Tech Skills

Cybersecurity

Ethical hacking, penetration testing, network security, CTFs and defensive security

2561
lessons
The Secret Message Hackers Left Deep Inside Their Malware๐ŸŽ™Darknet Diaries Ep. 103: Cloud Hopper
Cybersecurity
The Secret Message Hackers Left Deep Inside Their Malware๐ŸŽ™Darknet Diaries Ep. 103: Cloud Hopper
Jack Rhysider Intermediate 2y ago
Wait ... your router has been online for how long??!! #shorts #cybersecurity #hacking
Cybersecurity
Wait ... your router has been online for how long??!! #shorts #cybersecurity #hacking
David Bombal Intermediate 2y ago
The MOVEit Hack In Retrospect
Cybersecurity
The MOVEit Hack In Retrospect
John Hammond Intermediate 2y ago
How a Nigerian man stole millions of dollars in tax refunds
Cybersecurity
How a Nigerian man stole millions of dollars in tax refunds
Jack Rhysider Intermediate 2y ago
where do you ACTUALLY submit vulnerabilities?
Cybersecurity
where do you ACTUALLY submit vulnerabilities?
John Hammond Intermediate 2y ago
Thinking Outside the Firewall: Unconventional Cybersecurity Journeys | Host: Rich Greene
Cybersecurity
Thinking Outside the Firewall: Unconventional Cybersecurity Journeys | Host: Rich Greene
SANS Institute Intermediate 2y ago
ESG and Sustainable Financial Strategy Course
Cybersecurity
ESG and Sustainable Financial Strategy Course
Saรฏd Business School, University of Oxford Intermediate 2y ago
Guarding LLM and NLP APIs: A Trailblazing Odyssey for Enhanced Security //Ads Dawson // Podcast #190
Cybersecurity
Guarding LLM and NLP APIs: A Trailblazing Odyssey for Enhanced Security //Ads Dawson // Podcast #190
MLOps.community Intermediate 2y ago
What Can You Gain with Cybersecurity Certificates?
Cybersecurity
What Can You Gain with Cybersecurity Certificates?
Coursera Intermediate 2y ago
Three Cloud Security Differentiators for Leaders
Cybersecurity
Three Cloud Security Differentiators for Leaders
SANS Institute Intermediate 2y ago
macOS to Kali Linux to Windows 98? (back to the future copy and paste) #shorts #linux #windows
Cybersecurity
macOS to Kali Linux to Windows 98? (back to the future copy and paste) #shorts #linux #windows
David Bombal Intermediate 2y ago
CS50 Cybersecurity - Lecture 3 - Securing Software
Cybersecurity
CS50 Cybersecurity - Lecture 3 - Securing Software
CS50 Intermediate 2y ago
How to prepare for a career in cybersecurity with no prior experience.
Cybersecurity
How to prepare for a career in cybersecurity with no prior experience.
Coursera Intermediate 2y ago
I Took Over a Microsoft Cloud Account. Again.
Cybersecurity
I Took Over a Microsoft Cloud Account. Again.
John Hammond Intermediate 2y ago
Testing Your Cybersecurity Defenses
Cybersecurity
Testing Your Cybersecurity Defenses
John Hammond Intermediate 2y ago
One Click, $9 Million In Student Debt Erased๐ŸŽ™Darknet Diaries Ep. 139: D3f4ult
Cybersecurity
One Click, $9 Million In Student Debt Erased๐ŸŽ™Darknet Diaries Ep. 139: D3f4ult
Jack Rhysider Intermediate 2y ago
The malware disguised as a Word document
Cybersecurity
The malware disguised as a Word document
Jack Rhysider Intermediate 2y ago
Hacking with Bloodhound: Map Your Environment
Cybersecurity
Hacking with Bloodhound: Map Your Environment
John Hammond Intermediate 2y ago
Weird Security Voyeurs Unite | Host: Ryan Chapman | Guest: Sherrod Degrippo
Cybersecurity
Weird Security Voyeurs Unite | Host: Ryan Chapman | Guest: Sherrod Degrippo
SANS Institute Intermediate 2y ago
they're selling WHAT on Telegram?!?
Cybersecurity
they're selling WHAT on Telegram?!?
John Hammond Intermediate 2y ago
The malware that hides in your Dropbox
Cybersecurity
The malware that hides in your Dropbox
Jack Rhysider Intermediate 2y ago
How Amat Cama hacked Samsung for 3 years straight
Cybersecurity
How Amat Cama hacked Samsung for 3 years straight
Jack Rhysider Intermediate 2y ago
I Stole a Microsoft 365 Account. Here's How.
Cybersecurity
I Stole a Microsoft 365 Account. Here's How.
John Hammond Intermediate 2y ago
this Cybersecurity Platform is FREE
Cybersecurity
this Cybersecurity Platform is FREE
John Hammond Intermediate 2y ago
Hacking Websites: NodeJS Server-Side Template Injection
Cybersecurity
Hacking Websites: NodeJS Server-Side Template Injection
John Hammond Intermediate 2y ago
Jadee Hanson: Balancing CISO, CIO, and Product Leadership
Cybersecurity
Jadee Hanson: Balancing CISO, CIO, and Product Leadership
SANS Institute Intermediate 2y ago
The Russian cyberattack that crippled Ukraine
Cybersecurity
