Tech Skills

Cybersecurity

Ethical hacking, penetration testing, network security, CTFs and defensive security

7,076
lessons
Skills in this topic
View full skill map →
Security Basics
beginner
Fix OWASP top 10 vulnerabilities
AI Security
intermediate
Identify and patch prompt injection vulnerabilities
Network Security
intermediate
Configure a firewall with proper inbound/outbound rules
Ethical Hacking & Pen Testing
intermediate
Conduct a full pen test with Kali Linux
Cloud Security
intermediate
Implement IAM least-privilege policies on AWS/GCP
Incident Response
intermediate
Build an incident response playbook
Security Compliance
intermediate
Map controls for SOC 2 Type II compliance
Defensive AI
advanced
Build an AI-powered log anomaly detector
【Civilization V】 Taking Over the World One Sapling at a Time
Cybersecurity ⚡ AI Lesson
【Civilization V】 Taking Over the World One Sapling at a Time
Ceres Fauna Ch. hololive-EN Beginner 3y ago
Is it possible to hack WiFi with a phone?
Cybersecurity
Is it possible to hack WiFi with a phone?
David Bombal Beginner 3y ago
PowerShell - Observing Inline C# Compilation with Add-Type
Cybersecurity ⚡ AI Lesson
PowerShell - Observing Inline C# Compilation with Add-Type
John Hammond Beginner 3y ago
The Secret Signals Hiding at Hacking's Biggest Conferences🎙Darknet Diaries Ep. 43: PPP
Cybersecurity
The Secret Signals Hiding at Hacking's Biggest Conferences🎙Darknet Diaries Ep. 43: PPP
Jack Rhysider Beginner 3y ago
Phase 3: Finish Strong
Cybersecurity ⚡ AI Lesson
Phase 3: Finish Strong
SANS Institute Beginner 3y ago
CISOs Can Report to CIOs and Be Successful
Cybersecurity ⚡ AI Lesson
CISOs Can Report to CIOs and Be Successful
SANS Institute Advanced 3y ago
【Variety Gaming】 what the kirin doin
Cybersecurity ⚡ AI Lesson
【Variety Gaming】 what the kirin doin
Ceres Fauna Ch. hololive-EN Beginner 3y ago
Is product a part of marketing or are they "joined at the hip"? #shorts
Cybersecurity
Is product a part of marketing or are they "joined at the hip"? #shorts
Lenny's Podcast Beginner 3y ago
Creepy OSINT - Forgot Password Reveals A LOT
Cybersecurity ⚡ AI Lesson
Creepy OSINT - Forgot Password Reveals A LOT
The Cyber Mentor Beginner 3y ago
an INSIDE LOOK at Penetration Testing Collaborative Platform (Plextrac)
Cybersecurity ⚡ AI Lesson
an INSIDE LOOK at Penetration Testing Collaborative Platform (Plextrac)
John Hammond Beginner 3y ago
"the only way you will ever have any chance of being product-led" #shorts
Cybersecurity
"the only way you will ever have any chance of being product-led" #shorts
Lenny's Podcast Intermediate 3y ago
Rat hacks website in 5 minutes 😱
Cybersecurity
Rat hacks website in 5 minutes 😱
David Bombal Beginner 3y ago
The 7 SCIENCE BASED Ways To Heal Your Mind & Keep It HEALTHY!
Cybersecurity
The 7 SCIENCE BASED Ways To Heal Your Mind & Keep It HEALTHY!
