Tech Skills

Cybersecurity

Ethical hacking, penetration testing, network security, CTFs and defensive security

6396
lessons
Skills in this topic
View full skill map โ†’
Security Basics
beginner
Fix OWASP top 10 vulnerabilities
AI Security
intermediate
Identify and patch prompt injection vulnerabilities
Network Security
intermediate
Configure a firewall with proper inbound/outbound rules
Ethical Hacking & Pen Testing
intermediate
Conduct a full pen test with Kali Linux
Cloud Security
intermediate
Implement IAM least-privilege policies on AWS/GCP
Incident Response
intermediate
Build an incident response playbook
Security Compliance
intermediate
Map controls for SOC 2 Type II compliance
Defensive AI
advanced
Build an AI-powered log anomaly detector
The government spyware used to catch criminals
Cybersecurity
The government spyware used to catch criminals
Jack Rhysider Intermediate 2y ago
Day Johnson is on a mission to decode the fusion between engineering & life.
Cybersecurity
Day Johnson is on a mission to decode the fusion between engineering & life.
Coursera Beginner 2y ago
Don't make this Wi-Fi Security Mistake! #shorts #wifi #iphone #cybersecurity
Cybersecurity
Don't make this Wi-Fi Security Mistake! #shorts #wifi #iphone #cybersecurity
David Bombal Beginner 2y ago
Can a PDF File be Malware?
Cybersecurity
Can a PDF File be Malware?
John Hammond Intermediate 2y ago
The Cops Had No Idea He Just Stole $1 Million Worth of Crypto๐ŸŽ™Darknet Diaries Ep. 118: Hot Swaps
Cybersecurity
The Cops Had No Idea He Just Stole $1 Million Worth of Crypto๐ŸŽ™Darknet Diaries Ep. 118: Hot Swaps
Jack Rhysider Beginner 2y ago
I Made Malware In Under 20 Minutes
Cybersecurity
I Made Malware In Under 20 Minutes
John Hammond Beginner 2y ago
How to Find Cross-Site Scripting (XSS)
Cybersecurity
How to Find Cross-Site Scripting (XSS)
The Cyber Mentor Beginner 2y ago
Getting Started with Hack The Box
Cybersecurity
Getting Started with Hack The Box
The Cyber Mentor Beginner 2y ago
Top 10 FREE OSINT tools (with demos) for 2024 - And FREE OSINT course!
Cybersecurity
Top 10 FREE OSINT tools (with demos) for 2024 - And FREE OSINT course!
David Bombal Beginner 2y ago
HackTheBox - CozyHosting
Cybersecurity
HackTheBox - CozyHosting
IppSec Beginner 2y ago
How Nintendo killed open-source emulator Yuzu
Cybersecurity
How Nintendo killed open-source emulator Yuzu
Fireship Intermediate 2y ago
Get you started in an entry-level cybersecurity career! @collinsinfosec
Cybersecurity
Get you started in an entry-level cybersecurity career! @collinsinfosec
Coursera Beginner 2y ago
How to get into Cyber Security with SANS Foundations
Cybersecurity
How to get into Cyber Security with SANS Foundations
SANS Institute Intermediate 2y ago
What is Ethical Hacking? | Ethical Hacking in 15 Minutes | Learn Ethical Hacking | Edureka
Cybersecurity
What is Ethical Hacking? | Ethical Hacking in 15 Minutes | Learn Ethical Hacking | Edureka
edureka! Advanced 2y ago
HackTheBox - Drive
Cybersecurity
HackTheBox - Drive
IppSec Beginner 2y ago
Marc Raibert: Boston Dynamics and the Future of Robotics | Lex Fridman Podcast #412
Cybersecurity
Marc Raibert: Boston Dynamics and the Future of Robotics | Lex Fridman Podcast #412
Lex Fridman Beginner 2y ago
How the police spied on Europe's top criminal
Cybersecurity
How the police spied on Europe's top criminal
Jack Rhysider Intermediate 2y ago
The Cutwail Botnet
Cybersecurity
The Cutwail Botnet
Jack Rhysider Intermediate 2y ago
Why do you trust that website? #shorts #encryption #hashing #password
Cybersecurity
Why do you trust that website? #shorts #encryption #hashing #password
David Bombal Intermediate 2y ago
The FBI's undercover phone
Cybersecurity
The FBI's undercover phone
Jack Rhysider Intermediate 2y ago
A Beginners Guide to Code Review
Cybersecurity
A Beginners Guide to Code Review
The Cyber Mentor Beginner 2y ago
Free Coding Tool Distributes Malware
Cybersecurity
Free Coding Tool Distributes Malware
John Hammond Intermediate 2y ago
Top 5 Wireshark tricks to troubleshoot SLOW networks
Cybersecurity
Top 5 Wireshark tricks to troubleshoot SLOW networks
David Bombal Beginner 2y ago
Can you decrypt a hashed password? #shorts #encryption #hashing #password
Cybersecurity
Can you decrypt a hashed password? #shorts #encryption #hashing #password
David Bombal Intermediate 2y ago
