Tech Skills

Cybersecurity

Ethical hacking, penetration testing, network security, CTFs and defensive security

6405
lessons
Skills in this topic
View full skill map →
Security Basics
beginner
Fix OWASP top 10 vulnerabilities
AI Security
intermediate
Identify and patch prompt injection vulnerabilities
Network Security
intermediate
Configure a firewall with proper inbound/outbound rules
Ethical Hacking & Pen Testing
intermediate
Conduct a full pen test with Kali Linux
Cloud Security
intermediate
Implement IAM least-privilege policies on AWS/GCP
Incident Response
intermediate
Build an incident response playbook
Security Compliance
intermediate
Map controls for SOC 2 Type II compliance
Defensive AI
advanced
Build an AI-powered log anomaly detector
Do you need a Cybersecurity home lab?
Cybersecurity
Do you need a Cybersecurity home lab?
David Bombal Beginner 4y ago
BEGINNER Capture The Flag - PicoCTF 2021 001 "Obedient Cat"
Cybersecurity
BEGINNER Capture The Flag - PicoCTF 2021 001 "Obedient Cat"
John Hammond Beginner 4y ago
Knowing Your Applicants. How to Stay Current to Best Assess your Cyber Applicants w/ Kevin Garvey
Cybersecurity
Knowing Your Applicants. How to Stay Current to Best Assess your Cyber Applicants w/ Kevin Garvey
SANS Institute Beginner 4y ago
Heart and Stomach: Fire in the Digestive System, TCM Course with Izabela Mietka
Cybersecurity
Heart and Stomach: Fire in the Digestive System, TCM Course with Izabela Mietka
TCM Academy Beginner 4y ago
Ethical Hacking in 100 Seconds // And why do we need CORS?
Cybersecurity
Ethical Hacking in 100 Seconds // And why do we need CORS?
Fireship Intermediate 4y ago
HackTheBox - Laboratory
Cybersecurity
HackTheBox - Laboratory
IppSec Intermediate 4y ago
How Does Acupuncture Works, Sharing the Wisdom of TCM with Dr. John McDonald, PhD
Cybersecurity
How Does Acupuncture Works, Sharing the Wisdom of TCM with Dr. John McDonald, PhD
TCM Academy Beginner 4y ago
Live Office Hours for Entrepreneurs w/ Neville Medhora
Cybersecurity
Live Office Hours for Entrepreneurs w/ Neville Medhora
Noah Kagan Raw Intermediate 4y ago
HELP!! (for when you suck at Linux) // Linux for Hackers // EP3
Cybersecurity
HELP!! (for when you suck at Linux) // Linux for Hackers // EP3
NetworkChuck Beginner 4y ago
Cybersecurity jobs replaced by AI?
Cybersecurity
Cybersecurity jobs replaced by AI?
David Bombal Beginner 4y ago
SANS New to Cyber Summit 2021
Cybersecurity
SANS New to Cyber Summit 2021
SANS Institute Beginner 4y ago
Tyler Cowen: Economic Growth & the Fight Against Conformity & Mediocrity | Lex Fridman Podcast #174
Cybersecurity
Tyler Cowen: Economic Growth & the Fight Against Conformity & Mediocrity | Lex Fridman Podcast #174
Lex Fridman Beginner 5y ago
HackTheBox - APT
Cybersecurity
HackTheBox - APT
IppSec Beginner 5y ago
Securing Backend Applications (OWASP recommendations)
Cybersecurity
Securing Backend Applications (OWASP recommendations)
Hussein Nasser Intermediate 5y ago
Developer Interview Tips from a Tech Recruiter
Cybersecurity
Developer Interview Tips from a Tech Recruiter
Scrimba Beginner 5y ago
I made every video I ever wanted to make
Cybersecurity
I made every video I ever wanted to make
LiveOverflow Beginner 5y ago
$2 MILLION DOLLARS STOLEN in Bitcoin/Ethereum - JScript Malware Analysis
Cybersecurity
$2 MILLION DOLLARS STOLEN in Bitcoin/Ethereum - JScript Malware Analysis
John Hammond Intermediate 5y ago
Top 3 Tips to Avoid Getting Hacked
Cybersecurity
Top 3 Tips to Avoid Getting Hacked
The Cyber Mentor Beginner 5y ago
Security YouTuber Drama...
Cybersecurity
Security YouTuber Drama...
LiveOverflow Beginner 5y ago
Nginx ModSecurity Tutorial | Nginx WAF
Cybersecurity
Nginx ModSecurity Tutorial | Nginx WAF
HackerSploit Beginner 5y ago
Apache2 ModSecurity Tutorial | Apache2 WAF
Cybersecurity
Apache2 ModSecurity Tutorial | Apache2 WAF
HackerSploit Beginner 5y ago
So... How is Lockdown-Hairstyle Going for You?
Cybersecurity
So... How is Lockdown-Hairstyle Going for You?
LiveUnderflow Intermediate 5y ago
This is why we can't have nice things
Cybersecurity
This is why we can't have nice things
Veritasium Intermediate 5y ago
