✕ Clear filters
816 lessons

🔐 Cybersecurity

Ethical hacking, penetration testing, network security, CTFs and defensive security

All ▶ YouTube 184,629📚 Coursera 16,303
HTTP Cookies | "Cookie Monster" TJCTF 2018
Cybersecurity
HTTP Cookies | "Cookie Monster" TJCTF 2018
John Hammond Intermediate 7y ago
HTML Source Code | "Blank" TJCTF 2018
Cybersecurity
HTML Source Code | "Blank" TJCTF 2018
John Hammond Intermediate 7y ago
Infinite JavaScript Scrolling | "Moar Horses" TJCTF 2018
Cybersecurity
Infinite JavaScript Scrolling | "Moar Horses" TJCTF 2018
John Hammond Intermediate 7y ago
Uncommon SQL Injection | "Ess Kyoo Ell" TJCTF 2018
Cybersecurity
Uncommon SQL Injection | "Ess Kyoo Ell" TJCTF 2018
John Hammond Intermediate 7y ago
RSA Cryptography | "Classic" TJCTF 2018
Cybersecurity
RSA Cryptography | "Classic" TJCTF 2018
John Hammond Intermediate 7y ago
PicoCTF 2017 [33] A Thing Called the Stack
Cybersecurity
PicoCTF 2017 [33] A Thing Called the Stack
John Hammond Intermediate 7y ago
How Did You Get Into Programming?
Cybersecurity
How Did You Get Into Programming?
John Hammond Intermediate 7y ago
USB Devices in Wireshark | PicoCTF 2017 [29] Just Keyp Trying
Cybersecurity
USB Devices in Wireshark | PicoCTF 2017 [29] Just Keyp Trying
John Hammond Intermediate 7y ago
Port Knocking Attack | Ryan's CTF [17] Knock-Knock FINALE
Cybersecurity
Port Knocking Attack | Ryan's CTF [17] Knock-Knock FINALE
John Hammond Intermediate 7y ago
PCAP Manipulation | Ryan's CTF [16] Custom Encoded Data
Cybersecurity
PCAP Manipulation | Ryan's CTF [16] Custom Encoded Data
John Hammond Intermediate 7y ago
Sudo ltrace | Ryan's CTF [15] Strings wont help you
Cybersecurity
Sudo ltrace | Ryan's CTF [15] Strings wont help you
John Hammond Intermediate 7y ago
Embedded GZIP | Ryan's CTF [14] Mystery File
Cybersecurity
Embedded GZIP | Ryan's CTF [14] Mystery File
John Hammond Intermediate 7y ago
BASIC Buffer Overflow | Ryan's CTF [13] Everyday I'm Bufferin
Cybersecurity
BASIC Buffer Overflow | Ryan's CTF [13] Everyday I'm Bufferin
John Hammond Intermediate 7y ago
Command Injection | Ryan's CTF [12] Input Validation
Cybersecurity
Command Injection | Ryan's CTF [12] Input Validation
John Hammond Intermediate 7y ago
ALIAS Commands | Ryan's CTF [11] Find Flag Again
Cybersecurity
ALIAS Commands | Ryan's CTF [11] Find Flag Again
John Hammond Intermediate 7y ago
Reversing Android APK | Ryan's CTF [10] These are not the droids
Cybersecurity
Reversing Android APK | Ryan's CTF [10] These are not the droids
John Hammond Intermediate 7y ago
Binary ltrace | Ryan's CTF [08] What's the password?
Cybersecurity
Binary ltrace | Ryan's CTF [08] What's the password?
John Hammond Intermediate 7y ago
Image Strings | Ryan's CTF [07] "Stenography"
Cybersecurity
Image Strings | Ryan's CTF [07] "Stenography"
John Hammond Intermediate 7y ago
VIM Shell | Ryan's CTF [06] Escape the Jail
Cybersecurity
VIM Shell | Ryan's CTF [06] Escape the Jail
John Hammond Intermediate 7y ago
HTTP Authentication | Ryan's CTF [04] Encoded Credentials
Cybersecurity
HTTP Authentication | Ryan's CTF [04] Encoded Credentials
John Hammond Intermediate 7y ago
PATH Environment Variable | Ryan's CTF [09] Find the Flag
Cybersecurity
PATH Environment Variable | Ryan's CTF [09] Find the Flag
John Hammond Intermediate 7y ago
Simple MD5 Hash Cracking | Ryan's CTF [03] Crack That Hash
Cybersecurity
Simple MD5 Hash Cracking | Ryan's CTF [03] Crack That Hash
John Hammond Beginner 7y ago
Ryan's CTF [02] FTP File Transfer
Cybersecurity
Ryan's CTF [02] FTP File Transfer
John Hammond Intermediate 7y ago
Ryan's CTF [01] Hidden Web Flag
Cybersecurity
Ryan's CTF [01] Hidden Web Flag
John Hammond Intermediate 7y ago
FULL 2 HOUR Ryan's CTF
Cybersecurity
FULL 2 HOUR Ryan's CTF
John Hammond Intermediate 7y ago
Ryan's CTF TIMELAPSE
Cybersecurity
Ryan's CTF TIMELAPSE
John Hammond Intermediate 7y ago
Git/Linux Hacking | Bandit: OverTheWire (Level 32)
Cybersecurity
Git/Linux Hacking | Bandit: OverTheWire (Level 32)
John Hammond Intermediate 7y ago
Git/Linux Hacking | Bandit: OverTheWire (Level 31)
Cybersecurity
Git/Linux Hacking | Bandit: OverTheWire (Level 31)
