✕ Clear filters
502 lessons

Intermediate Lessons

Curated from top practitioners. Filtered, not flooded.

All ▶ YouTube 184,672📚 Coursera 16,312
Unpacking Code for CTF Challenges: Create Your Dirty Image
Cybersecurity
Unpacking Code for CTF Challenges: Create Your Dirty Image
John Hammond Intermediate 1y ago
Preventing Session Hijacking: Essential Cybersecurity Strategies
Cybersecurity
Preventing Session Hijacking: Essential Cybersecurity Strategies
John Hammond Intermediate 1y ago
Unlocking Secrets: Hacking With InfoStealer Malware
Cybersecurity
Unlocking Secrets: Hacking With InfoStealer Malware
John Hammond Intermediate 1y ago
Hacking a Reddit Account: A Step-by-Step Demonstration
Cybersecurity
Hacking a Reddit Account: A Step-by-Step Demonstration
John Hammond Intermediate 1y ago
Exploring Docker: Downloading and Testing Build Scripts
AI Safety & Ethics
Exploring Docker: Downloading and Testing Build Scripts
John Hammond Intermediate 1y ago
Stop Session Hijacking: Protect Your Accounts Now!
AI Safety & Ethics
Stop Session Hijacking: Protect Your Accounts Now!
John Hammond Intermediate 1y ago
Mastering Token Access: Uncovering Microsoft Graph API Secrets
Large Language Models
Mastering Token Access: Uncovering Microsoft Graph API Secrets
John Hammond Intermediate 1y ago
Unlocking Docker Inside Docker: The DIND Revolution
AI Safety & Ethics
Unlocking Docker Inside Docker: The DIND Revolution
John Hammond Intermediate 1y ago
Social Engineering: Accessing Microsoft Graph API Secrets
AI News & Updates
Social Engineering: Accessing Microsoft Graph API Secrets
John Hammond Intermediate 1y ago
Mastering Docker: Build Your Own Authentication & Registry Service
AI Safety & Ethics
Mastering Docker: Build Your Own Authentication & Registry Service
John Hammond Intermediate 1y ago
Unlocking the Secrets of Docker: A Creative Journey
AI Safety & Ethics
Unlocking the Secrets of Docker: A Creative Journey
John Hammond Intermediate 1y ago
Unlocking Service User Secrets: Bypassing Authentication Flaws
AI Safety & Ethics
Unlocking Service User Secrets: Bypassing Authentication Flaws
John Hammond Intermediate 1y ago
Master Docker Images with Scopio: Simplify Your Workflow
AI Tools & Apps
Master Docker Images with Scopio: Simplify Your Workflow
John Hammond Intermediate 1y ago
Linux Challenges for Holiday Hacking
Cybersecurity
Linux Challenges for Holiday Hacking
John Hammond Intermediate 1y ago
Inside the Registry Challenge: CTF Zone Finals 2024
Cybersecurity
Inside the Registry Challenge: CTF Zone Finals 2024
John Hammond Intermediate 1y ago
From Novice to Pro: Unleashing Hacking Genius
Cybersecurity
From Novice to Pro: Unleashing Hacking Genius
John Hammond Intermediate 1y ago
Unlock Your Cybersecurity Potential with Hands-On Labs
Cybersecurity
Unlock Your Cybersecurity Potential with Hands-On Labs
John Hammond Intermediate 1y ago
Unlocking Privilege Escalation in EntraID: The Essentials
Cybersecurity
Unlocking Privilege Escalation in EntraID: The Essentials
John Hammond Intermediate 1y ago
Exposing Vulnerabilities in EntraID: Ethical Hacking Insights
Cybersecurity
Exposing Vulnerabilities in EntraID: Ethical Hacking Insights
John Hammond Intermediate 1y ago
Hacking Everyday Items: The Truth Behind Suitcase Locks
Cybersecurity
Hacking Everyday Items: The Truth Behind Suitcase Locks
John Hammond Intermediate 1y ago
Exciting New Game Releases and Holiday Fun!
AI News & Updates
Exciting New Game Releases and Holiday Fun!
John Hammond Intermediate 1y ago
Hacking Microsoft 365: Maintain Access Like a Pro
AI News & Updates
Hacking Microsoft 365: Maintain Access Like a Pro
John Hammond Intermediate 1y ago
Microsoft Graph API
AI News & Updates
Microsoft Graph API
John Hammond Intermediate 1y ago
