✕ Clear filters
5,252 lessons

🔐 Cybersecurity

Ethical hacking, penetration testing, network security, CTFs and defensive security

All ▶ YouTube 184,675📚 Coursera 16,317
What to Know About Becoming a Pentester
Cybersecurity
What to Know About Becoming a Pentester
The Cyber Mentor Beginner 1y ago
Hacking Ninja’s PayPal
Cybersecurity
Hacking Ninja’s PayPal
Jack Rhysider Intermediate 1y ago
Real World OSINT and Cyber Threat Intelligence Tips and Tricks
Cybersecurity
Real World OSINT and Cyber Threat Intelligence Tips and Tricks
David Bombal Beginner 1y ago
Master DOM Invader in 60 Seconds
Cybersecurity
Master DOM Invader in 60 Seconds
The Cyber Mentor Beginner 1y ago
The Pack: How cybersecurity is evolving
Cybersecurity
The Pack: How cybersecurity is evolving
Google Cloud Advanced 1y ago
Buying stolen social media accounts
Cybersecurity
Buying stolen social media accounts
Jack Rhysider Intermediate 1y ago
Permission to Hack You: Illicit Consent Grant Attack
Cybersecurity
Permission to Hack You: Illicit Consent Grant Attack
John Hammond Beginner 1y ago
Keynote | Thriving Together: Empowering Neurodivergent Individuals in the Workplace
Cybersecurity
Keynote | Thriving Together: Empowering Neurodivergent Individuals in the Workplace
SANS Institute Intermediate 1y ago
I’m OK, You’re OK, We’re OK: Living with AD(H)D in InfoSec
Cybersecurity
I’m OK, You’re OK, We’re OK: Living with AD(H)D in InfoSec
SANS Institute Intermediate 1y ago
I'm going to be a hacker
Cybersecurity
I'm going to be a hacker
NetworkChuck Beginner 1y ago
SQL injection | SQL Injection Attack Tutorial | Cybersecurity Training | Edureka Rewind
Cybersecurity
SQL injection | SQL Injection Attack Tutorial | Cybersecurity Training | Edureka Rewind
edureka! Beginner 1y ago
Planning Red Team Operations | Scope, ROE & Reporting
Cybersecurity
Planning Red Team Operations | Scope, ROE & Reporting
HackerSploit Beginner 1y ago
What is dark web? 🤔 | What if your movements are tracked? 🫨 | Dark Web | Cyber threat | GFG
Cybersecurity
What is dark web? 🤔 | What if your movements are tracked? 🫨 | Dark Web | Cyber threat | GFG
GeeksforGeeks Beginner 1y ago
He DROPPED cybersecurity to start an AI company + content
Cybersecurity
He DROPPED cybersecurity to start an AI company + content
Sajjaad Khader Beginner 1y ago
HackTheBox - Headless
Cybersecurity
HackTheBox - Headless
IppSec Beginner 1y ago
Mapping APT TTPs With MITRE ATT&CK Navigator
Cybersecurity
Mapping APT TTPs With MITRE ATT&CK Navigator
HackerSploit Beginner 1y ago
AI in Prompt Engineering Hacking #SocialEngineering #CyberSecurity #Phishing #AIThreats #aibeware
Cybersecurity
AI in Prompt Engineering Hacking #SocialEngineering #CyberSecurity #Phishing #AIThreats #aibeware
AI Beware Advanced 1y ago
Hacking Windows TrustedInstaller (GOD MODE)
Cybersecurity
Hacking Windows TrustedInstaller (GOD MODE)
John Hammond Beginner 1y ago
How to be Invisible Online using Expert OSINT techniques
Cybersecurity
How to be Invisible Online using Expert OSINT techniques
David Bombal Beginner 1y ago
HackTheBox - Corporate (FIXED)
Cybersecurity
HackTheBox - Corporate (FIXED)
IppSec Beginner 1y ago
Cyber security fundamentals | Understanding Cybersecurity Basics | Edureka Rewind
Cybersecurity
Cyber security fundamentals | Understanding Cybersecurity Basics | Edureka Rewind
edureka! Beginner 1y ago
Linux on Windows......Windows on Linux
Cybersecurity
Linux on Windows......Windows on Linux
NetworkChuck Beginner 1y ago
Ivanka Trump: Politics, Family, Real Estate, Fashion, Music, and Life | Lex Fridman Podcast #436
Cybersecurity
Ivanka Trump: Politics, Family, Real Estate, Fashion, Music, and Life | Lex Fridman Podcast #436
Lex Fridman Beginner 1y ago
How to transition from feeling overwhelmed to achieving hyperfocus in 45 minutes or less
Cybersecurity
How to transition from feeling overwhelmed to achieving hyperfocus in 45 minutes or less
SANS Institute Intermediate 1y ago
Supporting Thinking outside The Box-Allyship for neurodiverse colleagues
Cybersecurity
Supporting Thinking outside The Box-Allyship for neurodiverse colleagues
