Tech Skills

Cybersecurity

Ethical hacking, penetration testing, network security, CTFs and defensive security

2561
lessons
The destructive Iranian cyber attacks
Cybersecurity
The destructive Iranian cyber attacks
Jack Rhysider Intermediate 1y ago
The US malware that sabotaged Iran's nuclear facility
Cybersecurity
The US malware that sabotaged Iran's nuclear facility
Jack Rhysider Intermediate 1y ago
WiFi Security Myths Demo: Don't believe that these will protect you!
Cybersecurity
WiFi Security Myths Demo: Don't believe that these will protect you!
David Bombal Intermediate 1y ago
Insomnia, A Call for Inner Change? #acupuncture #chinesemedicine
Cybersecurity
Insomnia, A Call for Inner Change? #acupuncture #chinesemedicine
TCM Academy Intermediate 1y ago
They're hunting your passwords? #shorts #passwords #cybersecurity  #ai
Cybersecurity
They're hunting your passwords? #shorts #passwords #cybersecurity #ai
David Bombal Intermediate 1y ago
How to learn foundational cybersecurity skills, brought to you by Sandra Liu.
Cybersecurity
How to learn foundational cybersecurity skills, brought to you by Sandra Liu.
Coursera Intermediate 1y ago
CISOs Confront AI: Adapting Cybersecurity to the AI Era
Cybersecurity
CISOs Confront AI: Adapting Cybersecurity to the AI Era
SANS Institute Intermediate 1y ago
Keynote | The Fast-Food Effect: Translating Fast-Food Mastery into Cross-Industry Success
Cybersecurity
Keynote | The Fast-Food Effect: Translating Fast-Food Mastery into Cross-Industry Success
SANS Institute Intermediate 1y ago
It is essential to keep up with the threat landscape!
Cybersecurity
It is essential to keep up with the threat landscape!
Coursera Intermediate 1y ago
8 Rules for Better Data Storytelling | Get Your Insights Understood
Cybersecurity
8 Rules for Better Data Storytelling | Get Your Insights Understood
DataCamp Intermediate 1y ago
Do you use your pet's name as your password?
Cybersecurity
Do you use your pet's name as your password?
Google for Developers Intermediate 1y ago
Diagnosing GB Liver Dysfunction
Cybersecurity
Diagnosing GB Liver Dysfunction
TCM Academy Intermediate 1y ago
Protecting workloads with Google Cloud next generation firewall
Cybersecurity
Protecting workloads with Google Cloud next generation firewall
Google Cloud Tech Intermediate 1y ago
computer science vs cybersecurity in 2025
Cybersecurity
computer science vs cybersecurity in 2025
Sajjaad Khader Intermediate 1y ago
7 tech leaders who ended up in prison
Cybersecurity
7 tech leaders who ended up in prison
Fireship Intermediate 2y ago
How Hackers Compromise BIG Networks (with NetExec)
Cybersecurity
How Hackers Compromise BIG Networks (with NetExec)
John Hammond Intermediate 2y ago
The Apex Legends Hack.
Cybersecurity
The Apex Legends Hack.
John Hammond Intermediate 2y ago
The hacker who became a Web Design CEO
Cybersecurity
The hacker who became a Web Design CEO
Jack Rhysider Intermediate 1y ago
The coolest WiFi hacking device?
Cybersecurity
The coolest WiFi hacking device?
David Bombal Intermediate 1y ago
How to get away with $230 Million in crypto
Cybersecurity
How to get away with $230 Million in crypto
Jack Rhysider Intermediate 1y ago
$75 Million Bitcoin theft in Slovenia
Cybersecurity
$75 Million Bitcoin theft in Slovenia
Jack Rhysider Intermediate 1y ago
Feather's Edge
Cybersecurity
Feather's Edge
Jack Rhysider Intermediate 1y ago
How Skype compromised your WoW account
Cybersecurity
How Skype compromised your WoW account
Jack Rhysider Intermediate 1y ago
This five-year-old hacked Xbox
Cybersecurity
This five-year-old hacked Xbox
Jack Rhysider Intermediate 1y ago
How a Montana Mom Became the FBI's Secret Weapon Against Al Qaeda🎙Darknet Diaries Ep. 145: Shannen
Cybersecurity
How a Montana Mom Became the FBI's Secret Weapon Against Al Qaeda🎙Darknet Diaries Ep. 145: Shannen
Jack Rhysider Intermediate 1y ago
Thieves stole $40K in Ethereum with NFT scam
Cybersecurity
Thieves stole $40K in Ethereum with NFT scam
