Tech Skills

Cybersecurity

Ethical hacking, penetration testing, network security, CTFs and defensive security

7,052
lessons
Skills in this topic
View full skill map →
Security Basics
beginner
Fix OWASP top 10 vulnerabilities
AI Security
intermediate
Identify and patch prompt injection vulnerabilities
Network Security
intermediate
Configure a firewall with proper inbound/outbound rules
Ethical Hacking & Pen Testing
intermediate
Conduct a full pen test with Kali Linux
Cloud Security
intermediate
Implement IAM least-privilege policies on AWS/GCP
Incident Response
intermediate
Build an incident response playbook
Security Compliance
intermediate
Map controls for SOC 2 Type II compliance
Defensive AI
advanced
Build an AI-powered log anomaly detector
HackTheBox - Runner
Cybersecurity
HackTheBox - Runner
IppSec Beginner 1y ago
3 Recommended Burp Suite Plugins
Cybersecurity ⚡ AI Lesson
3 Recommended Burp Suite Plugins
The Cyber Mentor Beginner 1y ago
Intro to Game Hacking: DEFCON 32
Cybersecurity
Intro to Game Hacking: DEFCON 32
John Hammond Beginner 1y ago
Why Cybersecurity Professionals Need to Understand AI
Cybersecurity
Why Cybersecurity Professionals Need to Understand AI
Coursera Beginner 1y ago
New Way Now: Pfizer is reshaping its security DNA with Google Cloud
Cybersecurity
New Way Now: Pfizer is reshaping its security DNA with Google Cloud
Google Cloud Intermediate 1y ago
Kali Linux Rust install (latest version) #shorts #kalilinux #linux #rust
Cybersecurity
Kali Linux Rust install (latest version) #shorts #kalilinux #linux #rust
David Bombal Intermediate 1y ago
HackTheBox - FormulaX
Cybersecurity
HackTheBox - FormulaX
IppSec Beginner 1y ago
How To Network At Conferences
Cybersecurity ⚡ AI Lesson
How To Network At Conferences
The Cyber Mentor Beginner 1y ago
Is that link safe to click? #shorts #privacy #iphone #android #vpn
Cybersecurity ⚡ AI Lesson
Is that link safe to click? #shorts #privacy #iphone #android #vpn
David Bombal Intermediate 1y ago
Craig Jones: Jiu Jitsu, $2 Million Prize, CJI, ADCC, Ukraine & Trolling | Lex Fridman Podcast #439
Cybersecurity
Craig Jones: Jiu Jitsu, $2 Million Prize, CJI, ADCC, Ukraine & Trolling | Lex Fridman Podcast #439
Lex Fridman Beginner 1y ago
SIIES Uses Google Security Products to Drive Enhanced Cybersecurity in Yucatán
Cybersecurity
SIIES Uses Google Security Products to Drive Enhanced Cybersecurity in Yucatán
Google Cloud Advanced 1y ago
The Phishing Website that Hacked Linus Tech Tips
Cybersecurity
The Phishing Website that Hacked Linus Tech Tips
John Hammond Beginner 1y ago
CEH V12 Exam Preparation | How to Prepare for CEH V12 Exam | Edureka
Cybersecurity
CEH V12 Exam Preparation | How to Prepare for CEH V12 Exam | Edureka
edureka! Beginner 1y ago
CISSP Interview Questions and Answers 2025 | CISSP Exam Preparation | Edureka
Cybersecurity
CISSP Interview Questions and Answers 2025 | CISSP Exam Preparation | Edureka
edureka! Advanced 1y ago
Hacking the Colony
Cybersecurity ⚡ AI Lesson
Hacking the Colony
Data Skeptic Beginner 1y ago
A Winning Partnership in Cybersecurity Talent Development
Cybersecurity ⚡ AI Lesson
A Winning Partnership in Cybersecurity Talent Development
SANS Institute Intermediate 1y ago
Hacking Tools
Cybersecurity ⚡ AI Lesson
Hacking Tools
NetworkChuck Intermediate 1y ago
You need these skills to become a hacker
Cybersecurity ⚡ AI Lesson
You need these skills to become a hacker
NetworkChuck Intermediate 1y ago
Supply Chain Compromises Pt. 2 | The Incident Commander Series Ep. 4
Cybersecurity ⚡ AI Lesson
Supply Chain Compromises Pt. 2 | The Incident Commander Series Ep. 4
SANS Institute Beginner 1y ago
Hacking Ninja’s PayPal
Cybersecurity ⚡ AI Lesson
Hacking Ninja’s PayPal
Jack Rhysider Intermediate 1y ago
Buying stolen social media accounts
Cybersecurity
Buying stolen social media accounts
Jack Rhysider Intermediate 1y ago
3 Must-Have Skills for SOC Analysts
Cybersecurity ⚡ AI Lesson
3 Must-Have Skills for SOC Analysts
The Cyber Mentor Beginner 1y ago
HackTheBox - Usage
Cybersecurity
HackTheBox - Usage
IppSec Beginner 1y ago
Do you want to see my IP address? #shorts #iphone #android #starlink #vpn
Cybersecurity
Do you want to see my IP address? #shorts #iphone #android #starlink #vpn
David Bombal Intermediate 1y ago
HCLTech Helps Global Customer Base Protect Data with Google Cloud Security
Cybersecurity
HCLTech Helps Global Customer Base Protect Data with Google Cloud Security
Google Cloud Beginner 1y ago
Cybersecurity for Beginners | Basics of Cybersecurity | Edureka
Cybersecurity
