Tech Skills

Cybersecurity

Ethical hacking, penetration testing, network security, CTFs and defensive security

6406
lessons
Skills in this topic
View full skill map →
Security Basics
beginner
Fix OWASP top 10 vulnerabilities
AI Security
intermediate
Identify and patch prompt injection vulnerabilities
Network Security
intermediate
Configure a firewall with proper inbound/outbound rules
Ethical Hacking & Pen Testing
intermediate
Conduct a full pen test with Kali Linux
Cloud Security
intermediate
Implement IAM least-privilege policies on AWS/GCP
Incident Response
intermediate
Build an incident response playbook
Security Compliance
intermediate
Map controls for SOC 2 Type II compliance
Defensive AI
advanced
Build an AI-powered log anomaly detector
your favorite websites can be HACKED! (watering holes, typo squatting) // FREE Security+ // EP 4
Cybersecurity
your favorite websites can be HACKED! (watering holes, typo squatting) // FREE Security+ // EP 4
NetworkChuck Beginner 5y ago
Discovering Email Addresses (OSINT)
Cybersecurity
Discovering Email Addresses (OSINT)
The Cyber Mentor Beginner 5y ago
Basic Buffer Overflow - VulnServer TRUN
Cybersecurity
Basic Buffer Overflow - VulnServer TRUN
John Hammond Beginner 5y ago
how Hackers SNiFF (capture) network traffic // MiTM attack
Cybersecurity
how Hackers SNiFF (capture) network traffic // MiTM attack
NetworkChuck Beginner 5y ago
HackTheBox - Intense
Cybersecurity
HackTheBox - Intense
IppSec Beginner 5y ago
Yaron Brook: Ayn Rand and the Philosophy of Objectivism | Lex Fridman Podcast #138
Cybersecurity
Yaron Brook: Ayn Rand and the Philosophy of Objectivism | Lex Fridman Podcast #138
Lex Fridman Beginner 5y ago
Creating Sock Puppet Accounts
Cybersecurity
Creating Sock Puppet Accounts
The Cyber Mentor Beginner 5y ago
SickOS 1.2 VulnHub Walkthrough - Boot-To-Root
Cybersecurity
SickOS 1.2 VulnHub Walkthrough - Boot-To-Root
HackerSploit Intermediate 5y ago
Credit card cloning is too easy!
Cybersecurity
Credit card cloning is too easy!
David Bombal Beginner 5y ago
Journey to Paradise: Immortality, Hun and Po - The Ma Wang Dui Funeral Banner
Cybersecurity
Journey to Paradise: Immortality, Hun and Po - The Ma Wang Dui Funeral Banner
TCM Academy Beginner 5y ago
How Hacking Actually Looks Like - ALLES! CTF Team in Real Time
Cybersecurity
How Hacking Actually Looks Like - ALLES! CTF Team in Real Time
LiveOverflow Beginner 5y ago
Healing the Eyes with Acupuncture and Chinese Medicine, with Julian Scott
Cybersecurity
Healing the Eyes with Acupuncture and Chinese Medicine, with Julian Scott
TCM Academy Beginner 5y ago
Pete Bryan - Scaling Jupyter Notebooks for global scale security analysis | JupyterCon 2020
Cybersecurity
Pete Bryan - Scaling Jupyter Notebooks for global scale security analysis | JupyterCon 2020
JupyterCon Intermediate 5y ago
Best Ways To Learn Linux
Cybersecurity
Best Ways To Learn Linux
HackerSploit Beginner 5y ago
Wait, what? Only 2 seconds to open a safe?
Cybersecurity
Wait, what? Only 2 seconds to open a safe?
David Bombal Beginner 5y ago
You Got a Job in Cybersecurity!... Now What?! (Panel)
Cybersecurity
You Got a Job in Cybersecurity!... Now What?! (Panel)
SANS Institute Intermediate 5y ago
#BuildYourBrand: Blogging & Podcasting Your Way to Leadership (Panel)
Cybersecurity
#BuildYourBrand: Blogging & Podcasting Your Way to Leadership (Panel)
SANS Institute Intermediate 5y ago
HackTheBox - Fuse
Cybersecurity
HackTheBox - Fuse
IppSec Beginner 5y ago
George Hotz: Hacking the Simulation & Learning to Drive with Neural Nets | Lex Fridman Podcast #132
Cybersecurity
George Hotz: Hacking the Simulation & Learning to Drive with Neural Nets | Lex Fridman Podcast #132
Lex Fridman Beginner 5y ago
Top 7 Most Elite Nation State Hackers
Cybersecurity
Top 7 Most Elite Nation State Hackers
Jack Rhysider Beginner 5y ago
Guessing vs. Not Knowing in Hacking and CTFs
Cybersecurity
Guessing vs. Not Knowing in Hacking and CTFs
LiveOverflow Beginner 5y ago
What Lives Behind The Blue Screen | Human Readable
Cybersecurity
What Lives Behind The Blue Screen | Human Readable
Jack Rhysider Beginner 5y ago
i hacked my grandma (social engineering and pretexting) // FREE Security+ // EP 3
Cybersecurity
i hacked my grandma (social engineering and pretexting) // FREE Security+ // EP 3
NetworkChuck Beginner 5y ago
