Tech Skills

Cybersecurity

Ethical hacking, penetration testing, network security, CTFs and defensive security

2561
lessons
Why does this work or not work? #shorts #iphone #android #starlink #vpn
Cybersecurity
Why does this work or not work? #shorts #iphone #android #starlink #vpn
David Bombal Intermediate 2y ago
When Scammers Call, He Strikes Back In the Best Way๐ŸŽ™Darknet Diaries Ep. 143: Jim Hates Scams
Cybersecurity
When Scammers Call, He Strikes Back In the Best Way๐ŸŽ™Darknet Diaries Ep. 143: Jim Hates Scams
Jack Rhysider Intermediate 2y ago
The government spyware used to catch criminals
Cybersecurity
The government spyware used to catch criminals
Jack Rhysider Intermediate 2y ago
Can a PDF File be Malware?
Cybersecurity
Can a PDF File be Malware?
John Hammond Intermediate 2y ago
Why do you trust that website? #shorts #encryption #hashing #password
Cybersecurity
Why do you trust that website? #shorts #encryption #hashing #password
David Bombal Intermediate 2y ago
Free Coding Tool Distributes Malware
Cybersecurity
Free Coding Tool Distributes Malware
John Hammond Intermediate 2y ago
Perusing the Dark Web with Jason Haddix
Cybersecurity
Perusing the Dark Web with Jason Haddix
The Cyber Mentor Intermediate 2y ago
How Nintendo killed open-source emulator Yuzu
Cybersecurity
How Nintendo killed open-source emulator Yuzu
Fireship Intermediate 2y ago
How to get into Cyber Security with SANS Foundations
Cybersecurity
How to get into Cyber Security with SANS Foundations
SANS Institute Intermediate 2y ago
2024 Artificial Intelligence Security Trends and Predictions
Cybersecurity
2024 Artificial Intelligence Security Trends and Predictions
SANS Institute Intermediate 2y ago
Roots of Life, Discussion on Hun, By Yair Maimon
Cybersecurity
Roots of Life, Discussion on Hun, By Yair Maimon
TCM Academy Intermediate 2y ago
Top 10 Study Habits 2024
Cybersecurity
Top 10 Study Habits 2024
NetworkChuck Intermediate 2y ago
How the police spied on Europe's top criminal
Cybersecurity
How the police spied on Europe's top criminal
Jack Rhysider Intermediate 2y ago
The Cutwail Botnet
Cybersecurity
The Cutwail Botnet
Jack Rhysider Intermediate 2y ago
The FBI's undercover phone
Cybersecurity
The FBI's undercover phone
Jack Rhysider Intermediate 2y ago
Can you decrypt a hashed password? #shorts #encryption #hashing #password
Cybersecurity
Can you decrypt a hashed password? #shorts #encryption #hashing #password
David Bombal Intermediate 2y ago
Hacking "World of Warcraft" Was His Gateway Drug to a Life of Crime๐ŸŽ™Ep. 117: Daniel the Paladin
Cybersecurity
Hacking "World of Warcraft" Was His Gateway Drug to a Life of Crime๐ŸŽ™Ep. 117: Daniel the Paladin
Jack Rhysider Intermediate 2y ago
Did you just dox yourself? #shorts #iphone #android #starlink #vpn
Cybersecurity
Did you just dox yourself? #shorts #iphone #android #starlink #vpn
David Bombal Intermediate 2y ago
Notepad.exe Will Snitch On You (full coding project)
Cybersecurity
Notepad.exe Will Snitch On You (full coding project)
John Hammond Intermediate 2y ago
One Code Mistake Ruined This Website
Cybersecurity
One Code Mistake Ruined This Website
John Hammond Intermediate 2y ago
Tracking Cybercrime on Telegram
Cybersecurity
Tracking Cybercrime on Telegram
John Hammond Intermediate 2y ago
Hacking the former UK Prime Minister
Cybersecurity
Hacking the former UK Prime Minister
Jack Rhysider Intermediate 2y ago
CIA Spy Shares Flipping Tactics๐ŸŽ™Darknet Diaries Ep. 116: Mad Dog
Cybersecurity
CIA Spy Shares Flipping Tactics๐ŸŽ™Darknet Diaries Ep. 116: Mad Dog
Jack Rhysider Intermediate 2y ago
Don't Forget This One Hacking Trick
Cybersecurity
Don't Forget This One Hacking Trick
John Hammond Intermediate 2y ago
Mark Zuckerberg's Facebook got hacked by teenagers
Cybersecurity
Mark Zuckerberg's Facebook got hacked by teenagers
Jack Rhysider Intermediate 2y ago
SMB Shares & Cronjob to Initial Access (Proving Grounds: Dawn)
Cybersecurity
SMB Shares & Cronjob to Initial Access (Proving Grounds: Dawn)
John Hammond Intermediate 2y ago
Enterprise security one step at a time
Cybersecurity
