✕ Clear filters
543 lessons

Beginner Lessons

Curated from top practitioners. Filtered, not flooded.

All ▶ YouTube 201,048📚 Coursera 18,188🎤 TED 1
Hackers Abuse Zero-Day Exploit for CrushFTP
Cybersecurity
Hackers Abuse Zero-Day Exploit for CrushFTP
John Hammond Beginner 1y ago
This File Steals Passwords
AI News & Updates
This File Steals Passwords
John Hammond Beginner 1y ago
Hackers Use Github For Malware
AI News & Updates
Hackers Use Github For Malware
John Hammond Beginner 1y ago
Finding WEIRD Devices on the Public Internet
AI News & Updates
Finding WEIRD Devices on the Public Internet
John Hammond Beginner 1y ago
Government Unveils Malware Analysis Tool, But...
Cybersecurity
Government Unveils Malware Analysis Tool, But...
John Hammond Beginner 1y ago
Bypassing SmartScreen on Web Browsers
AI News & Updates
Bypassing SmartScreen on Web Browsers
John Hammond Beginner 1y ago
Telegram Has Been Hacked
AI News & Updates
Telegram Has Been Hacked
John Hammond Beginner 1y ago
Scraping Dark Web Sites with Python
Cybersecurity
Scraping Dark Web Sites with Python
John Hammond Beginner 1y ago
How Hackers Can Hide PowerShell in Environment Variables
Cybersecurity
How Hackers Can Hide PowerShell in Environment Variables
John Hammond Beginner 2y ago
Malware & Cybersecurity Threats on the Horizon
Cybersecurity
Malware & Cybersecurity Threats on the Horizon
John Hammond Beginner 2y ago
Hackers Hide with Clever Alternate Data Streams
Cybersecurity
Hackers Hide with Clever Alternate Data Streams
John Hammond Beginner 2y ago
The Apex Legends Hacker: Destroyer2009
AI News & Updates
The Apex Legends Hacker: Destroyer2009
John Hammond Beginner 2y ago
Github Copilot Made My Code More Vulnerable
AI-Assisted Coding
Github Copilot Made My Code More Vulnerable
John Hammond Beginner 2y ago
Malware Analysis & Threat Intel: UAC Bypasses
Cybersecurity
Malware Analysis & Threat Intel: UAC Bypasses
John Hammond Beginner 2y ago
Hackers Can Phish with PLAINTEXT QR Codes
AI News & Updates
Hackers Can Phish with PLAINTEXT QR Codes
John Hammond Beginner 2y ago
I Made Malware In Under 20 Minutes
Cybersecurity
I Made Malware In Under 20 Minutes
John Hammond Beginner 2y ago
Sweet New Threat Intel Just Dropped
Cybersecurity
Sweet New Threat Intel Just Dropped
John Hammond Beginner 2y ago
Malware Analysis Made Easy: Cloud Investigations
Cybersecurity
Malware Analysis Made Easy: Cloud Investigations
John Hammond Beginner 2y ago
Calculating Smart Contract Vulnerability Impact: Low To Critical
Cybersecurity
Calculating Smart Contract Vulnerability Impact: Low To Critical
John Hammond Beginner 2y ago
Learning Entra ID (Azure Active Directory)
Cybersecurity
Learning Entra ID (Azure Active Directory)
John Hammond Beginner 2y ago
Network Threat Hunting Made Easy (Finding Hackers)
Cybersecurity
Network Threat Hunting Made Easy (Finding Hackers)
John Hammond Beginner 2y ago
How to Hack Active Directory with ASREP Roasting
Cybersecurity
How to Hack Active Directory with ASREP Roasting
John Hammond Beginner 2y ago
Create Your Own File Extension
Cybersecurity
Create Your Own File Extension
John Hammond Beginner 2y ago
Learn to Hack AWS & Kubernetes Clusters (for free)
Cybersecurity
Learn to Hack AWS & Kubernetes Clusters (for free)
John Hammond Beginner 2y ago
Writing Custom Malware: Import Address Table Hooking
Cybersecurity
Writing Custom Malware: Import Address Table Hooking
John Hammond Beginner 2y ago
Can ChatGPT Find Smart Contract Vulnerabilities?
Cybersecurity
Can ChatGPT Find Smart Contract Vulnerabilities?
John Hammond Beginner 2y ago
How Hackers Hide From Memory Scanners
Cybersecurity
How Hackers Hide From Memory Scanners
John Hammond Beginner 2y ago
ChatGPT Learns the Rust Programming Language