Staged Releases in SANS HHC
AI News & Updates
Staged Releases in SANS HHC
John Hammond Intermediate 1y ago
Collaborative Hacking with HHC 2024
Cybersecurity
Collaborative Hacking with HHC 2024
John Hammond Intermediate 1y ago
A Holiday Hacking Dream
Cybersecurity
A Holiday Hacking Dream
John Hammond Intermediate 1y ago
Scan QR Codes on Linux
AI Safety & Ethics
Scan QR Codes on Linux
John Hammond Intermediate 1y ago
QR Codes on Linux
AI Safety & Ethics
QR Codes on Linux
John Hammond Intermediate 1y ago
Decode Hex on Linux
AI Safety & Ethics
Decode Hex on Linux
John Hammond Intermediate 1y ago
How Hackers Compromise BIG Networks (with NetExec)
Cybersecurity
How Hackers Compromise BIG Networks (with NetExec)
John Hammond Intermediate 2y ago
The Apex Legends Hack.
Cybersecurity
The Apex Legends Hack.
John Hammond Intermediate 2y ago
Finding WEIRD Typosquatting Websites
Cybersecurity
Finding WEIRD Typosquatting Websites
John Hammond Intermediate 2y ago
The Secrets of The Tor Browser
Cybersecurity
The Secrets of The Tor Browser
John Hammond Intermediate 2y ago
Can a PDF File be Malware?
Cybersecurity
Can a PDF File be Malware?
John Hammond Intermediate 2y ago
Free Coding Tool Distributes Malware
Cybersecurity
Free Coding Tool Distributes Malware
John Hammond Intermediate 2y ago
Notepad.exe Will Snitch On You (full coding project)
Cybersecurity
Notepad.exe Will Snitch On You (full coding project)
John Hammond Intermediate 2y ago
One Code Mistake Ruined This Website
Cybersecurity
One Code Mistake Ruined This Website
John Hammond Intermediate 2y ago
Tracking Cybercrime on Telegram
Cybersecurity
Tracking Cybercrime on Telegram
John Hammond Intermediate 2y ago
Don't Forget This One Hacking Trick
Cybersecurity
Don't Forget This One Hacking Trick
John Hammond Intermediate 2y ago
SMB Shares & Cronjob to Initial Access (Proving Grounds: Dawn)
Cybersecurity
SMB Shares & Cronjob to Initial Access (Proving Grounds: Dawn)
John Hammond Intermediate 2y ago
Enterprise security one step at a time
Cybersecurity
Enterprise security one step at a time
John Hammond Intermediate 2y ago
I AUTOMATED a Penetration Test!?
Cybersecurity
I AUTOMATED a Penetration Test!?
John Hammond Intermediate 2y ago
Healthcare Software Exploit: CVE-2023-43208
Cybersecurity
Healthcare Software Exploit: CVE-2023-43208
John Hammond Intermediate 2y ago
Run this script with Eval
Cybersecurity
Run this script with Eval
John Hammond Intermediate 2y ago
Debug with JS-Beautify
Cybersecurity
Debug with JS-Beautify
John Hammond Intermediate 2y ago
Debug with Visual Studio
Cybersecurity
Debug with Visual Studio
John Hammond Intermediate 2y ago
Exploring the BIGGEST SCAMS in the Dark Web
Cybersecurity
Exploring the BIGGEST SCAMS in the Dark Web
John Hammond Intermediate 2y ago
Welcome back, Ryan Chapman
Cybersecurity
Welcome back, Ryan Chapman
John Hammond Intermediate 2y ago
📚 Coursera Courses Opens on Coursera · Free to audit
1 / 3 View all →
Regression Analysis
📚 Coursera Course ↗
Self-paced
Regression Analysis
Opens on Coursera ↗
Erstelle Social Media Anzeigen in Canva
📚 Coursera Course ↗
Self-paced
Erstelle Social Media Anzeigen in Canva
Opens on Coursera ↗
Basic Math: Derivatives
📚 Coursera Course ↗
Self-paced
Basic Math: Derivatives
Opens on Coursera ↗
How to design Facebook and IG stories using Canva
📚 Coursera Course ↗
Self-paced
How to design Facebook and IG stories using Canva
Opens on Coursera ↗
Software Engineering: Modeling Software Systems using UML
📚 Coursera Course ↗
Self-paced
Software Engineering: Modeling Software Systems using UML
Opens on Coursera ↗
Crea equipos y trabaja en grupos con Canva
📚 Coursera Course ↗
Self-paced
Crea equipos y trabaja en grupos con Canva
Opens on Coursera ↗