✕ Clear filters
1,623 lessons

🔐 Cybersecurity

Ethical hacking, penetration testing, network security, CTFs and defensive security

All ▶ YouTube 176,278📚 Coursera 16,093
The ad malware scam
Cybersecurity
The ad malware scam
Jack Rhysider Intermediate 1y ago
Russia Hacked the US Elections?
Cybersecurity
Russia Hacked the US Elections?
Jack Rhysider Intermediate 1y ago
1000 Players - One Game of Doom
Cybersecurity
1000 Players - One Game of Doom
ThePrimeagen Intermediate 1y ago
Will AI replace Cybersecurity professionals? Tom from Spunk replies. #shorts #AI #cybersecurity
Cybersecurity
Will AI replace Cybersecurity professionals? Tom from Spunk replies. #shorts #AI #cybersecurity
David Bombal Intermediate 1y ago
Keynote | Challenges and Opportunities for Modern CISOs
Cybersecurity
Keynote | Challenges and Opportunities for Modern CISOs
SANS Institute Intermediate 1y ago
Leading Without Authority: Leadership Beyond Titles
Cybersecurity
Leading Without Authority: Leadership Beyond Titles
SANS Institute Intermediate 1y ago
WiFi Security Myths Demo: Don't believe that these will protect you!
Cybersecurity
WiFi Security Myths Demo: Don't believe that these will protect you!
David Bombal Intermediate 1y ago
How to learn foundational cybersecurity skills, brought to you by Sandra Liu.
Cybersecurity
How to learn foundational cybersecurity skills, brought to you by Sandra Liu.
Coursera Intermediate 1y ago
It is essential to keep up with the threat landscape!
Cybersecurity
It is essential to keep up with the threat landscape!
Coursera Intermediate 1y ago
8 Rules for Better Data Storytelling | Get Your Insights Understood
Cybersecurity
8 Rules for Better Data Storytelling | Get Your Insights Understood
DataCamp Intermediate 1y ago
Do you use your pet's name as your password?
Cybersecurity
Do you use your pet's name as your password?
Google for Developers Intermediate 1y ago
Protecting workloads with Google Cloud next generation firewall
Cybersecurity
Protecting workloads with Google Cloud next generation firewall
Google Cloud Tech Intermediate 1y ago
computer science vs cybersecurity in 2025
Cybersecurity
computer science vs cybersecurity in 2025
Sajjaad Khader Intermediate 1y ago
7 tech leaders who ended up in prison
Cybersecurity
7 tech leaders who ended up in prison
Fireship Intermediate 2y ago
North Korean Hackers Targeting American Comedies
Cybersecurity
North Korean Hackers Targeting American Comedies
Jack Rhysider Intermediate 1y ago
How US forces crippled ISIS computers
Cybersecurity
How US forces crippled ISIS computers
Jack Rhysider Intermediate 1y ago
What’s worse than TikTok's data collection?
Cybersecurity
What’s worse than TikTok's data collection?
Jack Rhysider Intermediate 1y ago
How North Korea led the largest crypto heist in history
Cybersecurity
How North Korea led the largest crypto heist in history
Jack Rhysider Intermediate 1y ago
The cheat device that snuck onto Nintendo's platform
Cybersecurity
The cheat device that snuck onto Nintendo's platform
Jack Rhysider Intermediate 1y ago
$25 million lost to AI impersonation scam
Cybersecurity
$25 million lost to AI impersonation scam
Jack Rhysider Intermediate 1y ago
"For criminals, by criminals:" How the FBI Tried to Wire Tap the World🎙Darknet Diaries Ep 146: ANOM
Cybersecurity
"For criminals, by criminals:" How the FBI Tried to Wire Tap the World🎙Darknet Diaries Ep 146: ANOM
Jack Rhysider Intermediate 1y ago
The destructive Iranian cyber attacks
Cybersecurity
The destructive Iranian cyber attacks
Jack Rhysider Intermediate 1y ago
The US malware that sabotaged Iran's nuclear facility
Cybersecurity
The US malware that sabotaged Iran's nuclear facility
Jack Rhysider Intermediate 1y ago
The hacker who became a Web Design CEO
Cybersecurity
The hacker who became a Web Design CEO
Jack Rhysider Intermediate 1y ago
They're hunting your passwords? #shorts #passwords #cybersecurity  #ai
Cybersecurity
They're hunting your passwords? #shorts #passwords #cybersecurity #ai
David Bombal Intermediate 1y ago
The coolest WiFi hacking device?
Cybersecurity
The coolest WiFi hacking device?
