Tech Skills

Cybersecurity

Ethical hacking, penetration testing, network security, CTFs and defensive security

6396
lessons
Skills in this topic
View full skill map โ†’
Security Basics
beginner
Fix OWASP top 10 vulnerabilities
AI Security
intermediate
Identify and patch prompt injection vulnerabilities
Network Security
intermediate
Configure a firewall with proper inbound/outbound rules
Ethical Hacking & Pen Testing
intermediate
Conduct a full pen test with Kali Linux
Cloud Security
intermediate
Implement IAM least-privilege policies on AWS/GCP
Incident Response
intermediate
Build an incident response playbook
Security Compliance
intermediate
Map controls for SOC 2 Type II compliance
Defensive AI
advanced
Build an AI-powered log anomaly detector
Is Hashing Encryption? #shorts #encryption #hashing #password
Cybersecurity
Is Hashing Encryption? #shorts #encryption #hashing #password
David Bombal Intermediate 2y ago
This Computer Malware Steals Your Information
Cybersecurity
This Computer Malware Steals Your Information
John Hammond Intermediate 2y ago
Enhancing Your Environment
Cybersecurity
Enhancing Your Environment
John Hammond Intermediate 2y ago
Infostealer Malware is WICKED
Cybersecurity
Infostealer Malware is WICKED
The Cyber Mentor Beginner 2y ago
The DLL hijacking attack
Cybersecurity
The DLL hijacking attack
Jack Rhysider Beginner 2y ago
How to prepare for a career in cybersecurity with no prior experience.
Cybersecurity
How to prepare for a career in cybersecurity with no prior experience.
Coursera Intermediate 2y ago
They're watching you ๐Ÿ˜ฑ Protect your online PRIVACY!
Cybersecurity
They're watching you ๐Ÿ˜ฑ Protect your online PRIVACY!
David Bombal Beginner 2y ago
HackTheBox - Clicker
Cybersecurity
HackTheBox - Clicker
IppSec Beginner 2y ago
Is AI Still Writing Bad Code?
Cybersecurity
Is AI Still Writing Bad Code?
The Cyber Mentor Beginner 2y ago
Finding The .webp Vulnerability in 8s (Fuzzing with AFL++)
Cybersecurity
Finding The .webp Vulnerability in 8s (Fuzzing with AFL++)
LiveOverflow Beginner 2y ago
HackTheBox - Bookworm
Cybersecurity
HackTheBox - Bookworm
IppSec Beginner 2y ago
How hackers infiltrated the CIA director's email #shorts #cybersecurity
Cybersecurity
How hackers infiltrated the CIA director's email #shorts #cybersecurity
Jack Rhysider Intermediate 2y ago
Hands-on Cybersecurity Training in New Orleans 2024
Cybersecurity
Hands-on Cybersecurity Training in New Orleans 2024
SANS Institute Advanced 2y ago
Emerging Technologies: Designing Strategy and Forecasting Disruption I Program Overview
Cybersecurity
Emerging Technologies: Designing Strategy and Forecasting Disruption I Program Overview
Stanford Online Beginner 2y ago
Ethical Hacking Tutorial For Beginners [2023] | Learn Ethical hacking From Scratch | Edureka Rewind
Cybersecurity
Ethical Hacking Tutorial For Beginners [2023] | Learn Ethical hacking From Scratch | Edureka Rewind
edureka! Beginner 2y ago
What is Kali Linux | Kali Linux Hacking Tutorials | Ethical Hacking Training | Edureka Rewind
Cybersecurity
What is Kali Linux | Kali Linux Hacking Tutorials | Ethical Hacking Training | Edureka Rewind
edureka! Beginner 2y ago
2024 Cyber Defense Trends and Predictions
Cybersecurity
2024 Cyber Defense Trends and Predictions
SANS Institute Intermediate 2y ago
How Ethical Hacking Tricks Can Protect Your APIs and Apps
Cybersecurity
How Ethical Hacking Tricks Can Protect Your APIs and Apps
The New Stack Beginner 2y ago
3 Levels of WiFi Hacking
Cybersecurity
3 Levels of WiFi Hacking
NetworkChuck Beginner 2y ago
Kernel Level Exploits
Cybersecurity
Kernel Level Exploits
John Hammond Intermediate 2y ago
Getting Ahead in the Industry
Cybersecurity
Getting Ahead in the Industry
John Hammond Intermediate 2y ago
Cyber Defense is Literally Free
Cybersecurity
Cyber Defense is Literally Free
John Hammond Intermediate 2y ago
Free Web Application Ethical Hacking Course (Includes Server-side request forgery SSRF)
Cybersecurity
Free Web Application Ethical Hacking Course (Includes Server-side request forgery SSRF)
David Bombal Beginner 2y ago
Do you know the difference between the encryption algorithms? #shorts #encryption #tls #vpn
Cybersecurity
Do you know the difference between the encryption algorithms? #shorts #encryption #tls #vpn
David Bombal Intermediate 2y ago
i BACKDOORED a Desktop Shortcut (to run malware)
Cybersecurity
i BACKDOORED a Desktop Shortcut (to run malware)
John Hammond Advanced 2y ago
How to Hack Active Directory with ASREP Roasting
Cybersecurity
How to Hack Active Directory with ASREP Roasting
John Hammond Beginner 2y ago
5 Ways to Boost your Cybersecurity Career in 2024
Cybersecurity
