✕ Clear filters
5,252 lessons

🔐 Cybersecurity

Ethical hacking, penetration testing, network security, CTFs and defensive security

All ▶ YouTube 184,629📚 Coursera 16,303
RevOps: "OR... I can set up Zapier to scan the contents..."
Cybersecurity
RevOps: "OR... I can set up Zapier to scan the contents..."
Zapier Intermediate 12mo ago
What is the MITRE CVE Program - and Why It Matters So Much
Cybersecurity
What is the MITRE CVE Program - and Why It Matters So Much
The Cyber Mentor Beginner 12mo ago
Hidden Dangers of Phone Cameras! #PhoneCameraSpy #CameraHack #CyberSecurity
Cybersecurity
Hidden Dangers of Phone Cameras! #PhoneCameraSpy #CameraHack #CyberSecurity
Arivi by HCL GUVI Beginner 12mo ago
Jim Rohn’s 12 Pillars of Unshakable Success | The Ultimate Personal Code
Cybersecurity
Jim Rohn’s 12 Pillars of Unshakable Success | The Ultimate Personal Code
Evan Carmichael Intermediate 12mo ago
The brain of a pea? #shorts #hub #switch #network #wireshark #ccna
Cybersecurity
The brain of a pea? #shorts #hub #switch #network #wireshark #ccna
David Bombal Intermediate 1y ago
RIP CVE Program?! How the MITRE Funding Crisis Threatens Cybersecurity
Cybersecurity
RIP CVE Program?! How the MITRE Funding Crisis Threatens Cybersecurity
The Cyber Mentor Beginner 1y ago
4chan penetrated by a gang of soyjaks…
Cybersecurity
4chan penetrated by a gang of soyjaks…
Fireship Beginner 1y ago
Real-Time cyber threats
Cybersecurity
Real-Time cyber threats
Weights & Biases Intermediate 1y ago
cybersecurity just got f***ed
Cybersecurity
cybersecurity just got f***ed
John Hammond Intermediate 1y ago
Do you agree? Using Open WiFi networks in 2025? #shorts #wifi #iphone #android #cybersecurity
Cybersecurity
Do you agree? Using Open WiFi networks in 2025? #shorts #wifi #iphone #android #cybersecurity
David Bombal Intermediate 1y ago
Open Source Vs  Closed Source Model | Amr Awadallah | Data Science Dojo #opensource #ai
Cybersecurity
Open Source Vs Closed Source Model | Amr Awadallah | Data Science Dojo #opensource #ai
Data Science Dojo Beginner 1y ago
Panel | Mentors and Mentees: Navigating Cybersecurity's Path Together
Cybersecurity
Panel | Mentors and Mentees: Navigating Cybersecurity's Path Together
SANS Institute Intermediate 1y ago
A Day in the Life of a Network Security Engineer
Cybersecurity
A Day in the Life of a Network Security Engineer
SANS Institute Advanced 1y ago
Finding Web App Vulnerabilities with AI
Cybersecurity
Finding Web App Vulnerabilities with AI
John Hammond Intermediate 1y ago
RevOps: "The CRM AI did what!? I know what to do. Zapier."
Cybersecurity
RevOps: "The CRM AI did what!? I know what to do. Zapier."
Zapier Intermediate 1y ago
HackTheBox - LinkVortex
Cybersecurity
HackTheBox - LinkVortex
IppSec Beginner 1y ago
Cybersecurity Skills You NEED To Learn (2026) | The Most In-Demand Cybersecurity Skills | Edureka
Cybersecurity
Cybersecurity Skills You NEED To Learn (2026) | The Most In-Demand Cybersecurity Skills | Edureka
edureka! Beginner 1y ago
Hide Your Secrets Like a Pro! #tricks #techintamil #tech
Cybersecurity
Hide Your Secrets Like a Pro! #tricks #techintamil #tech
Arivi by HCL GUVI Beginner 1y ago
How FIN6 Exfiltrates Files Over FTP
Cybersecurity
How FIN6 Exfiltrates Files Over FTP
HackerSploit Intermediate 1y ago
From Zero to Zero Day (and beyond) - Life of a Hacker: Jonathan Jacobi
Cybersecurity
From Zero to Zero Day (and beyond) - Life of a Hacker: Jonathan Jacobi
LiveOverflow Beginner 1y ago
We bought stolen election access before the hackers did
Cybersecurity
We bought stolen election access before the hackers did
Weights & Biases Intermediate 1y ago
The hunt for America's most wanted computer scientist...
Cybersecurity
The hunt for America's most wanted computer scientist...
Fireship Beginner 1y ago
CZ Enhances Healthcare Innovation with the Databricks Data Intelligence Platform
Cybersecurity
CZ Enhances Healthcare Innovation with the Databricks Data Intelligence Platform
Databricks Beginner 1y ago
Fraud Detection in the AI Era // Rafael Sandroni // MLOps Podcast #301
Cybersecurity