Cybersecurity
ChatGPT Learns the Rust Programming Language
John Hammond Beginner 2y ago
Create Your Own Dark Web Website
Cybersecurity
Create Your Own Dark Web Website
John Hammond Beginner 2y ago
How Hackers Exploit Vulnerable Drivers
Cybersecurity
How Hackers Exploit Vulnerable Drivers
John Hammond Beginner 2y ago
Hackers Are Exploiting Critical Vulnerabilities in File Transfer Software
Cybersecurity
Hackers Are Exploiting Critical Vulnerabilities in File Transfer Software
John Hammond Beginner 2y ago
I Explored Ransomware Cybercrime on the Dark Web
Cybersecurity
I Explored Ransomware Cybercrime on the Dark Web
John Hammond Beginner 2y ago
Learn Active Directory Kerberoasting
Cybersecurity
Learn Active Directory Kerberoasting
John Hammond Beginner 2y ago
How Does Malware Know It's Being Monitored?
AI Safety & Ethics
How Does Malware Know It's Being Monitored?
John Hammond Beginner 2y ago
We Hacked An AWS Account. Again.
Large Language Models
We Hacked An AWS Account. Again.
John Hammond Beginner 2y ago
How Hackers & Malware Spoof Processes
AI Safety & Ethics
How Hackers & Malware Spoof Processes
John Hammond Beginner 2y ago
Zimbra ZCS 0-day Exploited In The Wild
Cybersecurity
Zimbra ZCS 0-day Exploited In The Wild
John Hammond Beginner 2y ago
Dependency Confusion with AWS CodeArtifact
AI Tools & Apps
Dependency Confusion with AWS CodeArtifact
John Hammond Beginner 2y ago
Dark Web Dumpster Diving (Hunting Infostealer Malware)
Cybersecurity
Dark Web Dumpster Diving (Hunting Infostealer Malware)
John Hammond Beginner 2y ago
How Hackers Write Malware & Evade Antivirus (Nim)
AI Safety & Ethics
How Hackers Write Malware & Evade Antivirus (Nim)
John Hammond Beginner 2y ago
TryHackMe! Finding Computer Artifacts with osquery
Cybersecurity
TryHackMe! Finding Computer Artifacts with osquery
John Hammond Beginner 2y ago
Stealing OAuth Github Tokens with AWS CodeBuild
Large Language Models
Stealing OAuth Github Tokens with AWS CodeBuild
John Hammond Beginner 2y ago
Bypassing Branch Protections with Github Actions (CI/CD)
AI Safety & Ethics
Bypassing Branch Protections with Github Actions (CI/CD)
John Hammond Beginner 2y ago
Ethical Hacking: Bypass Passwords with Linux PAM Degradation Attack
Cybersecurity
Ethical Hacking: Bypass Passwords with Linux PAM Degradation Attack
John Hammond Beginner 2y ago
FAKE Microsoft Login to Hacked Charity Scam
AI News & Updates
FAKE Microsoft Login to Hacked Charity Scam
John Hammond Beginner 2y ago
Hands-on Ransomware: Exploring Cybercrime
AI Safety & Ethics
Hands-on Ransomware: Exploring Cybercrime
John Hammond Beginner 2y ago
Threat Emulation & Purple Teaming (with PlexTrac Runbooks)
Data Analytics & Business Intelligence
Threat Emulation & Purple Teaming (with PlexTrac Runbooks)
John Hammond Beginner 2y ago
How Can CI/CD Go Horribly Wrong?
AI Safety & Ethics
How Can CI/CD Go Horribly Wrong?
John Hammond Beginner 2y ago
📚 Coursera Courses Opens on Coursera · Free to audit
1 / 3 View all →
Radio para internet con Podcast: conceptos básicos
📚 Coursera Course ↗
Self-paced
Radio para internet con Podcast: conceptos básicos
Opens on Coursera ↗
Automate Financial Analysis with AI Pipelines
📚 Coursera Course ↗
Self-paced
Automate Financial Analysis with AI Pipelines
Opens on Coursera ↗
Ethical Hacking
📚 Coursera Course ↗
Self-paced
Ethical Hacking
Opens on Coursera ↗
Host a Quiz Review with Blooket
📚 Coursera Course ↗
Self-paced
Host a Quiz Review with Blooket
Opens on Coursera ↗
MLOps with Vertex AI: Manage Features - Português Brasileiro
📚 Coursera Course ↗
Self-paced
MLOps with Vertex AI: Manage Features - Português Brasileiro
Opens on Coursera ↗
Beginning Security
📚 Coursera Course ↗
Self-paced
Beginning Security
Opens on Coursera ↗