Tech Skills

Cybersecurity

Ethical hacking, penetration testing, network security, CTFs and defensive security

6405
lessons
Skills in this topic
View full skill map →
Security Basics
beginner
Fix OWASP top 10 vulnerabilities
AI Security
intermediate
Identify and patch prompt injection vulnerabilities
Network Security
intermediate
Configure a firewall with proper inbound/outbound rules
Ethical Hacking & Pen Testing
intermediate
Conduct a full pen test with Kali Linux
Cloud Security
intermediate
Implement IAM least-privilege policies on AWS/GCP
Incident Response
intermediate
Build an incident response playbook
Security Compliance
intermediate
Map controls for SOC 2 Type II compliance
Defensive AI
advanced
Build an AI-powered log anomaly detector
Christmas Giveaway Day 1
Cybersecurity
Christmas Giveaway Day 1
David Bombal Intermediate 5y ago
you gotta be quick (win coffee and IT training)
Cybersecurity
you gotta be quick (win coffee and IT training)
NetworkChuck Beginner 5y ago
HackTheBox - Laser
Cybersecurity
HackTheBox - Laser
IppSec Beginner 5y ago
Michael Mina: Rapid Testing, Viruses, and the Engineering Mindset | Lex Fridman Podcast #146
Cybersecurity
Michael Mina: Rapid Testing, Viruses, and the Engineering Mindset | Lex Fridman Podcast #146
Lex Fridman Beginner 5y ago
your first Hacking certification (PenTest+)
Cybersecurity
your first Hacking certification (PenTest+)
NetworkChuck Beginner 5y ago
TryHackMe Ice - Walkthrough | Windows Privilege Escalation
Cybersecurity
TryHackMe Ice - Walkthrough | Windows Privilege Escalation
HackerSploit Intermediate 5y ago
Brute force WiFi WPA2
Cybersecurity
Brute force WiFi WPA2
David Bombal Beginner 5y ago
TryHackMe Blue - Walkthrough
Cybersecurity
TryHackMe Blue - Walkthrough
HackerSploit Intermediate 5y ago
Behind The Scenes Of Law Enforcement And Private Industry Cooperation | STAR Webcawst
Cybersecurity
Behind The Scenes Of Law Enforcement And Private Industry Cooperation | STAR Webcawst
SANS Institute Advanced 5y ago
Help us test our CTF! December is BUSY
Cybersecurity
Help us test our CTF! December is BUSY
John Hammond Intermediate 5y ago
Evolving Coursera’s Brand Identity
Cybersecurity
Evolving Coursera’s Brand Identity
Coursera Beginner 5y ago
TryHackMe Advent of Cyber Day 14: Where's Rudolph?
Cybersecurity
TryHackMe Advent of Cyber Day 14: Where's Rudolph?
The Cyber Mentor Beginner 5y ago
HackTheBox - OpenKeyS
Cybersecurity
HackTheBox - OpenKeyS
IppSec Beginner 5y ago
My Journey to Cybersecurity (CIA Keynote)
Cybersecurity
My Journey to Cybersecurity (CIA Keynote)
The Cyber Mentor Beginner 5y ago
Making Order out of Chaos: How to Deal with Threat Group Names | STAR Webcast
Cybersecurity
Making Order out of Chaos: How to Deal with Threat Group Names | STAR Webcast
SANS Institute Intermediate 5y ago
White Hat & Black Hat SEO / Linking - Are these Labels Still Relevant?
Cybersecurity
White Hat & Black Hat SEO / Linking - Are these Labels Still Relevant?
Search Engine Journal Beginner 5y ago
Spirit Gate: Opening to the Psycho-Spiritual Potential of Acupuncture Points
Cybersecurity
Spirit Gate: Opening to the Psycho-Spiritual Potential of Acupuncture Points
TCM Academy Intermediate 5y ago
The San Jiao Organ has Finally Been Discovered; Science Calls it the Interstitium
Cybersecurity
The San Jiao Organ has Finally Been Discovered; Science Calls it the Interstitium
TCM Academy Intermediate 5y ago
Nested JavaScript Obfuscation - GuidePoint Security CTF Challenge
Cybersecurity
Nested JavaScript Obfuscation - GuidePoint Security CTF Challenge
John Hammond Beginner 5y ago
7 REAL LINK BUILDING CAMPAIGNS Analyzed (And Why They Work) (Ep. 237)
Cybersecurity
7 REAL LINK BUILDING CAMPAIGNS Analyzed (And Why They Work) (Ep. 237)
Authority Hacker Podcast Beginner 5y ago
learn to HACK (the best way) // ft. John Hammond
Cybersecurity
learn to HACK (the best way) // ft. John Hammond
NetworkChuck Beginner 5y ago
WiFi Explained (CCNA Part 1)
Cybersecurity
WiFi Explained (CCNA Part 1)
David Bombal Beginner 5y ago
Cybertalk - EP8 - Better Bug Bounty Hunting, CTFs & Reverse Engineering
Cybersecurity
Cybertalk - EP8 - Better Bug Bounty Hunting, CTFs & Reverse Engineering
HackerSploit Intermediate 5y ago
hydra
Cybersecurity
hydra
David Bombal Beginner 5y ago
Destroying VNC with Cain and Abel
Cybersecurity
Destroying VNC with Cain and Abel
David Bombal Beginner 5y ago
