Tech Skills

Cybersecurity

Ethical hacking, penetration testing, network security, CTFs and defensive security

7,069
lessons
Skills in this topic
View full skill map โ†’
Security Basics
beginner
Fix OWASP top 10 vulnerabilities
AI Security
intermediate
Identify and patch prompt injection vulnerabilities
Network Security
intermediate
Configure a firewall with proper inbound/outbound rules
Ethical Hacking & Pen Testing
intermediate
Conduct a full pen test with Kali Linux
Cloud Security
intermediate
Implement IAM least-privilege policies on AWS/GCP
Incident Response
intermediate
Build an incident response playbook
Security Compliance
intermediate
Map controls for SOC 2 Type II compliance
Defensive AI
advanced
Build an AI-powered log anomaly detector
Dark Web Dumpster Diving (Hunting Infostealer Malware)
Cybersecurity โšก AI Lesson
Dark Web Dumpster Diving (Hunting Infostealer Malware)
John Hammond Beginner 2y ago
Strategy 10: Measure Performance to Improve Performance
Cybersecurity โšก AI Lesson
Strategy 10: Measure Performance to Improve Performance
SANS Institute Intermediate 2y ago
Dumping Data with NoSQL Injection via Regex and Python
Cybersecurity โšก AI Lesson
Dumping Data with NoSQL Injection via Regex and Python
IppSec Beginner 2y ago
Real World Hacking Demo with OTW
Cybersecurity โšก AI Lesson
Real World Hacking Demo with OTW
David Bombal Beginner 2y ago
HackTheBox - Inject
Cybersecurity
HackTheBox - Inject
IppSec Beginner 2y ago
The Evolution of Windows.    #windows #evolution #windowsos #windowsevolution
Cybersecurity
The Evolution of Windows. #windows #evolution #windowsos #windowsevolution
CydexCode Intermediate 2y ago
Hands-on guide to CORS
Cybersecurity โšก AI Lesson
Hands-on guide to CORS
The Cyber Mentor Beginner 2y ago
2023 Path to Hacking Success: Top 3 Bug Bounty Tips
Cybersecurity
2023 Path to Hacking Success: Top 3 Bug Bounty Tips
David Bombal Beginner 2y ago
Explore GeeksforGeeks Hiring Solutions | For Top Tech Companies | Innovative Hiring Solutions
Cybersecurity
Explore GeeksforGeeks Hiring Solutions | For Top Tech Companies | Innovative Hiring Solutions
GeeksforGeeks Advanced 2y ago
"Nobody trusts nobody." Inside the NSA's Secret Cyber Training Grounds๐ŸŽ™Ep. 83: NSA Cryptologists
Cybersecurity
"Nobody trusts nobody." Inside the NSA's Secret Cyber Training Grounds๐ŸŽ™Ep. 83: NSA Cryptologists
Jack Rhysider Advanced 2y ago
Strategy 9: Communicate Clearly, Collaborate Often, Share Generously
Cybersecurity โšก AI Lesson
Strategy 9: Communicate Clearly, Collaborate Often, Share Generously
SANS Institute Intermediate 2y ago
Is Coding Still Worth It?
Cybersecurity โšก AI Lesson
Is Coding Still Worth It?
a16z Beginner 2y ago
Web App Hacking with Caido.io
Cybersecurity โšก AI Lesson
Web App Hacking with Caido.io
The Cyber Mentor Intermediate 2y ago
Which one ?                            #programming #programminglanguages #print #languages
Cybersecurity
Which one ? #programming #programminglanguages #print #languages
CydexCode Beginner 2y ago
TryHackMe! Finding Computer Artifacts with osquery
Cybersecurity
TryHackMe! Finding Computer Artifacts with osquery
John Hammond Beginner 2y ago
The Most Important Thing I Learned About Core Values!
Cybersecurity
The Most Important Thing I Learned About Core Values!
