✕ Clear filters
543 lessons

Beginner Lessons

Curated from top practitioners. Filtered, not flooded.

All ▶ YouTube 201,051📚 Coursera 18,188🎤 TED 1
Getting Started in Firmware Analysis & IoT Reverse Engineering
Cybersecurity
Getting Started in Firmware Analysis & IoT Reverse Engineering
John Hammond Beginner 2y ago
Hunt for Hackers with Velociraptor
AI Safety & Ethics
Hunt for Hackers with Velociraptor
John Hammond Beginner 2y ago
Quick Forensics of Windows Event Logs (DeepBlueCLI)
AI Safety & Ethics
Quick Forensics of Windows Event Logs (DeepBlueCLI)
John Hammond Beginner 2y ago
What SECRETS are in your Clipboard?
Cybersecurity
What SECRETS are in your Clipboard?
John Hammond Beginner 2y ago
Cybersecurity Labs (FOR FREE) - Linux Backdoor Analysis
Cybersecurity
Cybersecurity Labs (FOR FREE) - Linux Backdoor Analysis
John Hammond Beginner 2y ago
How FAST Can You Write a Pentest Report?
Cybersecurity
How FAST Can You Write a Pentest Report?
John Hammond Beginner 3y ago
The Latest YouTube Malware Scam
Copywriting & Content Strategy
The Latest YouTube Malware Scam
John Hammond Beginner 3y ago
3CX VOIP Compromised & Supply Chain Threat
AI News & Updates
3CX VOIP Compromised & Supply Chain Threat
John Hammond Beginner 3y ago
CI/CD GOAT: Mad Hatter Capture The Flag
Cybersecurity
CI/CD GOAT: Mad Hatter Capture The Flag
John Hammond Beginner 3y ago
Free Hacking APIs Course (APISEC University!)
Cybersecurity
Free Hacking APIs Course (APISEC University!)
John Hammond Beginner 3y ago
a Hacker's Backdoor: Service Control Manager
AI News & Updates
a Hacker's Backdoor: Service Control Manager
John Hammond Beginner 3y ago
Unraveling Discord Token Stealer (python MALWARE)
Cybersecurity
Unraveling Discord Token Stealer (python MALWARE)
John Hammond Beginner 3y ago
Is This Website LEAKING?
Cybersecurity
Is This Website LEAKING?
John Hammond Beginner 3y ago
Strange File in Downloads Folder? Gootloader Malware Analysis
Cybersecurity
Strange File in Downloads Folder? Gootloader Malware Analysis
John Hammond Beginner 3y ago
Carving Exfiltrated Network Data from a Hack (Python & Scapy)
Cybersecurity
Carving Exfiltrated Network Data from a Hack (Python & Scapy)
John Hammond Beginner 3y ago
Internet Explorer Forced to Run Malware
AI Safety & Ethics
Internet Explorer Forced to Run Malware
John Hammond Beginner 3y ago
Fake OBS Studio Hack Targeting YouTubers
AI Safety & Ethics
Fake OBS Studio Hack Targeting YouTubers
John Hammond Beginner 3y ago
3 Things You Didn't Know about Windows Command Prompt
AI Safety & Ethics
3 Things You Didn't Know about Windows Command Prompt
John Hammond Beginner 3y ago
How To Bypass Website File Upload Restrictions
Cybersecurity
How To Bypass Website File Upload Restrictions
John Hammond Beginner 3y ago
Certified Penetration Testing Specialist! Chat with HackTheBox
Cybersecurity
Certified Penetration Testing Specialist! Chat with HackTheBox
John Hammond Beginner 3y ago
Filter Evasion in a REVERSE SHELL (no spaces!!)
Cybersecurity
Filter Evasion in a REVERSE SHELL (no spaces!!)
John Hammond Beginner 3y ago
ROP is DEAD! Kernel Driver Binary Exploitation
Cybersecurity
ROP is DEAD! Kernel Driver Binary Exploitation
John Hammond Beginner 3y ago
Start Hacking with the HEARTBLEED vulnerability: NahamCon CTF
Cybersecurity
Start Hacking with the HEARTBLEED vulnerability: NahamCon CTF
John Hammond Beginner 3y ago
Capture The Flag!  NahamCon EU CTF "MMORPG"
Cybersecurity
Capture The Flag! NahamCon EU CTF "MMORPG"
John Hammond Beginner 3y ago
Hardware Hacking! Day 19 - TryHackMe Advent of Cyber
Cybersecurity
Hardware Hacking! Day 19 - TryHackMe Advent of Cyber
John Hammond Beginner 3y ago
How To Manage Your Business Technology
