✕ Clear filters
3,383 lessons

🔐 Cybersecurity

Ethical hacking, penetration testing, network security, CTFs and defensive security

All ▶ YouTube 185,290📚 Coursera 16,583
Black Leaders in Cyber with Darold Kelly, Jr. | SANS+HBCU
Cybersecurity ⚡ AI Lesson
Black Leaders in Cyber with Darold Kelly, Jr. | SANS+HBCU
SANS Institute Beginner 4y ago
Your "Secret" Folders Aren't Secret
Cybersecurity ⚡ AI Lesson
Your "Secret" Folders Aren't Secret
The Cyber Mentor Beginner 4y ago
Hacking Routers with Python // Fake route injection to BLACK HOLE networks
Cybersecurity
Hacking Routers with Python // Fake route injection to BLACK HOLE networks
David Bombal Beginner 4y ago
HackTheBox - Crossfit2
Cybersecurity ⚡ AI Lesson
HackTheBox - Crossfit2
IppSec Beginner 4y ago
Hiring a Hacker to Hack My Facebook
Cybersecurity ⚡ AI Lesson
Hiring a Hacker to Hack My Facebook
The Cyber Mentor Beginner 4y ago
Hack your LinkedIn PROFILE to get a job
Cybersecurity
Hack your LinkedIn PROFILE to get a job
David Bombal Beginner 4y ago
SANS+HBCU | Black Leaders in Cyber with Dr. Kimberly Young-McLear, Fellow at CISA
Cybersecurity ⚡ AI Lesson
SANS+HBCU | Black Leaders in Cyber with Dr. Kimberly Young-McLear, Fellow at CISA
SANS Institute Beginner 4y ago
AES-CFB Cryptography Mistakes - HackTheBox Business CTF "Domain Controller"
Cybersecurity
AES-CFB Cryptography Mistakes - HackTheBox Business CTF "Domain Controller"
John Hammond Beginner 4y ago
HackTheBox - TheNotebook
Cybersecurity
HackTheBox - TheNotebook
IppSec Beginner 4y ago
GraphQL Introspection - HackTheBox "Business CTF" - NoteQL
Cybersecurity ⚡ AI Lesson
GraphQL Introspection - HackTheBox "Business CTF" - NoteQL
John Hammond Beginner 4y ago
How To Secure & Harden Docker Containers
Cybersecurity ⚡ AI Lesson
How To Secure & Harden Docker Containers
HackerSploit Beginner 4y ago
Auditing Docker Security
Cybersecurity ⚡ AI Lesson
Auditing Docker Security
HackerSploit Beginner 4y ago
Roger Reaves: Smuggling Drugs for Pablo Escobar and the Medellin Cartel | Lex Fridman Podcast #199
Cybersecurity
Roger Reaves: Smuggling Drugs for Pablo Escobar and the Medellin Cartel | Lex Fridman Podcast #199
Lex Fridman Beginner 4y ago
how to get remote access to your hacking targets // reverse shells with netcat (Windows and Linux!!)
Cybersecurity ⚡ AI Lesson
how to get remote access to your hacking targets // reverse shells with netcat (Windows and Linux!!)
NetworkChuck Beginner 4y ago
CISSP Certification Course – PASS the Certified Information Security Professional Exam!
Cybersecurity
CISSP Certification Course – PASS the Certified Information Security Professional Exam!
freeCodeCamp.org Beginner 4y ago
Machine Learning in Cybersecurity // Monika Venčkauskaitė // MLOps Meetup #70
Cybersecurity
Machine Learning in Cybersecurity // Monika Venčkauskaitė // MLOps Meetup #70
MLOps.community Beginner 4y ago
Charles Hoskinson: Cardano | Lex Fridman Podcast #192
Cybersecurity
Charles Hoskinson: Cardano | Lex Fridman Podcast #192
Lex Fridman Beginner 4y ago
Vulnerability Management Water Cooler Chat
Cybersecurity ⚡ AI Lesson
Vulnerability Management Water Cooler Chat
SANS Institute Beginner 4y ago
Hacking LinkedIn to get the JOB you want
Cybersecurity
Hacking LinkedIn to get the JOB you want
David Bombal Beginner 4y ago
DHCP Starvation (DoS) Attack // Python Scapy Red Team Script
Cybersecurity
DHCP Starvation (DoS) Attack // Python Scapy Red Team Script
David Bombal Beginner 4y ago
Domain Controller Domination
Cybersecurity ⚡ AI Lesson
Domain Controller Domination
The Cyber Mentor Beginner 4y ago
VLANs: Am I a joke to you? // Python VLAN hacking.
Cybersecurity
VLANs: Am I a joke to you? // Python VLAN hacking.
David Bombal Beginner 4y ago
Hacking Spanning Tree with Python, Scapy and Kali Linux  (Ep 2)  // STP Root Bridge attack! 😀
Cybersecurity
Hacking Spanning Tree with Python, Scapy and Kali Linux (Ep 2) // STP Root Bridge attack! 😀
David Bombal Beginner 4y ago
The Creepiest OSINT Tool to Date
Cybersecurity ⚡ AI Lesson
The Creepiest OSINT Tool to Date
The Cyber Mentor Beginner 4y ago
Python Network Hacking with Kali Linux and Scapy = attack one! 😀
Cybersecurity
Python Network Hacking with Kali Linux and Scapy = attack one! 😀
David Bombal Beginner 4y ago
Stealing Hashes with SeriousSam (CVE-2021–36934)
Cybersecurity ⚡ AI Lesson
Stealing Hashes with SeriousSam (CVE-2021–36934)
