Tech Skills

Cybersecurity

Ethical hacking, penetration testing, network security, CTFs and defensive security

7,099
lessons
Skills in this topic
View full skill map →
Security Basics
beginner
Fix OWASP top 10 vulnerabilities
AI Security
intermediate
Identify and patch prompt injection vulnerabilities
Network Security
intermediate
Configure a firewall with proper inbound/outbound rules
Ethical Hacking & Pen Testing
intermediate
Conduct a full pen test with Kali Linux
Cloud Security
intermediate
Implement IAM least-privilege policies on AWS/GCP
Incident Response
intermediate
Build an incident response playbook
Security Compliance
intermediate
Map controls for SOC 2 Type II compliance
Defensive AI
advanced
Build an AI-powered log anomaly detector
How Tor Works?  (The Onion Router)
Cybersecurity
How Tor Works? (The Onion Router)
Hussein Nasser Intermediate 6y ago
Rubik's Cube Encryption Demo
Cybersecurity
Rubik's Cube Encryption Demo
Dwarkesh Patel Intermediate 6y ago
Funnel Hacking Live FULL Documentary - A ClickFunnels Studio Presentation
Cybersecurity ⚡ AI Lesson
Funnel Hacking Live FULL Documentary - A ClickFunnels Studio Presentation
Russell Brunson Beginner 6y ago
Kali Linux: Hacking ARP
Cybersecurity
Kali Linux: Hacking ARP
David Bombal Intermediate 6y ago
Burp Suite Pro Walkthrough
Cybersecurity ⚡ AI Lesson
Burp Suite Pro Walkthrough
The Cyber Mentor Beginner 6y ago
Recon-ng V5 - Generating Reports
Cybersecurity ⚡ AI Lesson
Recon-ng V5 - Generating Reports
HackerSploit Intermediate 6y ago
Recon-ng V5 - Working With The Database
Cybersecurity ⚡ AI Lesson
Recon-ng V5 - Working With The Database
HackerSploit Intermediate 6y ago
Funnel Hacking LIVE Documentary Trailer - Why We Do It...
Cybersecurity
Funnel Hacking LIVE Documentary Trailer - Why We Do It...
Russell Brunson Beginner 6y ago
AES Explained (Advanced Encryption Standard) - Computerphile
Cybersecurity ⚡ AI Lesson
AES Explained (Advanced Encryption Standard) - Computerphile
Computerphile Beginner 6y ago
How to Install Ubuntu on VirtualBox using Windows 10
Cybersecurity
How to Install Ubuntu on VirtualBox using Windows 10
David Bombal Beginner 6y ago
One Encryption Standard to Rule Them All! - Computerphile
Cybersecurity ⚡ AI Lesson
One Encryption Standard to Rule Them All! - Computerphile
Computerphile Beginner 6y ago
Not giving credit where credit is due - Common Cybersecurity Writing Mistakes
Cybersecurity ⚡ AI Lesson
Not giving credit where credit is due - Common Cybersecurity Writing Mistakes
SANS Institute Beginner 6y ago
Including details most readers don't need - Common Cybersecurity Writing Mistakes
Cybersecurity
Including details most readers don't need - Common Cybersecurity Writing Mistakes
SANS Institute Beginner 6y ago
How To Apply Reverse Engineering To Learn Data Science
Cybersecurity
How To Apply Reverse Engineering To Learn Data Science
Krish Naik Beginner 6y ago
A Poor Man's Pentest: Automating the Manual - BsidesDE 2019
Cybersecurity
A Poor Man's Pentest: Automating the Manual - BsidesDE 2019
John Hammond Intermediate 6y ago
Pentesting for n00bs: Episode 10 - Netmon
Cybersecurity ⚡ AI Lesson
Pentesting for n00bs: Episode 10 - Netmon
The Cyber Mentor Beginner 6y ago
Do you REALLY need a VPN?
Cybersecurity ⚡ AI Lesson
Do you REALLY need a VPN?
