Tech Skills

Cybersecurity

Ethical hacking, penetration testing, network security, CTFs and defensive security

7,061
lessons
Skills in this topic
View full skill map →
Security Basics
beginner
Fix OWASP top 10 vulnerabilities
AI Security
intermediate
Identify and patch prompt injection vulnerabilities
Network Security
intermediate
Configure a firewall with proper inbound/outbound rules
Ethical Hacking & Pen Testing
intermediate
Conduct a full pen test with Kali Linux
Cloud Security
intermediate
Implement IAM least-privilege policies on AWS/GCP
Incident Response
intermediate
Build an incident response playbook
Security Compliance
intermediate
Map controls for SOC 2 Type II compliance
Defensive AI
advanced
Build an AI-powered log anomaly detector
Edureka YouTube Channel Has Now 4 Million+ Ridiculously Committed Subscribers
Cybersecurity
Edureka YouTube Channel Has Now 4 Million+ Ridiculously Committed Subscribers
edureka! Advanced 2y ago
Black Hat Bash: Bash Scripting for Hackers and Pentesters (Bonus: GraphQL and Drone hacking)
Cybersecurity ⚡ AI Lesson
Black Hat Bash: Bash Scripting for Hackers and Pentesters (Bonus: GraphQL and Drone hacking)
David Bombal Beginner 2y ago
computer science vs cybersecurity in 2025
Cybersecurity ⚡ AI Lesson
computer science vs cybersecurity in 2025
Sajjaad Khader Intermediate 2y ago
HackTheBox - Hospital
Cybersecurity
HackTheBox - Hospital
IppSec Beginner 2y ago
How did someone make $2,000 per day with Roblox?
Cybersecurity ⚡ AI Lesson
How did someone make $2,000 per day with Roblox?
Jack Rhysider Intermediate 2y ago
You ever seen these devices? Networking for Hackers and Cybersecurity professionals.
Cybersecurity
You ever seen these devices? Networking for Hackers and Cybersecurity professionals.
David Bombal Beginner 2y ago
How scammers can reverse their payment
Cybersecurity
How scammers can reverse their payment
Jack Rhysider Intermediate 2y ago
Why You Need to Know Active Directory
Cybersecurity ⚡ AI Lesson
Why You Need to Know Active Directory
The Cyber Mentor Beginner 2y ago
Everything you need to know about networking fundamentals from @TheBeardedITDad.
Cybersecurity
Everything you need to know about networking fundamentals from @TheBeardedITDad.
Coursera Beginner 2y ago
Common Job Application Mistakes and How to Fix Them
Cybersecurity ⚡ AI Lesson
Common Job Application Mistakes and How to Fix Them
The Cyber Mentor Beginner 2y ago
Scraping Dark Web Sites with Python
Cybersecurity
Scraping Dark Web Sites with Python
John Hammond Beginner 2y ago
Focus on developing skills and experience to naturally receive better compensation.
Cybersecurity
Focus on developing skills and experience to naturally receive better compensation.
Coursera Beginner 2y ago
How Hackers Can Hide PowerShell in Environment Variables
Cybersecurity
How Hackers Can Hide PowerShell in Environment Variables
John Hammond Beginner 2y ago
Incident Response VS Incident Management | The Incident Commander Series Ep. 1
Cybersecurity ⚡ AI Lesson
Incident Response VS Incident Management | The Incident Commander Series Ep. 1
SANS Institute Beginner 2y ago
60 Hacking Commands You NEED to Know
Cybersecurity ⚡ AI Lesson
60 Hacking Commands You NEED to Know
NetworkChuck Beginner 2y ago
Countdown Begins: SANS to Reveal The Five Biggest Cyber Threats at RSAC 2024
Cybersecurity ⚡ AI Lesson
Countdown Begins: SANS to Reveal The Five Biggest Cyber Threats at RSAC 2024
SANS Institute Advanced 2y ago
AES GCM (Advanced Encryption Standard in Galois Counter Mode) - Computerphile
Cybersecurity ⚡ AI Lesson
AES GCM (Advanced Encryption Standard in Galois Counter Mode) - Computerphile
Computerphile Advanced 2y ago
Tulsi Gabbard: War, Politics, and the Military Industrial Complex | Lex Fridman Podcast #423
Cybersecurity
Tulsi Gabbard: War, Politics, and the Military Industrial Complex | Lex Fridman Podcast #423
Lex Fridman Beginner 2y ago
HackTheBox - Rebound
Cybersecurity
HackTheBox - Rebound
IppSec Beginner 2y ago
7 tech leaders who ended up in prison
Cybersecurity ⚡ AI Lesson
7 tech leaders who ended up in prison
Fireship Intermediate 2y ago
What is Kali Linux | Kali Linux Hacking Tutorials | Ethical Hacking Training | Edureka Rewind
Cybersecurity
What is Kali Linux | Kali Linux Hacking Tutorials | Ethical Hacking Training | Edureka Rewind
edureka! Beginner 2y ago
How an AT&T employee stole $23 million overnight
Cybersecurity ⚡ AI Lesson
How an AT&T employee stole $23 million overnight
Jack Rhysider Intermediate 2y ago
Demo of the Microsoft Window's Hack developed by the NSA (with OTW)
Cybersecurity
Demo of the Microsoft Window's Hack developed by the NSA (with OTW)
David Bombal Beginner 2y ago
How to Keep Up with Cybersecurity News
Cybersecurity ⚡ AI Lesson