Evan Carmichael Intermediate 2y ago
how to HACK a password // Windows Edition
Cybersecurity โšก AI Lesson
how to HACK a password // Windows Edition
NetworkChuck Beginner 2y ago
Earn Your Cybersecurity Master's Degree Online | University of London
Cybersecurity
Earn Your Cybersecurity Master's Degree Online | University of London
Coursera Beginner 2y ago
$540 million of crypto was stolen through an unlikely loophole: LinkedIn
Cybersecurity
$540 million of crypto was stolen through an unlikely loophole: LinkedIn
Jack Rhysider Intermediate 2y ago
Hacking Google Cloud?
Cybersecurity
Hacking Google Cloud?
LiveOverflow Beginner 2y ago
Choose your Language ๐Ÿ‘จโ€๐Ÿ’ป #programminglanguage #languages #programming
Cybersecurity
Choose your Language ๐Ÿ‘จโ€๐Ÿ’ป #programminglanguage #languages #programming
CydexCode Beginner 2y ago
How to Write Great Bug Bounty Reports
Cybersecurity โšก AI Lesson
How to Write Great Bug Bounty Reports
The Cyber Mentor Beginner 2y ago
Directory Traversal Attacks Made Easy
Cybersecurity โšก AI Lesson
Directory Traversal Attacks Made Easy
The Cyber Mentor Beginner 2y ago
Keynote | Demonstrating CISO ROI with the C-Suite
Cybersecurity โšก AI Lesson
Keynote | Demonstrating CISO ROI with the C-Suite
SANS Institute Intermediate 2y ago
Panel | The Intersection of Cybersecurity and Law
Cybersecurity โšก AI Lesson
Panel | The Intersection of Cybersecurity and Law
SANS Institute Intermediate 2y ago
Cybersecurity Charisma: Unlocking Security Culture and Leadership
Cybersecurity โšก AI Lesson
Cybersecurity Charisma: Unlocking Security Culture and Leadership
SANS Institute Beginner 2y ago
Leading High Performing Teams During Lean Times
Cybersecurity โšก AI Lesson
Leading High Performing Teams During Lean Times
SANS Institute Intermediate 2y ago
How Hackers Use netsh.exe For Persistence & Code Execution (Sliver C2)
Cybersecurity โšก AI Lesson
How Hackers Use netsh.exe For Persistence & Code Execution (Sliver C2)
John Hammond Intermediate 2y ago
This is NetWars!
Cybersecurity โšก AI Lesson
This is NetWars!
SANS Institute Beginner 2y ago
SANS New NetWars Core Version 9
Cybersecurity โšก AI Lesson
SANS New NetWars Core Version 9
SANS Institute Beginner 2y ago
Scale Your Cloud Infrastructure (Hosting CTFs)
Cybersecurity
Scale Your Cloud Infrastructure (Hosting CTFs)
John Hammond Intermediate 2y ago
Strategy 8: Leverage Tools and Support Analyst Workflow
Cybersecurity โšก AI Lesson
Strategy 8: Leverage Tools and Support Analyst Workflow
SANS Institute Intermediate 2y ago
5 Hacking Tools I Can't Live Without
Cybersecurity โšก AI Lesson
5 Hacking Tools I Can't Live Without
The Cyber Mentor Beginner 2y ago
Top 3 Cybersecurity Career Tips (from Ex-NSA Hacker)
Cybersecurity โšก AI Lesson
Top 3 Cybersecurity Career Tips (from Ex-NSA Hacker)
David Bombal Beginner 2y ago
HackTheBox - Stocker
Cybersecurity โšก AI Lesson
HackTheBox - Stocker
IppSec Beginner 2y ago
How does the PNPT compare to other Pentest Certifications?  #PNPT #pentester #pentesting
Cybersecurity โšก AI Lesson
How does the PNPT compare to other Pentest Certifications? #PNPT #pentester #pentesting
