✕ Clear filters
1,053 lessons

Browse Lessons

Curated from top practitioners. Filtered, not flooded.

All ▶ YouTube 184,535📚 Coursera 16,235
How to Extract Plaintext Wi-Fi Passwords (with Rust)
Cybersecurity
How to Extract Plaintext Wi-Fi Passwords (with Rust)
John Hammond Intermediate 2y ago
This Computer Malware Steals Your Information
Cybersecurity
This Computer Malware Steals Your Information
John Hammond Intermediate 2y ago
Enhancing Your Environment
Cybersecurity
Enhancing Your Environment
John Hammond Intermediate 2y ago
Kernel Level Exploits
Cybersecurity
Kernel Level Exploits
John Hammond Intermediate 2y ago
Getting Ahead in the Industry
Cybersecurity
Getting Ahead in the Industry
John Hammond Intermediate 2y ago
Cyber Defense is Literally Free
Cybersecurity
Cyber Defense is Literally Free
John Hammond Intermediate 2y ago
i BACKDOORED a Desktop Shortcut (to run malware)
Cybersecurity
i BACKDOORED a Desktop Shortcut (to run malware)
John Hammond Advanced 2y ago
How to Hack Active Directory with ASREP Roasting
Cybersecurity
How to Hack Active Directory with ASREP Roasting
John Hammond Beginner 2y ago
Create Your Own File Extension
Cybersecurity
Create Your Own File Extension
John Hammond Beginner 2y ago
How Hackers Move Through Networks (with Ligolo)
Cybersecurity
How Hackers Move Through Networks (with Ligolo)
John Hammond Intermediate 2y ago
Hackers Steal Passwords & Personal Information
Cybersecurity
Hackers Steal Passwords & Personal Information
John Hammond Advanced 2y ago
I Put A Fake Email Server On The Internet
Cybersecurity
I Put A Fake Email Server On The Internet
John Hammond Advanced 2y ago
This Windows Program can CLONE ITSELF
Cybersecurity
This Windows Program can CLONE ITSELF
John Hammond Intermediate 2y ago
This Company Got Hacked... but HOW?
Cybersecurity
This Company Got Hacked... but HOW?
John Hammond Advanced 2y ago
Learn to Hack AWS & Kubernetes Clusters (for free)
Cybersecurity
Learn to Hack AWS & Kubernetes Clusters (for free)
John Hammond Beginner 2y ago
I Hacked Another File Upload Website
Cybersecurity
I Hacked Another File Upload Website
John Hammond Intermediate 2y ago
Digital Forensics with FTK Imager (TryHackMe Advent of Cyber Day 8)
Cybersecurity
Digital Forensics with FTK Imager (TryHackMe Advent of Cyber Day 8)
John Hammond Intermediate 2y ago
Writing Custom Malware: Import Address Table Hooking
Cybersecurity
Writing Custom Malware: Import Address Table Hooking
John Hammond Beginner 2y ago
How To Hack APIs with Python
Cybersecurity
How To Hack APIs with Python
John Hammond Intermediate 2y ago
This Cybercrime Group Puts Its Hackers Through School
Cybersecurity
This Cybercrime Group Puts Its Hackers Through School
John Hammond Intermediate 2y ago
TryHackMe! Advent of Cyber 2023 Kick-Off
Cybersecurity
TryHackMe! Advent of Cyber 2023 Kick-Off
John Hammond Intermediate 2y ago
Incident Response: Azure Log Analysis
Cybersecurity
Incident Response: Azure Log Analysis
John Hammond Advanced 2y ago
Can ChatGPT Find Smart Contract Vulnerabilities?
Cybersecurity
Can ChatGPT Find Smart Contract Vulnerabilities?
John Hammond Beginner 2y ago
Capture the Flag: Hacking Yet Another Markup Language
Cybersecurity
Capture the Flag: Hacking Yet Another Markup Language
John Hammond Intermediate 2y ago
This Cybercrime Forum Is Full Of Hackers
Cybersecurity
This Cybercrime Forum Is Full Of Hackers
John Hammond Intermediate 2y ago
How Hackers Compromise Other Users
Cybersecurity
How Hackers Compromise Other Users
John Hammond Intermediate 2y ago
The MOVEit Hack In Retrospect
Cybersecurity
The MOVEit Hack In Retrospect
