✕ Clear filters
5,255 lessons

🔐 Cybersecurity

Ethical hacking, penetration testing, network security, CTFs and defensive security

All ▶ YouTube 184,761📚 Coursera 16,379
Introduction to the Five Human Resources: Shen, Hun, Po, Yi, Zhi by Dr John McDonald.
Cybersecurity
Introduction to the Five Human Resources: Shen, Hun, Po, Yi, Zhi by Dr John McDonald.
TCM Academy Beginner 2y ago
HackTheBox - Investigation
Cybersecurity
HackTheBox - Investigation
IppSec Beginner 2y ago
Together, we can save the planet #shorts #earthday
Cybersecurity
Together, we can save the planet #shorts #earthday
TED-Ed Beginner 2y ago
Hacking IoT devices with Python (it's too easy to take control)
Cybersecurity
Hacking IoT devices with Python (it's too easy to take control)
David Bombal Beginner 2y ago
winget: Install ROGUE Software & Packages?
Cybersecurity
winget: Install ROGUE Software & Packages?
John Hammond Intermediate 2y ago
What SECRETS are in your Clipboard?
Cybersecurity
What SECRETS are in your Clipboard?
John Hammond Beginner 2y ago
Learn WebApp Pentesting: 2023 edition
Cybersecurity
Learn WebApp Pentesting: 2023 edition
The Cyber Mentor Beginner 3y ago
HackTheBox - Encoding
Cybersecurity
HackTheBox - Encoding
IppSec Beginner 3y ago
SANS Small Business Cyber Summit 2023
Cybersecurity
SANS Small Business Cyber Summit 2023
SANS Institute Beginner 3y ago
ICS Security with Dean Parsons | LastPass Breach with Moses Frost | Host Dean Parsons | Apr 11, 2023
Cybersecurity
ICS Security with Dean Parsons | LastPass Breach with Moses Frost | Host Dean Parsons | Apr 11, 2023
SANS Institute Advanced 3y ago
How to Hack MFA (Multi-Factor Authentication)
Cybersecurity
How to Hack MFA (Multi-Factor Authentication)
The Cyber Mentor Beginner 3y ago
When You Can't Breach the Network, Hack the Humans🎙Darknet Diaries Ep. 69: Human Hacker
Cybersecurity
When You Can't Breach the Network, Hack the Humans🎙Darknet Diaries Ep. 69: Human Hacker
Jack Rhysider Intermediate 3y ago
Cyber Security Challenge Germany (2023)
Cybersecurity
Cyber Security Challenge Germany (2023)
LiveOverflow Beginner 3y ago
Mom Hacked a Prison With a Clipboard & USB Stick🎙Darknet Diaries Ep. 67: The Big House
Cybersecurity
Mom Hacked a Prison With a Clipboard & USB Stick🎙Darknet Diaries Ep. 67: The Big House
Jack Rhysider Intermediate 3y ago
Attacking VSCode Extension from Browser? - Live Security Research
Cybersecurity
Attacking VSCode Extension from Browser? - Live Security Research
LiveOverflow Advanced 3y ago
3 HACKING gadgets you have to TRY!!
Cybersecurity
3 HACKING gadgets you have to TRY!!
NetworkChuck Intermediate 3y ago
Kubernetes Hacking: From Weak Applications to Cluster Control
Cybersecurity
Kubernetes Hacking: From Weak Applications to Cluster Control
John Hammond Intermediate 3y ago
Python Pwntools Hacking: ret2libc GOT & PLT
Cybersecurity
Python Pwntools Hacking: ret2libc GOT & PLT
John Hammond Intermediate 3y ago
Cybersecurity Labs (FOR FREE) - Linux Backdoor Analysis
Cybersecurity
Cybersecurity Labs (FOR FREE) - Linux Backdoor Analysis
John Hammond Beginner 3y ago
HackTheBox - BroScience
Cybersecurity
HackTheBox - BroScience
IppSec Beginner 3y ago
Top 3 Most Dangerous Lines of Code
Cybersecurity
Top 3 Most Dangerous Lines of Code
The Cyber Mentor Beginner 3y ago
How FAST Can You Write a Pentest Report?
Cybersecurity
How FAST Can You Write a Pentest Report?
John Hammond Beginner 3y ago
Password Hacking in Kali Linux
Cybersecurity
Password Hacking in Kali Linux
John Hammond Intermediate 3y ago
Attacking JWT - Header Injections
Cybersecurity
Attacking JWT - Header Injections
The Cyber Mentor Beginner 3y ago
HackTheBox - Sekhmet
Cybersecurity
HackTheBox - Sekhmet
IppSec Beginner 3y ago
A Cybersecurity Extortion Tale
Cybersecurity
A Cybersecurity Extortion Tale
The Cyber Mentor Beginner 3y ago
500K Subscriber Celebration!
Cybersecurity
