Tech Skills

Cybersecurity

Ethical hacking, penetration testing, network security, CTFs and defensive security

7,065
lessons
Skills in this topic
View full skill map โ†’
Security Basics
beginner
Fix OWASP top 10 vulnerabilities
AI Security
intermediate
Identify and patch prompt injection vulnerabilities
Network Security
intermediate
Configure a firewall with proper inbound/outbound rules
Ethical Hacking & Pen Testing
intermediate
Conduct a full pen test with Kali Linux
Cloud Security
intermediate
Implement IAM least-privilege policies on AWS/GCP
Incident Response
intermediate
Build an incident response playbook
Security Compliance
intermediate
Map controls for SOC 2 Type II compliance
Defensive AI
advanced
Build an AI-powered log anomaly detector
Cybersecurity Full Course - 10 Hours | Cyber Security Training for Beginners | Edureka
Cybersecurity
Cybersecurity Full Course - 10 Hours | Cyber Security Training for Beginners | Edureka
edureka! Beginner 2y ago
I Put A Fake Email Server On The Internet
Cybersecurity
I Put A Fake Email Server On The Internet
John Hammond Advanced 2y ago
Ranking Port Scanners - Tier List
Cybersecurity โšก AI Lesson
Ranking Port Scanners - Tier List
The Cyber Mentor Beginner 2y ago
3 Levels of WiFi Hacking
Cybersecurity
3 Levels of WiFi Hacking
NetworkChuck Beginner 2y ago
This Windows Program can CLONE ITSELF
Cybersecurity
This Windows Program can CLONE ITSELF
John Hammond Intermediate 2y ago
Over 30,000 Indian websites hacked by Pakistani hackers #shorts #cybersecurity
Cybersecurity
Over 30,000 Indian websites hacked by Pakistani hackers #shorts #cybersecurity
Jack Rhysider Intermediate 2y ago
HackTheBox - Sau
Cybersecurity
HackTheBox - Sau
IppSec Beginner 2y ago
Burp Extension Development Part 1: Setup & Basics
Cybersecurity โšก AI Lesson
Burp Extension Development Part 1: Setup & Basics
The Cyber Mentor Beginner 2y ago
Top Hacking Books for 2024 (plus Resources): FREE and Paid
Cybersecurity
Top Hacking Books for 2024 (plus Resources): FREE and Paid
David Bombal Beginner 2y ago
They Hacked Govts and Celebs, But Their Downfall Will Gut You๐ŸŽ™Darknet Diaries Ep. 109 TeaMp0isoN
Cybersecurity
They Hacked Govts and Celebs, But Their Downfall Will Gut You๐ŸŽ™Darknet Diaries Ep. 109 TeaMp0isoN
Jack Rhysider Intermediate 2y ago
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tutorial | Edureka Rewind
Cybersecurity
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tutorial | Edureka Rewind
edureka! Beginner 2y ago
Go FROM business ZERO to a growth hacking HERO.
Cybersecurity
Go FROM business ZERO to a growth hacking HERO.
Adam Erhart Intermediate 2y ago
Hacking Tools (with demos) that you need to learn in 2024
Cybersecurity
Hacking Tools (with demos) that you need to learn in 2024
David Bombal Beginner 2y ago
CyberThreat 2023
Cybersecurity โšก AI Lesson
CyberThreat 2023
SANS Institute Advanced 2y ago
HTMX Crash Course | Dynamic Pages Without Writing Any JavaScript
Cybersecurity โšก AI Lesson
HTMX Crash Course | Dynamic Pages Without Writing Any JavaScript
Traversy Media Beginner 2y ago
CS50x 2024 - Cybersecurity
Cybersecurity
CS50x 2024 - Cybersecurity
CS50 Beginner 2y ago
cybersecurity vs software engineering ๐Ÿ˜ฑ๐Ÿ˜ฑ๐Ÿ˜ฑ
Cybersecurity
cybersecurity vs software engineering ๐Ÿ˜ฑ๐Ÿ˜ฑ๐Ÿ˜ฑ
Sajjaad Khader Intermediate 2y ago
the most secure OS in the world.....I hate it
Cybersecurity โšก AI Lesson
the most secure OS in the world.....I hate it
NetworkChuck Beginner 2y ago
Introducing SANS Executive Cybersecurity Exercises
Cybersecurity โšก AI Lesson
Introducing SANS Executive Cybersecurity Exercises
SANS Institute Beginner 2y ago
Quick Intro to Insecure Direct Object References (IDORs) & How You Can Fix Them
Cybersecurity
Quick Intro to Insecure Direct Object References (IDORs) & How You Can Fix Them
AWS Developers Beginner 2y ago
Quick Intro to Injection Attacks & How You Can Fix Them
Cybersecurity
Quick Intro to Injection Attacks & How You Can Fix Them
AWS Developers Beginner 2y ago
Network security fundamentals: Creating layered network defenses with built-in tools
Cybersecurity
Network security fundamentals: Creating layered network defenses with built-in tools
Google Cloud Beginner 2y ago
HackTheBox - Authority
Cybersecurity โšก AI Lesson
HackTheBox - Authority
IppSec Beginner 2y ago
All About WEB SECURITY | Web Security for Full Stack Developers | GeeksforGeeks
Cybersecurity
All About WEB SECURITY | Web Security for Full Stack Developers | GeeksforGeeks
GeeksforGeeks Beginner 2y ago
Cyber Security Question and Answers  | CyberSecurity Interview Tips  | Edureka Rewind - 1
Cybersecurity
