Tech Skills

Cybersecurity

Ethical hacking, penetration testing, network security, CTFs and defensive security

6400
lessons
Skills in this topic
View full skill map →
Security Basics
beginner
Fix OWASP top 10 vulnerabilities
AI Security
intermediate
Identify and patch prompt injection vulnerabilities
Network Security
intermediate
Configure a firewall with proper inbound/outbound rules
Ethical Hacking & Pen Testing
intermediate
Conduct a full pen test with Kali Linux
Cloud Security
intermediate
Implement IAM least-privilege policies on AWS/GCP
Incident Response
intermediate
Build an incident response playbook
Security Compliance
intermediate
Map controls for SOC 2 Type II compliance
Defensive AI
advanced
Build an AI-powered log anomaly detector
James Rowley: Creating and Running an Insider Threat Program
Cybersecurity
James Rowley: Creating and Running an Insider Threat Program
SANS Institute Intermediate 3y ago
Dean Parsons: Cyber Security for OT and ICS
Cybersecurity
Dean Parsons: Cyber Security for OT and ICS
SANS Institute Advanced 3y ago
Best Hacking Python Book?
Cybersecurity
Best Hacking Python Book?
David Bombal Beginner 3y ago
【HoloCure】 Luck Be A Lady
Cybersecurity
【HoloCure】 Luck Be A Lady
Ceres Fauna Ch. hololive-EN Beginner 3y ago
Hacker Reacts to Influencer's Home Tour
Cybersecurity
Hacker Reacts to Influencer's Home Tour
The Cyber Mentor Beginner 3y ago
HacktheBox - RouterSpace
Cybersecurity
HacktheBox - RouterSpace
IppSec Beginner 3y ago
【chat & superchats!】 how ya been?
Cybersecurity
【chat & superchats!】 how ya been?
Ceres Fauna Ch. hololive-EN Beginner 3y ago
Reverse Engineering - Computerphile
Cybersecurity
Reverse Engineering - Computerphile
Computerphile Intermediate 3y ago
He Took Control of 50,000 Printers With 3 Lines of Code🎙Darknet Diaries Ep. 31: Hacker Giraffe
Cybersecurity
He Took Control of 50,000 Printers With 3 Lines of Code🎙Darknet Diaries Ep. 31: Hacker Giraffe
Jack Rhysider Intermediate 3y ago
Reversing Malware How is APT 29 Successful w/ this Phishing Tech and BRc4 (Brute Ratel) opsec fails?
Cybersecurity
Reversing Malware How is APT 29 Successful w/ this Phishing Tech and BRc4 (Brute Ratel) opsec fails?
IppSec Beginner 3y ago
3 ways the web can be INSECURE👩‍💻 #ad #cybersecurity #trendmicro #PremiumSecuritySuite #technology
Cybersecurity
3 ways the web can be INSECURE👩‍💻 #ad #cybersecurity #trendmicro #PremiumSecuritySuite #technology
Coding with Lewis Intermediate 3y ago
The Kuwaiti Banking Malware Mystery🎙Darknet Diaries Ep. 120: Voulnet
Cybersecurity
The Kuwaiti Banking Malware Mystery🎙Darknet Diaries Ep. 120: Voulnet
Jack Rhysider Intermediate 3y ago
Put your hacking skills to the test with Capture The Flag competition #Shorts
Cybersecurity
Put your hacking skills to the test with Capture The Flag competition #Shorts
Google for Developers Intermediate 3y ago
Accessing the Dark Web Safely
Cybersecurity
Accessing the Dark Web Safely
The Cyber Mentor Beginner 3y ago
OSINT tools to track you down. You cannot hide.
Cybersecurity
OSINT tools to track you down. You cannot hide.
David Bombal Beginner 3y ago
SOLANA Protocol Security Assessments (w/ HALBORN)
Cybersecurity
SOLANA Protocol Security Assessments (w/ HALBORN)
John Hammond Beginner 3y ago
BRUTEFORCING DOMAIN PASSWORDS (AD #05)
Cybersecurity
BRUTEFORCING DOMAIN PASSWORDS (AD #05)
John Hammond Beginner 3y ago
Getting Started in Python Cybersecurity and Forensics  | Real Python Podcast #114
Cybersecurity
Getting Started in Python Cybersecurity and Forensics | Real Python Podcast #114
Real Python Beginner 3y ago
How to Prioritize Your Work: Effort Impact Scale
Cybersecurity
How to Prioritize Your Work: Effort Impact Scale
AJ&Smart Intermediate 3y ago
Panel | Self-Management Strategies for Avoiding Burnout, Staying Healthy, and Getting Stuff Done
Cybersecurity
Panel | Self-Management Strategies for Avoiding Burnout, Staying Healthy, and Getting Stuff Done
SANS Institute Intermediate 3y ago
The Real STEM Sadie: Owning Your Story
Cybersecurity
The Real STEM Sadie: Owning Your Story
SANS Institute Intermediate 3y ago
Recruiting, Training, and Retaining Neurodivergent Talent
Cybersecurity
Recruiting, Training, and Retaining Neurodivergent Talent
SANS Institute Intermediate 3y ago
【KU100 ASMR】 Comfy Oneesan ASMR with Rain Ambience ♡
Cybersecurity
【KU100 ASMR】 Comfy Oneesan ASMR with Rain Ambience ♡
Ceres Fauna Ch. hololive-EN Beginner 3y ago
HackTheBox - Undetected
