Tech Skills

Cybersecurity

Ethical hacking, penetration testing, network security, CTFs and defensive security

7,065
lessons
Skills in this topic
View full skill map →
Security Basics
beginner
Fix OWASP top 10 vulnerabilities
AI Security
intermediate
Identify and patch prompt injection vulnerabilities
Network Security
intermediate
Configure a firewall with proper inbound/outbound rules
Ethical Hacking & Pen Testing
intermediate
Conduct a full pen test with Kali Linux
Cloud Security
intermediate
Implement IAM least-privilege policies on AWS/GCP
Incident Response
intermediate
Build an incident response playbook
Security Compliance
intermediate
Map controls for SOC 2 Type II compliance
Defensive AI
advanced
Build an AI-powered log anomaly detector
How Pirate Bay claimed to be hosted in North Korea
Cybersecurity ⚡ AI Lesson
How Pirate Bay claimed to be hosted in North Korea
Jack Rhysider Intermediate 2y ago
How To Hack APIs with Python
Cybersecurity
How To Hack APIs with Python
John Hammond Intermediate 2y ago
Hacker Reacts to 23andme Data Leak
Cybersecurity ⚡ AI Lesson
Hacker Reacts to 23andme Data Leak
LiveOverflow Beginner 2y ago
Empowering Tomorrow’s Security Leaders with the SANS Transformational Triad
Cybersecurity ⚡ AI Lesson
Empowering Tomorrow’s Security Leaders with the SANS Transformational Triad
SANS Institute Intermediate 2y ago
How to Become an Ethical Hacker | Ethical hacking certification | Ethical hacking  | Edureka Rewind
Cybersecurity
How to Become an Ethical Hacker | Ethical hacking certification | Ethical hacking | Edureka Rewind
edureka! Beginner 2y ago
Ethical Hacking Tutorial For Beginners 2025 | Learn Ethical hacking From Scratch | Edureka Rewind
Cybersecurity
Ethical Hacking Tutorial For Beginners 2025 | Learn Ethical hacking From Scratch | Edureka Rewind
edureka! Beginner 2y ago
This Cybercrime Group Puts Its Hackers Through School
Cybersecurity
This Cybercrime Group Puts Its Hackers Through School
John Hammond Intermediate 2y ago
LDR551: Building and Leading Security Operations Centers | GSOM
Cybersecurity ⚡ AI Lesson
LDR551: Building and Leading Security Operations Centers | GSOM
SANS Institute Advanced 2y ago
Kali Linux WHOIS with HackerD #shorts #kalilinux #domain #steam
Cybersecurity
Kali Linux WHOIS with HackerD #shorts #kalilinux #domain #steam
David Bombal Intermediate 2y ago
Networking for Hackers and Cybersecurity professionals (How long until you learn something new?)
Cybersecurity ⚡ AI Lesson
Networking for Hackers and Cybersecurity professionals (How long until you learn something new?)
David Bombal Beginner 2y ago
How much is your Instagram username worth?
Cybersecurity
How much is your Instagram username worth?
Jack Rhysider Intermediate 2y ago
What if Q* broke cybersecurity? How would we adapt? Deep dive! P≠NP? Here's why it's probably fine..
Cybersecurity
What if Q* broke cybersecurity? How would we adapt? Deep dive! P≠NP? Here's why it's probably fine..
David Shapiro Intermediate 2y ago
Hacking and Attacking Active Directory LIVE
Cybersecurity ⚡ AI Lesson
Hacking and Attacking Active Directory LIVE
The Cyber Mentor Beginner 2y ago
Step by Step Phishing Setup Tutorials are Unethical!
Cybersecurity ⚡ AI Lesson
Step by Step Phishing Setup Tutorials are Unethical!
