Tech Skills

Cybersecurity

Ethical hacking, penetration testing, network security, CTFs and defensive security

6395
lessons
Skills in this topic
View full skill map →
Security Basics
beginner
Fix OWASP top 10 vulnerabilities
AI Security
intermediate
Identify and patch prompt injection vulnerabilities
Network Security
intermediate
Configure a firewall with proper inbound/outbound rules
Ethical Hacking & Pen Testing
intermediate
Conduct a full pen test with Kali Linux
Cloud Security
intermediate
Implement IAM least-privilege policies on AWS/GCP
Incident Response
intermediate
Build an incident response playbook
Security Compliance
intermediate
Map controls for SOC 2 Type II compliance
Defensive AI
advanced
Build an AI-powered log anomaly detector
Stealing Computer Passwords on Login
Cybersecurity
Stealing Computer Passwords on Login
John Hammond Beginner 1y ago
Dr. Ullrich on Today’s Cyber Threats: SANSFIRE 2024 Insights
Cybersecurity
Dr. Ullrich on Today’s Cyber Threats: SANSFIRE 2024 Insights
SANS Institute Advanced 1y ago
3 Tips to Pass Your Next Pentesting Exam | Cybersecurity and Hacking
Cybersecurity
3 Tips to Pass Your Next Pentesting Exam | Cybersecurity and Hacking
The Cyber Mentor Beginner 1y ago
What to Know About IT Certifications
Cybersecurity
What to Know About IT Certifications
The Cyber Mentor Beginner 1y ago
Will AI replace Cybersecurity professionals? Tom from Spunk replies. #shorts #AI #cybersecurity
Cybersecurity
Will AI replace Cybersecurity professionals? Tom from Spunk replies. #shorts #AI #cybersecurity
David Bombal Intermediate 1y ago
The cheat device that snuck onto Nintendo's platform
Cybersecurity
The cheat device that snuck onto Nintendo's platform
Jack Rhysider Intermediate 1y ago
HackTheBox - POV
Cybersecurity
HackTheBox - POV
IppSec Beginner 1y ago
$25 million lost to AI impersonation scam
Cybersecurity
$25 million lost to AI impersonation scam
Jack Rhysider Intermediate 1y ago
The Future of Cybersecurity with Cisco & Splunk's $28 billion investment!
Cybersecurity
The Future of Cybersecurity with Cisco & Splunk's $28 billion investment!
David Bombal Beginner 1y ago
For the Win: Aligning Security Initiatives with the Business
Cybersecurity
For the Win: Aligning Security Initiatives with the Business
SANS Institute Beginner 1y ago
FBI Stops World's Largest Botnet
Cybersecurity
FBI Stops World's Largest Botnet
John Hammond Beginner 1y ago
Kevin Spacey: Power, Controversy, Betrayal, Truth & Love in Film and Life | Lex Fridman Podcast #432
Cybersecurity
Kevin Spacey: Power, Controversy, Betrayal, Truth & Love in Film and Life | Lex Fridman Podcast #432
Lex Fridman Beginner 1y ago
HackTheBox - Analysis
Cybersecurity
HackTheBox - Analysis
IppSec Beginner 1y ago
Insomnia, A Call for Inner Change? #acupuncture #chinesemedicine
Cybersecurity
Insomnia, A Call for Inner Change? #acupuncture #chinesemedicine
TCM Academy Intermediate 1y ago
Dartmouth's Meet Alexis Abramson, Dean of the Thayer School of Engineering at Dartmouth 5.23.24
Cybersecurity
Dartmouth's Meet Alexis Abramson, Dean of the Thayer School of Engineering at Dartmouth 5.23.24
Coursera Beginner 1y ago
HackerSploit Channel Update 2024
Cybersecurity
HackerSploit Channel Update 2024
HackerSploit Beginner 1y ago
Three Mental Models for Cybersecurity
Cybersecurity
Three Mental Models for Cybersecurity
The Cyber Mentor Beginner 1y ago
Keynote | Challenges and Opportunities for Modern CISOs
Cybersecurity
Keynote | Challenges and Opportunities for Modern CISOs
SANS Institute Intermediate 1y ago
Leading Without Authority: Leadership Beyond Titles
Cybersecurity
Leading Without Authority: Leadership Beyond Titles
SANS Institute Intermediate 1y ago
Navigating the AI Security Horizon: A CISO’s Guide to Sustaining Cyber Resilience
Cybersecurity
Navigating the AI Security Horizon: A CISO’s Guide to Sustaining Cyber Resilience
SANS Institute Beginner 1y ago
"For criminals, by criminals:" How the FBI Tried to Wire Tap the World🎙Darknet Diaries Ep 146: ANOM
Cybersecurity
"For criminals, by criminals:" How the FBI Tried to Wire Tap the World🎙Darknet Diaries Ep 146: ANOM
Jack Rhysider Intermediate 1y ago
The destructive Iranian cyber attacks
Cybersecurity
The destructive Iranian cyber attacks
Jack Rhysider Intermediate 1y ago
Fileless Malware Analysis & PowerShell Deobfuscation
Cybersecurity
Fileless Malware Analysis & PowerShell Deobfuscation
John Hammond Advanced 1y ago
Use This Code for Your Next Internal Penetration Test
Cybersecurity
