Tech Skills

Cybersecurity

Ethical hacking, penetration testing, network security, CTFs and defensive security

2561
lessons
The Penetration Test That Went Horribly Wrong๐ŸŽ™Darknet Diaries Ep. 95: Jon & Brian's Big Adventure
Cybersecurity
The Penetration Test That Went Horribly Wrong๐ŸŽ™Darknet Diaries Ep. 95: Jon & Brian's Big Adventure
Jack Rhysider Intermediate 2y ago
New "Dark Web" Generative AI Chatbots?!
Cybersecurity
New "Dark Web" Generative AI Chatbots?!
John Hammond Intermediate 2y ago
Your Windows Passwords ๐Ÿ˜ฑ #shorts #windows
Cybersecurity
Your Windows Passwords ๐Ÿ˜ฑ #shorts #windows
David Bombal Intermediate 2y ago
The Economic Case for Generative AI with a16z's Martin Casado
Cybersecurity
The Economic Case for Generative AI with a16z's Martin Casado
a16z Intermediate 2y ago
How "Mimikatz" works
Cybersecurity
How "Mimikatz" works
Jack Rhysider Intermediate 2y ago
Cybersecurity Roadmap 2023 ! #cybersecurity
Cybersecurity
Cybersecurity Roadmap 2023 ! #cybersecurity
Shweta Intermediate 2y ago
How To Pivot Through a Network with Chisel
Cybersecurity
How To Pivot Through a Network with Chisel
John Hammond Intermediate 2y ago
AI for Good Specialization: Learn AI's role in addressing real-world challenges
Cybersecurity
AI for Good Specialization: Learn AI's role in addressing real-world challenges
DeepLearningAI Intermediate 2y ago
Phases in Cybersecurity  | Cybersecurity Training | Edureka | Cybersecurity Rewind - 2
Cybersecurity
Phases in Cybersecurity | Cybersecurity Training | Edureka | Cybersecurity Rewind - 2
edureka! Intermediate 2y ago
Flipper Zero vs Alarm? (will the Bike alarm stop it?) #shorts
Cybersecurity
Flipper Zero vs Alarm? (will the Bike alarm stop it?) #shorts
David Bombal Intermediate 2y ago
Seasonal Cycle Embodied, with Deborah Woolf
Cybersecurity
Seasonal Cycle Embodied, with Deborah Woolf
TCM Academy Intermediate 2y ago
I Learned How To Hack WiFi In 2 Days...
Cybersecurity
I Learned How To Hack WiFi In 2 Days...
Tech With Tim Intermediate 2y ago
Bonus Episode: What does it take to author a cybersecurity book?
Cybersecurity
Bonus Episode: What does it take to author a cybersecurity book?
SANS Institute Intermediate 2y ago
Cyber Leadership Analogies and Metaphors
Cybersecurity
Cyber Leadership Analogies and Metaphors
SANS Institute Intermediate 2y ago
How to Stop an Army of 14 Million Zombie Computers๐ŸŽ™Darknet Diaries Ep. 94: Mariposa Botnet
Cybersecurity
How to Stop an Army of 14 Million Zombie Computers๐ŸŽ™Darknet Diaries Ep. 94: Mariposa Botnet
Jack Rhysider Intermediate 2y ago
India hacks Pakistani websites post-terrorist attack
Cybersecurity
India hacks Pakistani websites post-terrorist attack
Jack Rhysider Intermediate 2y ago
This scammer milked Facebook for millions
Cybersecurity
This scammer milked Facebook for millions
Jack Rhysider Intermediate 2y ago
OneCoin exposed as the biggest crypto scam!
Cybersecurity
OneCoin exposed as the biggest crypto scam!
Jack Rhysider Intermediate 2y ago
Classify Malware with YARA
Cybersecurity
Classify Malware with YARA
John Hammond Intermediate 2y ago
They made $2.5 million a week holding companies hostage
Cybersecurity
They made $2.5 million a week holding companies hostage
Jack Rhysider Intermediate 2y ago
Blackmail, Moles, and Awful Passwords: Defending the World Bank from Hackers๐ŸŽ™Ep. 91: webjedi
Cybersecurity
Blackmail, Moles, and Awful Passwords: Defending the World Bank from Hackers๐ŸŽ™Ep. 91: webjedi
Jack Rhysider Intermediate 2y ago
Your Computer could be For Sale on the Dark Web
Cybersecurity
Your Computer could be For Sale on the Dark Web
John Hammond Intermediate 2y ago
When She Can't Hack the Lock, She Hacks the Security Guard๐ŸŽ™Darknet Diaries Ep. 90: Jenny
Cybersecurity
When She Can't Hack the Lock, She Hacks the Security Guard๐ŸŽ™Darknet Diaries Ep. 90: Jenny
Jack Rhysider Intermediate 2y ago
Why did the FBI pay $1 million to hack this iPhone?
Cybersecurity
Why did the FBI pay $1 million to hack this iPhone?
Jack Rhysider Intermediate 2y ago
The 3 types of hackers
Cybersecurity
The 3 types of hackers
Jack Rhysider Intermediate 2y ago
Not All ZIP Files Are Equal
Cybersecurity
Not All ZIP Files Are Equal
John Hammond Intermediate 2y ago
Flipper Zero WiFi Hacking (Fake WiFi networks) #shorts
Cybersecurity
Flipper Zero WiFi Hacking (Fake WiFi networks) #shorts
David Bombal Intermediate 2y ago
How I Logged Into Donald Trump's Twitter Account (Again)๐ŸŽ™Darknet Diaries Ep. 88: Victor
