Tech Skills

Cybersecurity

Ethical hacking, penetration testing, network security, CTFs and defensive security

3573
lessons
CS50x 2025 - Lecture 2 - Arrays
Cybersecurity
CS50x 2025 - Lecture 2 - Arrays
CS50 Beginner 1y ago
Hide your files like a hacker (5 Ways)
Cybersecurity
Hide your files like a hacker (5 Ways)
NetworkChuck Beginner 1y ago
HackTheBox - Intuition
Cybersecurity
HackTheBox - Intuition
IppSec Beginner 1y ago
Gregory Aldrete: The Roman Empire - Rise and Fall of Ancient Rome | Lex Fridman Podcast #443
Cybersecurity
Gregory Aldrete: The Roman Empire - Rise and Fall of Ancient Rome | Lex Fridman Podcast #443
Lex Fridman Beginner 1y ago
SANS Compliance Countdown 2024
Cybersecurity
SANS Compliance Countdown 2024
SANS Institute Beginner 1y ago
LIVE: Ransomware Investigation | Cybersecurity | Splunk | Blue Team |
Cybersecurity
LIVE: Ransomware Investigation | Cybersecurity | Splunk | Blue Team |
The Cyber Mentor Beginner 1y ago
How I Find Fail-Proof SEO Niches
Cybersecurity
How I Find Fail-Proof SEO Niches
Matt Diggity Beginner 1y ago
Top web series every techie must watch | Netflix
Cybersecurity
Top web series every techie must watch | Netflix
GeeksforGeeks Beginner 1y ago
HackTheBox - Mailing
Cybersecurity
HackTheBox - Mailing
IppSec Beginner 1y ago
Caido: The Hacking Tool You Didn't Know You Needed
Cybersecurity
Caido: The Hacking Tool You Didn't Know You Needed
The Cyber Mentor Beginner 1y ago
The Hacker with Hardware Implants (interview)
Cybersecurity
The Hacker with Hardware Implants (interview)
John Hammond Beginner 1y ago
Hacking Games with MelonLoader
Cybersecurity
Hacking Games with MelonLoader
John Hammond Beginner 1y ago
Hacking networks with Python (FREE CCNA 200-301 Course 2024)
Cybersecurity
Hacking networks with Python (FREE CCNA 200-301 Course 2024)
David Bombal Beginner 1y ago
🔒 What is a VPN and How Does It Work? 🌐
Cybersecurity
🔒 What is a VPN and How Does It Work? 🌐
GeeksforGeeks Beginner 1y ago
SANS Threat Analysis Rundown with Katie Nickels
Cybersecurity
SANS Threat Analysis Rundown with Katie Nickels
SANS Institute Beginner 1y ago
What is DNS? (and how it makes the Internet work)
Cybersecurity
What is DNS? (and how it makes the Internet work)
NetworkChuck Beginner 1y ago
5 Cybersecurity Careers: Your Path to Protecting the Digital World
Cybersecurity
5 Cybersecurity Careers: Your Path to Protecting the Digital World
Coursera Beginner 1y ago
My Evidence-Backed Strategy To Make $100k In Six Months
Cybersecurity
My Evidence-Backed Strategy To Make $100k In Six Months
Sunny Lenarduzzi Beginner 1y ago
Billionaire Pavel Durov arrested... The truth about Telegram
Cybersecurity
Billionaire Pavel Durov arrested... The truth about Telegram
Fireship Beginner 1y ago
Why Cybersecurity Professionals Need to Understand AI
Cybersecurity
Why Cybersecurity Professionals Need to Understand AI
Coursera Beginner 1y ago
Craig Jones: Jiu Jitsu, $2 Million Prize, CJI, ADCC, Ukraine & Trolling | Lex Fridman Podcast #439
Cybersecurity
Craig Jones: Jiu Jitsu, $2 Million Prize, CJI, ADCC, Ukraine & Trolling | Lex Fridman Podcast #439
Lex Fridman Beginner 1y ago
CEH V12 Exam Preparation | How to Prepare for CEH V12 Exam | Edureka
Cybersecurity
CEH V12 Exam Preparation | How to Prepare for CEH V12 Exam | Edureka
edureka! Beginner 1y ago
Hacking the Colony
Cybersecurity
Hacking the Colony
Data Skeptic Beginner 1y ago
HCLTech Helps Global Customer Base Protect Data with Google Cloud Security
Cybersecurity
HCLTech Helps Global Customer Base Protect Data with Google Cloud Security
Google Cloud Beginner 1y ago
Cybersecurity for Beginners | Basics of Cybersecurity | Edureka