Jack Rhysider Intermediate 1y ago
From Rogue to Vanguard: My Odyssey through the Cyber Realm
Cybersecurity
From Rogue to Vanguard: My Odyssey through the Cyber Realm
SANS Institute Intermediate 1y ago
The Vanilla Gift Card Trap
Cybersecurity
The Vanilla Gift Card Trap
Jack Rhysider Intermediate 1y ago
CISOs Confront AI: Adapting Cybersecurity to the AI Era
Cybersecurity
CISOs Confront AI: Adapting Cybersecurity to the AI Era
SANS Institute Intermediate 1y ago
This exploit emptied 6,000 Coinbase wallets
Cybersecurity
This exploit emptied 6,000 Coinbase wallets
Jack Rhysider Intermediate 1y ago
The $70 million TalkTalk Breach
Cybersecurity
The $70 million TalkTalk Breach
Jack Rhysider Intermediate 1y ago
The Mastermind behind Pakistan's nuclear arms scene
Cybersecurity
The Mastermind behind Pakistan's nuclear arms scene
Jack Rhysider Intermediate 1y ago
Are You Interested in Blue Teaming?
Cybersecurity
Are You Interested in Blue Teaming?
Coursera Intermediate 1y ago
How did someone make $2,000 per day with Roblox?
Cybersecurity
How did someone make $2,000 per day with Roblox?
Jack Rhysider Intermediate 1y ago
How scammers can reverse their payment
Cybersecurity
How scammers can reverse their payment
Jack Rhysider Intermediate 1y ago
How an AT&T employee stole $23 million overnight
Cybersecurity
How an AT&T employee stole $23 million overnight
Jack Rhysider Intermediate 1y ago
Are you liable if criminals use your hacking software?
Cybersecurity
Are you liable if criminals use your hacking software?
Jack Rhysider Intermediate 2y ago
What's the Best Firewall? #shorts #firewall #cybersecurity #iphone #android
Cybersecurity
What's the Best Firewall? #shorts #firewall #cybersecurity #iphone #android
David Bombal Intermediate 2y ago
Why you shouldn't reuse passwords
Cybersecurity
Why you shouldn't reuse passwords
Jack Rhysider Intermediate 2y ago
Is your Discord account safe?
Cybersecurity
Is your Discord account safe?
Jack Rhysider Intermediate 2y ago
Stop these weird addresses #shorts #firewall #iphone #android #starlink
Cybersecurity
Stop these weird addresses #shorts #firewall #iphone #android #starlink
David Bombal Intermediate 2y ago
Changing the Landscape: Women Redefining Cybersecurity
Cybersecurity
Changing the Landscape: Women Redefining Cybersecurity
SANS Institute Intermediate 2y ago
Finding WEIRD Typosquatting Websites
Cybersecurity
Finding WEIRD Typosquatting Websites
John Hammond Intermediate 2y ago
Stealing $100,000 from Puff Daddy
Cybersecurity
Stealing $100,000 from Puff Daddy
Jack Rhysider Intermediate 2y ago
Hackers remotely hack millions of cars!
Cybersecurity
Hackers remotely hack millions of cars!
David Bombal Intermediate 2y ago
The BlackBerry attack
Cybersecurity
The BlackBerry attack
Jack Rhysider Intermediate 2y ago
The Pig Butchering Scam
Cybersecurity
The Pig Butchering Scam
Jack Rhysider Intermediate 2y ago
The Secrets of The Tor Browser
Cybersecurity
The Secrets of The Tor Browser
John Hammond Intermediate 2y ago
📚 Coursera Courses Opens on Coursera · Free to audit
1 / 3 View all →
Respectful Communication: Improve Patient Outcomes
📚 Coursera Course ↗
Self-paced
Respectful Communication: Improve Patient Outcomes
Opens on Coursera ↗
Cybersecurity Solutions and Microsoft Defender
📚 Coursera Course ↗
Self-paced
Cybersecurity Solutions and Microsoft Defender
Opens on Coursera ↗
Digital Shield: Cybersecurity for Data and System Protection
📚 Coursera Course ↗
Self-paced
Digital Shield: Cybersecurity for Data and System Protection
Opens on Coursera ↗
Protege GKE con Cloud Next Generation Firewall
📚 Coursera Course ↗
Self-paced
Protege GKE con Cloud Next Generation Firewall
Opens on Coursera ↗
CompTIA PenTest+ (PT0-003)
📚 Coursera Course ↗
Self-paced
CompTIA PenTest+ (PT0-003)
Opens on Coursera ↗
Securing Industrial Control and Safety Instrumented Systems
📚 Coursera Course ↗
Self-paced
Securing Industrial Control and Safety Instrumented Systems
Opens on Coursera ↗