Tech Skills

Cybersecurity

Ethical hacking, penetration testing, network security, CTFs and defensive security

7,066
lessons
Skills in this topic
View full skill map →
Security Basics
beginner
Fix OWASP top 10 vulnerabilities
AI Security
intermediate
Identify and patch prompt injection vulnerabilities
Network Security
intermediate
Configure a firewall with proper inbound/outbound rules
Ethical Hacking & Pen Testing
intermediate
Conduct a full pen test with Kali Linux
Cloud Security
intermediate
Implement IAM least-privilege policies on AWS/GCP
Incident Response
intermediate
Build an incident response playbook
Security Compliance
intermediate
Map controls for SOC 2 Type II compliance
Defensive AI
advanced
Build an AI-powered log anomaly detector
RagnarLocker Ransomware Seized by Law Enforcement
Cybersecurity ⚡ AI Lesson
RagnarLocker Ransomware Seized by Law Enforcement
John Hammond Intermediate 2y ago
Cybersecurity Careers by the Numbers
Cybersecurity
Cybersecurity Careers by the Numbers
Stanford Online Beginner 2y ago
Biggest Cybersecurity Job Myths
Cybersecurity ⚡ AI Lesson
Biggest Cybersecurity Job Myths
Stanford Online Beginner 2y ago
Password Managers and Secure Passwords
Cybersecurity ⚡ AI Lesson
Password Managers and Secure Passwords
The Cyber Mentor Beginner 2y ago
Brett Cumming: Saying Yes Led to a Career in Cybersecurity
Cybersecurity ⚡ AI Lesson
Brett Cumming: Saying Yes Led to a Career in Cybersecurity
SANS Institute Intermediate 2y ago
Linux Networking that you need to know (Episode 3)
Cybersecurity ⚡ AI Lesson
Linux Networking that you need to know (Episode 3)
David Bombal Beginner 2y ago
What is Phishing  | Learn Phishing Using Kali Linux  | Phishing Attack Explained | Edureka Rewind  1
Cybersecurity
What is Phishing | Learn Phishing Using Kali Linux | Phishing Attack Explained | Edureka Rewind 1
edureka! Beginner 2y ago
Ethical Hacking Tutorial For Beginners | Learn Ethical hacking From Scratch | Edureka Rewind
Cybersecurity
Ethical Hacking Tutorial For Beginners | Learn Ethical hacking From Scratch | Edureka Rewind
edureka! Beginner 2y ago
Learn Python in Under 30 Minutes
Cybersecurity ⚡ AI Lesson
Learn Python in Under 30 Minutes
The Cyber Mentor Beginner 2y ago
They Made QR Codes LONGER?!?
Cybersecurity
They Made QR Codes LONGER?!?
John Hammond Intermediate 2y ago
How these hackers won a Tesla using a web browser
Cybersecurity
How these hackers won a Tesla using a web browser
Jack Rhysider Intermediate 2y ago
Building the Security Culture Dream Team | Host: Lance Spitzner | Guest: Molly McLain
Cybersecurity ⚡ AI Lesson
Building the Security Culture Dream Team | Host: Lance Spitzner | Guest: Molly McLain
SANS Institute Intermediate 2y ago
The Circle of Unfixable Security Issues
Cybersecurity
The Circle of Unfixable Security Issues
LiveOverflow Beginner 2y ago
Linux for Hackers Tutorial with OTW! (Episode 2)
Cybersecurity
Linux for Hackers Tutorial with OTW! (Episode 2)
David Bombal Beginner 2y ago
HackTheBox - Intentions
Cybersecurity
HackTheBox - Intentions
IppSec Beginner 2y ago
Tier List of My Worst Tweets
Cybersecurity ⚡ AI Lesson
Tier List of My Worst Tweets
LiveOverflow Beginner 2y ago
HackTheBox - PC
Cybersecurity ⚡ AI Lesson
HackTheBox - PC
IppSec Beginner 2y ago
CS50 Cybersecurity - Lecture 4 - Preserving Privacy
Cybersecurity
CS50 Cybersecurity - Lecture 4 - Preserving Privacy
CS50 Beginner 2y ago
CS50 Cybersecurity - Lecture 3 - Securing Software
Cybersecurity
CS50 Cybersecurity - Lecture 3 - Securing Software
CS50 Intermediate 2y ago
What is Kali Linux | Kali Linux Hacking Tutorials | Ethical Hacking Training | Edureka Rewind
Cybersecurity
What is Kali Linux | Kali Linux Hacking Tutorials | Ethical Hacking Training | Edureka Rewind
edureka! Beginner 2y ago
Bernard Brantley: Cutting Edge Cloud Thinking and Team Building
Cybersecurity ⚡ AI Lesson
Bernard Brantley: Cutting Edge Cloud Thinking and Team Building
SANS Institute Advanced 2y ago
Using the Internet Safely
Cybersecurity ⚡ AI Lesson
Using the Internet Safely
The Cyber Mentor Beginner 2y ago
Rinki Sethi: From Analyst to CISO and Board Member
Cybersecurity ⚡ AI Lesson
Rinki Sethi: From Analyst to CISO and Board Member
SANS Institute Advanced 2y ago
3 FREE Resources for Cyber Defenders
Cybersecurity ⚡ AI Lesson
3 FREE Resources for Cyber Defenders
John Hammond Intermediate 2y ago
Kali Linux WiFi Managed Mode (from Monitor mode) : HackerD explains #shorts #wifi #kalilinux
Cybersecurity
Kali Linux WiFi Managed Mode (from Monitor mode) : HackerD explains #shorts #wifi #kalilinux
