Tech Skills

Cybersecurity

Ethical hacking, penetration testing, network security, CTFs and defensive security

7,058
lessons
Skills in this topic
View full skill map →
Security Basics
beginner
Fix OWASP top 10 vulnerabilities
AI Security
intermediate
Identify and patch prompt injection vulnerabilities
Network Security
intermediate
Configure a firewall with proper inbound/outbound rules
Ethical Hacking & Pen Testing
intermediate
Conduct a full pen test with Kali Linux
Cloud Security
intermediate
Implement IAM least-privilege policies on AWS/GCP
Incident Response
intermediate
Build an incident response playbook
Security Compliance
intermediate
Map controls for SOC 2 Type II compliance
Defensive AI
advanced
Build an AI-powered log anomaly detector
Did you know this about Linux? // Linux for Hackers Ep 5
Cybersecurity
Did you know this about Linux? // Linux for Hackers Ep 5
David Bombal Beginner 1y ago
Start Your Hacking Journey as a Beginner
Cybersecurity ⚡ AI Lesson
Start Your Hacking Journey as a Beginner
The Cyber Mentor Beginner 1y ago
Security Governance | The 8 Domains of the Cloud Security Maturity Model | Part 3
Cybersecurity ⚡ AI Lesson
Security Governance | The 8 Domains of the Cloud Security Maturity Model | Part 3
SANS Institute Beginner 1y ago
Hacking The Davinci Code: WebDAV Cybersecurity
Cybersecurity
Hacking The Davinci Code: WebDAV Cybersecurity
John Hammond Beginner 1y ago
Capture The Flag! NahamCon 2024 CTF Warmups
Cybersecurity
Capture The Flag! NahamCon 2024 CTF Warmups
John Hammond Beginner 1y ago
Install Nessus for Free and scan for Vulnerabilities (New Way)
Cybersecurity
Install Nessus for Free and scan for Vulnerabilities (New Way)
David Bombal Beginner 1y ago
HackTheBox - Bizness
Cybersecurity
HackTheBox - Bizness
IppSec Beginner 1y ago
How to Prevent, Detect, and Respond to Attacks with this Free Tool?
Cybersecurity ⚡ AI Lesson
How to Prevent, Detect, and Respond to Attacks with this Free Tool?
The Cyber Mentor Beginner 1y ago
Dartmouth's Meet Alexis Abramson, Dean of the Thayer School of Engineering at Dartmouth 5.23.24
Cybersecurity
Dartmouth's Meet Alexis Abramson, Dean of the Thayer School of Engineering at Dartmouth 5.23.24
Coursera Beginner 1y ago
Expertise isn't all you need - Building an AI Red Team
Cybersecurity ⚡ AI Lesson
Expertise isn't all you need - Building an AI Red Team
SANS Institute Beginner 1y ago
HackerSploit Channel Update 2024
Cybersecurity ⚡ AI Lesson
HackerSploit Channel Update 2024
HackerSploit Beginner 1y ago
How to get away with $230 Million in crypto
Cybersecurity ⚡ AI Lesson
How to get away with $230 Million in crypto
Jack Rhysider Intermediate 2y ago
How to learn foundational cybersecurity skills, brought to you by Sandra Liu.
Cybersecurity
How to learn foundational cybersecurity skills, brought to you by Sandra Liu.
Coursera Intermediate 2y ago
HackTheBox - Ouija
Cybersecurity
HackTheBox - Ouija
IppSec Beginner 2y ago
AI in Cybersecurity | Working of AI in Cybersecurity | Need for AI in Cybersecurity | Edureka
Cybersecurity
AI in Cybersecurity | Working of AI in Cybersecurity | Need for AI in Cybersecurity | Edureka
edureka! Beginner 2y ago
$75 Million Bitcoin theft in Slovenia
Cybersecurity
$75 Million Bitcoin theft in Slovenia
Jack Rhysider Intermediate 2y ago
🔍 Master Amazon SEO : Outrank Competitors Easily! #shorts
Cybersecurity
🔍 Master Amazon SEO : Outrank Competitors Easily! #shorts
Jacky Chou from Indexsy Beginner 2y ago
Social Engineering in Cyber Security Explained | What is Social Engineering?| CEH Training | Edureka
Cybersecurity
Social Engineering in Cyber Security Explained | What is Social Engineering?| CEH Training | Edureka
edureka! Beginner 2y ago
They're hunting your passwords? #shorts #passwords #cybersecurity  #ai
Cybersecurity
They're hunting your passwords? #shorts #passwords #cybersecurity #ai
David Bombal Intermediate 1y ago
The coolest WiFi hacking device?
Cybersecurity
The coolest WiFi hacking device?
David Bombal Intermediate 1y ago
NahamCon 2024 CTF is LIVE Right Now
Cybersecurity
NahamCon 2024 CTF is LIVE Right Now
John Hammond Beginner 1y ago
A Quick Beginner's Guide to CTFs | Tips for Starting Your First CTF
Cybersecurity ⚡ AI Lesson
A Quick Beginner's Guide to CTFs | Tips for Starting Your First CTF
The Cyber Mentor Beginner 1y ago
IAM | The 8 Domains of the Cloud Security Maturity Model | Part 2
Cybersecurity ⚡ AI Lesson
IAM | The 8 Domains of the Cloud Security Maturity Model | Part 2
SANS Institute Beginner 1y ago
I Put a Vulnerable Server on The Internet
Cybersecurity
I Put a Vulnerable Server on The Internet
John Hammond Beginner 1y ago
3 of the Top Note-Taking Apps Ranked
Cybersecurity ⚡ AI Lesson
3 of the Top Note-Taking Apps Ranked
