✕ Clear filters
1,622 lessons

🔐 Cybersecurity

Ethical hacking, penetration testing, network security, CTFs and defensive security

All ▶ YouTube 176,215📚 Coursera 16,072
CISOs: Your Cyber Program Is A Profit Center, Not A Cost Center
Cybersecurity
CISOs: Your Cyber Program Is A Profit Center, Not A Cost Center
SANS Institute Intermediate 10mo ago
Who Dares Wins: Effective Crisis Management
Cybersecurity
Who Dares Wins: Effective Crisis Management
SANS Institute Intermediate 10mo ago
How He got Into AMAZON Cybersecurity
Cybersecurity
How He got Into AMAZON Cybersecurity
Sajjaad Khader Intermediate 10mo ago
Hactivists are changing Cyberwarfare #shorts #cybersecurity #cyberwar #india #pakistan
Cybersecurity
Hactivists are changing Cyberwarfare #shorts #cybersecurity #cyberwar #india #pakistan
David Bombal Intermediate 10mo ago
golang obfuscated malware goes crazy
Cybersecurity
golang obfuscated malware goes crazy
John Hammond Intermediate 10mo ago
The CVE Foundation Interview
Cybersecurity
The CVE Foundation Interview
John Hammond Intermediate 11mo ago
Do you need both? #shorts #iphone #android #starlink #vpn
Cybersecurity
Do you need both? #shorts #iphone #android #starlink #vpn
David Bombal Intermediate 11mo ago
TikTok Cybersecurity SALARY 💰💸🤑
Cybersecurity
TikTok Cybersecurity SALARY 💰💸🤑
Sajjaad Khader Intermediate 11mo ago
RevOps: "Chill. Zapier's got this."
Cybersecurity
RevOps: "Chill. Zapier's got this."
Zapier Intermediate 11mo ago
RevOps: "Zapier to end Sprints automatically. Done."
Cybersecurity
RevOps: "Zapier to end Sprints automatically. Done."
Zapier Intermediate 11mo ago
Top Skills You’ll Build with the Microsoft Cybersecurity Certificate on Coursera
Cybersecurity
Top Skills You’ll Build with the Microsoft Cybersecurity Certificate on Coursera
Coursera Intermediate 11mo ago
AI Cybersecurity for Product Managers - AI PM Community Session #79
Cybersecurity
AI Cybersecurity for Product Managers - AI PM Community Session #79
PM Exercises Intermediate 11mo ago
Jim Rohn’s 12 Pillars of Unshakable Success | The Ultimate Personal Code
Cybersecurity
Jim Rohn’s 12 Pillars of Unshakable Success | The Ultimate Personal Code
Evan Carmichael Intermediate 12mo ago
Real-Time cyber threats
Cybersecurity
Real-Time cyber threats
Weights & Biases Intermediate 12mo ago
How FIN6 Exfiltrates Files Over FTP
Cybersecurity
How FIN6 Exfiltrates Files Over FTP
HackerSploit Intermediate 1y ago
We bought stolen election access before the hackers did
Cybersecurity
We bought stolen election access before the hackers did
Weights & Biases Intermediate 1y ago
Fraud Detection in the AI Era // Rafael Sandroni // MLOps Podcast #301
Cybersecurity
Fraud Detection in the AI Era // Rafael Sandroni // MLOps Podcast #301
MLOps.community Intermediate 1y ago
Wasm on feature phones with Cloud Phone's Thomas Barrasso
Cybersecurity
Wasm on feature phones with Cloud Phone's Thomas Barrasso
Chrome for Developers Intermediate 1y ago
Fireside Chat with Kate Marshall and Helen Oakley
Cybersecurity
Fireside Chat with Kate Marshall and Helen Oakley
SANS Institute Intermediate 11mo ago
Watching the Watchers: Safeguards and Security for Artificial Intelligence Systems
Cybersecurity
Watching the Watchers: Safeguards and Security for Artificial Intelligence Systems
SANS Institute Intermediate 11mo ago
Defending AI Models: Strategies for Securing AI Implementations Against Emerging Threats
Cybersecurity
Defending AI Models: Strategies for Securing AI Implementations Against Emerging Threats
SANS Institute Intermediate 11mo ago
Securing the Grid: AI’s Promise for Cyber Resilience in Power Systems
Cybersecurity
Securing the Grid: AI’s Promise for Cyber Resilience in Power Systems
SANS Institute Intermediate 11mo ago
Building an AI Pen-Testing Assistant
Cybersecurity
Building an AI Pen-Testing Assistant
SANS Institute Intermediate 11mo ago
Data to Defense: Generative AI and RAG Powering Real-Time Threat Response
Cybersecurity
Data to Defense: Generative AI and RAG Powering Real-Time Threat Response
SANS Institute Intermediate 11mo ago
Team Shellphish AIxCC Interview
Cybersecurity
Team Shellphish AIxCC Interview
John Hammond Intermediate 11mo ago
How Hackers Steal Passwords
Cybersecurity
How Hackers Steal Passwords
John Hammond Intermediate 11mo ago
