Tech Skills

Cybersecurity

Ethical hacking, penetration testing, network security, CTFs and defensive security

6399
lessons
Skills in this topic
View full skill map โ†’
Security Basics
beginner
Fix OWASP top 10 vulnerabilities
AI Security
intermediate
Identify and patch prompt injection vulnerabilities
Network Security
intermediate
Configure a firewall with proper inbound/outbound rules
Ethical Hacking & Pen Testing
intermediate
Conduct a full pen test with Kali Linux
Cloud Security
intermediate
Implement IAM least-privilege policies on AWS/GCP
Incident Response
intermediate
Build an incident response playbook
Security Compliance
intermediate
Map controls for SOC 2 Type II compliance
Defensive AI
advanced
Build an AI-powered log anomaly detector
Stanford Webinar - How to Get A Cybersecurity Job
Cybersecurity
Stanford Webinar - How to Get A Cybersecurity Job
Stanford Online Beginner 2y ago
When She Can't Hack the Lock, She Hacks the Security Guard๐ŸŽ™Darknet Diaries Ep. 90: Jenny
Cybersecurity
When She Can't Hack the Lock, She Hacks the Security Guard๐ŸŽ™Darknet Diaries Ep. 90: Jenny
Jack Rhysider Intermediate 2y ago
Why did the FBI pay $1 million to hack this iPhone?
Cybersecurity
Why did the FBI pay $1 million to hack this iPhone?
Jack Rhysider Intermediate 2y ago
Flipper Zero vs Alarm? (will the Bike alarm stop it?) #shorts
Cybersecurity
Flipper Zero vs Alarm? (will the Bike alarm stop it?) #shorts
David Bombal Intermediate 2y ago
Seasonal Cycle Embodied, with Deborah Woolf
Cybersecurity
Seasonal Cycle Embodied, with Deborah Woolf
TCM Academy Intermediate 2y ago
Kali Linux USB Live Boot with Persistence (in 5 minutes)
Cybersecurity
Kali Linux USB Live Boot with Persistence (in 5 minutes)
David Bombal Beginner 2y ago
HackTheBox - Mailroom
Cybersecurity
HackTheBox - Mailroom
IppSec Beginner 2y ago
2023 Roadmap To Your First Cybersecurity Job
Cybersecurity
2023 Roadmap To Your First Cybersecurity Job
The Cyber Mentor Beginner 2y ago
Analysis on legit tools abused in human-operated ransomware
Cybersecurity
Analysis on legit tools abused in human-operated ransomware
SANS Institute Beginner 2y ago
A RaaS-ipe for Disaster: The Evolving RaaS Space, as Told Through Tools, Techniques, and Procedures
Cybersecurity
A RaaS-ipe for Disaster: The Evolving RaaS Space, as Told Through Tools, Techniques, and Procedures
SANS Institute Beginner 2y ago
Are you looking for live PNPT training with virtual labs? Look no further!
Cybersecurity
Are you looking for live PNPT training with virtual labs? Look no further!
The Cyber Mentor Beginner 2y ago
Not All ZIP Files Are Equal
Cybersecurity
Not All ZIP Files Are Equal
John Hammond Intermediate 2y ago
I Learned How To Hack WiFi In 2 Days...
Cybersecurity
I Learned How To Hack WiFi In 2 Days...
Tech With Tim Intermediate 2y ago
HackTheBox - Busqueda
Cybersecurity
HackTheBox - Busqueda
IppSec Beginner 2y ago
Capture the Flag at Blackhat USA 2023!
Cybersecurity
Capture the Flag at Blackhat USA 2023!