John Hammond Intermediate 2y ago
where do you ACTUALLY submit vulnerabilities?
Cybersecurity
where do you ACTUALLY submit vulnerabilities?
John Hammond Intermediate 2y ago
I Took Over a Microsoft Cloud Account. Again.
Cybersecurity
I Took Over a Microsoft Cloud Account. Again.
John Hammond Intermediate 2y ago
Testing Your Cybersecurity Defenses
Cybersecurity
Testing Your Cybersecurity Defenses
John Hammond Intermediate 2y ago
Hacking with Bloodhound: Map Your Environment
Cybersecurity
Hacking with Bloodhound: Map Your Environment
John Hammond Intermediate 2y ago
How Hackers Hide From Memory Scanners
Cybersecurity
How Hackers Hide From Memory Scanners
John Hammond Beginner 2y ago
they're selling WHAT on Telegram?!?
Cybersecurity
they're selling WHAT on Telegram?!?
John Hammond Intermediate 2y ago
ChatGPT Learns the Rust Programming Language
Cybersecurity
ChatGPT Learns the Rust Programming Language
John Hammond Beginner 2y ago
I Stole a Microsoft 365 Account. Here's How.
Cybersecurity
I Stole a Microsoft 365 Account. Here's How.
John Hammond Intermediate 2y ago
this Cybersecurity Platform is FREE
Cybersecurity
this Cybersecurity Platform is FREE
John Hammond Intermediate 2y ago
Hacking Websites: NodeJS Server-Side Template Injection
Cybersecurity
Hacking Websites: NodeJS Server-Side Template Injection
John Hammond Intermediate 2y ago
Fetch the Flag CTF is Live Right Now
Cybersecurity
Fetch the Flag CTF is Live Right Now
John Hammond Intermediate 2y ago
The 3CX Hack In Retrospect
Cybersecurity
The 3CX Hack In Retrospect
John Hammond Intermediate 2y ago
Cloud Security with Microsoft 365 Developer Tenants
Cybersecurity
Cloud Security with Microsoft 365 Developer Tenants
John Hammond Intermediate 2y ago
RagnarLocker Ransomware Seized by Law Enforcement
Cybersecurity
RagnarLocker Ransomware Seized by Law Enforcement
John Hammond Intermediate 2y ago
They Made QR Codes LONGER?!?
Cybersecurity
They Made QR Codes LONGER?!?
John Hammond Intermediate 2y ago
3 FREE Resources for Cyber Defenders
Cybersecurity
3 FREE Resources for Cyber Defenders
John Hammond Intermediate 2y ago
Hunting for Hackers with Sigma Rules
Cybersecurity
Hunting for Hackers with Sigma Rules
John Hammond Intermediate 2y ago
Create Your Own Dark Web Website
Cybersecurity
Create Your Own Dark Web Website
John Hammond Beginner 2y ago
Website Vulnerabilities to Fully Hacked Server
Cybersecurity
Website Vulnerabilities to Fully Hacked Server
John Hammond Intermediate 2y ago
Detect Hackers & Malware on your Computer (literally for free)
Cybersecurity
Detect Hackers & Malware on your Computer (literally for free)
John Hammond Intermediate 2y ago
How Hackers Exploit Vulnerable Drivers
Cybersecurity
How Hackers Exploit Vulnerable Drivers
John Hammond Beginner 2y ago
📚 Coursera Courses Opens on Coursera · Free to audit
1 / 3 View all →
A Tour of Google Cloud Sustainability
📚 Coursera Course ↗
Self-paced
A Tour of Google Cloud Sustainability
Opens on Coursera ↗
Insights of Power BI
📚 Coursera Course ↗
Self-paced
Insights of Power BI
Opens on Coursera ↗
AWS: Network Security, Compliance and Governance
📚 Coursera Course ↗
Self-paced
AWS: Network Security, Compliance and Governance
Opens on Coursera ↗
Work with Gemini Models in BigQuery - Bahasa Indonesia
📚 Coursera Course ↗
Self-paced
Work with Gemini Models in BigQuery - Bahasa Indonesia
Opens on Coursera ↗
Prepare Data for Exploration
📚 Coursera Course ↗
Self-paced
Prepare Data for Exploration
Opens on Coursera ↗
Coaching for Change: Making Agility Work
📚 Coursera Course ↗
Self-paced
Coaching for Change: Making Agility Work
Opens on Coursera ↗