Tech Skills

Cybersecurity

Ethical hacking, penetration testing, network security, CTFs and defensive security

6396
lessons
Skills in this topic
View full skill map โ†’
Security Basics
beginner
Fix OWASP top 10 vulnerabilities
AI Security
intermediate
Identify and patch prompt injection vulnerabilities
Network Security
intermediate
Configure a firewall with proper inbound/outbound rules
Ethical Hacking & Pen Testing
intermediate
Conduct a full pen test with Kali Linux
Cloud Security
intermediate
Implement IAM least-privilege policies on AWS/GCP
Incident Response
intermediate
Build an incident response playbook
Security Compliance
intermediate
Map controls for SOC 2 Type II compliance
Defensive AI
advanced
Build an AI-powered log anomaly detector
How to get away with $230 Million in crypto
Cybersecurity
How to get away with $230 Million in crypto
Jack Rhysider Intermediate 1y ago
You have to look out for these hacks in 2024! (plus get FREE training)
Cybersecurity
You have to look out for these hacks in 2024! (plus get FREE training)
David Bombal Beginner 1y ago
How to learn foundational cybersecurity skills, brought to you by Sandra Liu.
Cybersecurity
How to learn foundational cybersecurity skills, brought to you by Sandra Liu.
Coursera Intermediate 1y ago
HackTheBox - Ouija
Cybersecurity
HackTheBox - Ouija
IppSec Beginner 1y ago
Learn Any Programming Language (from scratch)
Cybersecurity
Learn Any Programming Language (from scratch)
The Cyber Mentor Beginner 1y ago
AI in Cybersecurity | Working of AI in Cybersecurity | Need for AI in Cybersecurity | Edureka
Cybersecurity
AI in Cybersecurity | Working of AI in Cybersecurity | Need for AI in Cybersecurity | Edureka
edureka! Beginner 1y ago
3 Ways to Find and Exploit Command Injection
Cybersecurity
3 Ways to Find and Exploit Command Injection
The Cyber Mentor Beginner 1y ago
$75 Million Bitcoin theft in Slovenia
Cybersecurity
$75 Million Bitcoin theft in Slovenia
Jack Rhysider Intermediate 1y ago
How Accurate is Your Recovery Timeline? | The Incident Commander Series Ep. 2
Cybersecurity
How Accurate is Your Recovery Timeline? | The Incident Commander Series Ep. 2
SANS Institute Beginner 1y ago
๐Ÿ” Master Amazon SEO : Outrank Competitors Easily! #shorts
Cybersecurity
๐Ÿ” Master Amazon SEO : Outrank Competitors Easily! #shorts
Jacky Chou from Indexsy Beginner 1y ago
Automated Cloud Security with ONE CLICK
Cybersecurity
Automated Cloud Security with ONE CLICK
John Hammond Beginner 1y ago
Yet Another Cybercrime Hacking Forum...
Cybersecurity
Yet Another Cybercrime Hacking Forum...
John Hammond Beginner 1y ago
Social Engineering in Cyber Security Explained | What is Social Engineering?| CEH Training | Edureka
Cybersecurity
Social Engineering in Cyber Security Explained | What is Social Engineering?| CEH Training | Edureka
edureka! Beginner 1y ago
HackTheBox - Monitored
Cybersecurity
HackTheBox - Monitored
IppSec Beginner 1y ago
CISOs Confront AI: Adapting Cybersecurity to the AI Era
Cybersecurity
CISOs Confront AI: Adapting Cybersecurity to the AI Era
SANS Institute Intermediate 1y ago
Certificate vs. Certification, whats the difference? ๐Ÿค”
Cybersecurity
Certificate vs. Certification, whats the difference? ๐Ÿค”
Coursera Beginner 1y ago
Android Bluetooth Hacking with Python #shorts #android #bluetooth #raspberrypi #python
Cybersecurity
Android Bluetooth Hacking with Python #shorts #android #bluetooth #raspberrypi #python
David Bombal Beginner 1y ago
Breathing Life into an Ancient Healing Tradition: The Example of the Shanghan Lun
Cybersecurity
Breathing Life into an Ancient Healing Tradition: The Example of the Shanghan Lun
TCM Academy Beginner 1y ago
8 Rules for Better Data Storytelling | Get Your Insights Understood
Cybersecurity
8 Rules for Better Data Storytelling | Get Your Insights Understood
DataCamp Intermediate 1y ago
Do you use your pet's name as your password?
Cybersecurity
Do you use your pet's name as your password?
Google for Developers Intermediate 1y ago
Hacking a Smart Camera: IoT Hacking With Andrew Bellini (Part 4)
Cybersecurity
Hacking a Smart Camera: IoT Hacking With Andrew Bellini (Part 4)
The Cyber Mentor Beginner 1y ago
Feather's Edge
Cybersecurity
Feather's Edge
Jack Rhysider Intermediate 1y ago
How to Secure Your Email (DMARC, DKIM, SPF Tutorial)
Cybersecurity
How to Secure Your Email (DMARC, DKIM, SPF Tutorial)
The Cyber Mentor Beginner 1y ago
Learn to Hack AWS & Cloud Security
Cybersecurity
Learn to Hack AWS & Cloud Security
John Hammond Beginner 1y ago
How Skype compromised your WoW account
Cybersecurity
How Skype compromised your WoW account
