Tech Skills

Cybersecurity

Ethical hacking, penetration testing, network security, CTFs and defensive security

6392
lessons
Digital PR In 2025: Predictions & The Future Of SEO Link Building? - Interview
Cybersecurity
Digital PR In 2025: Predictions & The Future Of SEO Link Building? - Interview
fatjoe. Beginner 9mo ago
Ethical Hacking Full Course 2026 | Ethical Hacking Course for Beginners | Simplilearn
Cybersecurity
Ethical Hacking Full Course 2026 | Ethical Hacking Course for Beginners | Simplilearn
Simplilearn Beginner 9mo ago
Will this Tiny Chip Change EVERYTHING in Quantum Computing?
Cybersecurity
Will this Tiny Chip Change EVERYTHING in Quantum Computing?
David Bombal Intermediate 9mo ago
HackTheBox - Infiltrator
Cybersecurity
HackTheBox - Infiltrator
IppSec Beginner 9mo ago
Learning to Hack Active Directory Certificate Services (with Shikata!)
Cybersecurity
Learning to Hack Active Directory Certificate Services (with Shikata!)
John Hammond Intermediate 9mo ago
WiFi Myth: Too many people believe this one.
Cybersecurity
WiFi Myth: Too many people believe this one.
David Bombal Intermediate 9mo ago
Cybersecurity Full Course 2025  | Cyber Security Tutorial for Beginners | Cybersecurity | Edureka
Cybersecurity
Cybersecurity Full Course 2025 | Cyber Security Tutorial for Beginners | Cybersecurity | Edureka
edureka! Beginner 9mo ago
Building a Malicious USB Hacking Device for Only $5
Cybersecurity
Building a Malicious USB Hacking Device for Only $5
The Cyber Mentor Beginner 9mo ago
Kernel TLS | The Backend Engineering Show
Cybersecurity
Kernel TLS | The Backend Engineering Show
Hussein Nasser Advanced 9mo ago
Penetration Testing Full Course 2026 | Penetration Testing Tutorial | Pen Testing | Simplilearn
Cybersecurity
Penetration Testing Full Course 2026 | Penetration Testing Tutorial | Pen Testing | Simplilearn
Simplilearn Beginner 10mo ago
Plugging in a Suspicious Mystery USB
Cybersecurity
Plugging in a Suspicious Mystery USB
The Cyber Mentor Beginner 10mo ago
Setting max_connection: Building PostgreSQL user groups that bring people together | POSETTE 2025
Cybersecurity
Setting max_connection: Building PostgreSQL user groups that bring people together | POSETTE 2025
Microsoft Developer Beginner 10mo ago
Learn Phishing!
Cybersecurity
Learn Phishing!
John Hammond Beginner 10mo ago
Top Certifications to Skyrocket Your Career in 2025!
Cybersecurity
Top Certifications to Skyrocket Your Career in 2025!
edureka! Intermediate 10mo ago
Webinar: Systems thinking in practice
Cybersecurity
Webinar: Systems thinking in practice
Saïd Business School, University of Oxford Intermediate 10mo ago
How Pretto Made 200 Employees Happier & More Productive with Zapier
Cybersecurity
How Pretto Made 200 Employees Happier & More Productive with Zapier
Zapier Intermediate 10mo ago
Smart Phone Forensics Circa 2028
Cybersecurity
Smart Phone Forensics Circa 2028
SANS Institute Advanced 10mo ago
LLM SATs FTW
Cybersecurity
LLM SATs FTW
SANS Institute Advanced 10mo ago
Every Cyber Attack Facing America | Incognito Mode | WIRED
Cybersecurity
Every Cyber Attack Facing America | Incognito Mode | WIRED
WIRED Intermediate 10mo ago
Is it time to Stop Trusting VPN Companies? Host Your Own (WireGuard getting started guide)
Cybersecurity
Is it time to Stop Trusting VPN Companies? Host Your Own (WireGuard getting started guide)
David Bombal Beginner 9mo ago
Spooky Action at a Distance #einstein #quantum #computing #cybersecurity
Cybersecurity
Spooky Action at a Distance #einstein #quantum #computing #cybersecurity
David Bombal Intermediate 10mo ago
🔴 LIVE: TCMS CERT TIPS | Interview with an Expert | AMA
Cybersecurity
🔴 LIVE: TCMS CERT TIPS | Interview with an Expert | AMA
The Cyber Mentor Beginner 10mo ago
Fastest Way To Learn Bug Bounty In 2026 | Bug Bounty Roadmap 2026 | CyberSecurity | Simplilearn
Cybersecurity
Fastest Way To Learn Bug Bounty In 2026 | Bug Bounty Roadmap 2026 | CyberSecurity | Simplilearn
Simplilearn Intermediate 10mo ago
Hunting Phishing Kits
Cybersecurity
Hunting Phishing Kits
John Hammond Beginner 10mo ago
Threat Hunting in 3 Easy Steps!
Cybersecurity
Threat Hunting in 3 Easy Steps!
The Cyber Mentor Beginner 10mo ago
Windows Endpoint Telemetry (ft. Jonny Johnson)
Cybersecurity
