Tech Skills

Cybersecurity

Ethical hacking, penetration testing, network security, CTFs and defensive security

7,053
lessons
Skills in this topic
View full skill map โ†’
Security Basics
beginner
Fix OWASP top 10 vulnerabilities
AI Security
intermediate
Identify and patch prompt injection vulnerabilities
Network Security
intermediate
Configure a firewall with proper inbound/outbound rules
Ethical Hacking & Pen Testing
intermediate
Conduct a full pen test with Kali Linux
Cloud Security
intermediate
Implement IAM least-privilege policies on AWS/GCP
Incident Response
intermediate
Build an incident response playbook
Security Compliance
intermediate
Map controls for SOC 2 Type II compliance
Defensive AI
advanced
Build an AI-powered log anomaly detector
Inclusive Cybersecurity: Bridging the Accessibility Gap for People with Disabilities
Cybersecurity โšก AI Lesson
Inclusive Cybersecurity: Bridging the Accessibility Gap for People with Disabilities
SANS Institute Intermediate 1y ago
Strategies for retaining and advancing neurodivergent employees in Cybersecurity
Cybersecurity โšก AI Lesson
Strategies for retaining and advancing neurodivergent employees in Cybersecurity
SANS Institute Intermediate 1y ago
I'm going to be a hacker
Cybersecurity โšก AI Lesson
I'm going to be a hacker
NetworkChuck Beginner 1y ago
SQL injection | SQL Injection Attack Tutorial | Cybersecurity Training | Edureka Rewind
Cybersecurity
SQL injection | SQL Injection Attack Tutorial | Cybersecurity Training | Edureka Rewind
edureka! Beginner 1y ago
The Best and Worst of Hack The Box
Cybersecurity โšก AI Lesson
The Best and Worst of Hack The Box
The Cyber Mentor Beginner 1y ago
Planning Red Team Operations | Scope, ROE & Reporting
Cybersecurity โšก AI Lesson
Planning Red Team Operations | Scope, ROE & Reporting
HackerSploit Beginner 1y ago
What is dark web? ๐Ÿค” | What if your movements are tracked? ๐Ÿซจ | Dark Web | Cyber threat | GFG
Cybersecurity
What is dark web? ๐Ÿค” | What if your movements are tracked? ๐Ÿซจ | Dark Web | Cyber threat | GFG
GeeksforGeeks Beginner 1y ago
He DROPPED cybersecurity to start an AI company + content
Cybersecurity
He DROPPED cybersecurity to start an AI company + content
Sajjaad Khader Beginner 1y ago
HackTheBox - Headless
Cybersecurity
HackTheBox - Headless
IppSec Beginner 1y ago
The incident that got a robot arrested
Cybersecurity
The incident that got a robot arrested
Jack Rhysider Intermediate 1y ago
Exploit Failed. Now What?
Cybersecurity โšก AI Lesson
Exploit Failed. Now What?
The Cyber Mentor Beginner 1y ago
Mapping APT TTPs With MITRE ATT&CK Navigator
Cybersecurity โšก AI Lesson
Mapping APT TTPs With MITRE ATT&CK Navigator
HackerSploit Beginner 1y ago
AI in Prompt Engineering Hacking #SocialEngineering #CyberSecurity #Phishing #AIThreats #aibeware
Cybersecurity
AI in Prompt Engineering Hacking #SocialEngineering #CyberSecurity #Phishing #AIThreats #aibeware
AI Beware Advanced 1y ago
Hacking Windows TrustedInstaller (GOD MODE)
Cybersecurity โšก AI Lesson
Hacking Windows TrustedInstaller (GOD MODE)
John Hammond Beginner 1y ago
How to be Invisible Online using Expert OSINT techniques
Cybersecurity
How to be Invisible Online using Expert OSINT techniques
David Bombal Beginner 1y ago
HackTheBox - Corporate (FIXED)
Cybersecurity
HackTheBox - Corporate (FIXED)
IppSec Beginner 1y ago
The war between cheaters and game developers
Cybersecurity
The war between cheaters and game developers
Jack Rhysider Intermediate 1y ago
They took his computer. That didn't stop him from hacking Rockstar Games and leaking GTA 6
Cybersecurity โšก AI Lesson
They took his computer. That didn't stop him from hacking Rockstar Games and leaking GTA 6
David Bombal Intermediate 1y ago
Cyber security fundamentals | Understanding Cybersecurity Basics | Edureka Rewind
Cybersecurity
Cyber security fundamentals | Understanding Cybersecurity Basics | Edureka Rewind
edureka! Beginner 1y ago
Linux on Windows......Windows on Linux
Cybersecurity โšก AI Lesson
Linux on Windows......Windows on Linux
NetworkChuck Beginner 1y ago
Ivanka Trump: Politics, Family, Real Estate, Fashion, Music, and Life | Lex Fridman Podcast #436
Cybersecurity
Ivanka Trump: Politics, Family, Real Estate, Fashion, Music, and Life | Lex Fridman Podcast #436
Lex Fridman Beginner 1y ago
Simplified Google Cloud network security: Zero-trust and beyond
Cybersecurity
Simplified Google Cloud network security: Zero-trust and beyond
Google Cloud Tech Intermediate 1y ago
Protect your workload with Google Cloud next generation firewall
Cybersecurity