Cybersecurity
Cybersecurity for Beginners | Basics of Cybersecurity | Edureka
edureka! Beginner 1y ago
Reverse Engineering 101 tutorial with the amazing Stephen Sims!
Cybersecurity
Reverse Engineering 101 tutorial with the amazing Stephen Sims!
David Bombal Beginner 1y ago
I Can't Scan This Website
Cybersecurity
I Can't Scan This Website
John Hammond Beginner 1y ago
HackTheBox - Skyfall
Cybersecurity
HackTheBox - Skyfall
IppSec Beginner 1y ago
Mastering the Cybersecurity Interview: Key Tips and Common Pitfalls
Cybersecurity
Mastering the Cybersecurity Interview: Key Tips and Common Pitfalls
The Cyber Mentor Beginner 1y ago
Unity Game Hacking with dnSpy
Cybersecurity
Unity Game Hacking with dnSpy
John Hammond Beginner 1y ago
Interactive SQL Injection
Cybersecurity
Interactive SQL Injection
John Hammond Beginner 1y ago
The Moment They Got Hacked
Cybersecurity
The Moment They Got Hacked
John Hammond Beginner 1y ago
HackTheBox - Runner
Cybersecurity
HackTheBox - Runner
IppSec Beginner 1y ago
3 Recommended Burp Suite Plugins
Cybersecurity
3 Recommended Burp Suite Plugins
The Cyber Mentor Beginner 1y ago
Intro to Game Hacking: DEFCON 32
Cybersecurity
Intro to Game Hacking: DEFCON 32
John Hammond Beginner 1y ago
HackTheBox - FormulaX
Cybersecurity
HackTheBox - FormulaX
IppSec Beginner 1y ago
How To Network At Conferences
Cybersecurity
How To Network At Conferences
The Cyber Mentor Beginner 1y ago
3 Must-Have Skills for SOC Analysts
Cybersecurity
3 Must-Have Skills for SOC Analysts
The Cyber Mentor Beginner 1y ago
The Phishing Website that Hacked Linus Tech Tips
Cybersecurity
The Phishing Website that Hacked Linus Tech Tips
John Hammond Beginner 1y ago
HackTheBox - Usage
Cybersecurity
HackTheBox - Usage
IppSec Beginner 1y ago
Cyber Security for Beginners | Introduction to Cyber Security | Cyber Security | Edureka
Cybersecurity
Cyber Security for Beginners | Introduction to Cyber Security | Cyber Security | Edureka
edureka! Beginner 1y ago
How To Pass Any Cybersecurity Certification
Cybersecurity
How To Pass Any Cybersecurity Certification
The Cyber Mentor Beginner 1y ago
HackTheBox - iClean
Cybersecurity
HackTheBox - iClean
IppSec Beginner 1y ago
OSINT Deep Dive: Decoding Location Data Hidden in Photos
Cybersecurity
OSINT Deep Dive: Decoding Location Data Hidden in Photos
The Cyber Mentor Beginner 1y ago
New Cybersecurity Certification?
Cybersecurity
New Cybersecurity Certification?
David Bombal Beginner 1y ago
He Passed CISSP At Age 23
Cybersecurity
He Passed CISSP At Age 23
John Hammond Beginner 1y ago
What Their Computer Looked Like Right As They Got Hacked
Cybersecurity
What Their Computer Looked Like Right As They Got Hacked
John Hammond Beginner 1y ago
Hack a Smart Safe at the DEF CON IoT Village!
Cybersecurity
Hack a Smart Safe at the DEF CON IoT Village!
The Cyber Mentor Beginner 1y ago
📚 Coursera Courses Opens on Coursera · Free to audit
1 / 3 View all →
Advanced Web Exploits, Python Scripting & Network Attacks
📚 Coursera Course ↗
Self-paced
Advanced Web Exploits, Python Scripting & Network Attacks
Opens on Coursera ↗
Writing Secure Code in ASP.NET
📚 Coursera Course ↗
Self-paced
Writing Secure Code in ASP.NET
Opens on Coursera ↗
Network Systems Foundations
📚 Coursera Course ↗
Self-paced
Network Systems Foundations
Opens on Coursera ↗
Azure: Create a Virtual Machine and Deploy a Web Server
📚 Coursera Course ↗
Self-paced
Azure: Create a Virtual Machine and Deploy a Web Server
Opens on Coursera ↗
AWS Developer: Unit 2
📚 Coursera Course ↗
Self-paced
AWS Developer: Unit 2
Opens on Coursera ↗
Security Operations
📚 Coursera Course ↗
Self-paced
Security Operations
Opens on Coursera ↗