LiveOverflow Beginner 2y ago
TCM Security Black Friday Deals & More
Cybersecurity ⚡ AI Lesson
TCM Security Black Friday Deals & More
The Cyber Mentor Beginner 2y ago
How I Choose Niches with a 100% Success Rate
Cybersecurity
How I Choose Niches with a 100% Success Rate
Matt Diggity Beginner 2y ago
CS50 Fall 2023 - Lecture 10 - Cybersecurity (live, unedited)
Cybersecurity
CS50 Fall 2023 - Lecture 10 - Cybersecurity (live, unedited)
CS50 Beginner 2y ago
HackTheBox - Sandworm
Cybersecurity ⚡ AI Lesson
HackTheBox - Sandworm
IppSec Beginner 2y ago
Red Teaming and Mitigation Strategies // Ads Dawson // MLOP Podcast #190 clip
Cybersecurity
Red Teaming and Mitigation Strategies // Ads Dawson // MLOP Podcast #190 clip
MLOps.community Beginner 2y ago
Defining Cybersecurity with Gene Spafford - Computerphile
Cybersecurity ⚡ AI Lesson
Defining Cybersecurity with Gene Spafford - Computerphile
Computerphile Beginner 2y ago
DEFCon31 - AI CTF Solution Stream!
Cybersecurity
DEFCon31 - AI CTF Solution Stream!
Rob Mulla Beginner 2y ago
Celebrating Cybersecurity Awareness Month with a little study session!
Cybersecurity
Celebrating Cybersecurity Awareness Month with a little study session!
Coursera Beginner 2y ago
ESG and Sustainable Financial Strategy Course
Cybersecurity
ESG and Sustainable Financial Strategy Course
Saïd Business School, University of Oxford Intermediate 2y ago
What is Kali Linux | Kali Linux Hacking Tutorials | Ethical Hacking Training | Edureka Rewind
Cybersecurity
What is Kali Linux | Kali Linux Hacking Tutorials | Ethical Hacking Training | Edureka Rewind
edureka! Beginner 2y ago
#Trending Cybersecurity Certifications #SecureYourFuture | Edureka #Shorts
Cybersecurity
#Trending Cybersecurity Certifications #SecureYourFuture | Edureka #Shorts
edureka! Beginner 2y ago
TryHackMe! Advent of Cyber 2023 Kick-Off
Cybersecurity
TryHackMe! Advent of Cyber 2023 Kick-Off
John Hammond Intermediate 2y ago
Incident Response: Azure Log Analysis
Cybersecurity ⚡ AI Lesson
Incident Response: Azure Log Analysis
John Hammond Advanced 2y ago
Can ChatGPT Find Smart Contract Vulnerabilities?
Cybersecurity ⚡ AI Lesson
Can ChatGPT Find Smart Contract Vulnerabilities?
John Hammond Beginner 2y ago
Career Transition Series - Episode 27 | Cyber security Career Transition | Edureka Reviews
Cybersecurity
Career Transition Series - Episode 27 | Cyber security Career Transition | Edureka Reviews
edureka! Advanced 2y ago
Capture the Flag: Hacking Yet Another Markup Language
Cybersecurity
Capture the Flag: Hacking Yet Another Markup Language
John Hammond Intermediate 2y ago
Steve Tran: Hacker, Magician, Police Officer, and CISO
Cybersecurity ⚡ AI Lesson
Steve Tran: Hacker, Magician, Police Officer, and CISO
SANS Institute Intermediate 2y ago
This Cybercrime Forum Is Full Of Hackers
Cybersecurity
This Cybercrime Forum Is Full Of Hackers
John Hammond Intermediate 2y ago
Multicast is just Weird.... Doesn't even know who gets it?
Cybersecurity
Multicast is just Weird.... Doesn't even know who gets it?
David Bombal Intermediate 2y ago
How Hackers Compromise Other Users
Cybersecurity
How Hackers Compromise Other Users
John Hammond Intermediate 2y ago
Cyber Security Question and Answers  | CyberSecurity Interview Tips  | Edureka Rewind - 1
Cybersecurity
Cyber Security Question and Answers | CyberSecurity Interview Tips | Edureka Rewind - 1
edureka! Beginner 2y ago
Indian Prime Minister's personal website was hacked?