Cybersecurity
How To Manage Your Business Technology
John Hammond Beginner 3y ago
Is this a SECURE laptop?
Cybersecurity
Is this a SECURE laptop?
John Hammond Beginner 3y ago
Unraveling the IcedID Malware Stager & Phishing Email
Cybersecurity
Unraveling the IcedID Malware Stager & Phishing Email
John Hammond Beginner 3y ago
Become a Certified Penetration Tester with HackTheBox CPTS!
Cybersecurity
Become a Certified Penetration Tester with HackTheBox CPTS!
John Hammond Beginner 3y ago
Setup EXTREME VULNERABLE Kernel Driver (HEVD)
Cybersecurity
Setup EXTREME VULNERABLE Kernel Driver (HEVD)
John Hammond Beginner 3y ago
Linux Portbending Explained
Cybersecurity
Linux Portbending Explained
John Hammond Beginner 3y ago
run SHELLCODE within BASH!?!
Cybersecurity
run SHELLCODE within BASH!?!
John Hammond Beginner 3y ago
Start KERNEL HACKING with VirtualKD!
Cybersecurity
Start KERNEL HACKING with VirtualKD!
John Hammond Beginner 3y ago
explore a Wordpress PHP BACKDOOR webshell
Cybersecurity
explore a Wordpress PHP BACKDOOR webshell
John Hammond Beginner 3y ago
TryHackMe! Advent of Cyber 2022 Kick-Off
Cybersecurity
TryHackMe! Advent of Cyber 2022 Kick-Off
John Hammond Beginner 3y ago
catch EVERY reverse shell while hacking! (VILLAIN)
Cybersecurity
catch EVERY reverse shell while hacking! (VILLAIN)
John Hammond Beginner 3y ago
Your choices matter… Responsible Red Teaming w/ HuskyHacks
Cybersecurity
Your choices matter… Responsible Red Teaming w/ HuskyHacks
John Hammond Beginner 3y ago
you should be using PODMAN
Cybersecurity
you should be using PODMAN
John Hammond Beginner 3y ago
CUSTOM Java Deserialization Exploit - Serial Snyker
Cybersecurity
CUSTOM Java Deserialization Exploit - Serial Snyker
John Hammond Beginner 3y ago
Cybercrime & Dark Web Conversations (w/ Shmuel!)
Cybersecurity
Cybercrime & Dark Web Conversations (w/ Shmuel!)
John Hammond Beginner 3y ago
Node.js "Pug" Server-Side Template Injection
Cybersecurity
Node.js "Pug" Server-Side Template Injection
John Hammond Beginner 3y ago
The King Of Malware is Back
Cybersecurity
The King Of Malware is Back
John Hammond Beginner 3y ago
Backup Server Hacked - SUPPLY CHAIN Code Execution
Cybersecurity
Backup Server Hacked - SUPPLY CHAIN Code Execution
John Hammond Beginner 3y ago
I store ALL my Passwords in AWS
Cybersecurity
I store ALL my Passwords in AWS
John Hammond Beginner 3y ago
NEW Python 3.11 !!!
Cybersecurity
NEW Python 3.11 !!!
John Hammond Beginner 3y ago
zip files & hack... (CVE-2022-1271 zgrep/gzip)
Cybersecurity
zip files & hack... (CVE-2022-1271 zgrep/gzip)
John Hammond Beginner 3y ago
How Hackers Hide
Cybersecurity
How Hackers Hide
John Hammond Beginner 3y ago
PASSWORDS LEFT OUT IN THE OPEN (Active Directory #10)
Cybersecurity
PASSWORDS LEFT OUT IN THE OPEN (Active Directory #10)
John Hammond Beginner 3y ago
📚 Coursera Courses Opens on Coursera · Free to audit
1 / 3 View all →
GenAI for Algorithmic Trading
📚 Coursera Course ↗
Self-paced
GenAI for Algorithmic Trading
Opens on Coursera ↗
Introduction to Python Programming
📚 Coursera Course ↗
Self-paced
Introduction to Python Programming
Opens on Coursera ↗
Foundational Sustainability Skills & Competencies
📚 Coursera Course ↗
Self-paced
Foundational Sustainability Skills & Competencies
Opens on Coursera ↗
Mathematical Foundations for Computing
📚 Coursera Course ↗
Self-paced
Mathematical Foundations for Computing
Opens on Coursera ↗
Análise de oportunidade de Blockchain
📚 Coursera Course ↗
Self-paced
Análise de oportunidade de Blockchain
Opens on Coursera ↗
Design and Detailing of RCC elements
📚 Coursera Course ↗
Self-paced
Design and Detailing of RCC elements
Opens on Coursera ↗