✕ Clear filters
815 lessons

🔐 Cybersecurity

Ethical hacking, penetration testing, network security, CTFs and defensive security

All ▶ YouTube 184,518📚 Coursera 16,214
Calculating Smart Contract Vulnerability Impact: Low To Critical
Cybersecurity
Calculating Smart Contract Vulnerability Impact: Low To Critical
John Hammond Beginner 2y ago
SMB Shares & Cronjob to Initial Access (Proving Grounds: Dawn)
Cybersecurity
SMB Shares & Cronjob to Initial Access (Proving Grounds: Dawn)
John Hammond Intermediate 2y ago
Enterprise security one step at a time
Cybersecurity
Enterprise security one step at a time
John Hammond Intermediate 2y ago
I AUTOMATED a Penetration Test!?
Cybersecurity
I AUTOMATED a Penetration Test!?
John Hammond Intermediate 2y ago
Healthcare Software Exploit: CVE-2023-43208
Cybersecurity
Healthcare Software Exploit: CVE-2023-43208
John Hammond Intermediate 2y ago
Microsoft Entra Training
Cybersecurity
Microsoft Entra Training
John Hammond Advanced 2y ago
Run this script with Eval
Cybersecurity
Run this script with Eval
John Hammond Intermediate 2y ago
Debug with JS-Beautify
Cybersecurity
Debug with JS-Beautify
John Hammond Intermediate 2y ago
Debug with Visual Studio
Cybersecurity
Debug with Visual Studio
John Hammond Intermediate 2y ago
Exploring the BIGGEST SCAMS in the Dark Web
Cybersecurity
Exploring the BIGGEST SCAMS in the Dark Web
John Hammond Intermediate 2y ago
Welcome back, Ryan Chapman
Cybersecurity
Welcome back, Ryan Chapman
John Hammond Intermediate 2y ago
Learning Entra ID (Azure Active Directory)
Cybersecurity
Learning Entra ID (Azure Active Directory)
John Hammond Beginner 2y ago
Network Threat Hunting Made Easy (Finding Hackers)
Cybersecurity
Network Threat Hunting Made Easy (Finding Hackers)
John Hammond Beginner 2y ago
PikaBot Malware Analysis: Debugging in Visual Studio
Cybersecurity
PikaBot Malware Analysis: Debugging in Visual Studio
John Hammond Intermediate 2y ago
Technical Term Tips
Cybersecurity
Technical Term Tips
John Hammond Advanced 2y ago
Make Malware Analysis FASTER with Binary Emulation
Cybersecurity
Make Malware Analysis FASTER with Binary Emulation
John Hammond Intermediate 2y ago
Dig Deeper and Faster with AI
Cybersecurity
Dig Deeper and Faster with AI
John Hammond Intermediate 2y ago
I Made a Custom Threat Intel Feed (Connecting Apps with n8n)
Cybersecurity
I Made a Custom Threat Intel Feed (Connecting Apps with n8n)
John Hammond Intermediate 2y ago
NetworkChuck's Life Hack
Cybersecurity
NetworkChuck's Life Hack
John Hammond Intermediate 2y ago
How to Extract Plaintext Wi-Fi Passwords (with Rust)
Cybersecurity
How to Extract Plaintext Wi-Fi Passwords (with Rust)
John Hammond Intermediate 2y ago
This Computer Malware Steals Your Information
Cybersecurity
This Computer Malware Steals Your Information
John Hammond Intermediate 2y ago
Enhancing Your Environment
Cybersecurity
Enhancing Your Environment
John Hammond Intermediate 2y ago
Kernel Level Exploits
Cybersecurity
Kernel Level Exploits
John Hammond Intermediate 2y ago
Getting Ahead in the Industry
Cybersecurity
Getting Ahead in the Industry
John Hammond Intermediate 2y ago
Cyber Defense is Literally Free
Cybersecurity
Cyber Defense is Literally Free
John Hammond Intermediate 2y ago
i BACKDOORED a Desktop Shortcut (to run malware)
Cybersecurity
i BACKDOORED a Desktop Shortcut (to run malware)
John Hammond Advanced 2y ago
How to Hack Active Directory with ASREP Roasting
Cybersecurity
How to Hack Active Directory with ASREP Roasting
John Hammond Beginner 2y ago
Create Your Own File Extension