Bug Bounty (how to make money HACKING!!) // ft. STÖK
Cybersecurity
Bug Bounty (how to make money HACKING!!) // ft. STÖK
NetworkChuck Beginner 5y ago
rockyou
Cybersecurity
rockyou
David Bombal Beginner 5y ago
let's hack your home network // FREE CCNA // EP 9
Cybersecurity
let's hack your home network // FREE CCNA // EP 9
NetworkChuck Beginner 5y ago
HackTheBox - Unbalanced
Cybersecurity
HackTheBox - Unbalanced
IppSec Beginner 5y ago
It's too easy to own a WiFi network
Cybersecurity
It's too easy to own a WiFi network
David Bombal Beginner 5y ago
SANS Foundations - What's James Lyne's favorite part of the new course - Interview with the author
Cybersecurity
SANS Foundations - What's James Lyne's favorite part of the new course - Interview with the author
SANS Institute Beginner 5y ago
SANS Foundations - How do you balance theory and practical? - An Interview with James Lyne
Cybersecurity
SANS Foundations - How do you balance theory and practical? - An Interview with James Lyne
SANS Institute Beginner 5y ago
SANS Foundations - How did you pick the course topics?  An interview with the Author, James Lyne
Cybersecurity
SANS Foundations - How did you pick the course topics? An interview with the Author, James Lyne
SANS Institute Beginner 5y ago
Kali Linux Wifite Troubleshooting
Cybersecurity
Kali Linux Wifite Troubleshooting
David Bombal Beginner 5y ago
Heart Meditation with Lorie Dechar
Cybersecurity
Heart Meditation with Lorie Dechar
TCM Academy Intermediate 5y ago
HackTheBox Blue Walkthrough - Learn Windows Enumeration
Cybersecurity
HackTheBox Blue Walkthrough - Learn Windows Enumeration
HackerSploit Beginner 5y ago
I will own your WiFi with one Kali Linux command
Cybersecurity
I will own your WiFi with one Kali Linux command
David Bombal Beginner 5y ago
Custom Wordlists & SQL Injection - GuidePoint Security CTF (Belle)
Cybersecurity
Custom Wordlists & SQL Injection - GuidePoint Security CTF (Belle)
John Hammond Beginner 5y ago
Python keylogger
Cybersecurity
Python keylogger
David Bombal Beginner 5y ago
phpMyAdmin Local File Inclusion - GuidePoint Security CTF (Jeffrey)
Cybersecurity
phpMyAdmin Local File Inclusion - GuidePoint Security CTF (Jeffrey)
John Hammond Beginner 5y ago
HackTheBox - SneakyMailer
Cybersecurity
HackTheBox - SneakyMailer
IppSec Beginner 5y ago
learn Python, Hacking, Linux, CCNA.....hurry!! (6 deals you don't want to miss)
Cybersecurity
learn Python, Hacking, Linux, CCNA.....hurry!! (6 deals you don't want to miss)
NetworkChuck Advanced 5y ago
SANS Foundations overview by course author James Lyne
Cybersecurity
SANS Foundations overview by course author James Lyne
SANS Institute Beginner 5y ago
Hunting Usernames and Accounts (OSINT)
Cybersecurity
Hunting Usernames and Accounts (OSINT)
The Cyber Mentor Beginner 5y ago
you’re about to get hacked!! (7 reasons why) // FREE Security+ // EP 6
Cybersecurity
you’re about to get hacked!! (7 reasons why) // FREE Security+ // EP 6
NetworkChuck Beginner 5y ago
i scheduled the OSCP exam / kenneth copeland got hacked / new Kali 2020.4 release
Cybersecurity
i scheduled the OSCP exam / kenneth copeland got hacked / new Kali 2020.4 release
NetworkChuck Beginner 5y ago
my beard isn’t real // FREE Security+ // EP 5
Cybersecurity
my beard isn’t real // FREE Security+ // EP 5
NetworkChuck Beginner 5y ago
SANS Cyber Security Foundations Course
Cybersecurity
SANS Cyber Security Foundations Course
SANS Institute Beginner 5y ago
📚 Coursera Courses Opens on Coursera · Free to audit
1 / 3 View all →
Cloud Security, Resiliency, and Vulnerability Management
📚 Coursera Course ↗
Self-paced
Cloud Security, Resiliency, and Vulnerability Management
Opens on Coursera ↗
Handling Security Incidents Across Domains
📚 Coursera Course ↗
Self-paced
Handling Security Incidents Across Domains
Opens on Coursera ↗
Cybersecurity Policy Foundations
📚 Coursera Course ↗
Self-paced
Cybersecurity Policy Foundations
Opens on Coursera ↗
Defending Against AI-Driven Phishing and Social Engineering
📚 Coursera Course ↗
Self-paced
Defending Against AI-Driven Phishing and Social Engineering
Opens on Coursera ↗
Systems and Cybersecurity Fundamentals Part 2
📚 Coursera Course ↗
Self-paced
Systems and Cybersecurity Fundamentals Part 2
Opens on Coursera ↗
SD-WAN: Optimizing Network Performance & Security
📚 Coursera Course ↗
Self-paced
SD-WAN: Optimizing Network Performance & Security
Opens on Coursera ↗