500K Subscriber Celebration!
The Cyber Mentor Beginner 3y ago
SANS Neurodiversity in Cybersecurity Summit 2023
Cybersecurity
SANS Neurodiversity in Cybersecurity Summit 2023
SANS Institute Beginner 3y ago
Solving the Pickle Rick CTF
Cybersecurity
Solving the Pickle Rick CTF
The Cyber Mentor Beginner 3y ago
Must-See Keynote Returns to RSAC 2023: The Five Most Dangerous New Attack Techniques
Cybersecurity
Must-See Keynote Returns to RSAC 2023: The Five Most Dangerous New Attack Techniques
SANS Institute Beginner 3y ago
HackTheBox - Vessel
Cybersecurity
HackTheBox - Vessel
IppSec Beginner 3y ago
Linus Tech Tips Hack Explained
Cybersecurity
Linus Tech Tips Hack Explained
The Cyber Mentor Beginner 3y ago
Hackers Bypass Google Two-Factor Authentication (2FA) SMS
Cybersecurity
Hackers Bypass Google Two-Factor Authentication (2FA) SMS
John Hammond Intermediate 3y ago
Transparency from a CISO's Perspective
Cybersecurity
Transparency from a CISO's Perspective
SANS Institute Beginner 3y ago
CI/CD GOAT: Mad Hatter Capture The Flag
Cybersecurity
CI/CD GOAT: Mad Hatter Capture The Flag
John Hammond Beginner 3y ago
HTTP Fundamentals in 10 Minutes
Cybersecurity
HTTP Fundamentals in 10 Minutes
The Cyber Mentor Beginner 3y ago
HackTheBox - Extension
Cybersecurity
HackTheBox - Extension
IppSec Beginner 3y ago
Kali Purple 2023.1 Review
Cybersecurity
Kali Purple 2023.1 Review
The Cyber Mentor Beginner 3y ago
Free Hacking APIs Course (APISEC University!)
Cybersecurity
Free Hacking APIs Course (APISEC University!)
John Hammond Beginner 3y ago
Hacking CI/CD (Basic Pipeline Poisoning)
Cybersecurity
Hacking CI/CD (Basic Pipeline Poisoning)
John Hammond Intermediate 3y ago
Build, Break, and Hack WebSockets
Cybersecurity
Build, Break, and Hack WebSockets
The Cyber Mentor Beginner 3y ago
100% Scholarship Opportunities in Cybersecurity for Black American College Students
Cybersecurity
100% Scholarship Opportunities in Cybersecurity for Black American College Students
SANS Institute Beginner 3y ago
"I rob banks for a living," but it's all totally legal🎙Darknet Diaries Ep. 66: Freakyclown
Cybersecurity
"I rob banks for a living," but it's all totally legal🎙Darknet Diaries Ep. 66: Freakyclown
Jack Rhysider Intermediate 3y ago
Unraveling Discord Token Stealer (python MALWARE)
Cybersecurity
Unraveling Discord Token Stealer (python MALWARE)
John Hammond Beginner 3y ago
Practical Junior Malware Researcher (PJMR) Exam Overview
Cybersecurity
Practical Junior Malware Researcher (PJMR) Exam Overview
The Cyber Mentor Beginner 3y ago
Meet SANS Senior Instructor: Mark Baggett
Cybersecurity
Meet SANS Senior Instructor: Mark Baggett
SANS Institute Intermediate 3y ago
Meet SANS Instructor: Terrence Williams
Cybersecurity
Meet SANS Instructor: Terrence Williams
SANS Institute Intermediate 3y ago
Meet SANS Senior Instructor: John Hubbard
Cybersecurity
Meet SANS Senior Instructor: John Hubbard
SANS Institute Intermediate 3y ago
📚 Coursera Courses Opens on Coursera · Free to audit
1 / 3 View all →
Designing Robust Information System Security Architectures
📚 Coursera Course ↗
Self-paced
Designing Robust Information System Security Architectures
Opens on Coursera ↗
Cryptography: Learn Public Key Infrastructure from Scratch
📚 Coursera Course ↗
Self-paced
Cryptography: Learn Public Key Infrastructure from Scratch
Opens on Coursera ↗
Communication Strategies for a Virtual Age
📚 Coursera Course ↗
Self-paced
Communication Strategies for a Virtual Age
Opens on Coursera ↗
Intermediate Ethical Hacking Techniques
📚 Coursera Course ↗
Self-paced
Intermediate Ethical Hacking Techniques
Opens on Coursera ↗
What Is Cybersecurity?
📚 Coursera Course ↗
Self-paced
What Is Cybersecurity?
Opens on Coursera ↗
Create a Custom Network and Apply Firewall Rules
📚 Coursera Course ↗
Self-paced
Create a Custom Network and Apply Firewall Rules
Opens on Coursera ↗