David Bombal Intermediate 2y ago
How I Became a Hacker (and What I'd Do Differently)
Cybersecurity ⚡ AI Lesson
How I Became a Hacker (and What I'd Do Differently)
The Cyber Mentor Beginner 2y ago
Is your phone at risk? Flipper Zero vs Phone!
Cybersecurity
Is your phone at risk? Flipper Zero vs Phone!
David Bombal Beginner 2y ago
Hunting for Hackers with Sigma Rules
Cybersecurity
Hunting for Hackers with Sigma Rules
John Hammond Intermediate 2y ago
Healthcare Ransomware Discussion | Ryan Chapman
Cybersecurity ⚡ AI Lesson
Healthcare Ransomware Discussion | Ryan Chapman
SANS Institute Advanced 2y ago
Artificial Intelligence in Healthcare and How to Use it to Defend | David Hoelzer
Cybersecurity ⚡ AI Lesson
Artificial Intelligence in Healthcare and How to Use it to Defend | David Hoelzer
SANS Institute Advanced 2y ago
Create Your Own Dark Web Website
Cybersecurity
Create Your Own Dark Web Website
John Hammond Beginner 2y ago
Website Vulnerabilities to Fully Hacked Server
Cybersecurity
Website Vulnerabilities to Fully Hacked Server
John Hammond Intermediate 2y ago
Defending Your Business Against Ransomware & Cyber Extortion | Host: Ryan Chapman
Cybersecurity ⚡ AI Lesson
Defending Your Business Against Ransomware & Cyber Extortion | Host: Ryan Chapman
SANS Institute Beginner 2y ago
Detect Hackers & Malware on your Computer (literally for free)
Cybersecurity
Detect Hackers & Malware on your Computer (literally for free)
John Hammond Intermediate 2y ago
Phishing, Smishing, and Vishing Explained - 2023
Cybersecurity ⚡ AI Lesson
Phishing, Smishing, and Vishing Explained - 2023
The Cyber Mentor Beginner 2y ago
Kali Linux WiFi Monitor Mode: HackerD explains #shorts #wifi #kalilinux
Cybersecurity
Kali Linux WiFi Monitor Mode: HackerD explains #shorts #wifi #kalilinux
David Bombal Intermediate 2y ago
How to Study Effectively | Cybersecurity and Hacking
Cybersecurity ⚡ AI Lesson
How to Study Effectively | Cybersecurity and Hacking
The Cyber Mentor Beginner 2y ago
Binary Exploitation vs. Web Security
Cybersecurity ⚡ AI Lesson
Binary Exploitation vs. Web Security
LiveOverflow Beginner 2y ago
How Hackers Exploit Vulnerable Drivers
Cybersecurity
How Hackers Exploit Vulnerable Drivers
John Hammond Beginner 2y ago
Hacking for an Intelligence Agency
Cybersecurity ⚡ AI Lesson
Hacking for an Intelligence Agency
LiveOverflow Beginner 2y ago
Practical Bug Bounty Course Launch
Cybersecurity ⚡ AI Lesson
Practical Bug Bounty Course Launch
The Cyber Mentor Beginner 2y ago
To Click or Not to Click? | Host: Lodrina Cherne | October 3, 2023
Cybersecurity ⚡ AI Lesson
To Click or Not to Click? | Host: Lodrina Cherne | October 3, 2023
SANS Institute Beginner 2y ago
Stanford Online: Discover Your Career Path in Cybersecurity
Cybersecurity ⚡ AI Lesson
Stanford Online: Discover Your Career Path in Cybersecurity
Stanford Online Beginner 2y ago
Hackers Are Exploiting Critical Vulnerabilities in File Transfer Software
Cybersecurity ⚡ AI Lesson
Hackers Are Exploiting Critical Vulnerabilities in File Transfer Software
John Hammond Beginner 2y ago
Guidance on Leading the Cloud Security Journey
Cybersecurity ⚡ AI Lesson
Guidance on Leading the Cloud Security Journey
SANS Institute Beginner 2y ago
SQL Injecting Beyond Strict Filters - Union Without Comma
Cybersecurity ⚡ AI Lesson
SQL Injecting Beyond Strict Filters - Union Without Comma
IppSec Beginner 2y ago
CS50 Cybersecurity - Lecture 2 - Securing Systems
Cybersecurity
CS50 Cybersecurity - Lecture 2 - Securing Systems
CS50 Beginner 2y ago
CS50 Cybersecurity - Lecture 1 - Securing Data
Cybersecurity
CS50 Cybersecurity - Lecture 1 - Securing Data
CS50 Beginner 2y ago
📚 Coursera Courses Opens on Coursera · Free to audit
1 / 3 View all →
Cybersecurity Architecture
📚 Coursera Course ↗
Self-paced
Cybersecurity Architecture
Opens on Coursera ↗
TOTAL - CompTIA CySA+ Cybersecurity Analyst (CS0-003)
📚 Coursera Course ↗
Self-paced
TOTAL - CompTIA CySA+ Cybersecurity Analyst (CS0-003)
Opens on Coursera ↗
Vulnerability Scanning with Nmap: Network Scanning
📚 Coursera Course ↗
Self-paced
Vulnerability Scanning with Nmap: Network Scanning
Opens on Coursera ↗
The Art of Storytelling
📚 Coursera Course ↗
Self-paced
The Art of Storytelling
Opens on Coursera ↗
Networking Fundamentals and Physical Networks
📚 Coursera Course ↗
Self-paced
Networking Fundamentals and Physical Networks
Opens on Coursera ↗
Segurança de redes VPC com Cloud Next Generation Firewall
📚 Coursera Course ↗
Self-paced
Segurança de redes VPC com Cloud Next Generation Firewall
Opens on Coursera ↗