The Cyber Mentor Beginner 1y ago
Discussing Active Directory & Internal Network Security
Cybersecurity
Discussing Active Directory & Internal Network Security
John Hammond Beginner 2y ago
You have to look out for these hacks in 2024! (plus get FREE training)
Cybersecurity
You have to look out for these hacks in 2024! (plus get FREE training)
David Bombal Beginner 2y ago
Learn Any Programming Language (from scratch)
Cybersecurity ⚡ AI Lesson
Learn Any Programming Language (from scratch)
The Cyber Mentor Beginner 2y ago
3 Ways to Find and Exploit Command Injection
Cybersecurity ⚡ AI Lesson
3 Ways to Find and Exploit Command Injection
The Cyber Mentor Beginner 2y ago
How Accurate is Your Recovery Timeline? | The Incident Commander Series Ep. 2
Cybersecurity ⚡ AI Lesson
How Accurate is Your Recovery Timeline? | The Incident Commander Series Ep. 2
SANS Institute Beginner 2y ago
Automated Cloud Security with ONE CLICK
Cybersecurity
Automated Cloud Security with ONE CLICK
John Hammond Beginner 2y ago
Hacking a Smart Camera: IoT Hacking With Andrew Bellini (Part 4)
Cybersecurity ⚡ AI Lesson
Hacking a Smart Camera: IoT Hacking With Andrew Bellini (Part 4)
The Cyber Mentor Beginner 2y ago
Yet Another Cybercrime Hacking Forum...
Cybersecurity ⚡ AI Lesson
Yet Another Cybercrime Hacking Forum...
John Hammond Beginner 2y ago
How to Secure Your Email (DMARC, DKIM, SPF Tutorial)
Cybersecurity ⚡ AI Lesson
How to Secure Your Email (DMARC, DKIM, SPF Tutorial)
The Cyber Mentor Beginner 2y ago
Learn to Hack AWS & Cloud Security
Cybersecurity
Learn to Hack AWS & Cloud Security
John Hammond Beginner 2y ago
How Skype compromised your WoW account
Cybersecurity
How Skype compromised your WoW account
Jack Rhysider Intermediate 2y ago
HackTheBox - Monitored
Cybersecurity
HackTheBox - Monitored
IppSec Beginner 2y ago
This five-year-old hacked Xbox
Cybersecurity ⚡ AI Lesson
This five-year-old hacked Xbox
Jack Rhysider Intermediate 2y ago
CISOs Confront AI: Adapting Cybersecurity to the AI Era
Cybersecurity ⚡ AI Lesson
CISOs Confront AI: Adapting Cybersecurity to the AI Era
SANS Institute Intermediate 2y ago
Rust Programming 101 Full Course - Rust for Beginners
Cybersecurity ⚡ AI Lesson
Rust Programming 101 Full Course - Rust for Beginners
The Cyber Mentor Beginner 2y ago
Certificate vs. Certification, whats the difference? 🤔
Cybersecurity
Certificate vs. Certification, whats the difference? 🤔
Coursera Beginner 2y ago
Android Bluetooth Hacking with Python #shorts #android #bluetooth #raspberrypi #python
Cybersecurity ⚡ AI Lesson
Android Bluetooth Hacking with Python #shorts #android #bluetooth #raspberrypi #python
David Bombal Beginner 2y ago
Data Protection | The 8 Domains of the Cloud Security Maturity Model | Part 1
Cybersecurity ⚡ AI Lesson
Data Protection | The 8 Domains of the Cloud Security Maturity Model | Part 1
SANS Institute Beginner 2y ago
Keynote | The Fast-Food Effect: Translating Fast-Food Mastery into Cross-Industry Success
Cybersecurity ⚡ AI Lesson
Keynote | The Fast-Food Effect: Translating Fast-Food Mastery into Cross-Industry Success
SANS Institute Intermediate 2y ago
How a Montana Mom Became the FBI's Secret Weapon Against Al Qaeda🎙Darknet Diaries Ep. 145: Shannen
Cybersecurity
How a Montana Mom Became the FBI's Secret Weapon Against Al Qaeda🎙Darknet Diaries Ep. 145: Shannen
Jack Rhysider Intermediate 2y ago
Thieves stole $40K in Ethereum with NFT scam
Cybersecurity
Thieves stole $40K in Ethereum with NFT scam
Jack Rhysider Intermediate 2y ago
It is essential to keep up with the threat landscape!
Cybersecurity
It is essential to keep up with the threat landscape!
Coursera Intermediate 2y ago
Hacking a Smart Camera: IoT Hacking With Andrew Bellini (Part 3)
Cybersecurity ⚡ AI Lesson
Hacking a Smart Camera: IoT Hacking With Andrew Bellini (Part 3)
The Cyber Mentor Beginner 2y ago
📚 Coursera Courses Opens on Coursera · Free to audit
1 / 3 View all →
Introduction to Ethical Hacking and Recon Techniques
📚 Coursera Course ↗
Self-paced
Introduction to Ethical Hacking and Recon Techniques
Opens on Coursera ↗
Secure Mobile, IoT & Secure Applications
📚 Coursera Course ↗
Self-paced
Secure Mobile, IoT & Secure Applications
Opens on Coursera ↗
CISSP Domain 6: Security Assessment and Testing
📚 Coursera Course ↗
Self-paced
CISSP Domain 6: Security Assessment and Testing
Opens on Coursera ↗
Introduction to Hardware and Operating Systems
📚 Coursera Course ↗
Self-paced
Introduction to Hardware and Operating Systems
Opens on Coursera ↗
IoT Security: Access Control and Network Security
📚 Coursera Course ↗
Self-paced
IoT Security: Access Control and Network Security
Opens on Coursera ↗
NIST 800-171
📚 Coursera Course ↗
Self-paced
NIST 800-171
Opens on Coursera ↗