The Cyber Mentor Intermediate 2y ago
Don't use these passwords! (Too easy to crack) #shorts
Cybersecurity โšก AI Lesson
Don't use these passwords! (Too easy to crack) #shorts
David Bombal Beginner 2y ago
Blueprint Live at the SANS Blue Team Summit 2023
Cybersecurity โšก AI Lesson
Blueprint Live at the SANS Blue Team Summit 2023
SANS Institute Intermediate 2y ago
Responsive Screen Sizes ๐Ÿ‘จโ€๐Ÿ’ป.  #responsive #responsivewebdesign #responsivedesign
Cybersecurity
Responsive Screen Sizes ๐Ÿ‘จโ€๐Ÿ’ป. #responsive #responsivewebdesign #responsivedesign
CydexCode Beginner 2y ago
Protecting the Cloud from Ransomware | Host: Ryan Chapman | June 20, 2023
Cybersecurity โšก AI Lesson
Protecting the Cloud from Ransomware | Host: Ryan Chapman | June 20, 2023
SANS Institute Beginner 2y ago
Strategy 7: Select and Collect the Right Data
Cybersecurity โšก AI Lesson
Strategy 7: Select and Collect the Right Data
SANS Institute Intermediate 2y ago
WordPress Vulnerabilities
Cybersecurity โšก AI Lesson
WordPress Vulnerabilities
The Cyber Mentor Beginner 2y ago
Pegasus Spyware: so dangerous that it should be banned? OTW explains...
Cybersecurity
Pegasus Spyware: so dangerous that it should be banned? OTW explains...
David Bombal Beginner 2y ago
HackTheBox - Escape
Cybersecurity โšก AI Lesson
HackTheBox - Escape
IppSec Beginner 2y ago
Panel | Mastercard Trust Center
Cybersecurity โšก AI Lesson
Panel | Mastercard Trust Center
SANS Institute Beginner 2y ago
Panel | To Insure or Not to Insure: Debating the Value of Cyber Insurance for Small Business Success
Cybersecurity โšก AI Lesson
Panel | To Insure or Not to Insure: Debating the Value of Cyber Insurance for Small Business Success
SANS Institute Advanced 2y ago
How SMBs can defend against Top Threats using the CIS Critical Security Controls (Controls)
Cybersecurity โšก AI Lesson
How SMBs can defend against Top Threats using the CIS Critical Security Controls (Controls)
SANS Institute Beginner 2y ago
Locking It Down: Best Practices for Strong Passwords and Authentication Tools.
Cybersecurity โšก AI Lesson
Locking It Down: Best Practices for Strong Passwords and Authentication Tools.
SANS Institute Intermediate 2y ago
๐Ÿ“š Coursera Courses Opens on Coursera ยท Free to audit
1 / 3 View all โ†’
Data & Cybersecurity
๐Ÿ“š Coursera Course โ†—
Self-paced
Data & Cybersecurity
Opens on Coursera โ†—
Security Fundamentals & Network Automation
๐Ÿ“š Coursera Course โ†—
Self-paced
Security Fundamentals & Network Automation
Opens on Coursera โ†—
ChatGPT for Cybersecurity: AI Tools for Threat Defense
๐Ÿ“š Coursera Course โ†—
Self-paced
ChatGPT for Cybersecurity: AI Tools for Threat Defense
Opens on Coursera โ†—
Incident Response and Threat Mitigation
๐Ÿ“š Coursera Course โ†—
Self-paced
Incident Response and Threat Mitigation
Opens on Coursera โ†—
AWS: Content Delivery and Networking
๐Ÿ“š Coursera Course โ†—
Self-paced
AWS: Content Delivery and Networking
Opens on Coursera โ†—
Systems and Cybersecurity Fundamentals Part 1
๐Ÿ“š Coursera Course โ†—
Self-paced
Systems and Cybersecurity Fundamentals Part 1
Opens on Coursera โ†—