Tech Skills

Cybersecurity

Ethical hacking, penetration testing, network security, CTFs and defensive security

6399
lessons
Skills in this topic
View full skill map โ†’
Security Basics
beginner
Fix OWASP top 10 vulnerabilities
AI Security
intermediate
Identify and patch prompt injection vulnerabilities
Network Security
intermediate
Configure a firewall with proper inbound/outbound rules
Ethical Hacking & Pen Testing
intermediate
Conduct a full pen test with Kali Linux
Cloud Security
intermediate
Implement IAM least-privilege policies on AWS/GCP
Incident Response
intermediate
Build an incident response playbook
Security Compliance
intermediate
Map controls for SOC 2 Type II compliance
Defensive AI
advanced
Build an AI-powered log anomaly detector
Strategy 6: Illuminate Adversaries with Cyber Threat Intelligence
Cybersecurity
Strategy 6: Illuminate Adversaries with Cyber Threat Intelligence
SANS Institute Intermediate 2y ago
Cybersecurity Live - CS50 #Reels
Cybersecurity
Cybersecurity Live - CS50 #Reels
CS50 Intermediate 2y ago
the CHEAPEST path to becoming an ethical hacker
Cybersecurity
the CHEAPEST path to becoming an ethical hacker
The Cyber Mentor Beginner 2y ago
Your credit card isn't really safe online
Cybersecurity
Your credit card isn't really safe online
Jack Rhysider Intermediate 2y ago
The Emerging Technologies of AI, Edge and Quantum computing that are important to know about...
Cybersecurity
The Emerging Technologies of AI, Edge and Quantum computing that are important to know about...
David Bombal Beginner 2y ago
HackTheBox - Soccer
Cybersecurity
HackTheBox - Soccer
IppSec Beginner 2y ago
When You Lie for a Living, Everyone & Everything Is Hackable๐ŸŽ™Darknet Diaries Ep. 134: Deviant
Cybersecurity
When You Lie for a Living, Everyone & Everything Is Hackable๐ŸŽ™Darknet Diaries Ep. 134: Deviant
Jack Rhysider Intermediate 2y ago
Blind SQL Injection Made Easy
Cybersecurity
Blind SQL Injection Made Easy
The Cyber Mentor Beginner 2y ago
Cybersecurity's BIG Problem. Why it needs to change.
Cybersecurity
Cybersecurity's BIG Problem. Why it needs to change.
David Bombal Beginner 2y ago
SANS Live Training Student Success Story: Mackenize Morris
Cybersecurity
SANS Live Training Student Success Story: Mackenize Morris
SANS Institute Beginner 2y ago
HackTheBox - TwoMillion
Cybersecurity
HackTheBox - TwoMillion
IppSec Beginner 2y ago
Hacking 101๏ฟผ
Cybersecurity
Hacking 101๏ฟผ
GeeksforGeeks Beginner 2y ago
Bert Kreischer: Comedy, Drinking, Rogan, Segura, Churchill & Kim Jong Un | Lex Fridman Podcast #382
Cybersecurity
Bert Kreischer: Comedy, Drinking, Rogan, Segura, Churchill & Kim Jong Un | Lex Fridman Podcast #382
Lex Fridman Beginner 2y ago
Authentication Bypass Using Root Array
Cybersecurity
Authentication Bypass Using Root Array
LiveOverflow Beginner 2y ago
Rapid Windows Memory Analysis with Volatility 3
Cybersecurity
Rapid Windows Memory Analysis with Volatility 3
John Hammond Intermediate 2y ago
Exploring the Latest Dark Web Onion Sites
Cybersecurity
Exploring the Latest Dark Web Onion Sites
John Hammond Intermediate 2y ago
Fatherhoodโ€™s Power: How Men Protect, Provide, and PRESIDE!
Cybersecurity
Fatherhoodโ€™s Power: How Men Protect, Provide, and PRESIDE!
Evan Carmichael Intermediate 2y ago
Next Level API Hacking with Kiterunner
Cybersecurity
Next Level API Hacking with Kiterunner
The Cyber Mentor Beginner 2y ago
Banks are impossible to hack, unless...
Cybersecurity
Banks are impossible to hack, unless...
Jack Rhysider Intermediate 2y ago
Strategy 5: Prioritize Incident Response
Cybersecurity
Strategy 5: Prioritize Incident Response
SANS Institute Intermediate 2y ago
I got Pwned ... and so did you! (you're likely in the 12 Billion)
Cybersecurity
I got Pwned ... and so did you! (you're likely in the 12 Billion)
David Bombal Intermediate 2y ago
HackTheBox - Bagel
Cybersecurity
HackTheBox - Bagel
IppSec Beginner 2y ago
Practical Junior Penetration Tester (PJPT) - Certification Overview
Cybersecurity
Practical Junior Penetration Tester (PJPT) - Certification Overview
The Cyber Mentor Beginner 2y ago
Windows Pentest Tutorial (Active Directory Game Over!)
Cybersecurity
Windows Pentest Tutorial (Active Directory Game Over!)
David Bombal Beginner 2y ago
Three ways to level up your Windows Privilege Escalation skills #windows  #privesc #techtok #infosec
Cybersecurity
Three ways to level up your Windows Privilege Escalation skills #windows #privesc #techtok #infosec
The Cyber Mentor Intermediate 2y ago
Catch me if you can! #shorts
Cybersecurity