Sweet New Threat Intel Just Dropped
Cybersecurity
Sweet New Threat Intel Just Dropped
John Hammond Beginner 2y ago
Hacking "World of Warcraft" Was His Gateway Drug to a Life of Crime๐ŸŽ™Ep. 117: Daniel the Paladin
Cybersecurity
Hacking "World of Warcraft" Was His Gateway Drug to a Life of Crime๐ŸŽ™Ep. 117: Daniel the Paladin
Jack Rhysider Intermediate 2y ago
Perusing the Dark Web with Jason Haddix
Cybersecurity
Perusing the Dark Web with Jason Haddix
The Cyber Mentor Intermediate 2y ago
Did you just dox yourself? #shorts #iphone #android #starlink #vpn
Cybersecurity
Did you just dox yourself? #shorts #iphone #android #starlink #vpn
David Bombal Intermediate 2y ago
Notepad.exe Will Snitch On You (full coding project)
Cybersecurity
Notepad.exe Will Snitch On You (full coding project)
John Hammond Intermediate 2y ago
3 Common Pentesting Interview Questions You Need to Know
Cybersecurity
3 Common Pentesting Interview Questions You Need to Know
The Cyber Mentor Beginner 2y ago
One Code Mistake Ruined This Website
Cybersecurity
One Code Mistake Ruined This Website
John Hammond Intermediate 2y ago
What is a Race Condition?
Cybersecurity
What is a Race Condition?
The Cyber Mentor Beginner 2y ago
Tracking Cybercrime on Telegram
Cybersecurity
Tracking Cybercrime on Telegram
John Hammond Intermediate 2y ago
Free Hacking API courses (And how to use AI to help you hack)
Cybersecurity
Free Hacking API courses (And how to use AI to help you hack)
David Bombal Beginner 2y ago
Practical Bug Bounty
Cybersecurity
Practical Bug Bounty
The Cyber Mentor Beginner 2y ago
Hacking the former UK Prime Minister
Cybersecurity
Hacking the former UK Prime Minister
Jack Rhysider Intermediate 2y ago
CIA Spy Shares Flipping Tactics๐ŸŽ™Darknet Diaries Ep. 116: Mad Dog
Cybersecurity
CIA Spy Shares Flipping Tactics๐ŸŽ™Darknet Diaries Ep. 116: Mad Dog
Jack Rhysider Intermediate 2y ago
Why hack in when you can just log in?
Cybersecurity
Why hack in when you can just log in?
David Bombal Advanced 2y ago
Don't Forget This One Hacking Trick
Cybersecurity
Don't Forget This One Hacking Trick
John Hammond Intermediate 2y ago
Red teaming vs. blue teaming in cybersecurity. Whatโ€™s the difference?
Cybersecurity
Red teaming vs. blue teaming in cybersecurity. Whatโ€™s the difference?
Coursera Beginner 2y ago
Malware Analysis Made Easy: Cloud Investigations
Cybersecurity
Malware Analysis Made Easy: Cloud Investigations
John Hammond Beginner 2y ago
Calculating Smart Contract Vulnerability Impact: Low To Critical
Cybersecurity
Calculating Smart Contract Vulnerability Impact: Low To Critical
John Hammond Beginner 2y ago
Mark Zuckerberg's Facebook got hacked by teenagers
Cybersecurity
Mark Zuckerberg's Facebook got hacked by teenagers
Jack Rhysider Intermediate 2y ago
Get started in cybersecurity! @collinsinfosec
Cybersecurity
Get started in cybersecurity! @collinsinfosec
Coursera Beginner 2y ago
Can a professional certificate help you get a job? @CyberWithBen
Cybersecurity
Can a professional certificate help you get a job? @CyberWithBen
Coursera Beginner 2y ago
Turbocharging Your Recon Using ChatGPT
Cybersecurity
Turbocharging Your Recon Using ChatGPT
The Cyber Mentor Beginner 2y ago
Linux for Hackers: LINUX commands you need to know (with OTW) // Ep 6
Cybersecurity
Linux for Hackers: LINUX commands you need to know (with OTW) // Ep 6
David Bombal Beginner 2y ago
SMB Shares & Cronjob to Initial Access (Proving Grounds: Dawn)
Cybersecurity
SMB Shares & Cronjob to Initial Access (Proving Grounds: Dawn)
John Hammond Intermediate 2y ago
๐Ÿ“š Coursera Courses Opens on Coursera ยท Free to audit
1 / 3 View all โ†’
Network Operations
๐Ÿ“š Coursera Course โ†—
Self-paced
Network Operations
Opens on Coursera โ†—
FortiGate Administrator
๐Ÿ“š Coursera Course โ†—
Self-paced
FortiGate Administrator
Opens on Coursera โ†—
Network Systems Foundations
๐Ÿ“š Coursera Course โ†—
Self-paced
Network Systems Foundations
Opens on Coursera โ†—
Cybersecurity in Healthcare (Hospitals & Care Centres)
๐Ÿ“š Coursera Course โ†—
Self-paced
Cybersecurity in Healthcare (Hospitals & Care Centres)
Opens on Coursera โ†—
Decryption with Python
๐Ÿ“š Coursera Course โ†—
Self-paced
Decryption with Python
Opens on Coursera โ†—
Cyber Incident Response
๐Ÿ“š Coursera Course โ†—
Self-paced
Cyber Incident Response
Opens on Coursera โ†—