
Lightning Talk: Co-bots, Not Robots: Artificial Intelligence in Security Operations
Cybersecurity โšก AI Lesson
Lightning Talk: Co-bots, Not Robots: Artificial Intelligence in Security Operations
SANS Institute Intermediate 1y ago
They Say This Malware is INSANE
Cybersecurity
They Say This Malware is INSANE
John Hammond Beginner 1y ago
Hacking from Cloud to Endpoint (and vice versa)
Cybersecurity
Hacking from Cloud to Endpoint (and vice versa)
John Hammond Beginner 1y ago
Are phones and cars next? Hacker explains: The Cybersecurity threat you need to worry about?
Cybersecurity โšก AI Lesson
Are phones and cars next? Hacker explains: The Cybersecurity threat you need to worry about?
David Bombal Beginner 1y ago
Learn Regex in 15 Minutes
Cybersecurity โšก AI Lesson
Learn Regex in 15 Minutes
The Cyber Mentor Beginner 1y ago
Hack a network and capture passwords using Python and Kali Linux // FREE CCNA 200-301 Course
Cybersecurity
Hack a network and capture passwords using Python and Kali Linux // FREE CCNA 200-301 Course
David Bombal Beginner 1y ago
SANS Threat Analysis Rundown with Katie Nickels | Sep. 2024 Edition
Cybersecurity โšก AI Lesson
SANS Threat Analysis Rundown with Katie Nickels | Sep. 2024 Edition
SANS Institute Beginner 1y ago
Where Does Malware Go On Your Computer?
Cybersecurity
Where Does Malware Go On Your Computer?
John Hammond Beginner 1y ago
Hacking ALL Levels in this Game!
Cybersecurity โšก AI Lesson
Hacking ALL Levels in this Game!
John Hammond Beginner 1y ago
Healthcare - Industrial Control Security for Pharmaceuticals | Dean Parsons
Cybersecurity โšก AI Lesson
Healthcare - Industrial Control Security for Pharmaceuticals | Dean Parsons
SANS Institute Intermediate 1y ago
Enhanced Vendor Risk Assessment | Tony Turner
Cybersecurity โšก AI Lesson
Enhanced Vendor Risk Assessment | Tony Turner
SANS Institute Advanced 1y ago
Never access the Dark Web without doing this! (Tor and Telegram demos)
Cybersecurity
Never access the Dark Web without doing this! (Tor and Telegram demos)
David Bombal Beginner 1y ago
Detect Intruders and Fix Vulnerabilities With One Free Solution
Cybersecurity โšก AI Lesson
Detect Intruders and Fix Vulnerabilities With One Free Solution
The Cyber Mentor Beginner 1y ago
๐Ÿ“š Coursera Courses Opens on Coursera ยท Free to audit
1 / 3 View all โ†’
Homeland Security and Cybersecurity Future
๐Ÿ“š Coursera Course โ†—
Self-paced
Homeland Security and Cybersecurity Future
Opens on Coursera โ†—
Information Security
๐Ÿ“š Coursera Course โ†—
Self-paced
Information Security
Opens on Coursera โ†—
CompTIA A+ Core 2 (220-1202)
๐Ÿ“š Coursera Course โ†—
Self-paced
CompTIA A+ Core 2 (220-1202)
Opens on Coursera โ†—
Secure Healthcare Data: Encrypt, Audit, Protect
๐Ÿ“š Coursera Course โ†—
Self-paced
Secure Healthcare Data: Encrypt, Audit, Protect
Opens on Coursera โ†—
Security Governance & Compliance
๐Ÿ“š Coursera Course โ†—
Self-paced
Security Governance & Compliance
Opens on Coursera โ†—
Introduction to Google Security Operations: Unified SecOps
๐Ÿ“š Coursera Course โ†—
Self-paced
Introduction to Google Security Operations: Unified SecOps
Opens on Coursera โ†—