Tech Skills

Cybersecurity

Ethical hacking, penetration testing, network security, CTFs and defensive security

2561
lessons
The FBI monitors criminals through their phones
Cybersecurity
The FBI monitors criminals through their phones
Jack Rhysider Intermediate 1y ago
WiFi WPA2/WPA3 Wireshark Capture #shorts #wifi #wpa2 #iphone #android
Cybersecurity
WiFi WPA2/WPA3 Wireshark Capture #shorts #wifi #wpa2 #iphone #android
David Bombal Intermediate 1y ago
The Phone with decoy apps and secret chats
Cybersecurity
The Phone with decoy apps and secret chats
Jack Rhysider Intermediate 1y ago
New Way Now: Pfizer is reshaping its security DNA with Google Cloud
Cybersecurity
New Way Now: Pfizer is reshaping its security DNA with Google Cloud
Google Cloud Intermediate 1y ago
Kali Linux Rust install (latest version) #shorts #kalilinux #linux #rust
Cybersecurity
Kali Linux Rust install (latest version) #shorts #kalilinux #linux #rust
David Bombal Intermediate 1y ago
A Winning Partnership in Cybersecurity Talent Development
Cybersecurity
A Winning Partnership in Cybersecurity Talent Development
SANS Institute Intermediate 1y ago
Hacking Tools
Cybersecurity
Hacking Tools
NetworkChuck Intermediate 1y ago
You need these skills to become a hacker
Cybersecurity
You need these skills to become a hacker
NetworkChuck Intermediate 1y ago
Keynote | Thriving Together: Empowering Neurodivergent Individuals in the Workplace
Cybersecurity
Keynote | Thriving Together: Empowering Neurodivergent Individuals in the Workplace
SANS Institute Intermediate 1y ago
Simplified Google Cloud network security: Zero-trust and beyond
Cybersecurity
Simplified Google Cloud network security: Zero-trust and beyond
Google Cloud Tech Intermediate 1y ago
📍 Fake Address for Rank & Rent 🤔 Here's How to Future Proof It! #shorts
Cybersecurity
📍 Fake Address for Rank & Rent 🤔 Here's How to Future Proof It! #shorts
Jacky Chou from Indexsy Intermediate 1y ago
1000 Players - One Game of Doom
Cybersecurity
1000 Players - One Game of Doom
ThePrimeagen Intermediate 1y ago
Your Samsung Smart TV is spying on you
Cybersecurity
Your Samsung Smart TV is spying on you
Jack Rhysider Intermediate 1y ago
Gamers are losing money to crypto scams
Cybersecurity
Gamers are losing money to crypto scams
Jack Rhysider Intermediate 1y ago
Axie Infinity HACKED for $625 Million
Cybersecurity
Axie Infinity HACKED for $625 Million
Jack Rhysider Intermediate 1y ago
Is that link safe to click? #shorts #privacy #iphone #android #vpn
Cybersecurity
Is that link safe to click? #shorts #privacy #iphone #android #vpn
David Bombal Intermediate 1y ago
Do you want to see my IP address? #shorts #iphone #android #starlink #vpn
Cybersecurity
Do you want to see my IP address? #shorts #iphone #android #starlink #vpn
David Bombal Intermediate 1y ago
True story: They banned him from using a computer ... that didn't stop him #shorts #linux
Cybersecurity
True story: They banned him from using a computer ... that didn't stop him #shorts #linux
David Bombal Intermediate 1y ago
Cracking WiFi WPA2 Handshakes (And does it work with WPA3?)
Cybersecurity
Cracking WiFi WPA2 Handshakes (And does it work with WPA3?)
David Bombal Intermediate 1y ago
Hacking Ninja’s PayPal
Cybersecurity
Hacking Ninja’s PayPal
Jack Rhysider Intermediate 1y ago
Buying stolen social media accounts
Cybersecurity
Buying stolen social media accounts
Jack Rhysider Intermediate 1y ago
I’m OK, You’re OK, We’re OK: Living with AD(H)D in InfoSec
Cybersecurity
I’m OK, You’re OK, We’re OK: Living with AD(H)D in InfoSec
SANS Institute Intermediate 1y ago
How to transition from feeling overwhelmed to achieving hyperfocus in 45 minutes or less
Cybersecurity
How to transition from feeling overwhelmed to achieving hyperfocus in 45 minutes or less
SANS Institute Intermediate 1y ago
Inclusive Cybersecurity: Bridging the Accessibility Gap for People with Disabilities
Cybersecurity
Inclusive Cybersecurity: Bridging the Accessibility Gap for People with Disabilities
SANS Institute Intermediate 1y ago
Strategies for retaining and advancing neurodivergent employees in Cybersecurity
Cybersecurity
Strategies for retaining and advancing neurodivergent employees in Cybersecurity
SANS Institute Intermediate 1y ago
The incident that got a robot arrested
Cybersecurity