Which is the best? #shorts #password #2fa #cybersecurity #iphone #android
Cybersecurity
Which is the best? #shorts #password #2fa #cybersecurity #iphone #android
David Bombal Intermediate 11mo ago
But why??? No one uses this in 2025! #shorts #hub #switch #network #wireshark #ccna
Cybersecurity
But why??? No one uses this in 2025! #shorts #hub #switch #network #wireshark #ccna
David Bombal Intermediate 11mo ago
Blocking EVERYTHING with Windows Firewall
Cybersecurity
Blocking EVERYTHING with Windows Firewall
John Hammond Intermediate 11mo ago
Capture and Replay Phone Calls with Kali Linux and Wireshark (MITM / VoIP replay)
Cybersecurity
Capture and Replay Phone Calls with Kali Linux and Wireshark (MITM / VoIP replay)
David Bombal Intermediate 11mo ago
Try Hack Me! Hands-on hacking labs (free & paid) 😀 #shorts #cybersecurity #iphone #android
Cybersecurity
Try Hack Me! Hands-on hacking labs (free & paid) 😀 #shorts #cybersecurity #iphone #android
David Bombal Intermediate 11mo ago
Amazon Cybersecurity HACKER Q&A 🤫
Cybersecurity
Amazon Cybersecurity HACKER Q&A 🤫
Sajjaad Khader Intermediate 11mo ago
RevOps: "OR... I can set up Zapier to scan the contents..."
Cybersecurity
RevOps: "OR... I can set up Zapier to scan the contents..."
Zapier Intermediate 11mo ago
The brain of a pea? #shorts #hub #switch #network #wireshark #ccna
Cybersecurity
The brain of a pea? #shorts #hub #switch #network #wireshark #ccna
David Bombal Intermediate 12mo ago
cybersecurity just got f***ed
Cybersecurity
cybersecurity just got f***ed
John Hammond Intermediate 12mo ago
Do you agree? Using Open WiFi networks in 2025? #shorts #wifi #iphone #android #cybersecurity
Cybersecurity
Do you agree? Using Open WiFi networks in 2025? #shorts #wifi #iphone #android #cybersecurity
David Bombal Intermediate 12mo ago
Panel | Mentors and Mentees: Navigating Cybersecurity's Path Together
Cybersecurity
Panel | Mentors and Mentees: Navigating Cybersecurity's Path Together
SANS Institute Intermediate 12mo ago
Finding Web App Vulnerabilities with AI
Cybersecurity
Finding Web App Vulnerabilities with AI
John Hammond Intermediate 12mo ago
RevOps: "The CRM AI did what!? I know what to do. Zapier."
Cybersecurity
RevOps: "The CRM AI did what!? I know what to do. Zapier."
Zapier Intermediate 12mo ago
From Special Forces to Cybersecurity: Rich Greene on Communication and Persuasion in Infosec
Cybersecurity
From Special Forces to Cybersecurity: Rich Greene on Communication and Persuasion in Infosec
SANS Institute Intermediate 1y ago
I Backdoored Cursor AI
Cybersecurity
I Backdoored Cursor AI
John Hammond Intermediate 1y ago
RevOps: "Don't worry. Zapier will wake it up."
Cybersecurity
RevOps: "Don't worry. Zapier will wake it up."
Zapier Intermediate 1y ago
Burpsuite proxy browser and App Interception
Cybersecurity
Burpsuite proxy browser and App Interception
David Bombal Intermediate 1y ago
Turn Your Hard-Earned Experience into Impact
Cybersecurity
Turn Your Hard-Earned Experience into Impact
SANS Institute Intermediate 1y ago
Why nobody likes cybersecurity
Cybersecurity
Why nobody likes cybersecurity
Weights & Biases Intermediate 1y ago
this MP3 file is malware
Cybersecurity
this MP3 file is malware
John Hammond Intermediate 1y ago
Can you hack a hub? #shorts #hub #switch #network #wireshark #ccna
Cybersecurity
Can you hack a hub? #shorts #hub #switch #network #wireshark #ccna
David Bombal Intermediate 1y ago
the CRITICAL 9.1 severity Next.js vulnerability
Cybersecurity
the CRITICAL 9.1 severity Next.js vulnerability
John Hammond Intermediate 1y ago
📚 Coursera Courses Opens on Coursera · Free to audit
1 / 3 View all →
Governance and Strategy
📚 Coursera Course ↗
Self-paced
Governance and Strategy
Opens on Coursera ↗
Certified Ethical Hacker (CEH): Unit 4
📚 Coursera Course ↗
Self-paced
Certified Ethical Hacker (CEH): Unit 4
Opens on Coursera ↗
Introduction to Computer Security
📚 Coursera Course ↗
Self-paced
Introduction to Computer Security
Opens on Coursera ↗
Ethical Hacking
📚 Coursera Course ↗
Self-paced
Ethical Hacking
Opens on Coursera ↗
Intermediate Ethical Hacking Hands-on Training
📚 Coursera Course ↗
Self-paced
Intermediate Ethical Hacking Hands-on Training
Opens on Coursera ↗
Advanced Network Security and Analysis
📚 Coursera Course ↗
Self-paced
Advanced Network Security and Analysis
Opens on Coursera ↗