Jack Rhysider Intermediate 1y ago
This five-year-old hacked Xbox
Cybersecurity
This five-year-old hacked Xbox
Jack Rhysider Intermediate 1y ago
Rust Programming 101 Full Course - Rust for Beginners
Cybersecurity
Rust Programming 101 Full Course - Rust for Beginners
The Cyber Mentor Beginner 1y ago
Data Protection | The 8 Domains of the Cloud Security Maturity Model | Part 1
Cybersecurity
Data Protection | The 8 Domains of the Cloud Security Maturity Model | Part 1
SANS Institute Beginner 1y ago
Keynote | The Fast-Food Effect: Translating Fast-Food Mastery into Cross-Industry Success
Cybersecurity
Keynote | The Fast-Food Effect: Translating Fast-Food Mastery into Cross-Industry Success
SANS Institute Intermediate 1y ago
How a Montana Mom Became the FBI's Secret Weapon Against Al Qaeda๐ŸŽ™Darknet Diaries Ep. 145: Shannen
Cybersecurity
How a Montana Mom Became the FBI's Secret Weapon Against Al Qaeda๐ŸŽ™Darknet Diaries Ep. 145: Shannen
Jack Rhysider Intermediate 1y ago
Thieves stole $40K in Ethereum with NFT scam
Cybersecurity
Thieves stole $40K in Ethereum with NFT scam
Jack Rhysider Intermediate 1y ago
It is essential to keep up with the threat landscape!
Cybersecurity
It is essential to keep up with the threat landscape!
Coursera Intermediate 1y ago
Hacking a Smart Camera: IoT Hacking With Andrew Bellini (Part 3)
Cybersecurity
Hacking a Smart Camera: IoT Hacking With Andrew Bellini (Part 3)
The Cyber Mentor Beginner 1y ago
The 8 Domains of the Cloud Security Maturity Model | Overview
Cybersecurity
The 8 Domains of the Cloud Security Maturity Model | Overview
SANS Institute Beginner 1y ago
No Tools in a CTF
Cybersecurity
No Tools in a CTF
John Hammond Beginner 1y ago
Itโ€™s all about the end game!
Cybersecurity
Itโ€™s all about the end game!
Coursera Beginner 1y ago
Hacking Wordpress with Python in seconds (using Dark Web and Telegram data)
Cybersecurity
Hacking Wordpress with Python in seconds (using Dark Web and Telegram data)
David Bombal Beginner 1y ago
From Rogue to Vanguard: My Odyssey through the Cyber Realm
Cybersecurity
From Rogue to Vanguard: My Odyssey through the Cyber Realm
SANS Institute Intermediate 1y ago
Breaking the Mold: How Two Women from Non-Technical Backgrounds Broke into Cybersecurity.
Cybersecurity
Breaking the Mold: How Two Women from Non-Technical Backgrounds Broke into Cybersecurity.
SANS Institute Beginner 1y ago
Detection Engineers Unveiled: A Day in the Life and the Path to This Exciting Career
Cybersecurity
Detection Engineers Unveiled: A Day in the Life and the Path to This Exciting Career
SANS Institute Beginner 1y ago
Inclusive Cybersecurity: Tips for Hacking Barriers
Cybersecurity
Inclusive Cybersecurity: Tips for Hacking Barriers
SANS Institute Advanced 1y ago
Day in the Life of a CTI Engineer
Cybersecurity
Day in the Life of a CTI Engineer
SANS Institute Beginner 1y ago
HackTheBox - Napper
Cybersecurity
HackTheBox - Napper
IppSec Beginner 1y ago
The Vanilla Gift Card Trap
Cybersecurity
The Vanilla Gift Card Trap
Jack Rhysider Intermediate 1y ago
Do You Need to Know Programming to Be A Hacker?
Cybersecurity
Do You Need to Know Programming to Be A Hacker?
The Cyber Mentor Beginner 1y ago
CISOs Confront AI: Adapting Cybersecurity to the AI Era
Cybersecurity
CISOs Confront AI: Adapting Cybersecurity to the AI Era
SANS Institute Intermediate 1y ago
Hacking a Smart Camera: IoT Hacking With Andrew Bellini (Part 2)
Cybersecurity
Hacking a Smart Camera: IoT Hacking With Andrew Bellini (Part 2)
The Cyber Mentor Beginner 1y ago
This exploit emptied 6,000 Coinbase wallets
Cybersecurity
This exploit emptied 6,000 Coinbase wallets
Jack Rhysider Intermediate 1y ago
๐Ÿ“š Coursera Courses Opens on Coursera ยท Free to audit
1 / 3 View all โ†’
Defense in Depth Cybersecurity โ€“ Layered Security Strategy
๐Ÿ“š Coursera Course โ†—
Self-paced
Defense in Depth Cybersecurity โ€“ Layered Security Strategy
Opens on Coursera โ†—
Cybersecurity Policy Foundations
๐Ÿ“š Coursera Course โ†—
Self-paced
Cybersecurity Policy Foundations
Opens on Coursera โ†—
A+ Core 2 V15 - Pearson Cert Prep: Unit 4
๐Ÿ“š Coursera Course โ†—
Self-paced
A+ Core 2 V15 - Pearson Cert Prep: Unit 4
Opens on Coursera โ†—
Metasploit para Principiantes: Bรกsicos de explotaciรณn
๐Ÿ“š Coursera Course โ†—
Self-paced
Metasploit para Principiantes: Bรกsicos de explotaciรณn
Opens on Coursera โ†—
Application Security Testing and Debugging
๐Ÿ“š Coursera Course โ†—
Self-paced
Application Security Testing and Debugging
Opens on Coursera โ†—
Bitcoin Transaction & Network Security
๐Ÿ“š Coursera Course โ†—
Self-paced
Bitcoin Transaction & Network Security
Opens on Coursera โ†—