Tech Skills

Cybersecurity

Ethical hacking, penetration testing, network security, CTFs and defensive security

5196
lessons
Skills in this topic
View full skill map →
Security Basics
beginner
Fix OWASP top 10 vulnerabilities
AI Security
intermediate
Identify and patch prompt injection vulnerabilities
Network Security
intermediate
Configure a firewall with proper inbound/outbound rules
Ethical Hacking & Pen Testing
intermediate
Conduct a full pen test with Kali Linux
Cloud Security
intermediate
Implement IAM least-privilege policies on AWS/GCP
Incident Response
intermediate
Build an incident response playbook
Security Compliance
intermediate
Map controls for SOC 2 Type II compliance
Defensive AI
advanced
Build an AI-powered log anomaly detector
Learn Active Directory Kerberoasting
Cybersecurity
Learn Active Directory Kerberoasting
John Hammond Beginner 2y ago
Install Kali Linux on Windows 11 for FREE
Cybersecurity
Install Kali Linux on Windows 11 for FREE
David Bombal Beginner 2y ago
HackTheBox - MonitorsTwo
Cybersecurity
HackTheBox - MonitorsTwo
IppSec Beginner 2y ago
Its Okay to Quit
Cybersecurity
Its Okay to Quit
The Cyber Mentor Beginner 2y ago
FEATURE SEGMENT: Inside SANS Holiday Hack Challenge 2023 | Host: Ed Skoudis
Cybersecurity
FEATURE SEGMENT: Inside SANS Holiday Hack Challenge 2023 | Host: Ed Skoudis
SANS Institute Beginner 2y ago
Inside SANS Holiday Hack Challenge 2023 | Host: Ed Skoudis | August 29, 2023
Cybersecurity
Inside SANS Holiday Hack Challenge 2023 | Host: Ed Skoudis | August 29, 2023
SANS Institute Advanced 2y ago
Your Computer could be For Sale on the Dark Web
Cybersecurity
Your Computer could be For Sale on the Dark Web
John Hammond Intermediate 2y ago
Exploit Blind SSRF with Out-of-Band Detection
Cybersecurity
Exploit Blind SSRF with Out-of-Band Detection
The Cyber Mentor Beginner 2y ago
Ethical Hacking using Kali Linux | Ethical Hacking Tutorial | Edureka | Cybersecurity Rewind - 3
Cybersecurity
Ethical Hacking using Kali Linux | Ethical Hacking Tutorial | Edureka | Cybersecurity Rewind - 3
edureka! Beginner 2y ago
Cybersecurity Frameworks Tutorial | Cybersecurity Training | Edureka | Cybersecurity Rewind- 2
Cybersecurity
Cybersecurity Frameworks Tutorial | Cybersecurity Training | Edureka | Cybersecurity Rewind- 2
edureka! Beginner 2y ago
HackTheBox - OnlyForYou
Cybersecurity
HackTheBox - OnlyForYou
IppSec Beginner 2y ago
Stanford Webinar - How to Get A Cybersecurity Job
Cybersecurity
Stanford Webinar - How to Get A Cybersecurity Job
Stanford Online Beginner 2y ago
Flipper Zero vs Alarm? (will the Bike alarm stop it?) #shorts
Cybersecurity
Flipper Zero vs Alarm? (will the Bike alarm stop it?) #shorts
David Bombal Intermediate 2y ago
I Learned How To Hack WiFi In 2 Days...
Cybersecurity
I Learned How To Hack WiFi In 2 Days...
Tech With Tim Intermediate 2y ago
Building a Career in Cybersecurity
Cybersecurity
Building a Career in Cybersecurity
NVIDIA Developer Beginner 2y ago
Earn a Cybersecurity Degree | University of London MSc Cybersecurity
Cybersecurity
Earn a Cybersecurity Degree | University of London MSc Cybersecurity
Coursera Beginner 2y ago
Phases in Cybersecurity  | Cybersecurity Training | Edureka | Cybersecurity Rewind - 2
Cybersecurity
Phases in Cybersecurity | Cybersecurity Training | Edureka | Cybersecurity Rewind - 2
edureka! Intermediate 2y ago
Best Computer for Hacking in 2023
Cybersecurity
Best Computer for Hacking in 2023
The Cyber Mentor Beginner 2y ago
Kali Linux USB Live Boot with Persistence (in 5 minutes)
Cybersecurity
Kali Linux USB Live Boot with Persistence (in 5 minutes)
David Bombal Beginner 2y ago
HackTheBox - Mailroom
Cybersecurity
HackTheBox - Mailroom
IppSec Beginner 2y ago
2023 Roadmap To Your First Cybersecurity Job
Cybersecurity
2023 Roadmap To Your First Cybersecurity Job
The Cyber Mentor Beginner 2y ago
Analysis on legit tools abused in human-operated ransomware
Cybersecurity
Analysis on legit tools abused in human-operated ransomware
SANS Institute Beginner 2y ago
A RaaS-ipe for Disaster: The Evolving RaaS Space, as Told Through Tools, Techniques, and Procedures
Cybersecurity
A RaaS-ipe for Disaster: The Evolving RaaS Space, as Told Through Tools, Techniques, and Procedures
SANS Institute Beginner 2y ago
Are you looking for live PNPT training with virtual labs? Look no further!
Cybersecurity
Are you looking for live PNPT training with virtual labs? Look no further!
