✕ Clear filters
1,623 lessons

🔐 Cybersecurity

Ethical hacking, penetration testing, network security, CTFs and defensive security

All ▶ YouTube 176,357📚 Coursera 16,136
Strategy 4: Hire AND Grow Quality Staff
Cybersecurity
Strategy 4: Hire AND Grow Quality Staff
SANS Institute Intermediate 2y ago
Experience a Real Pentest with the PNPT Exam #pentesting  #ethicalhacking   #pnpt
Cybersecurity
Experience a Real Pentest with the PNPT Exam #pentesting #ethicalhacking #pnpt
The Cyber Mentor Intermediate 2y ago
Keynote | Neurodivergent Associates are an Asset: A CISO’s Perspective on Retention and Inclusion
Cybersecurity
Keynote | Neurodivergent Associates are an Asset: A CISO’s Perspective on Retention and Inclusion
SANS Institute Intermediate 2y ago
Here's a quick look at a path to becoming a webapp pentester! #webapp #pentesting #cybersecurity
Cybersecurity
Here's a quick look at a path to becoming a webapp pentester! #webapp #pentesting #cybersecurity
The Cyber Mentor Intermediate 2y ago
Hide a Hacker's Reverse Shell in ONE Command
Cybersecurity
Hide a Hacker's Reverse Shell in ONE Command
John Hammond Intermediate 2y ago
AI Voice Scams are on the RISE!
Cybersecurity
AI Voice Scams are on the RISE!
1littlecoder Intermediate 2y ago
Hacking Complex Passwords with Rules & Munging
Cybersecurity
Hacking Complex Passwords with Rules & Munging
John Hammond Intermediate 2y ago
Who Is Hacking the World's Best Online Poker Players?🎙Darknet Diaries Ep. 74: Mikko
Cybersecurity
Who Is Hacking the World's Best Online Poker Players?🎙Darknet Diaries Ep. 74: Mikko
Jack Rhysider Intermediate 2y ago
When You Can't Breach the Network, Hack the Humans🎙Darknet Diaries Ep. 69: Human Hacker
Cybersecurity
When You Can't Breach the Network, Hack the Humans🎙Darknet Diaries Ep. 69: Human Hacker
Jack Rhysider Intermediate 3y ago
3 HACKING gadgets you have to TRY!!
Cybersecurity
3 HACKING gadgets you have to TRY!!
NetworkChuck Intermediate 3y ago
How to Hack Passwords
Cybersecurity
How to Hack Passwords
Sahil & Sarra Intermediate 3y ago
IconScout plugin for Figma | Access icons, illustrations, 3D and Lottie animations within Figma
Cybersecurity
IconScout plugin for Figma | Access icons, illustrations, 3D and Lottie animations within Figma
IconScout Intermediate 3y ago
Amazon S3: Data Encryption Options
Cybersecurity
Amazon S3: Data Encryption Options
AWS Developers Intermediate 3y ago
Why We Need Even More Linux Distros!?!
Cybersecurity
Why We Need Even More Linux Distros!?!
Brodie Robertson Intermediate 3y ago
Patrick Mckeown: This Limited Nasal Breathing Hack Will Change Your Life!
Cybersecurity
Patrick Mckeown: This Limited Nasal Breathing Hack Will Change Your Life!
Evan Carmichael Intermediate 3y ago
Are you prepared for this?
Cybersecurity
Are you prepared for this?
David Bombal Intermediate 3y ago
HackTheBox - Response
Cybersecurity
HackTheBox - Response
IppSec Intermediate 3y ago
Opening Keynote | Investing in Neurodiversity
Cybersecurity
Opening Keynote | Investing in Neurodiversity
SANS Institute Intermediate 2y ago
Strategy 3: Build a SOC Structure to Match Your Organizational Needs
Cybersecurity
Strategy 3: Build a SOC Structure to Match Your Organizational Needs
SANS Institute Intermediate 2y ago
Strategy 2: Give the SOC the Authority to Do Its Job
Cybersecurity
Strategy 2: Give the SOC the Authority to Do Its Job
SANS Institute Intermediate 2y ago
Are you getting ready for Summer? So are hackers! #passwordchange  #ethicalhacking #cybersecurity
Cybersecurity
Are you getting ready for Summer? So are hackers! #passwordchange #ethicalhacking #cybersecurity
The Cyber Mentor Intermediate 2y ago
L2CODE like a hacker #programming #python #rust #cybersecurity
Cybersecurity
L2CODE like a hacker #programming #python #rust #cybersecurity
The Cyber Mentor Intermediate 2y ago
Dangerous Code in Seconds: Eval the evil #webapp  #infosec  #cybersecurity  #ethicalhacking
Cybersecurity
Dangerous Code in Seconds: Eval the evil #webapp #infosec #cybersecurity #ethicalhacking
The Cyber Mentor Intermediate 2y ago
SANS Neurodiversity in Cybersecurity Summit 2023 Graphic Illustrations
Cybersecurity
SANS Neurodiversity in Cybersecurity Summit 2023 Graphic Illustrations
SANS Institute Intermediate 2y ago
NICE Career: Discovering Career Pathways
Cybersecurity
NICE Career: Discovering Career Pathways
SANS Institute Intermediate 2y ago