Hussein Nasser Intermediate 6y ago
Recon-ng V5 - Adding API Keys (Shodan & BuiltWith)
Cybersecurity ⚡ AI Lesson
Recon-ng V5 - Adding API Keys (Shodan & BuiltWith)
HackerSploit Intermediate 6y ago
Recon-ng V5 - Marketplace & Installing Recon Modules (whois, subdomain enumeration)
Cybersecurity ⚡ AI Lesson
Recon-ng V5 - Marketplace & Installing Recon Modules (whois, subdomain enumeration)
HackerSploit Intermediate 6y ago
Recon-ng V5 - Syntax & Workspace Management
Cybersecurity ⚡ AI Lesson
Recon-ng V5 - Syntax & Workspace Management
HackerSploit Intermediate 6y ago
Recon-ng V5 - Introduction And New Updates
Cybersecurity ⚡ AI Lesson
Recon-ng V5 - Introduction And New Updates
HackerSploit Beginner 6y ago
SSH Brute Force Protection With Fail2Ban
Cybersecurity ⚡ AI Lesson
SSH Brute Force Protection With Fail2Ban
HackerSploit Intermediate 6y ago
Escalating tensions in difficult situations - Common Cybersecurity Writing Mistakes
Cybersecurity ⚡ AI Lesson
Escalating tensions in difficult situations - Common Cybersecurity Writing Mistakes
SANS Institute Beginner 6y ago
Using FUD to cause anxiety - Common Cybersecurity Writing Mistakes
Cybersecurity
Using FUD to cause anxiety - Common Cybersecurity Writing Mistakes
SANS Institute Beginner 6y ago
Not using parallel structure - Common Cybersecurity Writing Mistakes
Cybersecurity
Not using parallel structure - Common Cybersecurity Writing Mistakes
SANS Institute Beginner 6y ago
Using more words than necessary - Common Cybersecurity Writing Mistakes
Cybersecurity
Using more words than necessary - Common Cybersecurity Writing Mistakes
SANS Institute Beginner 6y ago
Applying Inconsistent formatting - Common Cybersecurity Writing Mistakes
Cybersecurity
Applying Inconsistent formatting - Common Cybersecurity Writing Mistakes
SANS Institute Beginner 6y ago
Including indecipherable graphics - Common Cybersecurity Writing Mistakes
Cybersecurity
Including indecipherable graphics - Common Cybersecurity Writing Mistakes
SANS Institute Beginner 6y ago
Burying the Main Point - Common Cybersecurity Writing Mistakes
Cybersecurity ⚡ AI Lesson
Burying the Main Point - Common Cybersecurity Writing Mistakes
SANS Institute Beginner 6y ago
Linux Essentials For Hackers - #17 - SSH And SSH Security
Cybersecurity ⚡ AI Lesson
Linux Essentials For Hackers - #17 - SSH And SSH Security
HackerSploit Intermediate 6y ago
Linux Essentials For Hackers - #16 - Service And Process Management (HTOP & systemctl)
Cybersecurity ⚡ AI Lesson
Linux Essentials For Hackers - #16 - Service And Process Management (HTOP & systemctl)
HackerSploit Intermediate 6y ago
Linux Essentials For Hackers - #15 - TOR & Proxychains
Cybersecurity ⚡ AI Lesson
Linux Essentials For Hackers - #15 - TOR & Proxychains
HackerSploit Intermediate 6y ago
Linux Essentials For Hackers - #14 - Networking (ifconfig, netstat & netdiscover)
Cybersecurity ⚡ AI Lesson
Linux Essentials For Hackers - #14 - Networking (ifconfig, netstat & netdiscover)
HackerSploit Beginner 6y ago
Linux Essentials For Hackers - #13 - Users And Groups & Permissions With Visudo
Cybersecurity ⚡ AI Lesson
Linux Essentials For Hackers - #13 - Users And Groups & Permissions With Visudo
HackerSploit Intermediate 6y ago
Linux Essentials For Hackers - #12 - File Compression & Archiving With tar