John Hammond Intermediate 2y ago
Elisabeth Rochat de la Vallรฉe. "The master phrase of the Daodejing is Bu Zheng"
Cybersecurity
Elisabeth Rochat de la Vallรฉe. "The master phrase of the Daodejing is Bu Zheng"
TCM Academy Beginner 2y ago
Building a Career in Cybersecurity
Cybersecurity
Building a Career in Cybersecurity
NVIDIA Developer Beginner 2y ago
Earn a Cybersecurity Degree | University of London MSc Cybersecurity
Cybersecurity
Earn a Cybersecurity Degree | University of London MSc Cybersecurity
Coursera Beginner 2y ago
The 3 types of hackers
Cybersecurity
The 3 types of hackers
Jack Rhysider Intermediate 2y ago
NICE Workforce for Cyber Security: Recruiting, Developing, and Planning Your Cybersecurity Workforce
Cybersecurity
NICE Workforce for Cyber Security: Recruiting, Developing, and Planning Your Cybersecurity Workforce
SANS Institute Beginner 2y ago
Flipper Zero WiFi Hacking (Fake WiFi networks) #shorts
Cybersecurity
Flipper Zero WiFi Hacking (Fake WiFi networks) #shorts
David Bombal Intermediate 2y ago
Google Cybersecurity Certificate - First Thoughts
Cybersecurity
Google Cybersecurity Certificate - First Thoughts
The Cyber Mentor Beginner 2y ago
Buffer Overflow Hacking Tutorial (Bypass Passwords)
Cybersecurity
Buffer Overflow Hacking Tutorial (Bypass Passwords)
David Bombal Beginner 2y ago
Finding Vulnerabilities in IoT Firmware
Cybersecurity
Finding Vulnerabilities in IoT Firmware
The Cyber Mentor Beginner 2y ago
How I Logged Into Donald Trump's Twitter Account (Again)๐ŸŽ™Darknet Diaries Ep. 88: Victor
Cybersecurity
How I Logged Into Donald Trump's Twitter Account (Again)๐ŸŽ™Darknet Diaries Ep. 88: Victor
Jack Rhysider Intermediate 2y ago
Rule-Breakers Unite: Reimagining SANS HackFest
Cybersecurity
Rule-Breakers Unite: Reimagining SANS HackFest
SANS Institute Advanced 2y ago
Flipper Zero WiFi Hacking (Rogue AP) #shorts
Cybersecurity
Flipper Zero WiFi Hacking (Rogue AP) #shorts
David Bombal Intermediate 2y ago
WordPress Vulnerabilities Part 2
Cybersecurity
WordPress Vulnerabilities Part 2
The Cyber Mentor Beginner 2y ago
Books! Books! Books! Which author should I interview? #shorts
Cybersecurity
Books! Books! Books! Which author should I interview? #shorts
David Bombal Intermediate 2y ago
Real World Hacking with OTW (Privacy and Cybersecurity IoT warning)
Cybersecurity
Real World Hacking with OTW (Privacy and Cybersecurity IoT warning)
David Bombal Beginner 2y ago
Hacking Active Directory for Beginners (over 5 hours of content!)
Cybersecurity
Hacking Active Directory for Beginners (over 5 hours of content!)
The Cyber Mentor Beginner 2y ago
Modding Your Switch Can Land You In Prison๐ŸŽ™Darknet Diaries Ep. 136: Team Xecuter
Cybersecurity
Modding Your Switch Can Land You In Prison๐ŸŽ™Darknet Diaries Ep. 136: Team Xecuter
Jack Rhysider Beginner 2y ago
No Experience Required โ€“ Gaining Clarity for a Career in Cybersecurity
Cybersecurity
No Experience Required โ€“ Gaining Clarity for a Career in Cybersecurity
SANS Institute Beginner 2y ago
Bonus Episode: What does it take to author a cybersecurity book?
Cybersecurity
Bonus Episode: What does it take to author a cybersecurity book?