Cybersecurity
Create Your Own File Extension
John Hammond Beginner 2y ago
How Hackers Move Through Networks (with Ligolo)
Cybersecurity
How Hackers Move Through Networks (with Ligolo)
John Hammond Intermediate 2y ago
Hackers Steal Passwords & Personal Information
Cybersecurity
Hackers Steal Passwords & Personal Information
John Hammond Advanced 2y ago
I Put A Fake Email Server On The Internet
Cybersecurity
I Put A Fake Email Server On The Internet
John Hammond Advanced 2y ago
This Windows Program can CLONE ITSELF
Cybersecurity
This Windows Program can CLONE ITSELF
John Hammond Intermediate 2y ago
This Company Got Hacked... but HOW?
Cybersecurity
This Company Got Hacked... but HOW?
John Hammond Advanced 2y ago
Learn to Hack AWS & Kubernetes Clusters (for free)
Cybersecurity
Learn to Hack AWS & Kubernetes Clusters (for free)
John Hammond Beginner 2y ago
I Hacked Another File Upload Website
Cybersecurity
I Hacked Another File Upload Website
John Hammond Intermediate 2y ago
Digital Forensics with FTK Imager (TryHackMe Advent of Cyber Day 8)
Cybersecurity
Digital Forensics with FTK Imager (TryHackMe Advent of Cyber Day 8)
John Hammond Intermediate 2y ago
Writing Custom Malware: Import Address Table Hooking
Cybersecurity
Writing Custom Malware: Import Address Table Hooking
John Hammond Beginner 2y ago
How To Hack APIs with Python
Cybersecurity
How To Hack APIs with Python
John Hammond Intermediate 2y ago
This Cybercrime Group Puts Its Hackers Through School
Cybersecurity
This Cybercrime Group Puts Its Hackers Through School
John Hammond Intermediate 2y ago
TryHackMe! Advent of Cyber 2023 Kick-Off
Cybersecurity
TryHackMe! Advent of Cyber 2023 Kick-Off
John Hammond Intermediate 2y ago
Incident Response: Azure Log Analysis
Cybersecurity
Incident Response: Azure Log Analysis
John Hammond Advanced 2y ago
Can ChatGPT Find Smart Contract Vulnerabilities?
Cybersecurity
Can ChatGPT Find Smart Contract Vulnerabilities?
John Hammond Beginner 2y ago
Capture the Flag: Hacking Yet Another Markup Language
Cybersecurity
Capture the Flag: Hacking Yet Another Markup Language
John Hammond Intermediate 2y ago
This Cybercrime Forum Is Full Of Hackers
Cybersecurity
This Cybercrime Forum Is Full Of Hackers
John Hammond Intermediate 2y ago
How Hackers Compromise Other Users
Cybersecurity
How Hackers Compromise Other Users
John Hammond Intermediate 2y ago
The MOVEit Hack In Retrospect
Cybersecurity
The MOVEit Hack In Retrospect
John Hammond Intermediate 2y ago
where do you ACTUALLY submit vulnerabilities?
Cybersecurity
where do you ACTUALLY submit vulnerabilities?
John Hammond Intermediate 2y ago
I Took Over a Microsoft Cloud Account. Again.
Cybersecurity
I Took Over a Microsoft Cloud Account. Again.
John Hammond Intermediate 2y ago
📚 Coursera Courses Opens on Coursera · Free to audit
1 / 3 View all →
Offensive Cyber Operations
📚 Coursera Course ↗
Self-paced
Offensive Cyber Operations
Opens on Coursera ↗
Cybersecurity Fundamentals for High-Tech Manufacturing
📚 Coursera Course ↗
Self-paced
Cybersecurity Fundamentals for High-Tech Manufacturing
Opens on Coursera ↗
Endpoints and Systems
📚 Coursera Course ↗
Self-paced
Endpoints and Systems
Opens on Coursera ↗
Cisco Collaboration Edge Services
📚 Coursera Course ↗
Self-paced
Cisco Collaboration Edge Services
Opens on Coursera ↗
Information Security Incident Management
📚 Coursera Course ↗
Self-paced
Information Security Incident Management
Opens on Coursera ↗
An Introduction to Cryptography
📚 Coursera Course ↗
Self-paced
An Introduction to Cryptography
Opens on Coursera ↗