David Bombal Intermediate 1y ago
How to get away with $230 Million in crypto
Cybersecurity
How to get away with $230 Million in crypto
Jack Rhysider Intermediate 1y ago
$75 Million Bitcoin theft in Slovenia
Cybersecurity
$75 Million Bitcoin theft in Slovenia
Jack Rhysider Intermediate 1y ago
How Skype compromised your WoW account
Cybersecurity
How Skype compromised your WoW account
Jack Rhysider Intermediate 1y ago
This five-year-old hacked Xbox
Cybersecurity
This five-year-old hacked Xbox
Jack Rhysider Intermediate 1y ago
CISOs Confront AI: Adapting Cybersecurity to the AI Era
Cybersecurity
CISOs Confront AI: Adapting Cybersecurity to the AI Era
SANS Institute Intermediate 1y ago
Keynote | The Fast-Food Effect: Translating Fast-Food Mastery into Cross-Industry Success
Cybersecurity
Keynote | The Fast-Food Effect: Translating Fast-Food Mastery into Cross-Industry Success
SANS Institute Intermediate 1y ago
How a Montana Mom Became the FBI's Secret Weapon Against Al Qaeda🎙Darknet Diaries Ep. 145: Shannen
Cybersecurity
How a Montana Mom Became the FBI's Secret Weapon Against Al Qaeda🎙Darknet Diaries Ep. 145: Shannen
Jack Rhysider Intermediate 1y ago
Thieves stole $40K in Ethereum with NFT scam
Cybersecurity
Thieves stole $40K in Ethereum with NFT scam
Jack Rhysider Intermediate 1y ago
From Rogue to Vanguard: My Odyssey through the Cyber Realm
Cybersecurity
From Rogue to Vanguard: My Odyssey through the Cyber Realm
SANS Institute Intermediate 1y ago
The Vanilla Gift Card Trap
Cybersecurity
The Vanilla Gift Card Trap
Jack Rhysider Intermediate 1y ago
CISOs Confront AI: Adapting Cybersecurity to the AI Era
Cybersecurity
CISOs Confront AI: Adapting Cybersecurity to the AI Era
SANS Institute Intermediate 1y ago
This exploit emptied 6,000 Coinbase wallets
Cybersecurity
This exploit emptied 6,000 Coinbase wallets
Jack Rhysider Intermediate 1y ago
The $70 million TalkTalk Breach
Cybersecurity
The $70 million TalkTalk Breach
Jack Rhysider Intermediate 1y ago
The Mastermind behind Pakistan's nuclear arms scene
Cybersecurity
The Mastermind behind Pakistan's nuclear arms scene
Jack Rhysider Intermediate 1y ago
Are You Interested in Blue Teaming?
Cybersecurity
Are You Interested in Blue Teaming?
Coursera Intermediate 1y ago
How did someone make $2,000 per day with Roblox?
Cybersecurity
How did someone make $2,000 per day with Roblox?
Jack Rhysider Intermediate 2y ago
How scammers can reverse their payment
Cybersecurity
How scammers can reverse their payment
Jack Rhysider Intermediate 2y ago
How an AT&T employee stole $23 million overnight
Cybersecurity
How an AT&T employee stole $23 million overnight
Jack Rhysider Intermediate 2y ago
Are you liable if criminals use your hacking software?
Cybersecurity
Are you liable if criminals use your hacking software?
Jack Rhysider Intermediate 2y ago
What's the Best Firewall? #shorts #firewall #cybersecurity #iphone #android
Cybersecurity
What's the Best Firewall? #shorts #firewall #cybersecurity #iphone #android
David Bombal Intermediate 2y ago
Why you shouldn't reuse passwords
Cybersecurity
Why you shouldn't reuse passwords
Jack Rhysider Intermediate 2y ago
Is your Discord account safe?
Cybersecurity
Is your Discord account safe?
Jack Rhysider Intermediate 2y ago
📚 Coursera Courses Opens on Coursera · Free to audit
1 / 3 View all →
Implementing MPLS VPNs
📚 Coursera Course ↗
Self-paced
Implementing MPLS VPNs
Opens on Coursera ↗
Cyber Security for Absolute Beginners – Part 1
📚 Coursera Course ↗
Self-paced
Cyber Security for Absolute Beginners – Part 1
Opens on Coursera ↗
Check Point Jump Start: Maestro Hyperscale Network Security
📚 Coursera Course ↗
Self-paced
Check Point Jump Start: Maestro Hyperscale Network Security
Opens on Coursera ↗
A+ Core 2 V15 - Pearson Cert Prep: Unit 4
📚 Coursera Course ↗
Self-paced
A+ Core 2 V15 - Pearson Cert Prep: Unit 4
Opens on Coursera ↗
Security Operations
📚 Coursera Course ↗
Self-paced
Security Operations
Opens on Coursera ↗
Advanced Networking Services and Routing
📚 Coursera Course ↗
Self-paced
Advanced Networking Services and Routing
Opens on Coursera ↗