✕ Clear filters
5,255 lessons

🔐 Cybersecurity

Ethical hacking, penetration testing, network security, CTFs and defensive security

All ▶ YouTube 184,738📚 Coursera 16,347
Ivanka Trump: Politics, Family, Real Estate, Fashion, Music, and Life | Lex Fridman Podcast #436
Cybersecurity
Ivanka Trump: Politics, Family, Real Estate, Fashion, Music, and Life | Lex Fridman Podcast #436
Lex Fridman Beginner 1y ago
Cyber Security Full Course | Cyber Security Training For Beginners | Cyber Security Course | Edureka
Cybersecurity
Cyber Security Full Course | Cyber Security Training For Beginners | Cyber Security Course | Edureka
edureka! Beginner 1y ago
Never store your passwords & keys like this! #shorts #passwords #cybersecurity
Cybersecurity
Never store your passwords & keys like this! #shorts #passwords #cybersecurity
David Bombal Intermediate 1y ago
Simplified Google Cloud network security: Zero-trust and beyond
Cybersecurity
Simplified Google Cloud network security: Zero-trust and beyond
Google Cloud Tech Intermediate 1y ago
Protect your workload with Google Cloud next generation firewall
Cybersecurity
Protect your workload with Google Cloud next generation firewall
Google Cloud Tech Advanced 1y ago
Secure your Cloud journey with effortless protection from Palo Alto Networks & Google Cloud
Cybersecurity
Secure your Cloud journey with effortless protection from Palo Alto Networks & Google Cloud
Google Cloud Beginner 1y ago
Nmap basic scan with HackerD #shorts #nmap #kalilinx
Cybersecurity
Nmap basic scan with HackerD #shorts #nmap #kalilinx
David Bombal Beginner 1y ago
Introduction To Red Teaming
Cybersecurity
Introduction To Red Teaming
HackerSploit Beginner 1y ago
HackTheBox - Jab
Cybersecurity
HackTheBox - Jab
IppSec Beginner 1y ago
The ad malware scam
Cybersecurity
The ad malware scam
Jack Rhysider Intermediate 1y ago
Breaking into Penetration Testing: Career Tips and Insights
Cybersecurity
Breaking into Penetration Testing: Career Tips and Insights
The Cyber Mentor Beginner 1y ago
Speed Up Pentest Report Writing
Cybersecurity
Speed Up Pentest Report Writing
John Hammond Beginner 1y ago
The Confidence Formula: 5 Steps to Transform Your Self-Belief
Cybersecurity
The Confidence Formula: 5 Steps to Transform Your Self-Belief
Russell Brunson Beginner 1y ago
Bypass SQL Filters & Get SQL Injection With These Quick Tips
Cybersecurity
Bypass SQL Filters & Get SQL Injection With These Quick Tips
The Cyber Mentor Beginner 1y ago
Stop Scammers from Controlling Your Computer
Cybersecurity
Stop Scammers from Controlling Your Computer
John Hammond Beginner 1y ago
Russia Hacked the US Elections?
Cybersecurity
Russia Hacked the US Elections?
Jack Rhysider Intermediate 1y ago
Pentesting Diaries 0x1 - SQL Injection 101
Cybersecurity
Pentesting Diaries 0x1 - SQL Injection 101
HackerSploit Beginner 1y ago
Advance your career in business with Royal Holloway, University of London
Cybersecurity
Advance your career in business with Royal Holloway, University of London
Coursera Beginner 1y ago
Leveraging Ethical Hacking Skills for Network and Application Security | Edureka x EC Council
Cybersecurity
Leveraging Ethical Hacking Skills for Network and Application Security | Edureka x EC Council
edureka! Advanced 1y ago
Simon Sinek: "Strong Thigh Muscles = More friends", This Is Why You Can't Make Friends!
Cybersecurity
Simon Sinek: "Strong Thigh Muscles = More friends", This Is Why You Can't Make Friends!
The Diary Of A CEO Beginner 1y ago
HackTheBox - Crafty
Cybersecurity
HackTheBox - Crafty
IppSec Beginner 1y ago
1000 Players - One Game of Doom
Cybersecurity
1000 Players - One Game of Doom
ThePrimeagen Intermediate 1y ago
Dr. Ullrich on Today’s Cyber Threats: SANSFIRE 2024 Insights
Cybersecurity
Dr. Ullrich on Today’s Cyber Threats: SANSFIRE 2024 Insights
SANS Institute Advanced 1y ago
For the Win: Aligning Security Initiatives with the Business
Cybersecurity
For the Win: Aligning Security Initiatives with the Business
SANS Institute Beginner 1y ago
Hacking Roadmap to Success: AMA with The Cyber Mentor and FREE training!
Cybersecurity
Hacking Roadmap to Success: AMA with The Cyber Mentor and FREE training!
David Bombal Beginner 1y ago
Next Gen Hackers are NEXT level 🤯
Cybersecurity
Next Gen Hackers are NEXT level 🤯
David Bombal Beginner 1y ago