SANS Institute Intermediate 2y ago
How We Hacked Donald Trump's Twitter Account๐ŸŽ™Darknet Diaries Ep. 87: Guild of the Grumpy Old Hackers
Cybersecurity
How We Hacked Donald Trump's Twitter Account๐ŸŽ™Darknet Diaries Ep. 87: Guild of the Grumpy Old Hackers
Jack Rhysider Intermediate 2y ago
Unpacking the New SEC Regulations with John Pescatore
Cybersecurity
Unpacking the New SEC Regulations with John Pescatore
SANS Institute Advanced 2y ago
The Five Critical Controls for ICS | Host: Robert M. Lee | August 1, 2023
Cybersecurity
The Five Critical Controls for ICS | Host: Robert M. Lee | August 1, 2023
SANS Institute Beginner 2y ago
Flipper Zero RFID Fuzzer (Fuzz RFID) #shorts
Cybersecurity
Flipper Zero RFID Fuzzer (Fuzz RFID) #shorts
David Bombal Intermediate 2y ago
Telegram Cybercrime is INSANE
Cybersecurity
Telegram Cybercrime is INSANE
John Hammond Intermediate 2y ago
Our Best Bug Bounty Tips
Cybersecurity
Our Best Bug Bounty Tips
The Cyber Mentor Beginner 2y ago
Real World Hacking Tools Tutorial (Target: Tesla)
Cybersecurity
Real World Hacking Tools Tutorial (Target: Tesla)
David Bombal Beginner 2y ago
HackTheBox - Cerberus
Cybersecurity
HackTheBox - Cerberus
IppSec Beginner 2y ago
The Top Open-Source Vulnerabilities (and how to fix them)
Cybersecurity
The Top Open-Source Vulnerabilities (and how to fix them)
The Cyber Mentor Beginner 2y ago
Your Social Accounts Are Never Safe, Even If You Use Great Passwords๐ŸŽ™Ep. 86 The LinkedIn Incident
Cybersecurity
Your Social Accounts Are Never Safe, Even If You Use Great Passwords๐ŸŽ™Ep. 86 The LinkedIn Incident
Jack Rhysider Intermediate 2y ago
Cyber Leadership Analogies and Metaphors
Cybersecurity
Cyber Leadership Analogies and Metaphors
SANS Institute Intermediate 2y ago
Should Countries Ban Ransomware Payments? | Host: Ryan Chapman | July 25, 2023
Cybersecurity
Should Countries Ban Ransomware Payments? | Host: Ryan Chapman | July 25, 2023
SANS Institute Advanced 2y ago
The Secret Version of the Internet
Cybersecurity
The Secret Version of the Internet
Jack Rhysider Beginner 2y ago
The next PNPT Accelerated Skill Camp beginning August 18, 2023!
Cybersecurity
The next PNPT Accelerated Skill Camp beginning August 18, 2023!
The Cyber Mentor Beginner 2y ago
๐Ÿ“š Coursera Courses Opens on Coursera ยท Free to audit
1 / 3 View all โ†’
Introduction to Secure Coding and Input Validation in iOS
๐Ÿ“š Coursera Course โ†—
Self-paced
Introduction to Secure Coding and Input Validation in iOS
Opens on Coursera โ†—
Bitcoin Transaction & Network Security
๐Ÿ“š Coursera Course โ†—
Self-paced
Bitcoin Transaction & Network Security
Opens on Coursera โ†—
Leaders Leap: Transformational Leadership Mindset
๐Ÿ“š Coursera Course โ†—
Self-paced
Leaders Leap: Transformational Leadership Mindset
Opens on Coursera โ†—
Azure Network Troubleshooting and Governance
๐Ÿ“š Coursera Course โ†—
Self-paced
Azure Network Troubleshooting and Governance
Opens on Coursera โ†—
Reporting and Advanced Practices
๐Ÿ“š Coursera Course โ†—
Self-paced
Reporting and Advanced Practices
Opens on Coursera โ†—
Ethical Hacking with Kali Linux: Analyze & Apply
๐Ÿ“š Coursera Course โ†—
Self-paced
Ethical Hacking with Kali Linux: Analyze & Apply
Opens on Coursera โ†—