Tech Skills

Cybersecurity

Ethical hacking, penetration testing, network security, CTFs and defensive security

6399
lessons
Skills in this topic
View full skill map โ†’
Security Basics
beginner
Fix OWASP top 10 vulnerabilities
AI Security
intermediate
Identify and patch prompt injection vulnerabilities
Network Security
intermediate
Configure a firewall with proper inbound/outbound rules
Ethical Hacking & Pen Testing
intermediate
Conduct a full pen test with Kali Linux
Cloud Security
intermediate
Implement IAM least-privilege policies on AWS/GCP
Incident Response
intermediate
Build an incident response playbook
Security Compliance
intermediate
Map controls for SOC 2 Type II compliance
Defensive AI
advanced
Build an AI-powered log anomaly detector
Are you getting ready for Summer? So are hackers! #passwordchange  #ethicalhacking #cybersecurity
Cybersecurity
Are you getting ready for Summer? So are hackers! #passwordchange #ethicalhacking #cybersecurity
The Cyber Mentor Intermediate 2y ago
FIVE Practical AI Uses for Cybersecurity
Cybersecurity
FIVE Practical AI Uses for Cybersecurity
The Cyber Mentor Beginner 2y ago
Hide a Hacker's Reverse Shell in ONE Command
Cybersecurity
Hide a Hacker's Reverse Shell in ONE Command
John Hammond Intermediate 2y ago
Getting Started in Firmware Analysis & IoT Reverse Engineering
Cybersecurity
Getting Started in Firmware Analysis & IoT Reverse Engineering
John Hammond Beginner 2y ago
SANS Neurodiversity in Cybersecurity Summit 2023 Graphic Illustrations
Cybersecurity
SANS Neurodiversity in Cybersecurity Summit 2023 Graphic Illustrations
SANS Institute Intermediate 2y ago
AI Voice Scams are on the RISE!
Cybersecurity
AI Voice Scams are on the RISE!
1littlecoder Intermediate 2y ago
SANS Cybersecurity Leadership Summit 2023
Cybersecurity
SANS Cybersecurity Leadership Summit 2023
SANS Institute Beginner 2y ago
RSA Encryption From Scratch - Math & Python Code
Cybersecurity
RSA Encryption From Scratch - Math & Python Code
NeuralNine Beginner 2y ago
Hack The Box - Flight
Cybersecurity
Hack The Box - Flight
IppSec Beginner 2y ago
Who Is Hacking the World's Best Online Poker Players?๐ŸŽ™Darknet Diaries Ep. 74: Mikko
Cybersecurity
Who Is Hacking the World's Best Online Poker Players?๐ŸŽ™Darknet Diaries Ep. 74: Mikko
Jack Rhysider Intermediate 2y ago
Pentester Blueprint: Your road to success
Cybersecurity
Pentester Blueprint: Your road to success
David Bombal Beginner 2y ago
HackTheBox - MetaTwo
Cybersecurity
HackTheBox - MetaTwo
IppSec Beginner 2y ago
the END of VPNs?!
Cybersecurity
the END of VPNs?!
NetworkChuck Beginner 2y ago
Deep Dive OSINT (Hacking, Shodan and more!)
Cybersecurity
Deep Dive OSINT (Hacking, Shodan and more!)
David Bombal Beginner 2y ago
Tech Jobs without Degree | GeeksforGeeks
Cybersecurity
Tech Jobs without Degree | GeeksforGeeks
GeeksforGeeks Beginner 2y ago
Women's Day Live & Free: The Importance of Du Mai in Pregnancy
Cybersecurity
Women's Day Live & Free: The Importance of Du Mai in Pregnancy
TCM Academy Intermediate 2y ago
Acupuncture Point ST-9: Humanโ€™s Welcome, with Yair Maimon
Cybersecurity
Acupuncture Point ST-9: Humanโ€™s Welcome, with Yair Maimon
TCM Academy Intermediate 2y ago
Together, we can save the planet #shorts #earthday
Cybersecurity
Together, we can save the planet #shorts #earthday
TED-Ed Beginner 2y ago
They Almost Stole $1 Billion, If Not For a Typo๐ŸŽ™Darknet Diaries Ep. 72: Bangladesh Bank Heist
Cybersecurity
They Almost Stole $1 Billion, If Not For a Typo๐ŸŽ™Darknet Diaries Ep. 72: Bangladesh Bank Heist
Jack Rhysider Intermediate 2y ago
L2CODE like a hacker #programming #python #rust #cybersecurity
Cybersecurity
L2CODE like a hacker #programming #python #rust #cybersecurity
The Cyber Mentor Intermediate 2y ago
Dangerous Code in Seconds: Eval the evil #webapp  #infosec  #cybersecurity  #ethicalhacking
Cybersecurity
Dangerous Code in Seconds: Eval the evil #webapp #infosec #cybersecurity #ethicalhacking
The Cyber Mentor Intermediate 2y ago
NICE Career: Discovering Career Pathways
Cybersecurity
NICE Career: Discovering Career Pathways
SANS Institute Intermediate 2y ago
Role-Play Your Way Into Cyber: Hands-On with KC7
Cybersecurity
Role-Play Your Way Into Cyber: Hands-On with KC7
SANS Institute Beginner 2y ago
Cybersecurity Role Finder: Navigating Your Personal Path into Cybersecurity Careers
Cybersecurity
Cybersecurity Role Finder: Navigating Your Personal Path into Cybersecurity Careers
SANS Institute Intermediate 2y ago
Going the Distance: Lessons from The Last Mile Education Fund
Cybersecurity
Going the Distance: Lessons from The Last Mile Education Fund