John Hammond Intermediate 7y ago
Git/Linux Hacking | Bandit: OverTheWire (Level 30)
Cybersecurity
Git/Linux Hacking | Bandit: OverTheWire (Level 30)
John Hammond Intermediate 7y ago
Git/Linux Hacking | Bandit: OverTheWire (Level 29)
Cybersecurity
Git/Linux Hacking | Bandit: OverTheWire (Level 29)
John Hammond Intermediate 7y ago
NEW LEVELS [Git Hacking] Bandit: OverTheWire (Levels 26-28)
Cybersecurity
NEW LEVELS [Git Hacking] Bandit: OverTheWire (Levels 26-28)
John Hammond Intermediate 7y ago
Learning Cryptography: PicoCTF 2017 [16] Substitution
Cybersecurity
Learning Cryptography: PicoCTF 2017 [16] Substitution
John Hammond Beginner 7y ago
Python Flask WebDev [04] Static Files
Cybersecurity
Python Flask WebDev [04] Static Files
John Hammond Intermediate 7y ago
Jinja2 Templates | Python Flask WebDev [03]
Cybersecurity
Jinja2 Templates | Python Flask WebDev [03]
John Hammond Intermediate 7y ago
PicoCTF 2017 [13] What is Web (HTML, CSS, & JS)
Cybersecurity
PicoCTF 2017 [13] What is Web (HTML, CSS, & JS)
John Hammond Beginner 7y ago
Python Flask WebDev [02] URL Routing
Cybersecurity
Python Flask WebDev [02] URL Routing
John Hammond Intermediate 7y ago
Python Flask WebDev [01] Installing & Introduction
Cybersecurity
Python Flask WebDev [01] Installing & Introduction
John Hammond Beginner 7y ago
Capture the Flag: PicoCTF 2017 [10] Leaf of the Forest
Cybersecurity
Capture the Flag: PicoCTF 2017 [10] Leaf of the Forest
John Hammond Intermediate 7y ago
Getting Started in CTF: PicoCTF 2017 [09] keyz (SSH)
Cybersecurity
Getting Started in CTF: PicoCTF 2017 [09] keyz (SSH)
John Hammond Beginner 7y ago
Learning CTF: PicoCTF 2017 [08] Loooong (Python Strings)
Cybersecurity
Learning CTF: PicoCTF 2017 [08] Loooong (Python Strings)
John Hammond Beginner 7y ago
PicoCTF 2017 [07] Getting a Linux VM
Cybersecurity
PicoCTF 2017 [07] Getting a Linux VM
John Hammond Intermediate 7y ago
How to Play CTF: PicoCTF 2017 [06| Leaf of the Tree
Cybersecurity
How to Play CTF: PicoCTF 2017 [06| Leaf of the Tree
John Hammond Intermediate 7y ago
CTF for Beginners: PicoCTF [05] Piazza (IRC & Help)
Cybersecurity
CTF for Beginners: PicoCTF [05] Piazza (IRC & Help)
John Hammond Beginner 7y ago
Beginner's Guide to CTF: PicoCTF [04] | Internet Kitties (Netcat)
Cybersecurity
Beginner's Guide to CTF: PicoCTF [04] | Internet Kitties (Netcat)
John Hammond Beginner 7y ago
SQL SELECT Tricks & Truncation: Python Web Hacking | Natas: OverTheWire (Level 27)
Cybersecurity
SQL SELECT Tricks & Truncation: Python Web Hacking | Natas: OverTheWire (Level 27)
John Hammond Intermediate 7y ago
PHP Object Injection & Serialization: Python Web Hacking | Natas: OverTheWire (Level 26)
Cybersecurity
PHP Object Injection & Serialization: Python Web Hacking | Natas: OverTheWire (Level 26)
John Hammond Intermediate 7y ago
Splitting Video into Frames: FFmpeg (Homemade CTF)
Cybersecurity
Splitting Video into Frames: FFmpeg (Homemade CTF)
John Hammond Intermediate 7y ago
PHP strcmp Abuse: Python Web Hacking | Natas: OverTheWire (Level 24)
Cybersecurity
PHP strcmp Abuse: Python Web Hacking | Natas: OverTheWire (Level 24)
John Hammond Intermediate 7y ago
📚 Coursera Courses Opens on Coursera · Free to audit
1 / 3 View all →
Network Traffic Analysis with Wireshark
📚 Coursera Course ↗
Self-paced
Network Traffic Analysis with Wireshark
Opens on Coursera ↗
The Pearson Complete Course for CISM Certification: Unit 3
📚 Coursera Course ↗
Self-paced
The Pearson Complete Course for CISM Certification: Unit 3
Opens on Coursera ↗
Emerging Telecom Technologies: Edge Security Focus
📚 Coursera Course ↗
Self-paced
Emerging Telecom Technologies: Edge Security Focus
Opens on Coursera ↗
Exploit Development, Malware, & Defensive Strategies
📚 Coursera Course ↗
Self-paced
Exploit Development, Malware, & Defensive Strategies
Opens on Coursera ↗
Segurança de TI: Defesa Contra as Artes Obscuras do Mundo Digital
📚 Coursera Course ↗
Self-paced
Segurança de TI: Defesa Contra as Artes Obscuras do Mundo Digital
Opens on Coursera ↗
GCP Security and Networking
📚 Coursera Course ↗
Self-paced
GCP Security and Networking
Opens on Coursera ↗