Cybersecurity ⚡ AI Lesson
Linux Essentials For Hackers - #12 - File Compression & Archiving With tar
HackerSploit Intermediate 6y ago
Kali Linux: Hacking DHCP and MITM
Cybersecurity
Kali Linux: Hacking DHCP and MITM
David Bombal Beginner 6y ago
Linux Essentials For Hackers - #11 - Disk Usage
Cybersecurity ⚡ AI Lesson
Linux Essentials For Hackers - #11 - Disk Usage
HackerSploit Intermediate 6y ago
Linux Essentials For Hackers - #10 - Shells & Bash Configuration
Cybersecurity ⚡ AI Lesson
Linux Essentials For Hackers - #10 - Shells & Bash Configuration
HackerSploit Intermediate 6y ago
Linux Essentials For Hackers - #9 - Find + OverTheWire Bandit Challenge
Cybersecurity ⚡ AI Lesson
Linux Essentials For Hackers - #9 - Find + OverTheWire Bandit Challenge
HackerSploit Intermediate 6y ago
Cybertalk Clips | How To Improve Your CTF Skills
Cybersecurity ⚡ AI Lesson
Cybertalk Clips | How To Improve Your CTF Skills
HackerSploit Intermediate 6y ago
Linux Essentials For Hackers - #8 - Enumerating Distribution & Kernel Information
Cybersecurity ⚡ AI Lesson
Linux Essentials For Hackers - #8 - Enumerating Distribution & Kernel Information
HackerSploit Intermediate 6y ago
Linux Essentials For Hackers - #7 - Finding Files With Locate
Cybersecurity ⚡ AI Lesson
Linux Essentials For Hackers - #7 - Finding Files With Locate
HackerSploit Intermediate 6y ago
Linux Essentials For Hackers - #6 - grep & piping
Cybersecurity ⚡ AI Lesson
Linux Essentials For Hackers - #6 - grep & piping
HackerSploit Intermediate 6y ago
Cybertalk - EP2 -  CEH vs CISSP, Cybersecurity Degrees & CTFs vs Penetration Tests
Cybersecurity ⚡ AI Lesson
Cybertalk - EP2 - CEH vs CISSP, Cybersecurity Degrees & CTFs vs Penetration Tests
HackerSploit Intermediate 6y ago
Cybertalk Clips | Importance Of Secure Coding For Developers
Cybersecurity ⚡ AI Lesson
Cybertalk Clips | Importance Of Secure Coding For Developers
HackerSploit Intermediate 6y ago
Kali Linux: Hacking Networks Part 2
Cybersecurity
Kali Linux: Hacking Networks Part 2
David Bombal Beginner 6y ago
Linux Essentials For Hackers - #5 - File & Directory Ownership
Cybersecurity ⚡ AI Lesson
Linux Essentials For Hackers - #5 - File & Directory Ownership
HackerSploit Intermediate 6y ago
Linux Essentials For Hackers - #4 - File & Directory Permissions
Cybersecurity ⚡ AI Lesson
Linux Essentials For Hackers - #4 - File & Directory Permissions
HackerSploit Intermediate 6y ago
📚 Coursera Courses Opens on Coursera · Free to audit
1 / 3 View all →
Certified Ethical Hacker (CEH): Unit 1
📚 Coursera Course ↗
Self-paced
Certified Ethical Hacker (CEH): Unit 1
Opens on Coursera ↗
Security and Auditing in Ethereum
📚 Coursera Course ↗
Self-paced
Security and Auditing in Ethereum
Opens on Coursera ↗
Advanced Penetration Testing with Kali Linux
📚 Coursera Course ↗
Self-paced
Advanced Penetration Testing with Kali Linux
Opens on Coursera ↗
Security Architecture for Cloud and Mobile
📚 Coursera Course ↗
Self-paced
Security Architecture for Cloud and Mobile
Opens on Coursera ↗
Previous OWASP Risks
📚 Coursera Course ↗
Self-paced
Previous OWASP Risks
Opens on Coursera ↗
Ethical Hacking Essentials: Hands-On Edition
📚 Coursera Course ↗
Self-paced
Ethical Hacking Essentials: Hands-On Edition
Opens on Coursera ↗