✕ Clear filters
5,252 lessons

🔐 Cybersecurity

Ethical hacking, penetration testing, network security, CTFs and defensive security

All ▶ YouTube 184,663📚 Coursera 16,305
AI Security Demystified
Cybersecurity
AI Security Demystified
SANS Institute Beginner 10mo ago
🔥Top 4 Cybersecurity Certifications You Need! #simplilearn #shorts
Cybersecurity
🔥Top 4 Cybersecurity Certifications You Need! #simplilearn #shorts
Simplilearn Beginner 10mo ago
WiFi Myths ... don't believe this one.
Cybersecurity
WiFi Myths ... don't believe this one.
David Bombal Intermediate 10mo ago
Every Cyber Attack Facing America | Incognito Mode | WIRED
Cybersecurity
Every Cyber Attack Facing America | Incognito Mode | WIRED
WIRED Intermediate 10mo ago
How Hackers Establish Persistence
Cybersecurity
How Hackers Establish Persistence
The Cyber Mentor Beginner 10mo ago
Malware & Hackers Evade Antivirus with Windows Sandbox
Cybersecurity
Malware & Hackers Evade Antivirus with Windows Sandbox
John Hammond Intermediate 10mo ago
Inside Pacific Rim with Ross McKerchar
Cybersecurity
Inside Pacific Rim with Ross McKerchar
SANS Institute Intermediate 10mo ago
Have I been pwned? 😱
Cybersecurity
Have I been pwned? 😱
David Bombal Intermediate 10mo ago
Ethical Hacking Full Course 2026 | Ethical Hacking Course for Beginners | Simplilearn
Cybersecurity
Ethical Hacking Full Course 2026 | Ethical Hacking Course for Beginners | Simplilearn
Simplilearn Beginner 10mo ago
What is SSRF? | Server-Side Request Forgery Explained |  Impact of SSRF Attacks | Edureka
Cybersecurity
What is SSRF? | Server-Side Request Forgery Explained | Impact of SSRF Attacks | Edureka
edureka! Beginner 10mo ago
How Swiss Cheese is Like Cybersecurity
Cybersecurity
How Swiss Cheese is Like Cybersecurity
The Cyber Mentor Beginner 10mo ago
hackers weaponize... really long filenames??
Cybersecurity
hackers weaponize... really long filenames??
John Hammond Intermediate 10mo ago
How He got Into AMAZON Cybersecurity
Cybersecurity
How He got Into AMAZON Cybersecurity
Sajjaad Khader Intermediate 10mo ago
Streamlining AKS Debugging: Techniques to solve common & complex problems | BRK181
Cybersecurity
Streamlining AKS Debugging: Techniques to solve common & complex problems | BRK181
Microsoft Developer Beginner 10mo ago
Choosing Between Computer Science VS Cyber Security (College Majors)
Cybersecurity
Choosing Between Computer Science VS Cyber Security (College Majors)
Sajjaad Khader Beginner 11mo ago
Cybersecurity Expert Answers Hacking History Questions | Tech Support | WIRED
Cybersecurity
Cybersecurity Expert Answers Hacking History Questions | Tech Support | WIRED
WIRED Beginner 11mo ago
Cybersecurity Explained in 60 Seconds!
Cybersecurity
Cybersecurity Explained in 60 Seconds!
edureka! Beginner 11mo ago
LIVE: HackTheBox | Pentesting | AppSec | Cybersecurity
Cybersecurity
LIVE: HackTheBox | Pentesting | AppSec | Cybersecurity
The Cyber Mentor Beginner 10mo ago
How Bad Characters Can Hold Your Exploits Back!
Cybersecurity
How Bad Characters Can Hold Your Exploits Back!
The Cyber Mentor Beginner 10mo ago
Keynote | How to Become a CISO
Cybersecurity
Keynote | How to Become a CISO
SANS Institute Intermediate 10mo ago
Believing in Yourself to Lead Your Team
Cybersecurity
Believing in Yourself to Lead Your Team
SANS Institute Beginner 10mo ago
CISOs: Your Cyber Program Is A Profit Center, Not A Cost Center
Cybersecurity
CISOs: Your Cyber Program Is A Profit Center, Not A Cost Center
SANS Institute Intermediate 10mo ago
Who Dares Wins: Effective Crisis Management
Cybersecurity
Who Dares Wins: Effective Crisis Management
SANS Institute Intermediate 10mo ago
FAKE Gambling Cheat Runs Malware
Cybersecurity
FAKE Gambling Cheat Runs Malware
John Hammond Advanced 10mo ago
Best way to Tap a Network? (Tier List)
Cybersecurity
Best way to Tap a Network? (Tier List)
David Bombal Beginner 10mo ago
Learn Quantum Computing!
Cybersecurity
Learn Quantum Computing!
John Hammond Beginner 10mo ago
Is this Entry-Level Microsoft Cybersecurity Cert Worth It?!
Cybersecurity
Is this Entry-Level Microsoft Cybersecurity Cert Worth It?!