Evan Carmichael Beginner 3y ago
Hacking a Domain Controller
Cybersecurity ⚡ AI Lesson
Hacking a Domain Controller
The Cyber Mentor Beginner 3y ago
Sometimes the Best Hacking Tool Is Confidence🎙Darknet Diaries Ep. 41: Just Visiting
Cybersecurity
Sometimes the Best Hacking Tool Is Confidence🎙Darknet Diaries Ep. 41: Just Visiting
Jack Rhysider Advanced 3y ago
Monitoring Sensitive Windows Commands via CanaryTokens - Deploying Registry Entries via Group Policy
Cybersecurity
Monitoring Sensitive Windows Commands via CanaryTokens - Deploying Registry Entries via Group Policy
IppSec Beginner 3y ago
DEFCON Hacking AI CTF Solution on Kaggle - Data Science Uncut Sep 11, 2022
Cybersecurity
DEFCON Hacking AI CTF Solution on Kaggle - Data Science Uncut Sep 11, 2022
Rob Mulla Beginner 3y ago
HackTheBox - Scanned - Escaping and Exploiting Chroot Based Jails via Unprotected File Descriptor
Cybersecurity ⚡ AI Lesson
HackTheBox - Scanned - Escaping and Exploiting Chroot Based Jails via Unprotected File Descriptor
IppSec Beginner 3y ago
How To Manage Affiliate Links Effectively
Cybersecurity
How To Manage Affiliate Links Effectively
Rank Math SEO Beginner 3y ago
Vulnerability Management: Finding Context - Part 1 of 3
Cybersecurity ⚡ AI Lesson
Vulnerability Management: Finding Context - Part 1 of 3
SANS Institute Beginner 3y ago
INSTANT File Downloads with JavaScript
Cybersecurity ⚡ AI Lesson
INSTANT File Downloads with JavaScript
John Hammond Beginner 3y ago
【Assassin's Creed IV: Black Flag】 Come sail away ⛵
Cybersecurity
【Assassin's Creed IV: Black Flag】 Come sail away ⛵
Ceres Fauna Ch. hololive-EN Beginner 3y ago
【Death Road to Canada】 Taking HoloEN to Canada!
Cybersecurity
【Death Road to Canada】 Taking HoloEN to Canada!
Ceres Fauna Ch. hololive-EN Beginner 3y ago
Free trials aren't just about converting YOU to a paying customer... #shorts
Cybersecurity
Free trials aren't just about converting YOU to a paying customer... #shorts
Lenny's Podcast Intermediate 3y ago
SANS Healthcare Forum 2022: Vulnerabilities and Mitigation Techniques
Cybersecurity ⚡ AI Lesson
SANS Healthcare Forum 2022: Vulnerabilities and Mitigation Techniques
SANS Institute Intermediate 3y ago
Starting Cybersecurity Careers (with JRHacka)
Cybersecurity ⚡ AI Lesson
Starting Cybersecurity Careers (with JRHacka)
John Hammond Beginner 3y ago
Did you know this about Virtual Machines (VMs)? Kali Linux, Ubuntu, Windows 11, macOS?
Cybersecurity
Did you know this about Virtual Machines (VMs)? Kali Linux, Ubuntu, Windows 11, macOS?
David Bombal Beginner 3y ago
Markdown to PDF Code Injection (CSAW CTF 2022)
Cybersecurity
Markdown to PDF Code Injection (CSAW CTF 2022)
John Hammond Beginner 3y ago
Phase 2: Accelerate and Glide
Cybersecurity ⚡ AI Lesson
Phase 2: Accelerate and Glide
SANS Institute Intermediate 3y ago
【Night Delivery】 Working Very Normal And Not Haunted Delivery Jobs
Cybersecurity
【Night Delivery】 Working Very Normal And Not Haunted Delivery Jobs
Ceres Fauna Ch. hololive-EN Beginner 3y ago
Inside Cybercrime Markets: Buying & Selling Malware (Dark Web Documentary #11)
Cybersecurity ⚡ AI Lesson
Inside Cybercrime Markets: Buying & Selling Malware (Dark Web Documentary #11)
John Hammond Beginner 3y ago
【MINECRAFT】 Villager Management Simulator
Cybersecurity ⚡ AI Lesson
【MINECRAFT】 Villager Management Simulator
Ceres Fauna Ch. hololive-EN Beginner 3y ago
Hacking WiFi with a Hak5 Pineapple
Cybersecurity
Hacking WiFi with a Hak5 Pineapple
David Bombal Intermediate 3y ago
Be a more EFFICIENT Penetration Tester (with Dan!)