The incident that got a robot arrested
Jack Rhysider Intermediate 1y ago
Should modding video game consoles be legal?
Cybersecurity
Should modding video game consoles be legal?
Jack Rhysider Intermediate 1y ago
The war between cheaters and game developers
Cybersecurity
The war between cheaters and game developers
Jack Rhysider Intermediate 1y ago
They took his computer. That didn't stop him from hacking Rockstar Games and leaking GTA 6
Cybersecurity
They took his computer. That didn't stop him from hacking Rockstar Games and leaking GTA 6
David Bombal Intermediate 1y ago
How Riot Games catches League of Legends cheaters
Cybersecurity
How Riot Games catches League of Legends cheaters
Jack Rhysider Intermediate 1y ago
How a kid hacked a mobile farming game
Cybersecurity
How a kid hacked a mobile farming game
Jack Rhysider Intermediate 1y ago
The biggest video game cheat operation
Cybersecurity
The biggest video game cheat operation
Jack Rhysider Intermediate 1y ago
Ubisoft sues 17-year-old for selling cheats
Cybersecurity
Ubisoft sues 17-year-old for selling cheats
Jack Rhysider Intermediate 1y ago
Your webcam is at risk
Cybersecurity
Your webcam is at risk
Jack Rhysider Intermediate 1y ago
Never store your passwords & keys like this! #shorts #passwords #cybersecurity
Cybersecurity
Never store your passwords & keys like this! #shorts #passwords #cybersecurity
David Bombal Intermediate 1y ago
The ad malware scam
Cybersecurity
The ad malware scam
Jack Rhysider Intermediate 1y ago
The mod that hacked into Sony's PlayStation
Cybersecurity
The mod that hacked into Sony's PlayStation
Jack Rhysider Intermediate 1y ago
Russia Hacked the US Elections?
Cybersecurity
Russia Hacked the US Elections?
Jack Rhysider Intermediate 1y ago
North Korean Hackers Targeting American Comedies
Cybersecurity
North Korean Hackers Targeting American Comedies
Jack Rhysider Intermediate 1y ago
How US forces crippled ISIS computers
Cybersecurity
How US forces crippled ISIS computers
Jack Rhysider Intermediate 1y ago
What’s worse than TikTok's data collection?
Cybersecurity
What’s worse than TikTok's data collection?
Jack Rhysider Intermediate 1y ago
How North Korea led the largest crypto heist in history
Cybersecurity
How North Korea led the largest crypto heist in history
Jack Rhysider Intermediate 1y ago
Will AI replace Cybersecurity professionals? Tom from Spunk replies. #shorts #AI #cybersecurity
Cybersecurity
Will AI replace Cybersecurity professionals? Tom from Spunk replies. #shorts #AI #cybersecurity
David Bombal Intermediate 1y ago
The cheat device that snuck onto Nintendo's platform
Cybersecurity
The cheat device that snuck onto Nintendo's platform
Jack Rhysider Intermediate 1y ago
$25 million lost to AI impersonation scam
Cybersecurity
$25 million lost to AI impersonation scam
Jack Rhysider Intermediate 1y ago
Keynote | Challenges and Opportunities for Modern CISOs
Cybersecurity
Keynote | Challenges and Opportunities for Modern CISOs
SANS Institute Intermediate 1y ago
Leading Without Authority: Leadership Beyond Titles
Cybersecurity
Leading Without Authority: Leadership Beyond Titles
SANS Institute Intermediate 1y ago
"For criminals, by criminals:" How the FBI Tried to Wire Tap the World🎙Darknet Diaries Ep 146: ANOM
Cybersecurity
"For criminals, by criminals:" How the FBI Tried to Wire Tap the World🎙Darknet Diaries Ep 146: ANOM
Jack Rhysider Intermediate 1y ago
📚 Coursera Courses Opens on Coursera · Free to audit
1 / 3 View all →
Leading Teams Effectively: Skills for Impactful Leadership
📚 Coursera Course ↗
Self-paced
Leading Teams Effectively: Skills for Impactful Leadership
Opens on Coursera ↗
AWS Developer: Unit 2
📚 Coursera Course ↗
Self-paced
AWS Developer: Unit 2
Opens on Coursera ↗
Cybersecurity and the X-Factor
📚 Coursera Course ↗
Self-paced
Cybersecurity and the X-Factor
Opens on Coursera ↗
Penetration Testing, Threat Hunting, and Cryptography
📚 Coursera Course ↗
Self-paced
Penetration Testing, Threat Hunting, and Cryptography
Opens on Coursera ↗
Sécuriser des réseaux VPC - Cloud Next Generation Firewall
📚 Coursera Course ↗
Self-paced
Sécuriser des réseaux VPC - Cloud Next Generation Firewall
Opens on Coursera ↗
Generative AI: Boost Your Cybersecurity Career
📚 Coursera Course ↗
Self-paced
Generative AI: Boost Your Cybersecurity Career
Opens on Coursera ↗