✕ Clear filters
5,209 lessons

🔐 Cybersecurity

Ethical hacking, penetration testing, network security, CTFs and defensive security

All ▶ YouTube 176,392📚 Coursera 16,153
Shock to the System: Re-Evaluating Your Security Operations
Cybersecurity
Shock to the System: Re-Evaluating Your Security Operations
SANS Institute Intermediate 5y ago
The Art of Blue Teaming
Cybersecurity
The Art of Blue Teaming
SANS Institute Intermediate 5y ago
what am i doing?? (aws...security+.....ccna?)
Cybersecurity
what am i doing?? (aws...security+.....ccna?)
NetworkChuck Intermediate 5y ago
Joscha Bach: Artificial Consciousness and the Nature of Reality | Lex Fridman Podcast #101
Cybersecurity
Joscha Bach: Artificial Consciousness and the Nature of Reality | Lex Fridman Podcast #101
Lex Fridman Beginner 5y ago
Learn Git
Cybersecurity
Learn Git
HackerSploit Beginner 5y ago
NahamCon CTF starts TOMORROW!
Cybersecurity
NahamCon CTF starts TOMORROW!
John Hammond Beginner 5y ago
Cybertalk - EP6 - Don't Dual Boot
Cybersecurity
Cybertalk - EP6 - Don't Dual Boot
HackerSploit Intermediate 5y ago
HackTheBox - Nest
Cybersecurity
HackTheBox - Nest
IppSec Beginner 5y ago
I PASSED the Linux+ (how to pass the CompTIA Linux+ Exam)
Cybersecurity
I PASSED the Linux+ (how to pass the CompTIA Linux+ Exam)
NetworkChuck Beginner 5y ago
When Learning Backend Engineering Ask Why, not What (Minute Engineering)
Cybersecurity
When Learning Backend Engineering Ask Why, not What (Minute Engineering)
Hussein Nasser Beginner 5y ago
Carnegie Mellon University Advanced Database Course Is a GREAT resource for Backend Engineers!
Cybersecurity
Carnegie Mellon University Advanced Database Course Is a GREAT resource for Backend Engineers!
Hussein Nasser Beginner 5y ago
CML FAQs: Wireshark, passwords, Docker and more.
Cybersecurity
CML FAQs: Wireshark, passwords, Docker and more.
David Bombal Beginner 5y ago
CTFs are AWESOME!
Cybersecurity
CTFs are AWESOME!
LiveOverflow Beginner 5y ago
CTFs are TERRIBLE!
Cybersecurity
CTFs are TERRIBLE!
LiveOverflow Beginner 5y ago
HackTheBox - Resolute
Cybersecurity
HackTheBox - Resolute
IppSec Intermediate 5y ago
Keeping Your Phone and Laptop Secure
Cybersecurity
Keeping Your Phone and Laptop Secure
CS50 Beginner 5y ago
Free CCNP 350-401 ENCOR Complete Course: 6.4: REST APIs Part 6
Cybersecurity
Free CCNP 350-401 ENCOR Complete Course: 6.4: REST APIs Part 6
David Bombal Intermediate 5y ago
Running CTFs with Docker (VirSecCon CTF Recap)
Cybersecurity
Running CTFs with Docker (VirSecCon CTF Recap)
John Hammond Intermediate 5y ago
TryHackMe - Brainstorm Walkthrough (Buffer Overflows Lets GOOO)
Cybersecurity
TryHackMe - Brainstorm Walkthrough (Buffer Overflows Lets GOOO)
The Cyber Mentor Beginner 5y ago
Stephen Schwarzman: Going Big in Business, Investing, and AI | Lex Fridman Podcast #96
Cybersecurity
Stephen Schwarzman: Going Big in Business, Investing, and AI | Lex Fridman Podcast #96
Lex Fridman Beginner 5y ago
Shellcode Analysis 101 | SANS@MIC Talk
Cybersecurity
Shellcode Analysis 101 | SANS@MIC Talk
SANS Institute Advanced 5y ago
SANS Live Online Interactive Local Lab Demo – FOR508: Advanced Incident Response
Cybersecurity
SANS Live Online Interactive Local Lab Demo – FOR508: Advanced Incident Response
SANS Institute Advanced 5y ago
CYA by Using CIA -- Correctly For a Change | SANS@MIC Talk
Cybersecurity
CYA by Using CIA -- Correctly For a Change | SANS@MIC Talk
SANS Institute Intermediate 5y ago
Remote Forensic Investigations in the Context of COVID-19 | SANS@MIC Talk
Cybersecurity
Remote Forensic Investigations in the Context of COVID-19 | SANS@MIC Talk
SANS Institute Intermediate 5y ago
Introducing Blueprint
Cybersecurity
Introducing Blueprint
SANS Institute Beginner 5y ago
Waiting for a cyber range exercise is not enough | SANS@MIC Talk
Cybersecurity
Waiting for a cyber range exercise is not enough | SANS@MIC Talk
SANS Institute Beginner 5y ago
Nmap - Firewall Detection (ACK Probing)
Cybersecurity
Nmap - Firewall Detection (ACK Probing)