Cybersecurity
HackTheBox - Undetected
IppSec Beginner 3y ago
【Kirby 64 ENDURANCE】 Playing Until I Beat the Game with BATSU WHEEL
Cybersecurity
【Kirby 64 ENDURANCE】 Playing Until I Beat the Game with BATSU WHEEL
Ceres Fauna Ch. hololive-EN Beginner 3y ago
【SKYRIM】 puts your soul in a gem
Cybersecurity
【SKYRIM】 puts your soul in a gem
Ceres Fauna Ch. hololive-EN Beginner 3y ago
The Logic Bomb That Took Down the World's Richest Oil Company🎙Darknet Diaries Ep. 30: Shamoon
Cybersecurity
The Logic Bomb That Took Down the World's Richest Oil Company🎙Darknet Diaries Ep. 30: Shamoon
Jack Rhysider Intermediate 3y ago
Ranking Animals By Their Power Levels
Cybersecurity
Ranking Animals By Their Power Levels
Ceres Fauna Ch. hololive-EN Beginner 3y ago
【HoloCure】 I Heard I'm OP In This Game
Cybersecurity
【HoloCure】 I Heard I'm OP In This Game
Ceres Fauna Ch. hololive-EN Beginner 3y ago
Keynote: The Journey to Inclusion
Cybersecurity
Keynote: The Journey to Inclusion
SANS Institute Beginner 3y ago
【Miitopia】 Turning Myth Into Cursed Miis
Cybersecurity
【Miitopia】 Turning Myth Into Cursed Miis
Ceres Fauna Ch. hololive-EN Beginner 3y ago
HackTheBox - Phoenix
Cybersecurity
HackTheBox - Phoenix
IppSec Beginner 3y ago
【I'm on Observation Duty 5】 DON'T LOOK At This Spot The Difference Horror Game
Cybersecurity
【I'm on Observation Duty 5】 DON'T LOOK At This Spot The Difference Horror Game
Ceres Fauna Ch. hololive-EN Beginner 3y ago
Linux for Ethical Hackers (2022 - Full Kali Linux Course)
Cybersecurity
Linux for Ethical Hackers (2022 - Full Kali Linux Course)
The Cyber Mentor Beginner 3y ago
Learning to Combat Ransomware
Cybersecurity
Learning to Combat Ransomware
SANS Institute Beginner 3y ago
The Most Sophisticated Malware Ever Made (That We Know Of)🎙Darknet Diaries Ep. 29: Stuxnet
Cybersecurity
The Most Sophisticated Malware Ever Made (That We Know Of)🎙Darknet Diaries Ep. 29: Stuxnet
Jack Rhysider Intermediate 3y ago
Fireside Chat with Caroline Wong
Cybersecurity
Fireside Chat with Caroline Wong
SANS Institute Beginner 3y ago
【MINECRAFT】 Kirin Builds A Lighthouse
Cybersecurity
【MINECRAFT】 Kirin Builds A Lighthouse
Ceres Fauna Ch. hololive-EN Beginner 3y ago
TEARING DOWN the DOMAIN CONTROLLER (Active Directory #04)
Cybersecurity
TEARING DOWN the DOMAIN CONTROLLER (Active Directory #04)
John Hammond Beginner 3y ago
I Know Where You Live Thanks to Your Cooking Tutorial
Cybersecurity
I Know Where You Live Thanks to Your Cooking Tutorial
The Cyber Mentor Beginner 3y ago
HackTheBox - Paper
Cybersecurity
HackTheBox - Paper
IppSec Beginner 3y ago
Hacking is not a crime. A real world story.
Cybersecurity
Hacking is not a crime. A real world story.
David Bombal Beginner 3y ago
【Miitopia】 I Am Not Building A Harem In Miitopia
Cybersecurity
【Miitopia】 I Am Not Building A Harem In Miitopia
Ceres Fauna Ch. hololive-EN Beginner 3y ago
POWERSHELL: Random Users & Weak Passwords (Active Directory #03)
Cybersecurity
POWERSHELL: Random Users & Weak Passwords (Active Directory #03)
John Hammond Beginner 3y ago
The Secret Hacking Unit of the Israeli Military🎙Darknet Diaries Ep. 28: Unit 8200
Cybersecurity
The Secret Hacking Unit of the Israeli Military🎙Darknet Diaries Ep. 28: Unit 8200
Jack Rhysider Advanced 3y ago
【PROPNIGHT】 You better hide...
Cybersecurity
【PROPNIGHT】 You better hide...
Ceres Fauna Ch. hololive-EN Beginner 3y ago
Return Oriented #shorts
Cybersecurity
Return Oriented #shorts
John Hammond Beginner 3y ago
Unpacking UPX #shorts
Cybersecurity
Unpacking UPX #shorts
John Hammond Beginner 3y ago
📚 Coursera Courses Opens on Coursera · Free to audit
1 / 3 View all →
Cloud Computing Security - Master's
📚 Coursera Course ↗
Self-paced
Cloud Computing Security - Master's
Opens on Coursera ↗
Ethical Hacking Capstone Project: Breach, Response, AI
📚 Coursera Course ↗
Self-paced
Ethical Hacking Capstone Project: Breach, Response, AI
Opens on Coursera ↗
Encryption and Cryptography Essentials
📚 Coursera Course ↗
Self-paced
Encryption and Cryptography Essentials
Opens on Coursera ↗
Foundations and Reconnaissance Techniques
📚 Coursera Course ↗
Self-paced
Foundations and Reconnaissance Techniques
Opens on Coursera ↗
Network Security, Troubleshooting, & Certification Prep
📚 Coursera Course ↗
Self-paced
Network Security, Troubleshooting, & Certification Prep
Opens on Coursera ↗
Red Hat Enterprise Linux 8
📚 Coursera Course ↗
Self-paced
Red Hat Enterprise Linux 8
Opens on Coursera ↗