How to Keep Up with Cybersecurity News
The Cyber Mentor Beginner 2y ago
3 Resources to Learn Programming Languages for Pentesting
Cybersecurity ⚡ AI Lesson
3 Resources to Learn Programming Languages for Pentesting
The Cyber Mentor Beginner 2y ago
Malware & Cybersecurity Threats on the Horizon
Cybersecurity ⚡ AI Lesson
Malware & Cybersecurity Threats on the Horizon
John Hammond Beginner 2y ago
Hackers Hide with Clever Alternate Data Streams
Cybersecurity
Hackers Hide with Clever Alternate Data Streams
John Hammond Beginner 2y ago
Are you liable if criminals use your hacking software?
Cybersecurity ⚡ AI Lesson
Are you liable if criminals use your hacking software?
Jack Rhysider Intermediate 2y ago
Mind Blowing 🤯 Reverse Shell Demo with DNS data bouncing exfiltration!
Cybersecurity
Mind Blowing 🤯 Reverse Shell Demo with DNS data bouncing exfiltration!
David Bombal Beginner 2y ago
Can AI Solve CAPTCHAs?
Cybersecurity ⚡ AI Lesson
Can AI Solve CAPTCHAs?
The Cyber Mentor Beginner 2y ago
What's the Best Firewall? #shorts #firewall #cybersecurity #iphone #android
Cybersecurity ⚡ AI Lesson
What's the Best Firewall? #shorts #firewall #cybersecurity #iphone #android
David Bombal Intermediate 2y ago
Giving a Caido a Try With Alex
Cybersecurity ⚡ AI Lesson
Giving a Caido a Try With Alex
The Cyber Mentor Beginner 2y ago
Why you shouldn't reuse passwords
Cybersecurity
Why you shouldn't reuse passwords
Jack Rhysider Intermediate 2y ago
Malware Analysis & Threat Intel: UAC Bypasses
Cybersecurity ⚡ AI Lesson
Malware Analysis & Threat Intel: UAC Bypasses
John Hammond Beginner 2y ago
3 Things You Need to Become a Penetration Tester
Cybersecurity ⚡ AI Lesson
3 Things You Need to Become a Penetration Tester
The Cyber Mentor Beginner 2y ago
5 Ways To Be More Productive
Cybersecurity ⚡ AI Lesson
5 Ways To Be More Productive
The Cyber Mentor Beginner 2y ago
Is your Discord account safe?
Cybersecurity
Is your Discord account safe?
Jack Rhysider Intermediate 2y ago
Network Chuck Hacked YouTube! Learn how RIGHT NOW!!
Cybersecurity
Network Chuck Hacked YouTube! Learn how RIGHT NOW!!
David Bombal Beginner 2y ago
What is a File Disclosure Vulnerability?
Cybersecurity ⚡ AI Lesson
What is a File Disclosure Vulnerability?
The Cyber Mentor Beginner 2y ago
How Hackers Compromise BIG Networks (with NetExec)
Cybersecurity
How Hackers Compromise BIG Networks (with NetExec)
John Hammond Intermediate 2y ago
Red Flags for Cybersecurity Jobseekers: Interviews and Resumes
Cybersecurity ⚡ AI Lesson
Red Flags for Cybersecurity Jobseekers: Interviews and Resumes
The Cyber Mentor Beginner 2y ago
Stop these weird addresses #shorts #firewall #iphone #android #starlink
Cybersecurity
Stop these weird addresses #shorts #firewall #iphone #android #starlink
David Bombal Intermediate 2y ago
The Apex Legends Hack.
Cybersecurity ⚡ AI Lesson
The Apex Legends Hack.
John Hammond Intermediate 2y ago
Changing the Landscape: Women Redefining Cybersecurity
Cybersecurity ⚡ AI Lesson
Changing the Landscape: Women Redefining Cybersecurity
SANS Institute Intermediate 2y ago
How to Become an Ethical Hacker | Ethical hacking certification | Ethical hacking training | Edureka
Cybersecurity
How to Become an Ethical Hacker | Ethical hacking certification | Ethical hacking training | Edureka
edureka! Beginner 2y ago
What's the Structure of a JSON Web Token?
Cybersecurity ⚡ AI Lesson
What's the Structure of a JSON Web Token?
The Cyber Mentor Beginner 2y ago
Finding WEIRD Typosquatting Websites
Cybersecurity
Finding WEIRD Typosquatting Websites
John Hammond Intermediate 2y ago
Stealing $100,000 from Puff Daddy
Cybersecurity
Stealing $100,000 from Puff Daddy
Jack Rhysider Intermediate 2y ago
📚 Coursera Courses Opens on Coursera · Free to audit
1 / 3 View all →
Ethical Hacking and CompTIA PenTest+ V3 (PT0-003) Exam Prep
📚 Coursera Course ↗
Self-paced
Ethical Hacking and CompTIA PenTest+ V3 (PT0-003) Exam Prep
Opens on Coursera ↗
CCSP (ISC)2 Certified Cloud Security Professional Exam Guide
📚 Coursera Course ↗
Self-paced
CCSP (ISC)2 Certified Cloud Security Professional Exam Guide
Opens on Coursera ↗
Database Security, Compliance, and Resilience
📚 Coursera Course ↗
Self-paced
Database Security, Compliance, and Resilience
Opens on Coursera ↗
Communication Strategies for a Virtual Age
📚 Coursera Course ↗
Self-paced
Communication Strategies for a Virtual Age
Opens on Coursera ↗
Secure VPC Networks with Cloud Next Generation Firewall
📚 Coursera Course ↗
Self-paced
Secure VPC Networks with Cloud Next Generation Firewall
Opens on Coursera ↗
Hacking COVID-19 — Course 1: Identifying a Deadly Pathogen
📚 Coursera Course ↗
Self-paced
Hacking COVID-19 — Course 1: Identifying a Deadly Pathogen
Opens on Coursera ↗