The Cyber Mentor Beginner 4y ago
Why Being a Destructive Architect is the Way Forward for Black in Tech
Cybersecurity ⚡ AI Lesson
Why Being a Destructive Architect is the Way Forward for Black in Tech
SANS Institute Beginner 4y ago
HackTheBox - Breadcrumbs
Cybersecurity ⚡ AI Lesson
HackTheBox - Breadcrumbs
IppSec Beginner 4y ago
You must fight! Lessons from Kaseya hack
Cybersecurity
You must fight! Lessons from Kaseya hack
David Bombal Beginner 4y ago
HackTheBox - Ophiuchi
Cybersecurity ⚡ AI Lesson
HackTheBox - Ophiuchi
IppSec Beginner 4y ago
Own a WiFi network with Python! WiFi DoS and ownership attack 😀 😂
Cybersecurity
Own a WiFi network with Python! WiFi DoS and ownership attack 😀 😂
David Bombal Beginner 4y ago
HackTheBox - Spectra
Cybersecurity
HackTheBox - Spectra
IppSec Beginner 4y ago
Dealing with Burnout
Cybersecurity ⚡ AI Lesson
Dealing with Burnout
The Cyber Mentor Beginner 4y ago
HackTheBox - Tentacle
Cybersecurity
HackTheBox - Tentacle
IppSec Beginner 4y ago
burp suite
Cybersecurity
burp suite
David Bombal Beginner 4y ago
Slow the Revolving Door of Talent. Creative Ways to Keep Your Existing Cyber Talent in Your Org
Cybersecurity ⚡ AI Lesson
Slow the Revolving Door of Talent. Creative Ways to Keep Your Existing Cyber Talent in Your Org
SANS Institute Beginner 4y ago
HackTheBox - Tenet
Cybersecurity ⚡ AI Lesson
HackTheBox - Tenet
IppSec Beginner 4y ago
Information Stealer - Malware Analysis (PowerShell to .NET)
Cybersecurity
Information Stealer - Malware Analysis (PowerShell to .NET)
John Hammond Beginner 4y ago
Kali Linux 2021.2 zero to WiFi (Free install)
Cybersecurity
Kali Linux 2021.2 zero to WiFi (Free install)
David Bombal Beginner 4y ago
AES-CTR Cryptography: Reused Key Weakness - HackTheBox Cyber Apocalypse CTF
Cybersecurity ⚡ AI Lesson
AES-CTR Cryptography: Reused Key Weakness - HackTheBox Cyber Apocalypse CTF
John Hammond Beginner 4y ago
Ransomware - Do You Pay It Or Not? - Experts debate the costs ethics around paying ransomware - SANS
Cybersecurity ⚡ AI Lesson
Ransomware - Do You Pay It Or Not? - Experts debate the costs ethics around paying ransomware - SANS
SANS Institute Beginner 4y ago
Security Myths: Your locked laptop keeps you safe // hak5 Bash Bunny
Cybersecurity
Security Myths: Your locked laptop keeps you safe // hak5 Bash Bunny
David Bombal Beginner 4y ago
Mark Morowczynski & Thomas Detzner: Microsoft Incident Response Playbooks
Cybersecurity ⚡ AI Lesson
Mark Morowczynski & Thomas Detzner: Microsoft Incident Response Playbooks
SANS Institute Beginner 4y ago
Frank Wilczek: Physics of Quarks, Dark Matter, Complexity, Life & Aliens | Lex Fridman Podcast #187
Cybersecurity
Frank Wilczek: Physics of Quarks, Dark Matter, Complexity, Life & Aliens | Lex Fridman Podcast #187
Lex Fridman Beginner 4y ago
HackTheBox - Cereal
Cybersecurity
HackTheBox - Cereal
IppSec Beginner 4y ago
Cloudflare CDN CSP - XSS Bypass / HackTheBox Cyber Apocalypse CTF
Cybersecurity ⚡ AI Lesson
Cloudflare CDN CSP - XSS Bypass / HackTheBox Cyber Apocalypse CTF
John Hammond Beginner 4y ago
AJ Yawn: Cloud, Compliance and Automating Security
Cybersecurity ⚡ AI Lesson
AJ Yawn: Cloud, Compliance and Automating Security
SANS Institute Beginner 4y ago
Bryan Johnson: Kernel Brain-Computer Interfaces | Lex Fridman Podcast #186
Cybersecurity ⚡ AI Lesson
Bryan Johnson: Kernel Brain-Computer Interfaces | Lex Fridman Podcast #186
Lex Fridman Beginner 4y ago
📚 Coursera Courses Opens on Coursera · Free to audit
1 / 3 View all →
Play It Safe: Manage Security Risks
📚 Coursera Course ↗
Self-paced
Play It Safe: Manage Security Risks
Opens on Coursera ↗
Network Traffic Analysis for Incident Response
📚 Coursera Course ↗
Self-paced
Network Traffic Analysis for Incident Response
Opens on Coursera ↗
Estrutura e Funcionamento das Redes de Computadores
📚 Coursera Course ↗
Self-paced
Estrutura e Funcionamento das Redes de Computadores
Opens on Coursera ↗
Advanced Threat Hunting and Incident Response
📚 Coursera Course ↗
Self-paced
Advanced Threat Hunting and Incident Response
Opens on Coursera ↗
Ethical Hacking and CompTIA PenTest+ V3 (PT0-003) Exam Prep
📚 Coursera Course ↗
Self-paced
Ethical Hacking and CompTIA PenTest+ V3 (PT0-003) Exam Prep
Opens on Coursera ↗
Stages of Incident Response
📚 Coursera Course ↗
Self-paced
Stages of Incident Response
Opens on Coursera ↗