The Cyber Mentor Beginner 10mo ago
Registry Hack: Clean Up Your Windows Search Bar!
Cybersecurity
Registry Hack: Clean Up Your Windows Search Bar!
The Cyber Mentor Beginner 10mo ago
Hactivists are changing Cyberwarfare #shorts #cybersecurity #cyberwar #india #pakistan
Cybersecurity
Hactivists are changing Cyberwarfare #shorts #cybersecurity #cyberwar #india #pakistan
David Bombal Intermediate 11mo ago
LIVE: 🔎ForenSICK! | Cybersecurity | TryHackme | AMA
Cybersecurity
LIVE: 🔎ForenSICK! | Cybersecurity | TryHackme | AMA
The Cyber Mentor Beginner 11mo ago
How to Write Shellcode in 3 Minutes!
Cybersecurity
How to Write Shellcode in 3 Minutes!
The Cyber Mentor Beginner 11mo ago
golang obfuscated malware goes crazy
Cybersecurity
golang obfuscated malware goes crazy
John Hammond Intermediate 11mo ago
Meet Bjorn, the Easy to Build Hacking Tool!
Cybersecurity
Meet Bjorn, the Easy to Build Hacking Tool!
The Cyber Mentor Beginner 11mo ago
The CVE Foundation Interview
Cybersecurity
The CVE Foundation Interview
John Hammond Intermediate 11mo ago
Easy Weekend Project to Boost Your IT Resume!
Cybersecurity
Easy Weekend Project to Boost Your IT Resume!
The Cyber Mentor Beginner 11mo ago
LIVE: Web Hacking | Pentesting | AppSec | Cybersecurity | TryHackme | AMA
Cybersecurity
LIVE: Web Hacking | Pentesting | AppSec | Cybersecurity | TryHackme | AMA
The Cyber Mentor Beginner 11mo ago
AI Security Made Easy
Cybersecurity
AI Security Made Easy
SANS Institute Beginner 11mo ago
Fireside Chat with Kate Marshall and Helen Oakley
Cybersecurity
Fireside Chat with Kate Marshall and Helen Oakley
SANS Institute Intermediate 11mo ago
Watching the Watchers: Safeguards and Security for Artificial Intelligence Systems
Cybersecurity
Watching the Watchers: Safeguards and Security for Artificial Intelligence Systems
SANS Institute Intermediate 11mo ago
Defending AI Models: Strategies for Securing AI Implementations Against Emerging Threats
Cybersecurity
Defending AI Models: Strategies for Securing AI Implementations Against Emerging Threats
SANS Institute Intermediate 11mo ago
Securing the Grid: AI’s Promise for Cyber Resilience in Power Systems
Cybersecurity
Securing the Grid: AI’s Promise for Cyber Resilience in Power Systems
SANS Institute Intermediate 11mo ago
Building an AI Pen-Testing Assistant
Cybersecurity
Building an AI Pen-Testing Assistant
SANS Institute Intermediate 11mo ago
Data to Defense: Generative AI and RAG Powering Real-Time Threat Response
Cybersecurity
Data to Defense: Generative AI and RAG Powering Real-Time Threat Response
SANS Institute Intermediate 11mo ago
Meet Bjorn: The Viking Network Raider!
Cybersecurity
Meet Bjorn: The Viking Network Raider!
The Cyber Mentor Beginner 11mo ago
Do you need both? #shorts #iphone #android #starlink #vpn
Cybersecurity
Do you need both? #shorts #iphone #android #starlink #vpn
David Bombal Intermediate 11mo ago
The Gremlin Stealer Malware
Cybersecurity
The Gremlin Stealer Malware
John Hammond Beginner 11mo ago
Hacking IP Cameras (CCTV) with Demos and Real World Examples
Cybersecurity
Hacking IP Cameras (CCTV) with Demos and Real World Examples
David Bombal Beginner 11mo ago
Team Shellphish AIxCC Interview
Cybersecurity
Team Shellphish AIxCC Interview
John Hammond Intermediate 11mo ago
📚 Coursera Courses Opens on Coursera · Free to audit
1 / 3 View all →
Cryptography I
📚 Coursera Course ↗
Self-paced
Cryptography I
Opens on Coursera ↗
Memory, Encryption, and Protecting Data in iOS
📚 Coursera Course ↗
Self-paced
Memory, Encryption, and Protecting Data in iOS
Opens on Coursera ↗
API Basics 2: Build a Blog (REST, URLs & HTTP Requests)
📚 Coursera Course ↗
Self-paced
API Basics 2: Build a Blog (REST, URLs & HTTP Requests)
Opens on Coursera ↗
Network Security
📚 Coursera Course ↗
Self-paced
Network Security
Opens on Coursera ↗
Introducing Google Security Operations (SOAR)
📚 Coursera Course ↗
Self-paced
Introducing Google Security Operations (SOAR)
Opens on Coursera ↗
Technical Deep Dive with Incident Response Tools
📚 Coursera Course ↗
Self-paced
Technical Deep Dive with Incident Response Tools
Opens on Coursera ↗