Protect your workload with Google Cloud next generation firewall
Google Cloud Tech Advanced 1y ago
Secure your Cloud journey with effortless protection from Palo Alto Networks & Google Cloud
Cybersecurity
Secure your Cloud journey with effortless protection from Palo Alto Networks & Google Cloud
Google Cloud Beginner 1y ago
Speed Up Pentest Report Writing
Cybersecurity โšก AI Lesson
Speed Up Pentest Report Writing
John Hammond Beginner 1y ago
The Confidence Formula: 5 Steps to Transform Your Self-Belief
Cybersecurity โšก AI Lesson
The Confidence Formula: 5 Steps to Transform Your Self-Belief
Russell Brunson Beginner 1y ago
How to Upgrade a Shell on Meterpreter
Cybersecurity โšก AI Lesson
How to Upgrade a Shell on Meterpreter
The Cyber Mentor Beginner 1y ago
Introduction To The MITRE ATT&CK Framework
Cybersecurity โšก AI Lesson
Introduction To The MITRE ATT&CK Framework
HackerSploit Beginner 1y ago
Red Team Frameworks & Methodologies
Cybersecurity โšก AI Lesson
Red Team Frameworks & Methodologies
HackerSploit Beginner 1y ago
Could AI Take Our Jobs?
Cybersecurity โšก AI Lesson
Could AI Take Our Jobs?
The Cyber Mentor Beginner 1y ago
When to Start Your Cybersecurity Career
Cybersecurity โšก AI Lesson
When to Start Your Cybersecurity Career
The Cyber Mentor Beginner 1y ago
3 SOC Analyst Projects for Beginners
Cybersecurity โšก AI Lesson
3 SOC Analyst Projects for Beginners
The Cyber Mentor Beginner 1y ago
How a kid hacked a mobile farming game
Cybersecurity
How a kid hacked a mobile farming game
Jack Rhysider Intermediate 1y ago
Getting Started With Hardware Hacking
Cybersecurity โšก AI Lesson
Getting Started With Hardware Hacking
The Cyber Mentor Beginner 1y ago
The biggest video game cheat operation
Cybersecurity โšก AI Lesson
The biggest video game cheat operation
Jack Rhysider Intermediate 1y ago
Ubisoft sues 17-year-old for selling cheats
Cybersecurity
Ubisoft sues 17-year-old for selling cheats
Jack Rhysider Intermediate 1y ago
HackTheBox - Perfection
Cybersecurity โšก AI Lesson
HackTheBox - Perfection
IppSec Beginner 1y ago
How to Get Pentesting Experience
Cybersecurity โšก AI Lesson
How to Get Pentesting Experience
The Cyber Mentor Beginner 1y ago
Your webcam is at risk
Cybersecurity
Your webcam is at risk
Jack Rhysider Intermediate 1y ago
Pass the PWPA Exam With These Tips
Cybersecurity โšก AI Lesson
Pass the PWPA Exam With These Tips
The Cyber Mentor Beginner 1y ago
Cyber Security Full Course | Cyber Security Training For Beginners | Cyber Security Course | Edureka
Cybersecurity
Cyber Security Full Course | Cyber Security Training For Beginners | Cyber Security Course | Edureka
edureka! Beginner 1y ago
Never store your passwords & keys like this! #shorts #passwords #cybersecurity
Cybersecurity
Never store your passwords & keys like this! #shorts #passwords #cybersecurity
David Bombal Intermediate 1y ago
Nmap basic scan with HackerD #shorts #nmap #kalilinx
Cybersecurity
Nmap basic scan with HackerD #shorts #nmap #kalilinx
David Bombal Beginner 1y ago
Introduction To Red Teaming
Cybersecurity โšก AI Lesson
Introduction To Red Teaming
HackerSploit Beginner 1y ago
Hacking Roadmap to Success: AMA with The Cyber Mentor and FREE training!
Cybersecurity
Hacking Roadmap to Success: AMA with The Cyber Mentor and FREE training!
David Bombal Beginner 1y ago
HackTheBox - Jab
Cybersecurity
HackTheBox - Jab
IppSec Beginner 1y ago
The ad malware scam
Cybersecurity โšก AI Lesson
The ad malware scam
Jack Rhysider Intermediate 1y ago
Breaking into Penetration Testing: Career Tips and Insights
Cybersecurity โšก AI Lesson
Breaking into Penetration Testing: Career Tips and Insights
The Cyber Mentor Beginner 1y ago
๐Ÿ“š Coursera Courses Opens on Coursera ยท Free to audit
1 / 3 View all โ†’
Network Traffic Analysis for Incident Response
๐Ÿ“š Coursera Course โ†—
Self-paced
Network Traffic Analysis for Incident Response
Opens on Coursera โ†—
IT Hardware, Networking & Troubleshooting
๐Ÿ“š Coursera Course โ†—
Self-paced
IT Hardware, Networking & Troubleshooting
Opens on Coursera โ†—
Microsoft 365 Security: Identity, Compliance & Trust
๐Ÿ“š Coursera Course โ†—
Self-paced
Microsoft 365 Security: Identity, Compliance & Trust
Opens on Coursera โ†—
VPN Tunneling with OpenVPN: Secure Network Connections
๐Ÿ“š Coursera Course โ†—
Self-paced
VPN Tunneling with OpenVPN: Secure Network Connections
Opens on Coursera โ†—
Physical Red Teaming
๐Ÿ“š Coursera Course โ†—
Self-paced
Physical Red Teaming
Opens on Coursera โ†—
Fortify Confluence Security
๐Ÿ“š Coursera Course โ†—
Self-paced
Fortify Confluence Security
Opens on Coursera โ†—