SANS Institute Intermediate 2y ago
From Nothing to Something: Getting Experience When You Have No Experience
Cybersecurity
From Nothing to Something: Getting Experience When You Have No Experience
SANS Institute Beginner 2y ago
Clickjacking - Hacking Web Application UIs
Cybersecurity
Clickjacking - Hacking Web Application UIs
The Cyber Mentor Beginner 2y ago
Hacking Complex Passwords with Rules & Munging
Cybersecurity
Hacking Complex Passwords with Rules & Munging
John Hammond Intermediate 2y ago
Strategy 1: Know What You Are Protecting and Why
Cybersecurity
Strategy 1: Know What You Are Protecting and Why
SANS Institute Intermediate 2y ago
11 Strategies of a World-Class Security Operations Center: Fundamentals
Cybersecurity
11 Strategies of a World-Class Security Operations Center: Fundamentals
SANS Institute Beginner 2y ago
Windows Privilege Escalation for Beginners
Cybersecurity
Windows Privilege Escalation for Beginners
The Cyber Mentor Beginner 2y ago
Living Off The Land - Windows Disk Cleaner Persistence
Cybersecurity
Living Off The Land - Windows Disk Cleaner Persistence
John Hammond Intermediate 2y ago
Pushing Cyber Security Forward with Wendi Whitmore | May 2, 2023
Cybersecurity
Pushing Cyber Security Forward with Wendi Whitmore | May 2, 2023
SANS Institute Advanced 2y ago
Learn Offensive JavaScript TODAY
Cybersecurity
Learn Offensive JavaScript TODAY
The Cyber Mentor Beginner 2y ago
Get Ready, A Very Special Season 4 Is On the Way!
Cybersecurity
Get Ready, A Very Special Season 4 Is On the Way!
SANS Institute Intermediate 2y ago
Live from RSAC with Melissa Bischoping, RSA Scholar | Host, Stephen A. Hart | April 27, 2023
Cybersecurity
Live from RSAC with Melissa Bischoping, RSA Scholar | Host, Stephen A. Hart | April 27, 2023
SANS Institute Beginner 2y ago
SANS Expert Line Up Live from RSAC Conference | April 26, 2023
Cybersecurity
SANS Expert Line Up Live from RSAC Conference | April 26, 2023
SANS Institute Beginner 2y ago
I want one! #shorts
Cybersecurity
I want one! #shorts
David Bombal Beginner 2y ago
Live from RSAC with Ed Skoudis | Host, Stephen A. Hart | April 24, 2023
Cybersecurity
Live from RSAC with Ed Skoudis | Host, Stephen A. Hart | April 24, 2023
SANS Institute Advanced 2y ago
How To Test Your Security with Atomic Red Team
Cybersecurity
How To Test Your Security with Atomic Red Team
John Hammond Intermediate 2y ago
Top 3 Programming Languages for Cybersecurity in 2023
Cybersecurity
Top 3 Programming Languages for Cybersecurity in 2023
The Cyber Mentor Beginner 2y ago
The best Hacking Cert just got updated (OSCP PEN-200)
Cybersecurity
The best Hacking Cert just got updated (OSCP PEN-200)
David Bombal Beginner 2y ago
Introduction to the Five Human Resources: Shen, Hun, Po, Yi, Zhi by Dr John McDonald.
Cybersecurity
Introduction to the Five Human Resources: Shen, Hun, Po, Yi, Zhi by Dr John McDonald.
TCM Academy Beginner 2y ago
HackTheBox - Investigation
Cybersecurity
HackTheBox - Investigation
IppSec Beginner 2y ago
Hacking IoT devices with Python (it's too easy to take control)
Cybersecurity
Hacking IoT devices with Python (it's too easy to take control)
David Bombal Beginner 2y ago
winget: Install ROGUE Software & Packages?
Cybersecurity
winget: Install ROGUE Software & Packages?
John Hammond Intermediate 2y ago
What SECRETS are in your Clipboard?
Cybersecurity
What SECRETS are in your Clipboard?
John Hammond Beginner 2y ago
Kubernetes Hacking: From Weak Applications to Cluster Control
Cybersecurity
Kubernetes Hacking: From Weak Applications to Cluster Control
John Hammond Intermediate 2y ago
๐Ÿ“š Coursera Courses Opens on Coursera ยท Free to audit
1 / 3 View all โ†’
Ethical Hacking and CompTIA PenTest+ V3 (PT0-003) Exam Prep
๐Ÿ“š Coursera Course โ†—
Self-paced
Ethical Hacking and CompTIA PenTest+ V3 (PT0-003) Exam Prep
Opens on Coursera โ†—
Introduction to Hardware and Operating Systems
๐Ÿ“š Coursera Course โ†—
Self-paced
Introduction to Hardware and Operating Systems
Opens on Coursera โ†—
Information Security Incident Management
๐Ÿ“š Coursera Course โ†—
Self-paced
Information Security Incident Management
Opens on Coursera โ†—
Cybersecurity Tools and Technologies
๐Ÿ“š Coursera Course โ†—
Self-paced
Cybersecurity Tools and Technologies
Opens on Coursera โ†—
Cybersecurity: Protecting your Information on the Go
๐Ÿ“š Coursera Course โ†—
Self-paced
Cybersecurity: Protecting your Information on the Go
Opens on Coursera โ†—
Assets, Threats, and Vulnerabilities
๐Ÿ“š Coursera Course โ†—
Self-paced
Assets, Threats, and Vulnerabilities
Opens on Coursera โ†—