Use This Code for Your Next Internal Penetration Test
The Cyber Mentor Beginner 1y ago
Linux Hackers Become Root with CURL & Sudo
Cybersecurity
Linux Hackers Become Root with CURL & Sudo
John Hammond Beginner 1y ago
Learn to Build a Web App
Cybersecurity
Learn to Build a Web App
The Cyber Mentor Beginner 1y ago
The US malware that sabotaged Iran's nuclear facility
Cybersecurity
The US malware that sabotaged Iran's nuclear facility
Jack Rhysider Intermediate 1y ago
WiFi Security Myths Demo: Don't believe that these will protect you!
Cybersecurity
WiFi Security Myths Demo: Don't believe that these will protect you!
David Bombal Intermediate 1y ago
The hacker who became a Web Design CEO
Cybersecurity
The hacker who became a Web Design CEO
Jack Rhysider Intermediate 1y ago
Exploiting the Front-End: Challenge Walkthrough
Cybersecurity
Exploiting the Front-End: Challenge Walkthrough
The Cyber Mentor Beginner 1y ago
Did you know this about Linux? // Linux for Hackers Ep 5
Cybersecurity
Did you know this about Linux? // Linux for Hackers Ep 5
David Bombal Beginner 1y ago
Start Your Hacking Journey as a Beginner
Cybersecurity
Start Your Hacking Journey as a Beginner
The Cyber Mentor Beginner 1y ago
Security Governance | The 8 Domains of the Cloud Security Maturity Model | Part 3
Cybersecurity
Security Governance | The 8 Domains of the Cloud Security Maturity Model | Part 3
SANS Institute Beginner 1y ago
Hacking The Davinci Code: WebDAV Cybersecurity
Cybersecurity
Hacking The Davinci Code: WebDAV Cybersecurity
John Hammond Beginner 1y ago
Capture The Flag! NahamCon 2024 CTF Warmups
Cybersecurity
Capture The Flag! NahamCon 2024 CTF Warmups
John Hammond Beginner 1y ago
Install Nessus for Free and scan for Vulnerabilities (New Way)
Cybersecurity
Install Nessus for Free and scan for Vulnerabilities (New Way)
David Bombal Beginner 1y ago
HackTheBox - Bizness
Cybersecurity
HackTheBox - Bizness
IppSec Beginner 1y ago
They're hunting your passwords? #shorts #passwords #cybersecurity  #ai
Cybersecurity
They're hunting your passwords? #shorts #passwords #cybersecurity #ai
David Bombal Intermediate 1y ago
How to Prevent, Detect, and Respond to Attacks with this Free Tool?
Cybersecurity
How to Prevent, Detect, and Respond to Attacks with this Free Tool?
The Cyber Mentor Beginner 1y ago
The coolest WiFi hacking device?
Cybersecurity
The coolest WiFi hacking device?
David Bombal Intermediate 1y ago
NahamCon 2024 CTF is LIVE Right Now
Cybersecurity
NahamCon 2024 CTF is LIVE Right Now
John Hammond Beginner 1y ago
A Quick Beginner's Guide to CTFs | Tips for Starting Your First CTF
Cybersecurity
A Quick Beginner's Guide to CTFs | Tips for Starting Your First CTF
The Cyber Mentor Beginner 1y ago
Expertise isn't all you need - Building an AI Red Team
Cybersecurity
Expertise isn't all you need - Building an AI Red Team
SANS Institute Beginner 1y ago
IAM | The 8 Domains of the Cloud Security Maturity Model | Part 2
Cybersecurity
IAM | The 8 Domains of the Cloud Security Maturity Model | Part 2
SANS Institute Beginner 1y ago
I Put a Vulnerable Server on The Internet
Cybersecurity
I Put a Vulnerable Server on The Internet
John Hammond Beginner 1y ago
3 of the Top Note-Taking Apps Ranked
Cybersecurity
3 of the Top Note-Taking Apps Ranked
The Cyber Mentor Beginner 1y ago
Discussing Active Directory & Internal Network Security
Cybersecurity
Discussing Active Directory & Internal Network Security
John Hammond Beginner 1y ago
How to get away with $230 Million in crypto
Cybersecurity
How to get away with $230 Million in crypto
Jack Rhysider Intermediate 1y ago
📚 Coursera Courses Opens on Coursera · Free to audit
1 / 3 View all →
Penetration Testing, Threat Hunting, and Cryptography
📚 Coursera Course ↗
Self-paced
Penetration Testing, Threat Hunting, and Cryptography
Opens on Coursera ↗
Sécuriser des réseaux VPC - Cloud Next Generation Firewall
📚 Coursera Course ↗
Self-paced
Sécuriser des réseaux VPC - Cloud Next Generation Firewall
Opens on Coursera ↗
A CISO Guide to Cyber Resilience
📚 Coursera Course ↗
Self-paced
A CISO Guide to Cyber Resilience
Opens on Coursera ↗
CyberSec First Responder – Advanced (CFR-A): Analyze
📚 Coursera Course ↗
Self-paced
CyberSec First Responder – Advanced (CFR-A): Analyze
Opens on Coursera ↗
Red Hat Enterprise Linux 8
📚 Coursera Course ↗
Self-paced
Red Hat Enterprise Linux 8
Opens on Coursera ↗
Networking, Mobile Devices, Virtualization & Security
📚 Coursera Course ↗
Self-paced
Networking, Mobile Devices, Virtualization & Security
Opens on Coursera ↗