What is Bitcoin | How does bitcoin work | Easy Explanation of Bitcoin | Explain Bitcoin as If I am 5
Cybersecurity
What is Bitcoin | How does bitcoin work | Easy Explanation of Bitcoin | Explain Bitcoin as If I am 5
codebasics Beginner 5y ago
Okta series by TNS - How a Security-Minded Culture Can Change Bad Habits
Cybersecurity
Okta series by TNS - How a Security-Minded Culture Can Change Bad Habits
The New Stack Intermediate 5y ago
Sharing the Wisdom of TCM: Alaine Duncan on Treating Trauma with Chinese Medicine
Cybersecurity
Sharing the Wisdom of TCM: Alaine Duncan on Treating Trauma with Chinese Medicine
TCM Academy Beginner 4y ago
Rob van Os: Maturing your Cyber Defense
Cybersecurity
Rob van Os: Maturing your Cyber Defense
SANS Institute Intermediate 4y ago
Best CTF?
Cybersecurity
Best CTF?
David Bombal Beginner 4y ago
Kali Linux TP-Link TP-WN722N
Cybersecurity
Kali Linux TP-Link TP-WN722N
David Bombal Beginner 5y ago
Kali Linux WiFi Alfa Adapter Fix
Cybersecurity
Kali Linux WiFi Alfa Adapter Fix
David Bombal Beginner 5y ago
AppSec, DevOps and DevSecOps
Cybersecurity
AppSec, DevOps and DevSecOps
SANS Institute Beginner 5y ago
Can I hack WiFi with this adapter?
Cybersecurity
Can I hack WiFi with this adapter?
David Bombal Beginner 5y ago
Best WiFi Hacking Adapters in 2021 (Kali Linux / Parrot OS)
Cybersecurity
Best WiFi Hacking Adapters in 2021 (Kali Linux / Parrot OS)
David Bombal Beginner 5y ago
Sharing the Wisdom with Mia Donovan: Dope is Death writer & director
Cybersecurity
Sharing the Wisdom with Mia Donovan: Dope is Death writer & director
TCM Academy Intermediate 5y ago
Born to hack?
Cybersecurity
Born to hack?
David Bombal Beginner 5y ago
The Blue Teamer's Blueprint for Malware Triage
Cybersecurity
The Blue Teamer's Blueprint for Malware Triage
SANS Institute Beginner 5y ago
SOC Metrics: Measuring Success and Preventing Burnout
Cybersecurity
SOC Metrics: Measuring Success and Preventing Burnout
SANS Institute Intermediate 5y ago
HackTheBox - Luanne
Cybersecurity
HackTheBox - Luanne
IppSec Beginner 5y ago
Python WiFi DoS  (Denial of Service) attack
Cybersecurity
Python WiFi DoS (Denial of Service) attack
David Bombal Beginner 5y ago
Sharing the Wisdom, with Dr. Julia Hartung MD
Cybersecurity
Sharing the Wisdom, with Dr. Julia Hartung MD
TCM Academy Intermediate 5y ago
Your path to success || Network Engineer in 2021
Cybersecurity
Your path to success || Network Engineer in 2021
David Bombal Intermediate 5y ago
Skilling the Gap: Creative Ways to Recruit Top Cyber Talent
Cybersecurity
Skilling the Gap: Creative Ways to Recruit Top Cyber Talent
SANS Institute Beginner 5y ago
HackTheBox - Crossfit
Cybersecurity
HackTheBox - Crossfit
IppSec Beginner 5y ago
Hacking: Too easy?
Cybersecurity
Hacking: Too easy?
David Bombal Beginner 5y ago
SANS Data Science Lightning Summit
Cybersecurity
SANS Data Science Lightning Summit
SANS Institute Advanced 5y ago
Part 3: Rekt Casino Hack - Security Operations Center Ill-equipped and Unprepared
Cybersecurity
Part 3: Rekt Casino Hack - Security Operations Center Ill-equipped and Unprepared
SANS Institute Beginner 5y ago
SANS Institute Stay Sharp Training
Cybersecurity
SANS Institute Stay Sharp Training
SANS Institute Intermediate 5y ago
Python nmap port scanner
Cybersecurity
Python nmap port scanner
David Bombal Beginner 5y ago
📚 Coursera Courses Opens on Coursera · Free to audit
1 / 3 View all →
Introduction to SIEM (Splunk)
📚 Coursera Course ↗
Self-paced
Introduction to SIEM (Splunk)
Opens on Coursera ↗
IT Infrastructure and Emerging Trends
📚 Coursera Course ↗
Self-paced
IT Infrastructure and Emerging Trends
Opens on Coursera ↗
Security Fundamentals and Identity Management
📚 Coursera Course ↗
Self-paced
Security Fundamentals and Identity Management
Opens on Coursera ↗
Network Security
📚 Coursera Course ↗
Self-paced
Network Security
Opens on Coursera ↗
CFR: Reconnaissance, Attack, and Post-Attack Analysis
📚 Coursera Course ↗
Self-paced
CFR: Reconnaissance, Attack, and Post-Attack Analysis
Opens on Coursera ↗
Cybersecurity and the X-Factor
📚 Coursera Course ↗
Self-paced
Cybersecurity and the X-Factor
Opens on Coursera ↗