Bypassing SQL Filters (picoCTF Web Gauntlet)
Cybersecurity
Bypassing SQL Filters (picoCTF Web Gauntlet)
The Cyber Mentor Beginner 5y ago
Journey Through 2000 Years of Yin-Yang Harmonisation (Tiao He)
Cybersecurity
Journey Through 2000 Years of Yin-Yang Harmonisation (Tiao He)
TCM Academy Intermediate 5y ago
Best OS For Pentesting & Security Research?
Cybersecurity
Best OS For Pentesting & Security Research?
HackerSploit Advanced 5y ago
A Word On The YouTube Community Guidelines
Cybersecurity
A Word On The YouTube Community Guidelines
HackerSploit Beginner 5y ago
Pentest Tales 001: You Spent How Much On Security?
Cybersecurity
Pentest Tales 001: You Spent How Much On Security?
The Cyber Mentor Beginner 5y ago
Keynote: The Language of Equality | Lodrina Cherne
Cybersecurity
Keynote: The Language of Equality | Lodrina Cherne
SANS Institute Beginner 5y ago
Phishing attacks are SCARY easy to do!! (let me show you!) // FREE Security+ // EP 2
Cybersecurity
Phishing attacks are SCARY easy to do!! (let me show you!) // FREE Security+ // EP 2
NetworkChuck Beginner 5y ago
Public Speaking: Feel the Fear and Do it Anyway | Xena Olsen
Cybersecurity
Public Speaking: Feel the Fear and Do it Anyway | Xena Olsen
SANS Institute Intermediate 5y ago
Cain and Abel Install Windows 10
Cybersecurity
Cain and Abel Install Windows 10
David Bombal Beginner 5y ago
I own your WiFi
Cybersecurity
I own your WiFi
David Bombal Beginner 5y ago
HackTheBox - Dyplesher
Cybersecurity
HackTheBox - Dyplesher
IppSec Beginner 5y ago
Raising the Tide: Driving Improvement in Security By Being a Good Human | David Bianco
Cybersecurity
Raising the Tide: Driving Improvement in Security By Being a Good Human | David Bianco
SANS Institute Beginner 5y ago
How to Connect to a Cisco Switch Using Putty (CCNA)
Cybersecurity
How to Connect to a Cisco Switch Using Putty (CCNA)
David Bombal Intermediate 5y ago
how to become a Network Developer at Amazon (AWS)
Cybersecurity
how to become a Network Developer at Amazon (AWS)
NetworkChuck Beginner 5y ago
3 Hacking Skills EVERYONE has // FREE Security+ // EP 1
Cybersecurity
3 Hacking Skills EVERYONE has // FREE Security+ // EP 1
NetworkChuck Beginner 5y ago
The Truth About Impostor Syndrome
Cybersecurity
The Truth About Impostor Syndrome
The Cyber Mentor Beginner 5y ago
HackTheBox - Blunder
Cybersecurity
HackTheBox - Blunder
IppSec Beginner 5y ago
Human Aspects of Ransomware
Cybersecurity
Human Aspects of Ransomware
SANS Institute Intermediate 5y ago
Solving Novel Problems in IT Security
Cybersecurity
Solving Novel Problems in IT Security
Jack Rhysider Intermediate 5y ago
HackTheBox - Cache
Cybersecurity
HackTheBox - Cache
IppSec Beginner 5y ago
Hexadecimal to Decimal made EASY! | Free CCNA 200-301 Course | Video #16
Cybersecurity
Hexadecimal to Decimal made EASY! | Free CCNA 200-301 Course | Video #16
David Bombal Beginner 5y ago
FREE CompTIA Security+ Course // SY0-501 vs SY0-601 // EP 0
Cybersecurity
FREE CompTIA Security+ Course // SY0-501 vs SY0-601 // EP 0
NetworkChuck Beginner 5y ago
Kali Linux 2020.3 install Windows 10 (for free)
Cybersecurity
Kali Linux 2020.3 install Windows 10 (for free)
David Bombal Beginner 5y ago
O.MG: From zero to hero
Cybersecurity
O.MG: From zero to hero
David Bombal Beginner 5y ago
ZeroLogon Exploit - Abusing CVE-2020-1472
Cybersecurity
ZeroLogon Exploit - Abusing CVE-2020-1472
The Cyber Mentor Beginner 5y ago
📚 Coursera Courses Opens on Coursera · Free to audit
1 / 3 View all →
Cybersecurity Awareness Essentials for Employees
📚 Coursera Course ↗
Self-paced
Cybersecurity Awareness Essentials for Employees
Opens on Coursera ↗
Cybersecurity Assurance for Accounting and Finance
📚 Coursera Course ↗
Self-paced
Cybersecurity Assurance for Accounting and Finance
Opens on Coursera ↗
Network Security, Automation, and Exam Preparation
📚 Coursera Course ↗
Self-paced
Network Security, Automation, and Exam Preparation
Opens on Coursera ↗
Security for Artificial Intelligence Software and Services
📚 Coursera Course ↗
Self-paced
Security for Artificial Intelligence Software and Services
Opens on Coursera ↗
Ethical Hacking Essentials (EHE)
📚 Coursera Course ↗
Self-paced
Ethical Hacking Essentials (EHE)
Opens on Coursera ↗
Ethical Hacking Foundations & Network Security
📚 Coursera Course ↗
Self-paced
Ethical Hacking Foundations & Network Security
Opens on Coursera ↗