Cybersecurity for Beginners | Basics of Cybersecurity | Edureka
edureka! Beginner 1y ago
Cyber Security for Beginners | Introduction to Cyber Security | Cyber Security | Edureka
Cybersecurity
Cyber Security for Beginners | Introduction to Cyber Security | Cyber Security | Edureka
edureka! Beginner 1y ago
How To Pass Any Cybersecurity Certification
Cybersecurity ⚡ AI Lesson
How To Pass Any Cybersecurity Certification
The Cyber Mentor Beginner 1y ago
Reverse Engineering 101 tutorial with the amazing Stephen Sims!
Cybersecurity ⚡ AI Lesson
Reverse Engineering 101 tutorial with the amazing Stephen Sims!
David Bombal Beginner 1y ago
HackTheBox - iClean
Cybersecurity ⚡ AI Lesson
HackTheBox - iClean
IppSec Beginner 1y ago
OSINT Deep Dive: Decoding Location Data Hidden in Photos
Cybersecurity ⚡ AI Lesson
OSINT Deep Dive: Decoding Location Data Hidden in Photos
The Cyber Mentor Beginner 1y ago
New Cybersecurity Certification?
Cybersecurity ⚡ AI Lesson
New Cybersecurity Certification?
David Bombal Beginner 1y ago
He Passed CISSP At Age 23
Cybersecurity
He Passed CISSP At Age 23
John Hammond Beginner 1y ago
What Their Computer Looked Like Right As They Got Hacked
Cybersecurity
What Their Computer Looked Like Right As They Got Hacked
John Hammond Beginner 1y ago
Hack a Smart Safe at the DEF CON IoT Village!
Cybersecurity ⚡ AI Lesson
Hack a Smart Safe at the DEF CON IoT Village!
The Cyber Mentor Beginner 1y ago
True story: They banned him from using a computer ... that didn't stop him #shorts #linux
Cybersecurity
True story: They banned him from using a computer ... that didn't stop him #shorts #linux
David Bombal Intermediate 1y ago
Hacking a Docker Container Registry
Cybersecurity
Hacking a Docker Container Registry
John Hammond Beginner 1y ago
Cracking WiFi WPA2 Handshakes (And does it work with WPA3?)
Cybersecurity
Cracking WiFi WPA2 Handshakes (And does it work with WPA3?)
David Bombal Intermediate 1y ago
What to Know About Becoming a Pentester
Cybersecurity ⚡ AI Lesson
What to Know About Becoming a Pentester
The Cyber Mentor Beginner 1y ago
Real World OSINT and Cyber Threat Intelligence Tips and Tricks
Cybersecurity
Real World OSINT and Cyber Threat Intelligence Tips and Tricks
David Bombal Beginner 1y ago
Master DOM Invader in 60 Seconds
Cybersecurity ⚡ AI Lesson
Master DOM Invader in 60 Seconds
The Cyber Mentor Beginner 1y ago
The Pack: How cybersecurity is evolving
Cybersecurity
The Pack: How cybersecurity is evolving
Google Cloud Advanced 1y ago
Permission to Hack You: Illicit Consent Grant Attack
Cybersecurity ⚡ AI Lesson
Permission to Hack You: Illicit Consent Grant Attack
John Hammond Beginner 1y ago
Keynote | Thriving Together: Empowering Neurodivergent Individuals in the Workplace
Cybersecurity ⚡ AI Lesson
Keynote | Thriving Together: Empowering Neurodivergent Individuals in the Workplace
SANS Institute Intermediate 1y ago
I’m OK, You’re OK, We’re OK: Living with AD(H)D in InfoSec
Cybersecurity ⚡ AI Lesson
I’m OK, You’re OK, We’re OK: Living with AD(H)D in InfoSec
SANS Institute Intermediate 1y ago
How to transition from feeling overwhelmed to achieving hyperfocus in 45 minutes or less
Cybersecurity ⚡ AI Lesson
How to transition from feeling overwhelmed to achieving hyperfocus in 45 minutes or less
SANS Institute Intermediate 1y ago
Supporting Thinking outside The Box-Allyship for neurodiverse colleagues
Cybersecurity ⚡ AI Lesson
Supporting Thinking outside The Box-Allyship for neurodiverse colleagues
SANS Institute Beginner 1y ago
Inclusive Cybersecurity: Bridging the Accessibility Gap for People with Disabilities
Cybersecurity ⚡ AI Lesson
Inclusive Cybersecurity: Bridging the Accessibility Gap for People with Disabilities
SANS Institute Intermediate 1y ago
📚 Coursera Courses Opens on Coursera · Free to audit
1 / 3 View all →
Microsoft Unified XDR and SIEM Solution Handbook
📚 Coursera Course ↗
Self-paced
Microsoft Unified XDR and SIEM Solution Handbook
Opens on Coursera ↗
Negotiation  Fundamentals
📚 Coursera Course ↗
Self-paced
Negotiation Fundamentals
Opens on Coursera ↗
Incident Response Frameworks
📚 Coursera Course ↗
Self-paced
Incident Response Frameworks
Opens on Coursera ↗
Hack the Cybersecurity Interview
📚 Coursera Course ↗
Self-paced
Hack the Cybersecurity Interview
Opens on Coursera ↗
Access & Security Management
📚 Coursera Course ↗
Self-paced
Access & Security Management
Opens on Coursera ↗
Introduction to Networking and Cloud Computing
📚 Coursera Course ↗
Self-paced
Introduction to Networking and Cloud Computing
Opens on Coursera ↗