Tech Skills

Cybersecurity

Ethical hacking, penetration testing, network security, CTFs and defensive security

6399
lessons
Skills in this topic
View full skill map โ†’
Security Basics
beginner
Fix OWASP top 10 vulnerabilities
AI Security
intermediate
Identify and patch prompt injection vulnerabilities
Network Security
intermediate
Configure a firewall with proper inbound/outbound rules
Ethical Hacking & Pen Testing
intermediate
Conduct a full pen test with Kali Linux
Cloud Security
intermediate
Implement IAM least-privilege policies on AWS/GCP
Incident Response
intermediate
Build an incident response playbook
Security Compliance
intermediate
Map controls for SOC 2 Type II compliance
Defensive AI
advanced
Build an AI-powered log anomaly detector
Start your IT Journey in 2023 RIGHT NOW
Cybersecurity
Start your IT Journey in 2023 RIGHT NOW
NetworkChuck Beginner 2y ago
Flipper Zero WiFi Hacking #shorts
Cybersecurity
Flipper Zero WiFi Hacking #shorts
David Bombal Intermediate 2y ago
How I Found My First Bug (now you can too)
Cybersecurity
How I Found My First Bug (now you can too)
The Cyber Mentor Beginner 2y ago
Zimbra ZCS 0-day Exploited In The Wild
Cybersecurity
Zimbra ZCS 0-day Exploited In The Wild
John Hammond Beginner 2y ago
HackTheBox - Derailed
Cybersecurity
HackTheBox - Derailed
IppSec Beginner 2y ago
Local Root Exploit in HospitalRun Software
Cybersecurity
Local Root Exploit in HospitalRun Software
LiveOverflow Beginner 2y ago
Hacking Web Applications (2+ hours of content)
Cybersecurity
Hacking Web Applications (2+ hours of content)
The Cyber Mentor Beginner 2y ago
SQL Injection Hacking Tutorial (Beginner to Advanced)
Cybersecurity
SQL Injection Hacking Tutorial (Beginner to Advanced)
David Bombal Beginner 2y ago
"Please Hack My Computer"
Cybersecurity
"Please Hack My Computer"
John Hammond Advanced 2y ago
He Made $5K a Day in High School With This Risky ID Scam๐ŸŽ™Darknet Diaries Ep. 85: Cam the Carder
Cybersecurity
He Made $5K a Day in High School With This Risky ID Scam๐ŸŽ™Darknet Diaries Ep. 85: Cam the Carder
Jack Rhysider Intermediate 2y ago
SANS Network Security in Las Vegas 2024
Cybersecurity
SANS Network Security in Las Vegas 2024
SANS Institute Advanced 2y ago
CS50 Cybersecurity - Introduction
Cybersecurity
CS50 Cybersecurity - Introduction
CS50 Beginner 2y ago
you need this FREE CyberSecurity tool
Cybersecurity
you need this FREE CyberSecurity tool
NetworkChuck Beginner 2y ago
loveletterforyou.txt tricked a LOT of people back in 2000
Cybersecurity
loveletterforyou.txt tricked a LOT of people back in 2000
Jack Rhysider Intermediate 2y ago
Strategies of a World-Class SOC | Host: John Hubbard | July 18, 2023
Cybersecurity
Strategies of a World-Class SOC | Host: John Hubbard | July 18, 2023
SANS Institute Intermediate 2y ago
Day-18 Career Path in Tech | Navigating Job Market | Priya Vajpeyi
Cybersecurity
Day-18 Career Path in Tech | Navigating Job Market | Priya Vajpeyi
GeeksforGeeks Beginner 2y ago
HackTheBox - Socket
Cybersecurity
HackTheBox - Socket
IppSec Beginner 2y ago
The Evolution of Windows.    #windows #evolution #windowsos #windowsevolution
Cybersecurity
The Evolution of Windows. #windows #evolution #windowsos #windowsevolution
CydexCode Intermediate 2y ago
Explore GeeksforGeeks Hiring Solutions | For Top Tech Companies | Innovative Hiring Solutions
Cybersecurity
Explore GeeksforGeeks Hiring Solutions | For Top Tech Companies | Innovative Hiring Solutions
GeeksforGeeks Advanced 2y ago
Is Coding Still Worth It?
Cybersecurity
Is Coding Still Worth It?
a16z Beginner 2y ago
Strategy 11: Turn up the Volume by Expanding SOC Functionality
Cybersecurity
Strategy 11: Turn up the Volume by Expanding SOC Functionality
SANS Institute Intermediate 2y ago
Insider Risk & Generative AI
Cybersecurity
Insider Risk & Generative AI
SANS Institute Intermediate 2y ago
Preserving Creativity and the Ethical Implications of AI Art Generators
Cybersecurity
Preserving Creativity and the Ethical Implications of AI Art Generators
SANS Institute Intermediate 2y ago
Navigating the Impact of Emerging Tech on Education: A Teen's Perspective on AI and Cybersecurity
Cybersecurity
Navigating the Impact of Emerging Tech on Education: A Teen's Perspective on AI and Cybersecurity
SANS Institute Intermediate 2y ago
AI for Red Team & Malware Development
Cybersecurity
AI for Red Team & Malware Development
SANS Institute Beginner 2y ago
