Tech Skills

Cybersecurity

Ethical hacking, penetration testing, network security, CTFs and defensive security

7,052
lessons
Skills in this topic
View full skill map โ†’
Security Basics
beginner
Fix OWASP top 10 vulnerabilities
AI Security
intermediate
Identify and patch prompt injection vulnerabilities
Network Security
intermediate
Configure a firewall with proper inbound/outbound rules
Ethical Hacking & Pen Testing
intermediate
Conduct a full pen test with Kali Linux
Cloud Security
intermediate
Implement IAM least-privilege policies on AWS/GCP
Incident Response
intermediate
Build an incident response playbook
Security Compliance
intermediate
Map controls for SOC 2 Type II compliance
Defensive AI
advanced
Build an AI-powered log anomaly detector
Cracking Active Directory Passwords & MFA Fatigue
Cybersecurity โšก AI Lesson
Cracking Active Directory Passwords & MFA Fatigue
John Hammond Beginner 1y ago
LIVE: Blue Team with @MalwareCube | New Cert? | Cybersecurity | SOC | PJSA
Cybersecurity โšก AI Lesson
LIVE: Blue Team with @MalwareCube | New Cert? | Cybersecurity | SOC | PJSA
The Cyber Mentor Beginner 1y ago
he hacked my websites
Cybersecurity โšก AI Lesson
he hacked my websites
NetworkChuck Beginner 1y ago
How to Scrape Telegram with Python
Cybersecurity โšก AI Lesson
How to Scrape Telegram with Python
John Hammond Beginner 1y ago
CS50x 2025 - Lecture 2 - Arrays
Cybersecurity
CS50x 2025 - Lecture 2 - Arrays
CS50 Beginner 1y ago
Hide your files like a hacker (5 Ways)
Cybersecurity โšก AI Lesson
Hide your files like a hacker (5 Ways)
NetworkChuck Beginner 1y ago
Darknet Diaries ๐™ฒ๐šˆ๐™ฑ๐™ด๐š๐š†๐™ฐ๐š…๐™ด Remix
Cybersecurity โšก AI Lesson
Darknet Diaries ๐™ฒ๐šˆ๐™ฑ๐™ด๐š๐š†๐™ฐ๐š…๐™ด Remix
Jack Rhysider Intermediate 1y ago
HackTheBox - Intuition
Cybersecurity
HackTheBox - Intuition
IppSec Beginner 1y ago
SANS Hacker Tools & Incident Handling Training Course: SEC504 with Kevin Tyers
Cybersecurity โšก AI Lesson
SANS Hacker Tools & Incident Handling Training Course: SEC504 with Kevin Tyers
SANS Institute Advanced 1y ago
Gregory Aldrete: The Roman Empire - Rise and Fall of Ancient Rome | Lex Fridman Podcast #443
Cybersecurity
Gregory Aldrete: The Roman Empire - Rise and Fall of Ancient Rome | Lex Fridman Podcast #443
Lex Fridman Beginner 1y ago
SANS Compliance Countdown 2024
Cybersecurity โšก AI Lesson
SANS Compliance Countdown 2024
SANS Institute Beginner 1y ago
Career Spotlight: Cybersecurity Analyst
Cybersecurity
Career Spotlight: Cybersecurity Analyst
Coursera Intermediate 1y ago
AWS Network Firewall TLS Inspection: 3 Pitfalls to Avoid
Cybersecurity
AWS Network Firewall TLS Inspection: 3 Pitfalls to Avoid
AWS Developers Intermediate 1y ago
LIVE: Ransomware Investigation | Cybersecurity | Splunk | Blue Team |
Cybersecurity โšก AI Lesson
LIVE: Ransomware Investigation | Cybersecurity | Splunk | Blue Team |
The Cyber Mentor Beginner 1y ago
How I Find Fail-Proof SEO Niches
Cybersecurity
How I Find Fail-Proof SEO Niches
Matt Diggity Beginner 1y ago
Your information is not safe in the hands of authorities
Cybersecurity
Your information is not safe in the hands of authorities
Jack Rhysider Intermediate 1y ago
WiFi Hacking Watch (WiFi Deauther)
Cybersecurity
WiFi Hacking Watch (WiFi Deauther)
David Bombal Intermediate 1y ago
Top web series every techie must watch | Netflix
Cybersecurity
Top web series every techie must watch | Netflix
GeeksforGeeks Beginner 1y ago
HackTheBox - Mailing
Cybersecurity
HackTheBox - Mailing
IppSec Beginner 1y ago
Hacking networks with Python (FREE CCNA 200-301 Course 2024)
Cybersecurity โšก AI Lesson
Hacking networks with Python (FREE CCNA 200-301 Course 2024)
David Bombal Beginner 1y ago
๐Ÿ”’ What is a VPN and How Does It Work? ๐ŸŒ
Cybersecurity
๐Ÿ”’ What is a VPN and How Does It Work? ๐ŸŒ
GeeksforGeeks Beginner 1y ago
5 Cybersecurity Careers: Your Path to Protecting the Digital World
Cybersecurity
5 Cybersecurity Careers: Your Path to Protecting the Digital World
Coursera Beginner 1y ago
My Evidence-Backed Strategy To Make $100k In Six Months
Cybersecurity
My Evidence-Backed Strategy To Make $100k In Six Months
Sunny Lenarduzzi Beginner 1y ago
Billionaire Pavel Durov arrested... The truth about Telegram
