Tech Skills

Cybersecurity

Ethical hacking, penetration testing, network security, CTFs and defensive security

7,071
lessons
Skills in this topic
View full skill map โ†’
Security Basics
beginner
Fix OWASP top 10 vulnerabilities
AI Security
intermediate
Identify and patch prompt injection vulnerabilities
Network Security
intermediate
Configure a firewall with proper inbound/outbound rules
Ethical Hacking & Pen Testing
intermediate
Conduct a full pen test with Kali Linux
Cloud Security
intermediate
Implement IAM least-privilege policies on AWS/GCP
Incident Response
intermediate
Build an incident response playbook
Security Compliance
intermediate
Map controls for SOC 2 Type II compliance
Defensive AI
advanced
Build an AI-powered log anomaly detector
ICS Security with Dean Parsons | LastPass Breach with Moses Frost | Host Dean Parsons | Apr 11, 2023
Cybersecurity โšก AI Lesson
ICS Security with Dean Parsons | LastPass Breach with Moses Frost | Host Dean Parsons | Apr 11, 2023
SANS Institute Advanced 3y ago
Cybersecurity Labs (FOR FREE) - Linux Backdoor Analysis
Cybersecurity โšก AI Lesson
Cybersecurity Labs (FOR FREE) - Linux Backdoor Analysis
John Hammond Beginner 3y ago
How to Hack MFA (Multi-Factor Authentication)
Cybersecurity โšก AI Lesson
How to Hack MFA (Multi-Factor Authentication)
The Cyber Mentor Beginner 3y ago
HackTheBox - BroScience
Cybersecurity โšก AI Lesson
HackTheBox - BroScience
IppSec Beginner 3y ago
Top 3 Most Dangerous Lines of Code
Cybersecurity โšก AI Lesson
Top 3 Most Dangerous Lines of Code
The Cyber Mentor Beginner 3y ago
How FAST Can You Write a Pentest Report?
Cybersecurity โšก AI Lesson
How FAST Can You Write a Pentest Report?
John Hammond Beginner 3y ago
HackTheBox - Sekhmet
Cybersecurity
HackTheBox - Sekhmet
IppSec Beginner 3y ago
When You Can't Breach the Network, Hack the Humans๐ŸŽ™Darknet Diaries Ep. 69: Human Hacker
Cybersecurity
When You Can't Breach the Network, Hack the Humans๐ŸŽ™Darknet Diaries Ep. 69: Human Hacker
Jack Rhysider Intermediate 3y ago
Cyber Security Challenge Germany (2023)
Cybersecurity โšก AI Lesson
Cyber Security Challenge Germany (2023)
LiveOverflow Beginner 3y ago
SANS Neurodiversity in Cybersecurity Summit 2023
Cybersecurity โšก AI Lesson
SANS Neurodiversity in Cybersecurity Summit 2023
SANS Institute Beginner 3y ago
Mom Hacked a Prison With a Clipboard & USB Stick๐ŸŽ™Darknet Diaries Ep. 67: The Big House
Cybersecurity
Mom Hacked a Prison With a Clipboard & USB Stick๐ŸŽ™Darknet Diaries Ep. 67: The Big House
Jack Rhysider Intermediate 3y ago
Attacking VSCode Extension from Browser? - Live Security Research
Cybersecurity โšก AI Lesson
Attacking VSCode Extension from Browser? - Live Security Research
LiveOverflow Advanced 3y ago
3 HACKING gadgets you have to TRY!!
Cybersecurity โšก AI Lesson
3 HACKING gadgets you have to TRY!!
NetworkChuck Intermediate 3y ago
The best Hacking Courses & Certs (not all these)? Your roadmap to Pentester success.
Cybersecurity
The best Hacking Courses & Certs (not all these)? Your roadmap to Pentester success.
David Bombal Beginner 3y ago
Demo: ControlPlaneโ€™s Capture The Flag - Hacking Kubernetes
Cybersecurity โšก AI Lesson
Demo: ControlPlaneโ€™s Capture The Flag - Hacking Kubernetes
The New Stack Beginner 3y ago
How to Hack Passwords
Cybersecurity
How to Hack Passwords
Sahil & Sarra Intermediate 3y ago
Password Hacking in Kali Linux
Cybersecurity โšก AI Lesson
Password Hacking in Kali Linux
John Hammond Intermediate 3y ago
Attacking JWT - Header Injections
Cybersecurity โšก AI Lesson
Attacking JWT - Header Injections
The Cyber Mentor Beginner 3y ago
A Cybersecurity Extortion Tale
Cybersecurity โšก AI Lesson
A Cybersecurity Extortion Tale
The Cyber Mentor Beginner 3y ago
500K Subscriber Celebration!
Cybersecurity โšก AI Lesson
500K Subscriber Celebration!
The Cyber Mentor Beginner 3y ago
Solving the Pickle Rick CTF
Cybersecurity โšก AI Lesson
Solving the Pickle Rick CTF
The Cyber Mentor Beginner 3y ago
Must-See Keynote Returns to RSAC 2023: The Five Most Dangerous New Attack Techniques
Cybersecurity โšก AI Lesson
Must-See Keynote Returns to RSAC 2023: The Five Most Dangerous New Attack Techniques
SANS Institute Beginner 3y ago
HackTheBox - Vessel
Cybersecurity โšก AI Lesson
HackTheBox - Vessel
IppSec Beginner 3y ago
Linus Tech Tips Hack Explained
Cybersecurity โšก AI Lesson
Linus Tech Tips Hack Explained
The Cyber Mentor Beginner 3y ago