Cybersecurity
How I Logged Into Donald Trump's Twitter Account (Again)๐ŸŽ™Darknet Diaries Ep. 88: Victor
Jack Rhysider Intermediate 2y ago
Flipper Zero WiFi Hacking (Rogue AP) #shorts
Cybersecurity
Flipper Zero WiFi Hacking (Rogue AP) #shorts
David Bombal Intermediate 2y ago
Capture the Flag at Blackhat USA 2023!
Cybersecurity
Capture the Flag at Blackhat USA 2023!
John Hammond Intermediate 2y ago
Books! Books! Books! Which author should I interview? #shorts
Cybersecurity
Books! Books! Books! Which author should I interview? #shorts
David Bombal Intermediate 2y ago
How We Hacked Donald Trump's Twitter Account๐ŸŽ™Darknet Diaries Ep. 87: Guild of the Grumpy Old Hackers
Cybersecurity
How We Hacked Donald Trump's Twitter Account๐ŸŽ™Darknet Diaries Ep. 87: Guild of the Grumpy Old Hackers
Jack Rhysider Intermediate 2y ago
Flipper Zero RFID Fuzzer (Fuzz RFID) #shorts
Cybersecurity
Flipper Zero RFID Fuzzer (Fuzz RFID) #shorts
David Bombal Intermediate 2y ago
Telegram Cybercrime is INSANE
Cybersecurity
Telegram Cybercrime is INSANE
John Hammond Intermediate 2y ago
Your Social Accounts Are Never Safe, Even If You Use Great Passwords๐ŸŽ™Ep. 86 The LinkedIn Incident
Cybersecurity
Your Social Accounts Are Never Safe, Even If You Use Great Passwords๐ŸŽ™Ep. 86 The LinkedIn Incident
Jack Rhysider Intermediate 2y ago
Flipper Zero WiFi Hacking #shorts
Cybersecurity
Flipper Zero WiFi Hacking #shorts
David Bombal Intermediate 2y ago
He Made $5K a Day in High School With This Risky ID Scam๐ŸŽ™Darknet Diaries Ep. 85: Cam the Carder
Cybersecurity
He Made $5K a Day in High School With This Risky ID Scam๐ŸŽ™Darknet Diaries Ep. 85: Cam the Carder
Jack Rhysider Intermediate 2y ago
loveletterforyou.txt tricked a LOT of people back in 2000
Cybersecurity
loveletterforyou.txt tricked a LOT of people back in 2000
Jack Rhysider Intermediate 2y ago
Strategies of a World-Class SOC | Host: John Hubbard | July 18, 2023
Cybersecurity
Strategies of a World-Class SOC | Host: John Hubbard | July 18, 2023
SANS Institute Intermediate 2y ago
Strategy 11: Turn up the Volume by Expanding SOC Functionality
Cybersecurity
Strategy 11: Turn up the Volume by Expanding SOC Functionality
SANS Institute Intermediate 2y ago
Insider Risk & Generative AI
Cybersecurity
Insider Risk & Generative AI
SANS Institute Intermediate 2y ago
Preserving Creativity and the Ethical Implications of AI Art Generators
Cybersecurity
Preserving Creativity and the Ethical Implications of AI Art Generators
SANS Institute Intermediate 2y ago
Navigating the Impact of Emerging Tech on Education: A Teen's Perspective on AI and Cybersecurity
Cybersecurity
Navigating the Impact of Emerging Tech on Education: A Teen's Perspective on AI and Cybersecurity
SANS Institute Intermediate 2y ago
AI and Its Impact on Cybersecurity
Cybersecurity
AI and Its Impact on Cybersecurity
SANS Institute Intermediate 2y ago
New to Cyber: AI-Powered Careers
Cybersecurity
New to Cyber: AI-Powered Careers
SANS Institute Intermediate 2y ago
Addressing Practical and Ethical Issues in AI-Assisted Threat Intelligence Analysis
Cybersecurity
Addressing Practical and Ethical Issues in AI-Assisted Threat Intelligence Analysis
SANS Institute Intermediate 2y ago
Mass Digital Forensics & Incident Response with Velociraptor
Cybersecurity
Mass Digital Forensics & Incident Response with Velociraptor
John Hammond Intermediate 2y ago
If they can't hack your password, maybe they can buy it
Cybersecurity
If they can't hack your password, maybe they can buy it
Jack Rhysider Intermediate 2y ago
๐Ÿ“š Coursera Courses Opens on Coursera ยท Free to audit
1 / 3 View all โ†’
Network Implementations and Operations
๐Ÿ“š Coursera Course โ†—
Self-paced
Network Implementations and Operations
Opens on Coursera โ†—
Rust Secret Cipher CLI
๐Ÿ“š Coursera Course โ†—
Self-paced
Rust Secret Cipher CLI
Opens on Coursera โ†—
Cybersecurity Operations and Controls
๐Ÿ“š Coursera Course โ†—
Self-paced
Cybersecurity Operations and Controls
Opens on Coursera โ†—
Introduction to Software-Defined (SD) Branch
๐Ÿ“š Coursera Course โ†—
Self-paced
Introduction to Software-Defined (SD) Branch
Opens on Coursera โ†—
Linux Security Basics and Beyond: Unit 4
๐Ÿ“š Coursera Course โ†—
Self-paced
Linux Security Basics and Beyond: Unit 4
Opens on Coursera โ†—
Cryptography: Learn Public Key Infrastructure from Scratch
๐Ÿ“š Coursera Course โ†—
Self-paced
Cryptography: Learn Public Key Infrastructure from Scratch
Opens on Coursera โ†—