Cybersecurity โšก AI Lesson
Billionaire Pavel Durov arrested... The truth about Telegram
Fireship Beginner 1y ago
Fake CAPTCHA Runs Malware
Cybersecurity โšก AI Lesson
Fake CAPTCHA Runs Malware
John Hammond Beginner 1y ago
Ransomware In Action: MedusaLocker ReadText34
Cybersecurity
Ransomware In Action: MedusaLocker ReadText34
John Hammond Advanced 1y ago
Thieves stole NFTs with Instagram
Cybersecurity โšก AI Lesson
Thieves stole NFTs with Instagram
Jack Rhysider Intermediate 1y ago
Caido: The Hacking Tool You Didn't Know You Needed
Cybersecurity โšก AI Lesson
Caido: The Hacking Tool You Didn't Know You Needed
The Cyber Mentor Beginner 1y ago
Mini-Stories Vol. 3
Cybersecurity
Mini-Stories Vol. 3
Jack Rhysider Intermediate 1y ago
The Hacker with Hardware Implants (interview)
Cybersecurity โšก AI Lesson
The Hacker with Hardware Implants (interview)
John Hammond Beginner 1y ago
The Secret CIA Backdoor
Cybersecurity
The Secret CIA Backdoor
Jack Rhysider Intermediate 1y ago
Hacking Games with MelonLoader
Cybersecurity โšก AI Lesson
Hacking Games with MelonLoader
John Hammond Beginner 1y ago
For when you canโ€™t afford a Cybersecurity Engineerโ€ฆโ€ฆ
Cybersecurity โšก AI Lesson
For when you canโ€™t afford a Cybersecurity Engineerโ€ฆโ€ฆ
NetworkChuck Intermediate 1y ago
I Can't Scan This Website
Cybersecurity
I Can't Scan This Website
John Hammond Beginner 1y ago
How military hackers destroyed 90% of ISIS's media online
Cybersecurity
How military hackers destroyed 90% of ISIS's media online
Jack Rhysider Intermediate 1y ago
HackTheBox - Skyfall
Cybersecurity
HackTheBox - Skyfall
IppSec Beginner 1y ago
The terrorist who mistakenly revealed his plans online
Cybersecurity
The terrorist who mistakenly revealed his plans online
Jack Rhysider Intermediate 1y ago
Mastering the Cybersecurity Interview: Key Tips and Common Pitfalls
Cybersecurity โšก AI Lesson
Mastering the Cybersecurity Interview: Key Tips and Common Pitfalls
The Cyber Mentor Beginner 1y ago
Unity Game Hacking with dnSpy
Cybersecurity โšก AI Lesson
Unity Game Hacking with dnSpy
John Hammond Beginner 1y ago
SANS Threat Analysis Rundown with Katie Nickels
Cybersecurity โšก AI Lesson
SANS Threat Analysis Rundown with Katie Nickels
SANS Institute Beginner 1y ago
The FBI monitors criminals through their phones
Cybersecurity
The FBI monitors criminals through their phones
Jack Rhysider Intermediate 1y ago
WiFi WPA2/WPA3 Wireshark Capture #shorts #wifi #wpa2 #iphone #android
Cybersecurity
WiFi WPA2/WPA3 Wireshark Capture #shorts #wifi #wpa2 #iphone #android
David Bombal Intermediate 1y ago
The Phone with decoy apps and secret chats
Cybersecurity โšก AI Lesson
The Phone with decoy apps and secret chats
Jack Rhysider Intermediate 1y ago
What is DNS? (and how it makes the Internet work)
Cybersecurity โšก AI Lesson
What is DNS? (and how it makes the Internet work)
NetworkChuck Beginner 1y ago
Interactive SQL Injection
Cybersecurity
Interactive SQL Injection
John Hammond Beginner 1y ago
Your Samsung Smart TV is spying on you
Cybersecurity
Your Samsung Smart TV is spying on you
Jack Rhysider Intermediate 1y ago
The Moment They Got Hacked
Cybersecurity โšก AI Lesson
The Moment They Got Hacked
John Hammond Beginner 1y ago
Gamers are losing money to crypto scams
Cybersecurity
Gamers are losing money to crypto scams
Jack Rhysider Intermediate 1y ago
๐Ÿ“š Coursera Courses Opens on Coursera ยท Free to audit
1 / 3 View all โ†’
IT Risk Assessment Practices
๐Ÿ“š Coursera Course โ†—
Self-paced
IT Risk Assessment Practices
Opens on Coursera โ†—
CompTIA PenTest+ (PT0-003)
๐Ÿ“š Coursera Course โ†—
Self-paced
CompTIA PenTest+ (PT0-003)
Opens on Coursera โ†—
Cloud Security on AWS
๐Ÿ“š Coursera Course โ†—
Self-paced
Cloud Security on AWS
Opens on Coursera โ†—
Wireshark for Beginners: TCP IP Protocol Fundamentals
๐Ÿ“š Coursera Course โ†—
Self-paced
Wireshark for Beginners: TCP IP Protocol Fundamentals
Opens on Coursera โ†—
Exploitation and Penetration Testing with Metasploit
๐Ÿ“š Coursera Course โ†—
Self-paced
Exploitation and Penetration Testing with Metasploit
Opens on Coursera โ†—
Into the Trenches: Security Operations Center
๐Ÿ“š Coursera Course โ†—
Self-paced
Into the Trenches: Security Operations Center
Opens on Coursera โ†—