The Cyber Mentor Beginner 2y ago
Not All ZIP Files Are Equal
Cybersecurity
Not All ZIP Files Are Equal
John Hammond Intermediate 2y ago
NICE Workforce for Cyber Security: Recruiting, Developing, and Planning Your Cybersecurity Workforce
Cybersecurity
NICE Workforce for Cyber Security: Recruiting, Developing, and Planning Your Cybersecurity Workforce
SANS Institute Beginner 2y ago
Flipper Zero WiFi Hacking (Fake WiFi networks) #shorts
Cybersecurity
Flipper Zero WiFi Hacking (Fake WiFi networks) #shorts
David Bombal Intermediate 2y ago
Google Cybersecurity Certificate - First Thoughts
Cybersecurity
Google Cybersecurity Certificate - First Thoughts
The Cyber Mentor Beginner 2y ago
Buffer Overflow Hacking Tutorial (Bypass Passwords)
Cybersecurity
Buffer Overflow Hacking Tutorial (Bypass Passwords)
David Bombal Beginner 2y ago
HackTheBox - Busqueda
Cybersecurity
HackTheBox - Busqueda
IppSec Beginner 2y ago
Finding Vulnerabilities in IoT Firmware
Cybersecurity
Finding Vulnerabilities in IoT Firmware
The Cyber Mentor Beginner 2y ago
Rule-Breakers Unite: Reimagining SANS HackFest
Cybersecurity
Rule-Breakers Unite: Reimagining SANS HackFest
SANS Institute Advanced 2y ago
Flipper Zero WiFi Hacking (Rogue AP) #shorts
Cybersecurity
Flipper Zero WiFi Hacking (Rogue AP) #shorts
David Bombal Intermediate 2y ago
Capture the Flag at Blackhat USA 2023!
Cybersecurity
Capture the Flag at Blackhat USA 2023!
John Hammond Intermediate 2y ago
WordPress Vulnerabilities Part 2
Cybersecurity
WordPress Vulnerabilities Part 2
The Cyber Mentor Beginner 2y ago
Books! Books! Books! Which author should I interview? #shorts
Cybersecurity
Books! Books! Books! Which author should I interview? #shorts
David Bombal Intermediate 2y ago
Real World Hacking with OTW (Privacy and Cybersecurity IoT warning)
Cybersecurity
Real World Hacking with OTW (Privacy and Cybersecurity IoT warning)
David Bombal Beginner 2y ago
Hacking Active Directory for Beginners (over 5 hours of content!)
Cybersecurity
Hacking Active Directory for Beginners (over 5 hours of content!)
The Cyber Mentor Beginner 2y ago
No Experience Required – Gaining Clarity for a Career in Cybersecurity
Cybersecurity
No Experience Required – Gaining Clarity for a Career in Cybersecurity
SANS Institute Beginner 2y ago
Bonus Episode: What does it take to author a cybersecurity book?
Cybersecurity
Bonus Episode: What does it take to author a cybersecurity book?
SANS Institute Intermediate 2y ago
Unpacking the New SEC Regulations with John Pescatore
Cybersecurity
Unpacking the New SEC Regulations with John Pescatore
SANS Institute Advanced 2y ago
The Five Critical Controls for ICS | Host: Robert M. Lee | August 1, 2023
Cybersecurity
The Five Critical Controls for ICS | Host: Robert M. Lee | August 1, 2023
SANS Institute Beginner 2y ago
Flipper Zero RFID Fuzzer (Fuzz RFID) #shorts
Cybersecurity
Flipper Zero RFID Fuzzer (Fuzz RFID) #shorts
David Bombal Intermediate 2y ago
Telegram Cybercrime is INSANE
Cybersecurity
Telegram Cybercrime is INSANE
John Hammond Intermediate 2y ago
Our Best Bug Bounty Tips
Cybersecurity
Our Best Bug Bounty Tips
The Cyber Mentor Beginner 2y ago
Real World Hacking Tools Tutorial (Target: Tesla)
Cybersecurity
Real World Hacking Tools Tutorial (Target: Tesla)
David Bombal Beginner 2y ago
HackTheBox - Cerberus
Cybersecurity
HackTheBox - Cerberus
IppSec Beginner 2y ago
The Top Open-Source Vulnerabilities (and how to fix them)
Cybersecurity
The Top Open-Source Vulnerabilities (and how to fix them)
The Cyber Mentor Beginner 2y ago
📚 Coursera Courses Opens on Coursera · Free to audit
1 / 3 View all →
Computer Networks and Network Security
📚 Coursera Course ↗
Self-paced
Computer Networks and Network Security
Opens on Coursera ↗
LPIC-2 Linux Engineer (202-450)
📚 Coursera Course ↗
Self-paced
LPIC-2 Linux Engineer (202-450)
Opens on Coursera ↗
IT & Cloud Audit Masterclass – Fundamentals to Advanced
📚 Coursera Course ↗
Self-paced
IT & Cloud Audit Masterclass – Fundamentals to Advanced
Opens on Coursera ↗
Incident Response Frameworks
📚 Coursera Course ↗
Self-paced
Incident Response Frameworks
Opens on Coursera ↗
Cyber Security Professional – Beginner’s Career Guide
📚 Coursera Course ↗
Self-paced
Cyber Security Professional – Beginner’s Career Guide
Opens on Coursera ↗
Introduction to Software-Defined (SD) Branch
📚 Coursera Course ↗
Self-paced
Introduction to Software-Defined (SD) Branch
Opens on Coursera ↗