The Russian cyberattack that crippled Ukraine
Jack Rhysider Intermediate 2y ago
Fetch the Flag CTF is Live Right Now
Cybersecurity
Fetch the Flag CTF is Live Right Now
John Hammond Intermediate 2y ago
The 3CX Hack In Retrospect
Cybersecurity
The 3CX Hack In Retrospect
John Hammond Intermediate 2y ago
They Hired Him to Snoop a Target, but Something Felt Very Wrong๐ŸŽ™Darknet Diaries Ep. 99: The Spy
Cybersecurity
They Hired Him to Snoop a Target, but Something Felt Very Wrong๐ŸŽ™Darknet Diaries Ep. 99: The Spy
Jack Rhysider Intermediate 2y ago
Cloud Security with Microsoft 365 Developer Tenants
Cybersecurity
Cloud Security with Microsoft 365 Developer Tenants
John Hammond Intermediate 2y ago
Did the World Bankโ€™s servers get breached?
Cybersecurity
Did the World Bankโ€™s servers get breached?
Jack Rhysider Intermediate 2y ago
RagnarLocker Ransomware Seized by Law Enforcement
Cybersecurity
RagnarLocker Ransomware Seized by Law Enforcement
John Hammond Intermediate 2y ago
Brett Cumming: Saying Yes Led to a Career in Cybersecurity
Cybersecurity
Brett Cumming: Saying Yes Led to a Career in Cybersecurity
SANS Institute Intermediate 2y ago
They Made QR Codes LONGER?!?
Cybersecurity
They Made QR Codes LONGER?!?
John Hammond Intermediate 2y ago
How these hackers won a Tesla using a web browser
Cybersecurity
How these hackers won a Tesla using a web browser
Jack Rhysider Intermediate 2y ago
Building the Security Culture Dream Team | Host: Lance Spitzner | Guest: Molly McLain
Cybersecurity
Building the Security Culture Dream Team | Host: Lance Spitzner | Guest: Molly McLain
SANS Institute Intermediate 2y ago
3 FREE Resources for Cyber Defenders
Cybersecurity
3 FREE Resources for Cyber Defenders
John Hammond Intermediate 2y ago
Kali Linux WiFi Managed Mode (from Monitor mode) : HackerD explains #shorts #wifi #kalilinux
Cybersecurity
Kali Linux WiFi Managed Mode (from Monitor mode) : HackerD explains #shorts #wifi #kalilinux
David Bombal Intermediate 2y ago
Hunting for Hackers with Sigma Rules
Cybersecurity
Hunting for Hackers with Sigma Rules
John Hammond Intermediate 2y ago
How one man took down AT&T's entire network
Cybersecurity
How one man took down AT&T's entire network
Jack Rhysider Intermediate 2y ago
They Took Control of His Phone (and His Life) With a Single Text Message๐ŸŽ™Ep. 97: The Pizza Problem
Cybersecurity
They Took Control of His Phone (and His Life) With a Single Text Message๐ŸŽ™Ep. 97: The Pizza Problem
Jack Rhysider Intermediate 2y ago
Website Vulnerabilities to Fully Hacked Server
Cybersecurity
Website Vulnerabilities to Fully Hacked Server
John Hammond Intermediate 2y ago
Detect Hackers & Malware on your Computer (literally for free)
Cybersecurity
Detect Hackers & Malware on your Computer (literally for free)
John Hammond Intermediate 2y ago
Kali Linux WiFi Monitor Mode: HackerD explains #shorts #wifi #kalilinux
Cybersecurity
Kali Linux WiFi Monitor Mode: HackerD explains #shorts #wifi #kalilinux
David Bombal Intermediate 2y ago
A Small Town Hack Became a Secret Service Forensics Investigation๐ŸŽ™Ep. 96 The Police Station Incident
Cybersecurity
A Small Town Hack Became a Secret Service Forensics Investigation๐ŸŽ™Ep. 96 The Police Station Incident
Jack Rhysider Intermediate 2y ago
How law enforcement caught Alexandre Cazes
Cybersecurity
How law enforcement caught Alexandre Cazes
Jack Rhysider Intermediate 2y ago
Wifi Hacking with a Steam Deck and Kali Linux #shorts #wifi
Cybersecurity
Wifi Hacking with a Steam Deck and Kali Linux #shorts #wifi
David Bombal Intermediate 2y ago
๐Ÿ“š Coursera Courses Opens on Coursera ยท Free to audit
1 / 3 View all โ†’
Verbal Communications and Presentation Skills
๐Ÿ“š Coursera Course โ†—
Self-paced
Verbal Communications and Presentation Skills
Opens on Coursera โ†—
Sรฉcuriser GKE avec Cloud Next Generationย Firewall
๐Ÿ“š Coursera Course โ†—
Self-paced
Sรฉcuriser GKE avec Cloud Next Generationย Firewall
Opens on Coursera โ†—
 An Employee's Guide to Cybersecurity
๐Ÿ“š Coursera Course โ†—
Self-paced
An Employee's Guide to Cybersecurity
Opens on Coursera โ†—
Systems and Application Security
๐Ÿ“š Coursera Course โ†—
Self-paced
Systems and Application Security
Opens on Coursera โ†—
Effective .NET Memory Management
๐Ÿ“š Coursera Course โ†—
Self-paced
Effective .NET Memory Management
Opens on Coursera โ†—
Exploitation and Penetration Testing with Metasploit
๐Ÿ“š Coursera Course โ†—
Self-paced
Exploitation and Penetration Testing with Metasploit
Opens on Coursera โ†—