Cybersecurity
Indian Prime Minister's personal website was hacked?
Jack Rhysider Intermediate 2y ago
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tutorial | Edureka Rewind
Cybersecurity
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tutorial | Edureka Rewind
edureka! Beginner 2y ago
Wait ... your router has been online for how long??!! #shorts #cybersecurity #hacking
Cybersecurity
Wait ... your router has been online for how long??!! #shorts #cybersecurity #hacking
David Bombal Intermediate 2y ago
Reinventing Web Security
Cybersecurity
Reinventing Web Security
LiveOverflow Beginner 2y ago
The Future of XDR, SIEM & Threat Hunting is FREE
Cybersecurity ⚡ AI Lesson
The Future of XDR, SIEM & Threat Hunting is FREE
The Cyber Mentor Beginner 2y ago
Mercenary PREDATOR Spyware and other THREATS (plus FREE training)
Cybersecurity
Mercenary PREDATOR Spyware and other THREATS (plus FREE training)
David Bombal Advanced 2y ago
How to Use DOM Invader in 2023
Cybersecurity ⚡ AI Lesson
How to Use DOM Invader in 2023
The Cyber Mentor Beginner 2y ago
The MOVEit Hack In Retrospect
Cybersecurity
The MOVEit Hack In Retrospect
John Hammond Intermediate 2y ago
How a Nigerian man stole millions of dollars in tax refunds
Cybersecurity ⚡ AI Lesson
How a Nigerian man stole millions of dollars in tax refunds
Jack Rhysider Intermediate 2y ago
where do you ACTUALLY submit vulnerabilities?
Cybersecurity
where do you ACTUALLY submit vulnerabilities?
John Hammond Intermediate 2y ago
I Took Over a Microsoft Cloud Account. Again.
Cybersecurity ⚡ AI Lesson
I Took Over a Microsoft Cloud Account. Again.
John Hammond Intermediate 2y ago
Thinking Outside the Firewall: Unconventional Cybersecurity Journeys | Host: Rich Greene
Cybersecurity ⚡ AI Lesson
Thinking Outside the Firewall: Unconventional Cybersecurity Journeys | Host: Rich Greene
SANS Institute Intermediate 2y ago
SANS Network Security 2023 Recap: Cybersecurity, Night Talks, & Puppies!
Cybersecurity ⚡ AI Lesson
SANS Network Security 2023 Recap: Cybersecurity, Night Talks, & Puppies!
SANS Institute Advanced 2y ago
📚 Coursera Courses Opens on Coursera · Free to audit
1 / 3 View all →
CCNA Expert – Network Automation, Cloud, and Emerging Technologies
📚 Coursera Course ↗
Self-paced
CCNA Expert – Network Automation, Cloud, and Emerging Technologies
Opens on Coursera ↗
Introduction to Networking and Cloud Computing
📚 Coursera Course ↗
Self-paced
Introduction to Networking and Cloud Computing
Opens on Coursera ↗
Hacking WEP/WPA/WPA2 Wi-Fi Networks Using Kali Linux
📚 Coursera Course ↗
Self-paced
Hacking WEP/WPA/WPA2 Wi-Fi Networks Using Kali Linux
Opens on Coursera ↗
Security for Artificial Intelligence Software and Services
📚 Coursera Course ↗
Self-paced
Security for Artificial Intelligence Software and Services
Opens on Coursera ↗
Consultative Selling and Buyer Engagement
📚 Coursera Course ↗
Self-paced
Consultative Selling and Buyer Engagement
Opens on Coursera ↗
CISSP Domain 3: Security Architecture and Engineering
📚 Coursera Course ↗
Self-paced
CISSP Domain 3: Security Architecture and Engineering
Opens on Coursera ↗