5 Ways to Boost your Cybersecurity Career in 2024
The Cyber Mentor Beginner 2y ago
The best Hacking Courses & Certs? Your 2024 roadmap to Pentester success.
Cybersecurity
The best Hacking Courses & Certs? Your 2024 roadmap to Pentester success.
David Bombal Beginner 2y ago
Learn Application Security Testing in 2024
Cybersecurity
Learn Application Security Testing in 2024
The Cyber Mentor Beginner 2y ago
Free OSINT course and resources: How you can get started in 2024
Cybersecurity
Free OSINT course and resources: How you can get started in 2024
David Bombal Beginner 2y ago
Create Your Own File Extension
Cybersecurity
Create Your Own File Extension
John Hammond Beginner 2y ago
The Bank Robber Lurking Inside Your Web Browser๐ŸŽ™Darknet Diaries Ep. 111: ZeuS
Cybersecurity
The Bank Robber Lurking Inside Your Web Browser๐ŸŽ™Darknet Diaries Ep. 111: ZeuS
Jack Rhysider Intermediate 2y ago
How Hackers Move Through Networks (with Ligolo)
Cybersecurity
How Hackers Move Through Networks (with Ligolo)
John Hammond Intermediate 2y ago
Begin your journey into DFIR, Blue Team, Malware and Threat Hunting with Mary Ellen Kennel
Cybersecurity
Begin your journey into DFIR, Blue Team, Malware and Threat Hunting with Mary Ellen Kennel
The Cyber Mentor Intermediate 2y ago
Mind blowing ๐Ÿคฏ $20 million USD bounties! (Zero to Hero Money Hacking Roadmap)
Cybersecurity
Mind blowing ๐Ÿคฏ $20 million USD bounties! (Zero to Hero Money Hacking Roadmap)
David Bombal Beginner 2y ago
Burp Extension Development Part 2: Data Persistence
Cybersecurity
Burp Extension Development Part 2: Data Persistence
The Cyber Mentor Beginner 2y ago
True or False? Your IP address gives your location? #shorts #iphone #android #starlink #vpn
Cybersecurity
True or False? Your IP address gives your location? #shorts #iphone #android #starlink #vpn
David Bombal Intermediate 2y ago
The Unholy Alliance Between a Spam Kingpin & Cheap Viagra๐ŸŽ™Darknet Diaries Ep. 110: Spam Botnets
Cybersecurity
The Unholy Alliance Between a Spam Kingpin & Cheap Viagra๐ŸŽ™Darknet Diaries Ep. 110: Spam Botnets
Jack Rhysider Intermediate 2y ago
How hackers breach iPhone security
Cybersecurity
How hackers breach iPhone security
Jack Rhysider Intermediate 2y ago
How to Become an Ethical Hacker | Ethical hacking certification | Ethical hacking training | Edureka
Cybersecurity
How to Become an Ethical Hacker | Ethical hacking certification | Ethical hacking training | Edureka
edureka! Beginner 2y ago
Hackers Steal Passwords & Personal Information
Cybersecurity
Hackers Steal Passwords & Personal Information
John Hammond Advanced 2y ago
Cybersecurity Full Course - 10 Hours | Cyber Security Training for Beginners | Edureka
Cybersecurity
Cybersecurity Full Course - 10 Hours | Cyber Security Training for Beginners | Edureka
edureka! Beginner 2y ago
I Put A Fake Email Server On The Internet
Cybersecurity
I Put A Fake Email Server On The Internet
John Hammond Advanced 2y ago
Ranking Port Scanners - Tier List
Cybersecurity
Ranking Port Scanners - Tier List
The Cyber Mentor Beginner 2y ago
This Windows Program can CLONE ITSELF
Cybersecurity
This Windows Program can CLONE ITSELF
John Hammond Intermediate 2y ago
Over 30,000 Indian websites hacked by Pakistani hackers #shorts #cybersecurity
Cybersecurity
Over 30,000 Indian websites hacked by Pakistani hackers #shorts #cybersecurity
Jack Rhysider Intermediate 2y ago
HackTheBox - Sau
Cybersecurity
HackTheBox - Sau
IppSec Beginner 2y ago
When His Online Girlfriend Scammed Him Out of $90,000, He Scammed Back๐ŸŽ™Ep. 141: The Pig Butcher
Cybersecurity
When His Online Girlfriend Scammed Him Out of $90,000, He Scammed Back๐ŸŽ™Ep. 141: The Pig Butcher
Jack Rhysider Intermediate 2y ago
๐Ÿ“š Coursera Courses Opens on Coursera ยท Free to audit
1 / 3 View all โ†’
Advanced Network Attacks, Web Hacking, and Cryptography
๐Ÿ“š Coursera Course โ†—
Self-paced
Advanced Network Attacks, Web Hacking, and Cryptography
Opens on Coursera โ†—
Advanced Penetration Testing with Kali Linux
๐Ÿ“š Coursera Course โ†—
Self-paced
Advanced Penetration Testing with Kali Linux
Opens on Coursera โ†—
Cybersecurity Essentials - From Zero to Secure
๐Ÿ“š Coursera Course โ†—
Self-paced
Cybersecurity Essentials - From Zero to Secure
Opens on Coursera โ†—
AWS: Resilient Solutions and Security Controls
๐Ÿ“š Coursera Course โ†—
Self-paced
AWS: Resilient Solutions and Security Controls
Opens on Coursera โ†—
Block Cipher Modes of Operation Training
๐Ÿ“š Coursera Course โ†—
Self-paced
Block Cipher Modes of Operation Training
Opens on Coursera โ†—
Introduction to Computer Security
๐Ÿ“š Coursera Course โ†—
Self-paced
Introduction to Computer Security
Opens on Coursera โ†—