Catch me if you can! #shorts
David Bombal Beginner 2y ago
What the Heck is Going on with Cybersecurity Higher Ed? | Host: Ed Skoudis | May 30, 2023
Cybersecurity
What the Heck is Going on with Cybersecurity Higher Ed? | Host: Ed Skoudis | May 30, 2023
SANS Institute Beginner 2y ago
What is the BEST Hacking Platform?
Cybersecurity
What is the BEST Hacking Platform?
The Cyber Mentor Beginner 2y ago
Strategy 4: Hire AND Grow Quality Staff
Cybersecurity
Strategy 4: Hire AND Grow Quality Staff
SANS Institute Intermediate 2y ago
HackTheBox - Absolute
Cybersecurity
HackTheBox - Absolute
IppSec Beginner 2y ago
Building a Password Cracker in Rust
Cybersecurity
Building a Password Cracker in Rust
The Cyber Mentor Beginner 2y ago
It's DNS again ๐Ÿ˜ข Did you know this Malware Hack?
Cybersecurity
It's DNS again ๐Ÿ˜ข Did you know this Malware Hack?
David Bombal Beginner 2y ago
Experience a Real Pentest with the PNPT Exam #pentesting  #ethicalhacking   #pnpt
Cybersecurity
Experience a Real Pentest with the PNPT Exam #pentesting #ethicalhacking #pnpt
The Cyber Mentor Intermediate 2y ago
The Worm That Crashed the Winter Games Was Full of False Flags๐ŸŽ™Ep. 77: Olympics Destroyer
Cybersecurity
The Worm That Crashed the Winter Games Was Full of False Flags๐ŸŽ™Ep. 77: Olympics Destroyer
Jack Rhysider Intermediate 2y ago
Kali NetHunter Pro in 6 minutes
Cybersecurity
Kali NetHunter Pro in 6 minutes
David Bombal Beginner 2y ago
Keynote | Neurodivergent Associates are an Asset: A CISOโ€™s Perspective on Retention and Inclusion
Cybersecurity
Keynote | Neurodivergent Associates are an Asset: A CISOโ€™s Perspective on Retention and Inclusion
SANS Institute Intermediate 2y ago
Opening Keynote | Investing in Neurodiversity
Cybersecurity
Opening Keynote | Investing in Neurodiversity
SANS Institute Intermediate 2y ago
This New Web Hacking Tool May Replace Burp Suite
Cybersecurity
This New Web Hacking Tool May Replace Burp Suite
The Cyber Mentor Beginner 2y ago
Who Tapped These 106 Govt Cell Phones?
Cybersecurity
Who Tapped These 106 Govt Cell Phones?
Jack Rhysider Intermediate 2y ago
Strategy 3: Build a SOC Structure to Match Your Organizational Needs
Cybersecurity
Strategy 3: Build a SOC Structure to Match Your Organizational Needs
SANS Institute Intermediate 2y ago
His new gadget any good at catching rogue devices?
Cybersecurity
His new gadget any good at catching rogue devices?
David Bombal Beginner 2y ago
HackTheBox - Precious
Cybersecurity
HackTheBox - Precious
IppSec Beginner 2y ago
the BEST resources for finding a cybersecurity job
Cybersecurity
the BEST resources for finding a cybersecurity job
The Cyber Mentor Beginner 2y ago
Who Would Hack the Largest U.S. Bank, But Not Steal a Penny?๐ŸŽ™Darknet Diaries Ep. 76: Knaves Out
Cybersecurity
Who Would Hack the Largest U.S. Bank, But Not Steal a Penny?๐ŸŽ™Darknet Diaries Ep. 76: Knaves Out
Jack Rhysider Intermediate 2y ago
Here's a quick look at a path to becoming a webapp pentester! #webapp #pentesting #cybersecurity
Cybersecurity
Here's a quick look at a path to becoming a webapp pentester! #webapp #pentesting #cybersecurity
The Cyber Mentor Intermediate 2y ago
The BEST Notetaking Apps Ranked
Cybersecurity
The BEST Notetaking Apps Ranked
The Cyber Mentor Beginner 2y ago
Strategy 2: Give the SOC the Authority to Do Its Job
Cybersecurity
Strategy 2: Give the SOC the Authority to Do Its Job
SANS Institute Intermediate 2y ago
How to be Invisible Online (and the hard truth about it)...
Cybersecurity
How to be Invisible Online (and the hard truth about it)...
David Bombal Beginner 2y ago
๐Ÿ“š Coursera Courses Opens on Coursera ยท Free to audit
1 / 3 View all โ†’
Verbal Communications and Presentation Skills
๐Ÿ“š Coursera Course โ†—
Self-paced
Verbal Communications and Presentation Skills
Opens on Coursera โ†—
A CISO Guide to Cyber Resilience
๐Ÿ“š Coursera Course โ†—
Self-paced
A CISO Guide to Cyber Resilience
Opens on Coursera โ†—
GenAI for Cybersecurity: Blue Team
๐Ÿ“š Coursera Course โ†—
Self-paced
GenAI for Cybersecurity: Blue Team
Opens on Coursera โ†—
Cryptography: Learn Public Key Infrastructure from Scratch
๐Ÿ“š Coursera Course โ†—
Self-paced
Cryptography: Learn Public Key Infrastructure from Scratch
Opens on Coursera โ†—
Cybersecurity Foundations & Threat Mitigation
๐Ÿ“š Coursera Course โ†—
Self-paced
Cybersecurity Foundations & Threat Mitigation
Opens on Coursera โ†—
Mulesoft Integration on Salesforce Platform
๐Ÿ“š Coursera Course โ†—
Self-paced
Mulesoft Integration on Salesforce Platform
Opens on Coursera โ†—