Hackers Bypass Google Two-Factor Authentication (2FA) SMS
Cybersecurity โšก AI Lesson
Hackers Bypass Google Two-Factor Authentication (2FA) SMS
John Hammond Intermediate 3y ago
Transparency from a CISO's Perspective
Cybersecurity โšก AI Lesson
Transparency from a CISO's Perspective
SANS Institute Beginner 3y ago
CI/CD GOAT: Mad Hatter Capture The Flag
Cybersecurity
CI/CD GOAT: Mad Hatter Capture The Flag
John Hammond Beginner 3y ago
HTTP Fundamentals in 10 Minutes
Cybersecurity โšก AI Lesson
HTTP Fundamentals in 10 Minutes
The Cyber Mentor Beginner 3y ago
HackTheBox - Extension
Cybersecurity
HackTheBox - Extension
IppSec Beginner 3y ago
Kali Purple 2023.1 Review
Cybersecurity โšก AI Lesson
Kali Purple 2023.1 Review
The Cyber Mentor Beginner 3y ago
Free Hacking APIs Course (APISEC University!)
Cybersecurity โšก AI Lesson
Free Hacking APIs Course (APISEC University!)
John Hammond Beginner 3y ago
Hacking CI/CD (Basic Pipeline Poisoning)
Cybersecurity
Hacking CI/CD (Basic Pipeline Poisoning)
John Hammond Intermediate 3y ago
Build, Break, and Hack WebSockets
Cybersecurity โšก AI Lesson
Build, Break, and Hack WebSockets
The Cyber Mentor Beginner 3y ago
100% Scholarship Opportunities in Cybersecurity for Black American College Students
Cybersecurity โšก AI Lesson
100% Scholarship Opportunities in Cybersecurity for Black American College Students
SANS Institute Beginner 3y ago
"I rob banks for a living," but it's all totally legal๐ŸŽ™Darknet Diaries Ep. 66: Freakyclown
Cybersecurity
"I rob banks for a living," but it's all totally legal๐ŸŽ™Darknet Diaries Ep. 66: Freakyclown
Jack Rhysider Intermediate 3y ago
Unraveling Discord Token Stealer (python MALWARE)
Cybersecurity โšก AI Lesson
Unraveling Discord Token Stealer (python MALWARE)
John Hammond Beginner 3y ago
Practical Junior Malware Researcher (PJMR) Exam Overview
Cybersecurity โšก AI Lesson
Practical Junior Malware Researcher (PJMR) Exam Overview
The Cyber Mentor Beginner 3y ago
Meet SANS Senior Instructor: Mark Baggett
Cybersecurity โšก AI Lesson
Meet SANS Senior Instructor: Mark Baggett
SANS Institute Intermediate 3y ago
Meet SANS Instructor: Terrence Williams
Cybersecurity โšก AI Lesson
Meet SANS Instructor: Terrence Williams
SANS Institute Intermediate 3y ago
Meet SANS Senior Instructor: John Hubbard
Cybersecurity โšก AI Lesson
Meet SANS Senior Instructor: John Hubbard
SANS Institute Intermediate 3y ago
Meet SANS Instructor: Jason Nickola
Cybersecurity โšก AI Lesson
Meet SANS Instructor: Jason Nickola
SANS Institute Advanced 3y ago
Meet SANS Certified Instructor: Dean Parsons
Cybersecurity โšก AI Lesson
Meet SANS Certified Instructor: Dean Parsons
SANS Institute Intermediate 3y ago
Meet SANS Senior Instructor: Bryan Simon
Cybersecurity โšก AI Lesson
Meet SANS Senior Instructor: Bryan Simon
SANS Institute Advanced 3y ago
HackTheBox - Forgot
Cybersecurity โšก AI Lesson
HackTheBox - Forgot
IppSec Beginner 3y ago
Hacking APIs: Fuzzing 101
Cybersecurity โšก AI Lesson
Hacking APIs: Fuzzing 101
The Cyber Mentor Beginner 3y ago
Is This Website LEAKING?
Cybersecurity
Is This Website LEAKING?
John Hammond Beginner 3y ago
Strange File in Downloads Folder? Gootloader Malware Analysis
Cybersecurity
Strange File in Downloads Folder? Gootloader Malware Analysis
John Hammond Beginner 3y ago
Carving Exfiltrated Network Data from a Hack (Python & Scapy)
Cybersecurity
Carving Exfiltrated Network Data from a Hack (Python & Scapy)
John Hammond Beginner 3y ago
๐Ÿ“š Coursera Courses Opens on Coursera ยท Free to audit
1 / 3 View all โ†’
Technical Deep Dive with Incident Response Tools
๐Ÿ“š Coursera Course โ†—
Self-paced
Technical Deep Dive with Incident Response Tools
Opens on Coursera โ†—
CFR: Security Assessment, Data Collection, and Log Analysis
๐Ÿ“š Coursera Course โ†—
Self-paced
CFR: Security Assessment, Data Collection, and Log Analysis
Opens on Coursera โ†—
Road to the CISO โ€“ Culminating Project Course
๐Ÿ“š Coursera Course โ†—
Self-paced
Road to the CISO โ€“ Culminating Project Course
Opens on Coursera โ†—
Advanced Exploitation and Scripting Techniques
๐Ÿ“š Coursera Course โ†—
Self-paced
Advanced Exploitation and Scripting Techniques
Opens on Coursera โ†—
Advanced Network Security and Analysis
๐Ÿ“š Coursera Course โ†—
Self-paced
Advanced Network Security and Analysis
Opens on Coursera โ†—
CISSP Domain 1: Security and Risk Management
๐Ÿ“š Coursera Course โ†—
Self-paced
CISSP Domain 1: Security and Risk Management
Opens on Coursera โ†—