Enterprise security one step at a time
John Hammond Intermediate 2y ago
I AUTOMATED a Penetration Test!?
Cybersecurity
I AUTOMATED a Penetration Test!?
John Hammond Intermediate 2y ago
Video Game Cheaters Are in an Eternal Arms Race๐ŸŽ™Darknet Diaries Ep. 115: Player Cheater Dev Spy
Cybersecurity
Video Game Cheaters Are in an Eternal Arms Race๐ŸŽ™Darknet Diaries Ep. 115: Player Cheater Dev Spy
Jack Rhysider Intermediate 2y ago
Tracking down a cybercriminal through network logs
Cybersecurity
Tracking down a cybercriminal through network logs
Jack Rhysider Intermediate 2y ago
Healthcare Software Exploit: CVE-2023-43208
Cybersecurity
Healthcare Software Exploit: CVE-2023-43208
John Hammond Intermediate 2y ago
Run this script with Eval
Cybersecurity
Run this script with Eval
John Hammond Intermediate 2y ago
Chinese hackers stealing American technology?
Cybersecurity
Chinese hackers stealing American technology?
Jack Rhysider Intermediate 2y ago
They Make Millions Selling Fake Degrees, and Their Victims Love It๐ŸŽ™Darknet Diaries Ep. 142: Axact
Cybersecurity
They Make Millions Selling Fake Degrees, and Their Victims Love It๐ŸŽ™Darknet Diaries Ep. 142: Axact
Jack Rhysider Intermediate 2y ago
Debug with JS-Beautify
Cybersecurity
Debug with JS-Beautify
John Hammond Intermediate 2y ago
Debug with Visual Studio
Cybersecurity
Debug with Visual Studio
John Hammond Intermediate 2y ago
Exploring the BIGGEST SCAMS in the Dark Web
Cybersecurity
Exploring the BIGGEST SCAMS in the Dark Web
John Hammond Intermediate 2y ago
Welcome back, Ryan Chapman
Cybersecurity
Welcome back, Ryan Chapman
John Hammond Intermediate 2y ago
Hacker vs. Hacker: Why EVERYONE Hated His Genius Malware Kit๐ŸŽ™Darknet Diaries Ep. 114: HD
Cybersecurity
Hacker vs. Hacker: Why EVERYONE Hated His Genius Malware Kit๐ŸŽ™Darknet Diaries Ep. 114: HD
Jack Rhysider Intermediate 2y ago
PikaBot Malware Analysis: Debugging in Visual Studio
Cybersecurity
PikaBot Malware Analysis: Debugging in Visual Studio
John Hammond Intermediate 2y ago
Make Malware Analysis FASTER with Binary Emulation
Cybersecurity
Make Malware Analysis FASTER with Binary Emulation
John Hammond Intermediate 2y ago
Dig Deeper and Faster with AI
Cybersecurity
Dig Deeper and Faster with AI
John Hammond Intermediate 2y ago
I Made a Custom Threat Intel Feed (Connecting Apps with n8n)
Cybersecurity
I Made a Custom Threat Intel Feed (Connecting Apps with n8n)
John Hammond Intermediate 2y ago
NetworkChuck's Life Hack
Cybersecurity
NetworkChuck's Life Hack
John Hammond Intermediate 2y ago
Revenge: He Could Wipe 2,947 Devices With One Risky Click๐ŸŽ™Darknet Diaries Ep. 113: Adam
Cybersecurity
Revenge: He Could Wipe 2,947 Devices With One Risky Click๐ŸŽ™Darknet Diaries Ep. 113: Adam
Jack Rhysider Intermediate 2y ago
How to Extract Plaintext Wi-Fi Passwords (with Rust)
Cybersecurity
How to Extract Plaintext Wi-Fi Passwords (with Rust)
John Hammond Intermediate 2y ago
Is Hashing Encryption? #shorts #encryption #hashing #password
Cybersecurity
Is Hashing Encryption? #shorts #encryption #hashing #password
David Bombal Intermediate 2y ago
This Computer Malware Steals Your Information
Cybersecurity
This Computer Malware Steals Your Information
John Hammond Intermediate 2y ago
๐Ÿ“š Coursera Courses Opens on Coursera ยท Free to audit
1 / 3 View all โ†’
Assets, Threats, and Vulnerabilities
๐Ÿ“š Coursera Course โ†—
Self-paced
Assets, Threats, and Vulnerabilities
Opens on Coursera โ†—
Cybersecurity: What to Do When You Are a Victim
๐Ÿ“š Coursera Course โ†—
Self-paced
Cybersecurity: What to Do When You Are a Victim
Opens on Coursera โ†—
Network Implementations and Operations
๐Ÿ“š Coursera Course โ†—
Self-paced
Network Implementations and Operations
Opens on Coursera โ†—
Writing Secure Code in ASP.NET
๐Ÿ“š Coursera Course โ†—
Self-paced
Writing Secure Code in ASP.NET
Opens on Coursera โ†—
CISSP Domain 4: Communication and Network Security
๐Ÿ“š Coursera Course โ†—
Self-paced
CISSP Domain 4: Communication and Network Security
Opens on Coursera โ†—
Network Operations
๐Ÿ“š Coursera Course โ†—
Self-paced
Network Operations
Opens on Coursera โ†—