Tech Skills

Cybersecurity

Ethical hacking, penetration testing, network security, CTFs and defensive security

7,061
lessons
Skills in this topic
View full skill map →
Security Basics
beginner
Fix OWASP top 10 vulnerabilities
AI Security
intermediate
Identify and patch prompt injection vulnerabilities
Network Security
intermediate
Configure a firewall with proper inbound/outbound rules
Ethical Hacking & Pen Testing
intermediate
Conduct a full pen test with Kali Linux
Cloud Security
intermediate
Implement IAM least-privilege policies on AWS/GCP
Incident Response
intermediate
Build an incident response playbook
Security Compliance
intermediate
Map controls for SOC 2 Type II compliance
Defensive AI
advanced
Build an AI-powered log anomaly detector
Hacking a Smart Camera: IoT Hacking With Andrew Bellini (Part 3)
Cybersecurity ⚡ AI Lesson
Hacking a Smart Camera: IoT Hacking With Andrew Bellini (Part 3)
The Cyber Mentor Beginner 2y ago
The 8 Domains of the Cloud Security Maturity Model | Overview
Cybersecurity ⚡ AI Lesson
The 8 Domains of the Cloud Security Maturity Model | Overview
SANS Institute Beginner 2y ago
No Tools in a CTF
Cybersecurity
No Tools in a CTF
John Hammond Beginner 2y ago
It’s all about the end game!
Cybersecurity
It’s all about the end game!
Coursera Beginner 2y ago
Hacking Wordpress with Python in seconds (using Dark Web and Telegram data)
Cybersecurity ⚡ AI Lesson
Hacking Wordpress with Python in seconds (using Dark Web and Telegram data)
David Bombal Beginner 2y ago
From Rogue to Vanguard: My Odyssey through the Cyber Realm
Cybersecurity ⚡ AI Lesson
From Rogue to Vanguard: My Odyssey through the Cyber Realm
SANS Institute Intermediate 2y ago
HackTheBox - Napper
Cybersecurity
HackTheBox - Napper
IppSec Beginner 2y ago
The Vanilla Gift Card Trap
Cybersecurity
The Vanilla Gift Card Trap
Jack Rhysider Intermediate 2y ago
Do You Need to Know Programming to Be A Hacker?
Cybersecurity ⚡ AI Lesson
Do You Need to Know Programming to Be A Hacker?
The Cyber Mentor Beginner 2y ago
8 Rules for Better Data Storytelling | Get Your Insights Understood
Cybersecurity ⚡ AI Lesson
8 Rules for Better Data Storytelling | Get Your Insights Understood
DataCamp Intermediate 2y ago
Do you use your pet's name as your password?
Cybersecurity
Do you use your pet's name as your password?
Google for Developers Intermediate 2y ago
This exploit emptied 6,000 Coinbase wallets
Cybersecurity ⚡ AI Lesson
This exploit emptied 6,000 Coinbase wallets
Jack Rhysider Intermediate 2y ago
Entry-level cybersecurity Professional Certificates can equip you with the skills you need.
Cybersecurity
Entry-level cybersecurity Professional Certificates can equip you with the skills you need.
Coursera Beginner 2y ago
Real World Windows Pentest Tutorial (demos of Top 5 Active Directory hacks)
Cybersecurity
Real World Windows Pentest Tutorial (demos of Top 5 Active Directory hacks)
David Bombal Beginner 2y ago
HackTheBox - Devvortex
Cybersecurity
HackTheBox - Devvortex
IppSec Beginner 2y ago
What is Kali Linux | Kali Linux Hacking Tutorials | Ethical Hacking Training | Edureka Rewind
Cybersecurity
What is Kali Linux | Kali Linux Hacking Tutorials | Ethical Hacking Training | Edureka Rewind
edureka! Beginner 2y ago
Hackers Abuse Zero-Day Exploit for CrushFTP
Cybersecurity
Hackers Abuse Zero-Day Exploit for CrushFTP
John Hammond Beginner 2y ago
Protecting workloads with Google Cloud next generation firewall
Cybersecurity
Protecting workloads with Google Cloud next generation firewall
Google Cloud Tech Intermediate 2y ago
Best Practices to Enhance the Security of Your RDP Server
Cybersecurity
Best Practices to Enhance the Security of Your RDP Server
UltaHost Beginner 2y ago
Detect, Respond, and Recover from Cybersecurity Attacks | Google Cloud Cybersecurity Certificate
Cybersecurity
Detect, Respond, and Recover from Cybersecurity Attacks | Google Cloud Cybersecurity Certificate
Google Cloud Beginner 2y ago
Cloud Security Risks: Identify and Protect Against Threats | Google Cloud Cybersecurity Certificate
Cybersecurity
Cloud Security Risks: Identify and Protect Against Threats | Google Cloud Cybersecurity Certificate
Google Cloud Beginner 2y ago
Breaking the Mold: How Two Women from Non-Technical Backgrounds Broke into Cybersecurity.
Cybersecurity ⚡ AI Lesson
Breaking the Mold: How Two Women from Non-Technical Backgrounds Broke into Cybersecurity.
SANS Institute Beginner 2y ago
Detection Engineers Unveiled: A Day in the Life and the Path to This Exciting Career
Cybersecurity ⚡ AI Lesson
Detection Engineers Unveiled: A Day in the Life and the Path to This Exciting Career