SANS Institute Beginner 1y ago
Inclusive Cybersecurity: Bridging the Accessibility Gap for People with Disabilities
Cybersecurity
Inclusive Cybersecurity: Bridging the Accessibility Gap for People with Disabilities
SANS Institute Intermediate 1y ago
Strategies for retaining and advancing neurodivergent employees in Cybersecurity
Cybersecurity
Strategies for retaining and advancing neurodivergent employees in Cybersecurity
SANS Institute Intermediate 1y ago
The Best and Worst of Hack The Box
Cybersecurity
The Best and Worst of Hack The Box
The Cyber Mentor Beginner 1y ago
The incident that got a robot arrested
Cybersecurity
The incident that got a robot arrested
Jack Rhysider Intermediate 1y ago
Exploit Failed. Now What?
Cybersecurity
Exploit Failed. Now What?
The Cyber Mentor Beginner 1y ago
How to Upgrade a Shell on Meterpreter
Cybersecurity
How to Upgrade a Shell on Meterpreter
The Cyber Mentor Beginner 1y ago
Introduction To The MITRE ATT&CK Framework
Cybersecurity
Introduction To The MITRE ATT&CK Framework
HackerSploit Beginner 1y ago
Red Team Frameworks & Methodologies
Cybersecurity
Red Team Frameworks & Methodologies
HackerSploit Beginner 1y ago
Could AI Take Our Jobs?
Cybersecurity
Could AI Take Our Jobs?
The Cyber Mentor Beginner 1y ago
The war between cheaters and game developers
Cybersecurity
The war between cheaters and game developers
Jack Rhysider Intermediate 1y ago
When to Start Your Cybersecurity Career
Cybersecurity
When to Start Your Cybersecurity Career
The Cyber Mentor Beginner 1y ago
They took his computer. That didn't stop him from hacking Rockstar Games and leaking GTA 6
Cybersecurity
They took his computer. That didn't stop him from hacking Rockstar Games and leaking GTA 6
David Bombal Intermediate 1y ago
3 SOC Analyst Projects for Beginners
Cybersecurity
3 SOC Analyst Projects for Beginners
The Cyber Mentor Beginner 1y ago
How a kid hacked a mobile farming game
Cybersecurity
How a kid hacked a mobile farming game
Jack Rhysider Intermediate 1y ago
Getting Started With Hardware Hacking
Cybersecurity
Getting Started With Hardware Hacking
The Cyber Mentor Beginner 1y ago
The biggest video game cheat operation
Cybersecurity
The biggest video game cheat operation
Jack Rhysider Intermediate 1y ago
Ubisoft sues 17-year-old for selling cheats
Cybersecurity
Ubisoft sues 17-year-old for selling cheats
Jack Rhysider Intermediate 1y ago
HackTheBox - Perfection
Cybersecurity
HackTheBox - Perfection
IppSec Beginner 1y ago
How to Get Pentesting Experience
Cybersecurity
How to Get Pentesting Experience
The Cyber Mentor Beginner 1y ago
Your webcam is at risk
Cybersecurity
Your webcam is at risk
Jack Rhysider Intermediate 1y ago
Pass the PWPA Exam With These Tips
Cybersecurity
Pass the PWPA Exam With These Tips
The Cyber Mentor Beginner 1y ago
Cyber Security Full Course | Cyber Security Training For Beginners | Cyber Security Course | Edureka
Cybersecurity
Cyber Security Full Course | Cyber Security Training For Beginners | Cyber Security Course | Edureka
edureka! Beginner 1y ago
Never store your passwords & keys like this! #shorts #passwords #cybersecurity
Cybersecurity
Never store your passwords & keys like this! #shorts #passwords #cybersecurity
David Bombal Intermediate 1y ago
📚 Coursera Courses Opens on Coursera · Free to audit
1 / 3 View all →
Blockchain and Cryptography Overview
📚 Coursera Course ↗
Self-paced
Blockchain and Cryptography Overview
Opens on Coursera ↗
Advanced Security Strategies and Incident Response
📚 Coursera Course ↗
Self-paced
Advanced Security Strategies and Incident Response
Opens on Coursera ↗
Advanced Penetration Testing with Kali Linux
📚 Coursera Course ↗
Self-paced
Advanced Penetration Testing with Kali Linux
Opens on Coursera ↗
Microsoft Copilot for Security
📚 Coursera Course ↗
Self-paced
Microsoft Copilot for Security
Opens on Coursera ↗
Introduction to Network Security
📚 Coursera Course ↗
Self-paced
Introduction to Network Security
Opens on Coursera ↗
Cybersecurity and the Internet of Things
📚 Coursera Course ↗
Self-paced
Cybersecurity and the Internet of Things
Opens on Coursera ↗