AI and Its Impact on Cybersecurity
Cybersecurity
AI and Its Impact on Cybersecurity
SANS Institute Intermediate 2y ago
New to Cyber: AI-Powered Careers
Cybersecurity
New to Cyber: AI-Powered Careers
SANS Institute Intermediate 2y ago
Addressing Practical and Ethical Issues in AI-Assisted Threat Intelligence Analysis
Cybersecurity
Addressing Practical and Ethical Issues in AI-Assisted Threat Intelligence Analysis
SANS Institute Intermediate 2y ago
Mass Digital Forensics & Incident Response with Velociraptor
Cybersecurity
Mass Digital Forensics & Incident Response with Velociraptor
John Hammond Intermediate 2y ago
Appsec Careers in 2023
Cybersecurity
Appsec Careers in 2023
The Cyber Mentor Beginner 2y ago
If they can't hack your password, maybe they can buy it
Cybersecurity
If they can't hack your password, maybe they can buy it
Jack Rhysider Intermediate 2y ago
How They Hacked the Prime Minister From 1 Instagram Post๐ŸŽ™Darknet Diaries Ep. 84: Jet-setters
Cybersecurity
How They Hacked the Prime Minister From 1 Instagram Post๐ŸŽ™Darknet Diaries Ep. 84: Jet-setters
Jack Rhysider Intermediate 2y ago
Free Training & Courses (Cybersecurity, Cloud, DevOps, Networking) ๐Ÿคฏ #shorts
Cybersecurity
Free Training & Courses (Cybersecurity, Cloud, DevOps, Networking) ๐Ÿคฏ #shorts
David Bombal Beginner 2y ago
He made millions (illegally) hacking online poker
Cybersecurity
He made millions (illegally) hacking online poker
Jack Rhysider Intermediate 2y ago
intro to cloud hacking (leaky buckets)
Cybersecurity
intro to cloud hacking (leaky buckets)
NetworkChuck Beginner 2y ago
College Degrees and Your Cybersecurity Career
Cybersecurity
College Degrees and Your Cybersecurity Career
The Cyber Mentor Beginner 2y ago
Dark Web Dumpster Diving (Hunting Infostealer Malware)
Cybersecurity
Dark Web Dumpster Diving (Hunting Infostealer Malware)
John Hammond Beginner 2y ago
Strategy 10: Measure Performance to Improve Performance
Cybersecurity
Strategy 10: Measure Performance to Improve Performance
SANS Institute Intermediate 2y ago
Dumping Data with NoSQL Injection via Regex and Python
Cybersecurity
Dumping Data with NoSQL Injection via Regex and Python
IppSec Beginner 2y ago
Real World Hacking Demo with OTW
Cybersecurity
Real World Hacking Demo with OTW
David Bombal Beginner 2y ago
HackTheBox - Inject
Cybersecurity
HackTheBox - Inject
IppSec Beginner 2y ago
Even Governments Are No Match for a Hack This Big๐ŸŽ™Darknet Diaries Ep. 135 The D.R. Incident
Cybersecurity
Even Governments Are No Match for a Hack This Big๐ŸŽ™Darknet Diaries Ep. 135 The D.R. Incident
Jack Rhysider Intermediate 2y ago
Hands-on guide to CORS
Cybersecurity
Hands-on guide to CORS
The Cyber Mentor Beginner 2y ago
2023 Path to Hacking Success: Top 3 Bug Bounty Tips
Cybersecurity
2023 Path to Hacking Success: Top 3 Bug Bounty Tips
David Bombal Beginner 2y ago
"Nobody trusts nobody." Inside the NSA's Secret Cyber Training Grounds๐ŸŽ™Ep. 83: NSA Cryptologists
Cybersecurity
"Nobody trusts nobody." Inside the NSA's Secret Cyber Training Grounds๐ŸŽ™Ep. 83: NSA Cryptologists
Jack Rhysider Advanced 2y ago
Strategy 9: Communicate Clearly, Collaborate Often, Share Generously
Cybersecurity
Strategy 9: Communicate Clearly, Collaborate Often, Share Generously
SANS Institute Intermediate 2y ago
This boring website is actually a top secret CIA comms channel
Cybersecurity
This boring website is actually a top secret CIA comms channel
Jack Rhysider Intermediate 2y ago
Web App Hacking with Caido.io
Cybersecurity
Web App Hacking with Caido.io
The Cyber Mentor Intermediate 2y ago
๐Ÿ“š Coursera Courses Opens on Coursera ยท Free to audit
1 / 3 View all โ†’
Examining MPLS VPN Operation
๐Ÿ“š Coursera Course โ†—
Self-paced
Examining MPLS VPN Operation
Opens on Coursera โ†—
FortiGate Administrator
๐Ÿ“š Coursera Course โ†—
Self-paced
FortiGate Administrator
Opens on Coursera โ†—
Protection of Information Assets
๐Ÿ“š Coursera Course โ†—
Self-paced
Protection of Information Assets
Opens on Coursera โ†—
Network Architecture
๐Ÿ“š Coursera Course โ†—
Self-paced
Network Architecture
Opens on Coursera โ†—
Advanced Security and Troubleshooting
๐Ÿ“š Coursera Course โ†—
Self-paced
Advanced Security and Troubleshooting
Opens on Coursera โ†—
Cybersecurity Assurance for Accounting and Finance
๐Ÿ“š Coursera Course โ†—
Self-paced
Cybersecurity Assurance for Accounting and Finance
Opens on Coursera โ†—