SANS Institute Beginner 2y ago
Inclusive Cybersecurity: Tips for Hacking Barriers
Cybersecurity ⚡ AI Lesson
Inclusive Cybersecurity: Tips for Hacking Barriers
SANS Institute Advanced 2y ago
Day in the Life of a CTI Engineer
Cybersecurity ⚡ AI Lesson
Day in the Life of a CTI Engineer
SANS Institute Beginner 2y ago
CISOs Confront AI: Adapting Cybersecurity to the AI Era
Cybersecurity ⚡ AI Lesson
CISOs Confront AI: Adapting Cybersecurity to the AI Era
SANS Institute Intermediate 2y ago
Hacking a Smart Camera: IoT Hacking With Andrew Bellini (Part 2)
Cybersecurity ⚡ AI Lesson
Hacking a Smart Camera: IoT Hacking With Andrew Bellini (Part 2)
The Cyber Mentor Beginner 2y ago
Build a Pro-Level Detection Engineering Strategy | SOC Success Pt. 2
Cybersecurity ⚡ AI Lesson
Build a Pro-Level Detection Engineering Strategy | SOC Success Pt. 2
SANS Institute Beginner 2y ago
Hacking a Smart Camera: IoT Hacking With Andrew Bellini (Part 1)
Cybersecurity ⚡ AI Lesson
Hacking a Smart Camera: IoT Hacking With Andrew Bellini (Part 1)
The Cyber Mentor Beginner 2y ago
The $70 million TalkTalk Breach
Cybersecurity
The $70 million TalkTalk Breach
Jack Rhysider Intermediate 2y ago
The Mastermind behind Pakistan's nuclear arms scene
Cybersecurity
The Mastermind behind Pakistan's nuclear arms scene
Jack Rhysider Intermediate 2y ago
The power of scripting and programming in cybersecurity should not be underestimated!
Cybersecurity
The power of scripting and programming in cybersecurity should not be underestimated!
Coursera Beginner 2y ago
6 Tips to Stay Motivated
Cybersecurity ⚡ AI Lesson
6 Tips to Stay Motivated
The Cyber Mentor Beginner 2y ago
Grant Collins is spilling all the cybersecurity tea. ☕️
Cybersecurity
Grant Collins is spilling all the cybersecurity tea. ☕️
Coursera Beginner 2y ago
Your VPN won't protect you 😱
Cybersecurity ⚡ AI Lesson
Your VPN won't protect you 😱
David Bombal Beginner 2y ago
Python vs. Bash vs. PowerShell: The Benefits of Each
Cybersecurity ⚡ AI Lesson
Python vs. Bash vs. PowerShell: The Benefits of Each
The Cyber Mentor Beginner 2y ago
Should I Get a Degree in Cybersecurity? Here Are the Benefits!
Cybersecurity
Should I Get a Degree in Cybersecurity? Here Are the Benefits!
Coursera Beginner 2y ago
3 Ways to Avoid Burnout
Cybersecurity ⚡ AI Lesson
3 Ways to Avoid Burnout
The Cyber Mentor Beginner 2y ago
Hack Active Directory with LLMNR
Cybersecurity ⚡ AI Lesson
Hack Active Directory with LLMNR
The Cyber Mentor Beginner 2y ago
Did you know you can program this? 🤯 #shorts #f1 #cybersecurity #linux
Cybersecurity ⚡ AI Lesson
Did you know you can program this? 🤯 #shorts #f1 #cybersecurity #linux
David Bombal Beginner 2y ago
The new AI Cyber Defense  you need to know about
Cybersecurity
The new AI Cyber Defense you need to know about
David Bombal Beginner 2y ago
Start Hacking for FREE
Cybersecurity ⚡ AI Lesson
Start Hacking for FREE
The Cyber Mentor Beginner 2y ago
Next Gen Hackers protecting our world
Cybersecurity ⚡ AI Lesson
Next Gen Hackers protecting our world
David Bombal Beginner 2y ago
Government Unveils Malware Analysis Tool, But...
Cybersecurity
Government Unveils Malware Analysis Tool, But...
John Hammond Beginner 2y ago
How Golden Ticket Attacks Work
Cybersecurity ⚡ AI Lesson
How Golden Ticket Attacks Work
The Cyber Mentor Beginner 2y ago
Are You Interested in Blue Teaming?
Cybersecurity
Are You Interested in Blue Teaming?
Coursera Intermediate 2y ago
Should You Learn Programming for Cybersecurity?
Cybersecurity ⚡ AI Lesson
Should You Learn Programming for Cybersecurity?
The Cyber Mentor Beginner 2y ago
Start Your Cybersecurity Career with TryHackMe
Cybersecurity ⚡ AI Lesson
Start Your Cybersecurity Career with TryHackMe
The Cyber Mentor Beginner 2y ago
📚 Coursera Courses Opens on Coursera · Free to audit
1 / 3 View all →
Managing and Optimizing SD-Branch Networks
📚 Coursera Course ↗
Self-paced
Managing and Optimizing SD-Branch Networks
Opens on Coursera ↗
Systems and Cybersecurity Fundamentals Part 2
📚 Coursera Course ↗
Self-paced
Systems and Cybersecurity Fundamentals Part 2
Opens on Coursera ↗
Effective Management: Essential Manager Skills
📚 Coursera Course ↗
Self-paced
Effective Management: Essential Manager Skills
Opens on Coursera ↗
Analyze and Defend Against GenAI Social Engineering Attacks
📚 Coursera Course ↗
Self-paced
Analyze and Defend Against GenAI Social Engineering Attacks
Opens on Coursera ↗
Fundamentals of Network Security and Cryptography
📚 Coursera Course ↗
Self-paced
Fundamentals of Network Security and Cryptography
Opens on Coursera ↗
CompTIA Cloud+
📚 Coursera Course ↗
Self-paced
CompTIA Cloud+
Opens on Coursera ↗