Fraud Detection in the AI Era // Rafael Sandroni // MLOps Podcast #301
MLOps.community Intermediate 1y ago
HackTheBox - BlockBlock
Cybersecurity
HackTheBox - BlockBlock
IppSec Beginner 1y ago
LIVE: Moose on the loose | CVE | Cybersecurity | AMA
Cybersecurity
LIVE: Moose on the loose | CVE | Cybersecurity | AMA
The Cyber Mentor Beginner 1y ago
Hardware Reverse Engineering with a Logic Analyzer
Cybersecurity
Hardware Reverse Engineering with a Logic Analyzer
The Cyber Mentor Beginner 1y ago
Lightning Talk | Ever sucked into Wikipedia for three hours? CTI might be for you!
Cybersecurity
Lightning Talk | Ever sucked into Wikipedia for three hours? CTI might be for you!
SANS Institute Beginner 1y ago
A Day in the Life of a Threat Emulation Specialist: Demystifying Offensive Cybersecurity
Cybersecurity
A Day in the Life of a Threat Emulation Specialist: Demystifying Offensive Cybersecurity
SANS Institute Beginner 1y ago
Lightning Talk | Negating the Noise: Prioritize Your Cybersecurity
Cybersecurity
Lightning Talk | Negating the Noise: Prioritize Your Cybersecurity
SANS Institute Beginner 1y ago
Cyber Adjacent: 5 Lessons Learned from a Day in the Life of an IT Project Manager
Cybersecurity
Cyber Adjacent: 5 Lessons Learned from a Day in the Life of an IT Project Manager
SANS Institute Beginner 1y ago
From TV news to cybersecurity: the 5 steps I took to completely change careers
Cybersecurity
From TV news to cybersecurity: the 5 steps I took to completely change careers
SANS Institute Beginner 1y ago
Going Technical, Against All Odds: From Digital Communications to Reverse Engineering Malware
Cybersecurity
Going Technical, Against All Odds: From Digital Communications to Reverse Engineering Malware
SANS Institute Beginner 1y ago
Screenshot.jpg (When They Got Hacked)
Cybersecurity
Screenshot.jpg (When They Got Hacked)
John Hammond Beginner 1y ago
How AI Dating Scams Are Getting Dangerously Smart in 2025
Cybersecurity
How AI Dating Scams Are Getting Dangerously Smart in 2025
The Cyber Mentor Beginner 1y ago
From Special Forces to Cybersecurity: Rich Greene on Communication and Persuasion in Infosec
Cybersecurity
From Special Forces to Cybersecurity: Rich Greene on Communication and Persuasion in Infosec
SANS Institute Intermediate 1y ago
LIVE: Memory Forensics | Volatility | Cybersecurity | Blue Team | AMA
Cybersecurity
LIVE: Memory Forensics | Volatility | Cybersecurity | Blue Team | AMA
The Cyber Mentor Beginner 1y ago
Watch Out for this AI Prompt Injection Hack!
Cybersecurity
Watch Out for this AI Prompt Injection Hack!
The Cyber Mentor Beginner 1y ago
I Backdoored Cursor AI
Cybersecurity
I Backdoored Cursor AI
John Hammond Intermediate 1y ago
RevOps: "Don't worry. Zapier will wake it up."
Cybersecurity
RevOps: "Don't worry. Zapier will wake it up."
Zapier Intermediate 1y ago
Burpsuite proxy browser and App Interception
Cybersecurity
Burpsuite proxy browser and App Interception
David Bombal Intermediate 1y ago
Learn Cybersecurity Defense!
Cybersecurity
Learn Cybersecurity Defense!
John Hammond Beginner 1y ago
How to Avoid These Cybersecurity Resume Mistakes
Cybersecurity
How to Avoid These Cybersecurity Resume Mistakes
The Cyber Mentor Beginner 1y ago
Turn Your Hard-Earned Experience into Impact
Cybersecurity
Turn Your Hard-Earned Experience into Impact
SANS Institute Intermediate 1y ago
LIVE: Exploit Development | Shellcoding | Cybersecurity | Red Team | AMA
Cybersecurity
LIVE: Exploit Development | Shellcoding | Cybersecurity | Red Team | AMA
The Cyber Mentor Beginner 1y ago
How I Landed My First Cybersecurity Job
Cybersecurity
How I Landed My First Cybersecurity Job
The Cyber Mentor Beginner 1y ago
Security Operations (SOC) 101 Course - 10+ Hours of Content!
Cybersecurity
Security Operations (SOC) 101 Course - 10+ Hours of Content!
The Cyber Mentor Beginner 1y ago
Movie vs Reality: Tech Hacking Scene from Singam! #scienceandtechnology #techintamil #hackingscenes
Cybersecurity
Movie vs Reality: Tech Hacking Scene from Singam! #scienceandtechnology #techintamil #hackingscenes
Arivi by HCL GUVI Beginner 1y ago