Cybersecurity
Be a more EFFICIENT Penetration Tester (with Dan!)
John Hammond Beginner 3y ago
$100 RANSOMWARE on the Dark Web (Documentary #10)
Cybersecurity
$100 RANSOMWARE on the Dark Web (Documentary #10)
John Hammond Beginner 3y ago
【SKYRIM】 NOOOOO DON'T SEND ME TO SKYRIM PRISON I'LL GIVE YOU YOUR SOUL BACK
Cybersecurity
【SKYRIM】 NOOOOO DON'T SEND ME TO SKYRIM PRISON I'LL GIVE YOU YOUR SOUL BACK
Ceres Fauna Ch. hololive-EN Beginner 3y ago
Hacking cell phones like Mr Robot
Cybersecurity
Hacking cell phones like Mr Robot
David Bombal Beginner 3y ago
OSINT social media: Are you crazy to share so much information online? 😱
Cybersecurity
OSINT social media: Are you crazy to share so much information online? 😱
David Bombal Beginner 3y ago
【Sucker for Love: First Date】 Please Let Me Date the Eldritch Catgirl
Cybersecurity
【Sucker for Love: First Date】 Please Let Me Date the Eldritch Catgirl
Ceres Fauna Ch. hololive-EN Beginner 3y ago
Docker Container Forensics - CSAW CTF 2022
Cybersecurity
Docker Container Forensics - CSAW CTF 2022
John Hammond Beginner 3y ago
Phase 1: On Your Marks
Cybersecurity ⚡ AI Lesson
Phase 1: On Your Marks
SANS Institute Beginner 3y ago
【MINECRAFT】 World is Mine
Cybersecurity
【MINECRAFT】 World is Mine
Ceres Fauna Ch. hololive-EN Beginner 3y ago
Avoid PowerShell Invoke-Expression with DNS Records
Cybersecurity
Avoid PowerShell Invoke-Expression with DNS Records
John Hammond Beginner 3y ago
Brandon Evans: Cloud Security - Threats and Opportunities
Cybersecurity ⚡ AI Lesson
Brandon Evans: Cloud Security - Threats and Opportunities
SANS Institute Intermediate 3y ago
How to Protect Your Crypto Assets From Thieves
Cybersecurity
How to Protect Your Crypto Assets From Thieves
Jack Rhysider Beginner 3y ago
Babuk RANSOMWARE Leak Site (Dark Web Documentary #09)
Cybersecurity ⚡ AI Lesson
Babuk RANSOMWARE Leak Site (Dark Web Documentary #09)
John Hammond Beginner 3y ago
Best WiFi Hacking tools: Airgeddon, Kismet, Raspberry Pi and Kody's favourite wifi tools
Cybersecurity
Best WiFi Hacking tools: Airgeddon, Kismet, Raspberry Pi and Kody's favourite wifi tools
David Bombal Beginner 3y ago
Hacker hunting with Wireshark (even if SSL encrypted!)
Cybersecurity
Hacker hunting with Wireshark (even if SSL encrypted!)
David Bombal Beginner 3y ago
📚 Coursera Courses Opens on Coursera · Free to audit
1 / 3 View all →
Previous OWASP Risks
📚 Coursera Course ↗
Self-paced
Previous OWASP Risks
Opens on Coursera ↗
GenAI for Cybersecurity: Blue Team
📚 Coursera Course ↗
Self-paced
GenAI for Cybersecurity: Blue Team
Opens on Coursera ↗
AI for Cybersecurity
📚 Coursera Course ↗
Self-paced
AI for Cybersecurity
Opens on Coursera ↗
Technical Deep Dive with Incident Response Tools
📚 Coursera Course ↗
Self-paced
Technical Deep Dive with Incident Response Tools
Opens on Coursera ↗
Securing the Network
📚 Coursera Course ↗
Self-paced
Securing the Network
Opens on Coursera ↗
Cloud Security on AWS
📚 Coursera Course ↗
Self-paced
Cloud Security on AWS
Opens on Coursera ↗