Cyber Security Question and Answers | CyberSecurity Interview Tips | Edureka Rewind - 1
edureka! Intermediate 2y ago
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Edureka Rewind
Cybersecurity
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Edureka Rewind
edureka! Beginner 2y ago
How phone calls can hack a bank
Cybersecurity
How phone calls can hack a bank
Jack Rhysider Intermediate 2y ago
2024 Roadmap to Master Hacker
Cybersecurity
2024 Roadmap to Master Hacker
David Bombal Beginner 2y ago
The mysterious virus that erases its own tracks
Cybersecurity
The mysterious virus that erases its own tracks
Jack Rhysider Intermediate 2y ago
How they scammed people for downloading nothing
Cybersecurity
How they scammed people for downloading nothing
Jack Rhysider Intermediate 2y ago
๐Ÿ’ฐ Cybersecurity Salary, Career & More | Edureka #Shorts
Cybersecurity
๐Ÿ’ฐ Cybersecurity Salary, Career & More | Edureka #Shorts
edureka! Beginner 2y ago
The Highs and Lows of Working in Cybersecurity
Cybersecurity โšก AI Lesson
The Highs and Lows of Working in Cybersecurity
The Cyber Mentor Beginner 2y ago
I Get Paid to Trick People Into Giving Up Their Passwords๐ŸŽ™Darknet Diaries Ep. 107: Alethe
Cybersecurity
I Get Paid to Trick People Into Giving Up Their Passwords๐ŸŽ™Darknet Diaries Ep. 107: Alethe
Jack Rhysider Intermediate 2y ago
Avoid "OR 1=1" in SQL Injections
Cybersecurity โšก AI Lesson
Avoid "OR 1=1" in SQL Injections
The Cyber Mentor Beginner 2y ago
WiFi hacking like Mr Robot (with OTW)
Cybersecurity
WiFi hacking like Mr Robot (with OTW)
David Bombal Beginner 2y ago
Best Games to Teach You How to Code
Cybersecurity โšก AI Lesson
Best Games to Teach You How to Code
The Cyber Mentor Beginner 2y ago
Ethical Hacking using Kali Linux | Ethical Hacking Tutorial | Edureka | Cybersecurity Rewind - 3
Cybersecurity
Ethical Hacking using Kali Linux | Ethical Hacking Tutorial | Edureka | Cybersecurity Rewind - 3
edureka! Beginner 2y ago
Phases in Cybersecurity  |Cybersecurity Training | Edureka | Cybersecurity Rewind - 2
Cybersecurity
Phases in Cybersecurity |Cybersecurity Training | Edureka | Cybersecurity Rewind - 2
edureka! Intermediate 2y ago
This Company Got Hacked... but HOW?
Cybersecurity
This Company Got Hacked... but HOW?
John Hammond Advanced 2y ago
Learn to Hack AWS & Kubernetes Clusters (for free)
Cybersecurity
Learn to Hack AWS & Kubernetes Clusters (for free)
John Hammond Beginner 2y ago
Edโ€™s Whacky Winter Wonder Holiday Bonanza | Host: Ed Skoudis | December 12, 2023
Cybersecurity โšก AI Lesson
Edโ€™s Whacky Winter Wonder Holiday Bonanza | Host: Ed Skoudis | December 12, 2023
SANS Institute Intermediate 2y ago
I Hacked Another File Upload Website
Cybersecurity
I Hacked Another File Upload Website
John Hammond Intermediate 2y ago
The 1st Annual TCM Invitational CTF (THIS SATURDAY!)
Cybersecurity โšก AI Lesson
The 1st Annual TCM Invitational CTF (THIS SATURDAY!)
The Cyber Mentor Beginner 2y ago
Using AI for call scams!
Cybersecurity โšก AI Lesson
Using AI for call scams!
Jack Rhysider Intermediate 2y ago
Next Gen Hacker?
Cybersecurity
Next Gen Hacker?
David Bombal Beginner 2y ago
New Web Application Penetration Testing Certification
Cybersecurity โšก AI Lesson
New Web Application Penetration Testing Certification
The Cyber Mentor Beginner 2y ago
Digital Forensics with FTK Imager (TryHackMe Advent of Cyber Day 8)
Cybersecurity
Digital Forensics with FTK Imager (TryHackMe Advent of Cyber Day 8)
John Hammond Intermediate 2y ago
Writing Custom Malware: Import Address Table Hooking
Cybersecurity
Writing Custom Malware: Import Address Table Hooking
John Hammond Beginner 2y ago
๐Ÿ“š Coursera Courses Opens on Coursera ยท Free to audit
1 / 3 View all โ†’
Certified Kubernetes Security Specialist (CKS): Unit 2
๐Ÿ“š Coursera Course โ†—
Self-paced
Certified Kubernetes Security Specialist (CKS): Unit 2
Opens on Coursera โ†—
Cybersecurity Operations and Controls
๐Ÿ“š Coursera Course โ†—
Self-paced
Cybersecurity Operations and Controls
Opens on Coursera โ†—
Security Fundamentals and Identity Management
๐Ÿ“š Coursera Course โ†—
Self-paced
Security Fundamentals and Identity Management
Opens on Coursera โ†—
 Incident Response and Recovery
๐Ÿ“š Coursera Course โ†—
Self-paced
Incident Response and Recovery
Opens on Coursera โ†—
Apply Intermediate Flutter UI Design & Interaction
๐Ÿ“š Coursera Course โ†—
Self-paced
Apply Intermediate Flutter UI Design & Interaction
Opens on Coursera โ†—
Nessus Scanner - Network Scanning from Beginner to Advanced
๐Ÿ“š Coursera Course โ†—
Self-paced
Nessus Scanner - Network Scanning from Beginner to Advanced
Opens on Coursera โ†—