North Korean Hackers Targeting American Comedies
Cybersecurity
North Korean Hackers Targeting American Comedies
Jack Rhysider Intermediate 1y ago
How to Prepare for The Practical Web Pentest Professional Exam
Cybersecurity
How to Prepare for The Practical Web Pentest Professional Exam
The Cyber Mentor Beginner 1y ago
Hack your water and electricity! Myth or Reality?
Cybersecurity
Hack your water and electricity! Myth or Reality?
David Bombal Beginner 1y ago
How US forces crippled ISIS computers
Cybersecurity
How US forces crippled ISIS computers
Jack Rhysider Intermediate 1y ago
Hacking a Smart Camera: IoT Hacking With Andrew Bellini (Part 5 - Conclusion)
Cybersecurity
Hacking a Smart Camera: IoT Hacking With Andrew Bellini (Part 5 - Conclusion)
The Cyber Mentor Beginner 1y ago
OSINT Deep Dive: What Voter Records Can Tell You
Cybersecurity
OSINT Deep Dive: What Voter Records Can Tell You
The Cyber Mentor Beginner 1y ago
Cyber Security Interview Question and Answers  | CyberSecurity Interview Tips  | Edureka
Cybersecurity
Cyber Security Interview Question and Answers | CyberSecurity Interview Tips | Edureka
edureka! Advanced 1y ago
What’s worse than TikTok's data collection?
Cybersecurity
What’s worse than TikTok's data collection?
Jack Rhysider Intermediate 1y ago
Fuzz Faster with Turbo Intruder
Cybersecurity
Fuzz Faster with Turbo Intruder
The Cyber Mentor Beginner 1y ago
How North Korea led the largest crypto heist in history
Cybersecurity
How North Korea led the largest crypto heist in history
Jack Rhysider Intermediate 1y ago
Stealing Computer Passwords on Login
Cybersecurity
Stealing Computer Passwords on Login
John Hammond Beginner 1y ago
3 Tips to Pass Your Next Pentesting Exam | Cybersecurity and Hacking
Cybersecurity
3 Tips to Pass Your Next Pentesting Exam | Cybersecurity and Hacking
The Cyber Mentor Beginner 1y ago
What to Know About IT Certifications
Cybersecurity
What to Know About IT Certifications
The Cyber Mentor Beginner 1y ago
Will AI replace Cybersecurity professionals? Tom from Spunk replies. #shorts #AI #cybersecurity
Cybersecurity
Will AI replace Cybersecurity professionals? Tom from Spunk replies. #shorts #AI #cybersecurity
David Bombal Intermediate 1y ago
The cheat device that snuck onto Nintendo's platform
Cybersecurity
The cheat device that snuck onto Nintendo's platform
Jack Rhysider Intermediate 1y ago
HackTheBox - POV
Cybersecurity
HackTheBox - POV
IppSec Beginner 1y ago
$25 million lost to AI impersonation scam
Cybersecurity
$25 million lost to AI impersonation scam
Jack Rhysider Intermediate 1y ago
Three Mental Models for Cybersecurity
Cybersecurity
Three Mental Models for Cybersecurity
The Cyber Mentor Beginner 1y ago
The Future of Cybersecurity with Cisco & Splunk's $28 billion investment!
Cybersecurity
The Future of Cybersecurity with Cisco & Splunk's $28 billion investment!
David Bombal Beginner 1y ago
Keynote | Challenges and Opportunities for Modern CISOs
Cybersecurity
Keynote | Challenges and Opportunities for Modern CISOs
SANS Institute Intermediate 1y ago
Leading Without Authority: Leadership Beyond Titles
Cybersecurity
Leading Without Authority: Leadership Beyond Titles
SANS Institute Intermediate 1y ago
Navigating the AI Security Horizon: A CISO’s Guide to Sustaining Cyber Resilience
Cybersecurity
Navigating the AI Security Horizon: A CISO’s Guide to Sustaining Cyber Resilience
SANS Institute Beginner 1y ago
📚 Coursera Courses Opens on Coursera · Free to audit
1 / 3 View all →
Pentesting APIs
📚 Coursera Course ↗
Self-paced
Pentesting APIs
Opens on Coursera ↗
Certified Kubernetes Administrator (CKA): Unit 4
📚 Coursera Course ↗
Self-paced
Certified Kubernetes Administrator (CKA): Unit 4
Opens on Coursera ↗
Certified Ethical Hacker (CEH): Unit 4
📚 Coursera Course ↗
Self-paced
Certified Ethical Hacker (CEH): Unit 4
Opens on Coursera ↗
Check Point Jump Start: Maestro Hyperscale Network Security
📚 Coursera Course ↗
Self-paced
Check Point Jump Start: Maestro Hyperscale Network Security
Opens on Coursera ↗
Advanced Threat Hunting and Incident Response
📚 Coursera Course ↗
Self-paced
Advanced Threat Hunting and Incident Response
Opens on Coursera ↗
Fundamentals of Network Security and Cryptography
📚 Coursera Course ↗
Self-paced
Fundamentals of Network Security and Cryptography
Opens on Coursera ↗