Windows Endpoint Telemetry (ft. Jonny Johnson)
John Hammond Intermediate 10mo ago
Top Cybersecurity Certifications in 60 Seconds!
Cybersecurity
Top Cybersecurity Certifications in 60 Seconds!
edureka! Beginner 10mo ago
Getting Started with HackTheBox in 2025 | Cheatsheet Inside
Cybersecurity
Getting Started with HackTheBox in 2025 | Cheatsheet Inside
The Cyber Mentor Beginner 10mo ago
Impress Interviewers With This IT Weekend Project!
Cybersecurity
Impress Interviewers With This IT Weekend Project!
The Cyber Mentor Beginner 10mo ago
Which is used by default? #shorts #iphone #android #starlink #vpn
Cybersecurity
Which is used by default? #shorts #iphone #android #starlink #vpn
David Bombal Intermediate 10mo ago
🔴 LIVE: Conti Ransomware | Cybersecurity | TryHackme | AMA
Cybersecurity
🔴 LIVE: Conti Ransomware | Cybersecurity | TryHackme | AMA
The Cyber Mentor Beginner 10mo ago
Best Antiviruses for Cybersecurity in 2026 | Top 10 Antivirus Software | Edureka
Cybersecurity
Best Antiviruses for Cybersecurity in 2026 | Top 10 Antivirus Software | Edureka
edureka! Beginner 10mo ago
What Is ASLR and Why Does It Matter?
Cybersecurity
What Is ASLR and Why Does It Matter?
The Cyber Mentor Beginner 10mo ago
AI Security Demystified
Cybersecurity
AI Security Demystified
SANS Institute Beginner 10mo ago
🔥Top 4 Cybersecurity Certifications You Need! #simplilearn #shorts
Cybersecurity
🔥Top 4 Cybersecurity Certifications You Need! #simplilearn #shorts
Simplilearn Beginner 10mo ago
WiFi Myths ... don't believe this one.
Cybersecurity
WiFi Myths ... don't believe this one.
David Bombal Intermediate 10mo ago
How Hackers Establish Persistence
Cybersecurity
How Hackers Establish Persistence
The Cyber Mentor Beginner 10mo ago
Malware & Hackers Evade Antivirus with Windows Sandbox
Cybersecurity
Malware & Hackers Evade Antivirus with Windows Sandbox
John Hammond Intermediate 10mo ago
Inside Pacific Rim with Ross McKerchar
Cybersecurity
Inside Pacific Rim with Ross McKerchar
SANS Institute Intermediate 10mo ago
Have I been pwned? 😱
Cybersecurity
Have I been pwned? 😱
David Bombal Intermediate 10mo ago
Ethical Hacking Full Course 2026 | Ethical Hacking Course for Beginners | Simplilearn
Cybersecurity
Ethical Hacking Full Course 2026 | Ethical Hacking Course for Beginners | Simplilearn
Simplilearn Beginner 10mo ago
What is SSRF? | Server-Side Request Forgery Explained |  Impact of SSRF Attacks | Edureka
Cybersecurity
What is SSRF? | Server-Side Request Forgery Explained | Impact of SSRF Attacks | Edureka
edureka! Beginner 10mo ago
How Swiss Cheese is Like Cybersecurity
Cybersecurity
How Swiss Cheese is Like Cybersecurity
The Cyber Mentor Beginner 10mo ago
hackers weaponize... really long filenames??
Cybersecurity
hackers weaponize... really long filenames??
John Hammond Intermediate 10mo ago
LIVE: HackTheBox | Pentesting | AppSec | Cybersecurity
Cybersecurity
LIVE: HackTheBox | Pentesting | AppSec | Cybersecurity
The Cyber Mentor Beginner 10mo ago
How Bad Characters Can Hold Your Exploits Back!
Cybersecurity
How Bad Characters Can Hold Your Exploits Back!
The Cyber Mentor Beginner 10mo ago
Keynote | How to Become a CISO
Cybersecurity
Keynote | How to Become a CISO
SANS Institute Intermediate 10mo ago
Believing in Yourself to Lead Your Team
Cybersecurity
Believing in Yourself to Lead Your Team
SANS Institute Beginner 10mo ago
📚 Coursera Courses Opens on Coursera · Free to audit
1 / 3 View all →
Analyze Network Traffic with TCPDump: Build a Logging Tool
📚 Coursera Course ↗
Self-paced
Analyze Network Traffic with TCPDump: Build a Logging Tool
Opens on Coursera ↗
LPIC-2 Linux Engineer (202-450)
📚 Coursera Course ↗
Self-paced
LPIC-2 Linux Engineer (202-450)
Opens on Coursera ↗
Cybersecurity Capstone Project
📚 Coursera Course ↗
Self-paced
Cybersecurity Capstone Project
Opens on Coursera ↗
Pentesting Fundamentals for Beginners
📚 Coursera Course ↗
Self-paced
Pentesting Fundamentals for Beginners
Opens on Coursera ↗
Vulnerability Scanning with Nmap: Network Scanning
📚 Coursera Course ↗
Self-paced
Vulnerability Scanning with Nmap: Network Scanning
Opens on Coursera ↗
Network Defense Essentials: Hands-On Edition
📚 Coursera Course ↗
Self-paced
Network Defense Essentials: Hands-On Edition
Opens on Coursera ↗