Cybersecurity Role Finder: Navigating Your Personal Path into Cybersecurity Careers
Cybersecurity
Cybersecurity Role Finder: Navigating Your Personal Path into Cybersecurity Careers
SANS Institute Intermediate 2y ago
Going the Distance: Lessons from The Last Mile Education Fund
Cybersecurity
Going the Distance: Lessons from The Last Mile Education Fund
SANS Institute Intermediate 2y ago
Strategy 1: Know What You Are Protecting and Why
Cybersecurity
Strategy 1: Know What You Are Protecting and Why
SANS Institute Intermediate 2y ago
Living Off The Land - Windows Disk Cleaner Persistence
Cybersecurity
Living Off The Land - Windows Disk Cleaner Persistence
John Hammond Intermediate 2y ago
Get Ready, A Very Special Season 4 Is On the Way!
Cybersecurity
Get Ready, A Very Special Season 4 Is On the Way!
SANS Institute Intermediate 2y ago
How To Test Your Security with Atomic Red Team
Cybersecurity
How To Test Your Security with Atomic Red Team
John Hammond Intermediate 2y ago
winget: Install ROGUE Software & Packages?
Cybersecurity
winget: Install ROGUE Software & Packages?
John Hammond Intermediate 2y ago
Kubernetes Hacking: From Weak Applications to Cluster Control
Cybersecurity
Kubernetes Hacking: From Weak Applications to Cluster Control
John Hammond Intermediate 2y ago
Python Pwntools Hacking: ret2libc GOT & PLT
Cybersecurity
Python Pwntools Hacking: ret2libc GOT & PLT
John Hammond Intermediate 3y ago
Password Hacking in Kali Linux
Cybersecurity
Password Hacking in Kali Linux
John Hammond Intermediate 3y ago
Hackers Bypass Google Two-Factor Authentication (2FA) SMS
Cybersecurity
Hackers Bypass Google Two-Factor Authentication (2FA) SMS
John Hammond Intermediate 3y ago
Mom Hacked a Prison With a Clipboard & USB Stick🎙Darknet Diaries Ep. 67: The Big House
Cybersecurity
Mom Hacked a Prison With a Clipboard & USB Stick🎙Darknet Diaries Ep. 67: The Big House
Jack Rhysider Intermediate 3y ago
Hacking CI/CD (Basic Pipeline Poisoning)
Cybersecurity
Hacking CI/CD (Basic Pipeline Poisoning)
John Hammond Intermediate 3y ago
"I rob banks for a living," but it's all totally legal🎙Darknet Diaries Ep. 66: Freakyclown
Cybersecurity
"I rob banks for a living," but it's all totally legal🎙Darknet Diaries Ep. 66: Freakyclown
Jack Rhysider Intermediate 3y ago
Meet SANS Senior Instructor: Mark Baggett
Cybersecurity
Meet SANS Senior Instructor: Mark Baggett
SANS Institute Intermediate 3y ago
Meet SANS Instructor: Terrence Williams
Cybersecurity
Meet SANS Instructor: Terrence Williams
SANS Institute Intermediate 3y ago
Meet SANS Senior Instructor: John Hubbard
Cybersecurity
Meet SANS Senior Instructor: John Hubbard
SANS Institute Intermediate 3y ago
Meet SANS Certified Instructor: Dean Parsons
Cybersecurity
Meet SANS Certified Instructor: Dean Parsons
SANS Institute Intermediate 3y ago
Jenee Saunders on SANS Cybersecurity Leadership Triads
Cybersecurity
Jenee Saunders on SANS Cybersecurity Leadership Triads
SANS Institute Intermediate 3y ago
SANS Cyber Threat Intelligence Summit 2023 Graphic Illustrations
Cybersecurity
SANS Cyber Threat Intelligence Summit 2023 Graphic Illustrations
SANS Institute Intermediate 3y ago
How Hackers Can Bypass Your Security Defenses
Cybersecurity
How Hackers Can Bypass Your Security Defenses
John Hammond Intermediate 3y ago
SANS New2Cyber Summit 2023: Reskilling Edition
Cybersecurity
SANS New2Cyber Summit 2023: Reskilling Edition
SANS Institute Intermediate 3y ago
SANS Institute
Cybersecurity
SANS Institute
SANS Institute Intermediate 3y ago
📚 Coursera Courses Opens on Coursera · Free to audit
1 / 3 View all →
Advanced Security Strategies and Incident Response
📚 Coursera Course ↗
Self-paced
Advanced Security Strategies and Incident Response
Opens on Coursera ↗
Security Architecture and Engineering
📚 Coursera Course ↗
Self-paced
Security Architecture and Engineering
Opens on Coursera ↗
Check Point Jump Start: Quantum Spark Network Security
📚 Coursera Course ↗
Self-paced
Check Point Jump Start: Quantum Spark Network Security
Opens on Coursera ↗
Data Security
📚 Coursera Course ↗
Self-paced
Data Security
Opens on Coursera ↗
Advanced Threat Intelligence Techniques
📚 Coursera Course ↗
Self-paced
Advanced Threat Intelligence Techniques
Opens on Coursera ↗
Cloud Data & Application Security
📚 Coursera Course ↗
Self-paced
Cloud Data & Application Security
Opens on Coursera ↗