HackerSploit Intermediate 5y ago
Nmap - Inverse TCP Flag Scanning (FIN, XMAS & NULL)
Cybersecurity
Nmap - Inverse TCP Flag Scanning (FIN, XMAS & NULL)
HackerSploit Intermediate 5y ago
Nmap - Output And Verbosity
Cybersecurity
Nmap - Output And Verbosity
HackerSploit Intermediate 5y ago
Threat Hunting and the Rise of Targeted eCrime Intrusions | STAR Webcast
Cybersecurity
Threat Hunting and the Rise of Targeted eCrime Intrusions | STAR Webcast
SANS Institute Advanced 5y ago
STRESSED OUT!! (you need to learn EVERYTHING RIGHT NOW!!)
Cybersecurity
STRESSED OUT!! (you need to learn EVERYTHING RIGHT NOW!!)
NetworkChuck Beginner 5y ago
Nmap - UDP Scanning
Cybersecurity
Nmap - UDP Scanning
HackerSploit Intermediate 5y ago
Nmap - TCP Connect & Stealth (SYN) Scanning
Cybersecurity
Nmap - TCP Connect & Stealth (SYN) Scanning
HackerSploit Intermediate 5y ago
Nmap - OS And Service Version Scanning
Cybersecurity
Nmap - OS And Service Version Scanning
HackerSploit Intermediate 5y ago
Nmap - Host Discovery With Ping Sweep
Cybersecurity
Nmap - Host Discovery With Ping Sweep
HackerSploit Intermediate 5y ago
TCP-3 Way Handshake Explained
Cybersecurity
TCP-3 Way Handshake Explained
HackerSploit Beginner 5y ago
Network Scanning - TCP Flags & TCP 3-Way Handshake
Cybersecurity
Network Scanning - TCP Flags & TCP 3-Way Handshake
HackerSploit Intermediate 5y ago
Free CCNP 350-401 ENCOR Complete Course: 6.4: REST APIs Part 5
Cybersecurity
Free CCNP 350-401 ENCOR Complete Course: 6.4: REST APIs Part 5
David Bombal Intermediate 5y ago
Moving Past Just Googling It: Harvesting and Using OSINT | SANS@MIC Talk
Cybersecurity
Moving Past Just Googling It: Harvesting and Using OSINT | SANS@MIC Talk
SANS Institute Intermediate 5y ago
Free CCNP 350-401 ENCOR Complete Course: 6.4: REST APIs Part 4
Cybersecurity
Free CCNP 350-401 ENCOR Complete Course: 6.4: REST APIs Part 4
David Bombal Intermediate 5y ago
Puppet for Network Engineers (CCNA and CCNP Automation)
Cybersecurity
Puppet for Network Engineers (CCNA and CCNP Automation)
NetworkChuck Beginner 5y ago
Find_Evil - Threat Hunting | SANS@MIC Talk
Cybersecurity
Find_Evil - Threat Hunting | SANS@MIC Talk
SANS Institute Advanced 5y ago
TryHackMe! Buffer Overflow & Penetration Testing
Cybersecurity
TryHackMe! Buffer Overflow & Penetration Testing
John Hammond Intermediate 5y ago
Tricking modern endpoint security products | SANS@MIC Talk
Cybersecurity
Tricking modern endpoint security products | SANS@MIC Talk
SANS Institute Advanced 5y ago
Modern Domain Deception - The risk, issues and potentiality | SANS@MIC Talk
Cybersecurity
Modern Domain Deception - The risk, issues and potentiality | SANS@MIC Talk
SANS Institute Beginner 5y ago
What you need to study in 2020
Cybersecurity
What you need to study in 2020
David Bombal Beginner 5y ago
IT certifications: one thing I HATE! (but not anymore)
Cybersecurity
IT certifications: one thing I HATE! (but not anymore)
NetworkChuck Beginner 5y ago
TryHackMe! Wget for Privilege Escalation
Cybersecurity
TryHackMe! Wget for Privilege Escalation
John Hammond Intermediate 5y ago
📚 Coursera Courses Opens on Coursera · Free to audit
1 / 3 View all →
(SSCP) Systems Security Certified Practitioner: Unit 6
📚 Coursera Course ↗
Self-paced
(SSCP) Systems Security Certified Practitioner: Unit 6
Opens on Coursera ↗
Data Center Security Management with Microsoft System Center
📚 Coursera Course ↗
Self-paced
Data Center Security Management with Microsoft System Center
Opens on Coursera ↗
Implement Platform Protection
📚 Coursera Course ↗
Self-paced
Implement Platform Protection
Opens on Coursera ↗
Cybersecurity and Mobility
📚 Coursera Course ↗
Self-paced
Cybersecurity and Mobility
Opens on Coursera ↗
CCNP and CCIE Security Core SCOR 350-701(Exam Blueprint 1.1)
📚 Coursera Course ↗
Self-paced
CCNP and CCIE Security Core SCOR 350-701(Exam Blueprint 1.1)
Opens on Coursera ↗
Introduction to Detection and Incident Response
📚 Coursera Course ↗
Self-paced
Introduction to Detection and Incident Response
Opens on Coursera ↗