✕ Clear filters
439 lessons

🔐 Cybersecurity

Ethical hacking, penetration testing, network security, CTFs and defensive security

All ▶ YouTube 200,964📚 Coursera 18,180🎤 TED 1
Extremely Easy Identity Management (with Fletcher Heisler!)
Cybersecurity
Extremely Easy Identity Management (with Fletcher Heisler!)
John Hammond Beginner 3d ago
HUGE supply chain attack
Cybersecurity
HUGE supply chain attack
John Hammond Beginner 1w ago
ChatGPT For The Dark Web
Cybersecurity
ChatGPT For The Dark Web
John Hammond Beginner 2w ago
NahamSec Teaches Me Bug Bounty Basics
Cybersecurity
NahamSec Teaches Me Bug Bounty Basics
John Hammond Beginner 3w ago
An Interview with Allie Mellen (author: CODE WAR)
Cybersecurity
An Interview with Allie Mellen (author: CODE WAR)
John Hammond Beginner 4w ago
The Payload Podcast #003
Cybersecurity
The Payload Podcast #003
John Hammond Beginner 1mo ago
crypto scammers phish with physical mail
Cybersecurity
crypto scammers phish with physical mail
John Hammond Beginner 1mo ago
thousands of Google API keys exposed
Cybersecurity
thousands of Google API keys exposed
John Hammond Beginner 1mo ago
Learn PowerShell!
Cybersecurity
Learn PowerShell!
John Hammond Beginner 1mo ago
The Payload Podcast #002 with Connor McGarr
Cybersecurity
The Payload Podcast #002 with Connor McGarr
John Hammond Beginner 1mo ago
Russia is hacking zero-days again
Cybersecurity
Russia is hacking zero-days again
John Hammond Beginner 1mo ago
ContinuumCon is back for 2026!
Cybersecurity
ContinuumCon is back for 2026!
John Hammond Beginner 1mo ago
An Interview with Eva Benn!
Cybersecurity
An Interview with Eva Benn!
John Hammond Beginner 1mo ago
TiKTok needs to fix this vulnerability
Cybersecurity
TiKTok needs to fix this vulnerability
John Hammond Beginner 1mo ago
AI wrote a hit piece
Cybersecurity
AI wrote a hit piece
John Hammond Beginner 1mo ago
this is really funny
Cybersecurity
this is really funny
John Hammond Beginner 1mo ago
Moltbook is still weird (and AI skills suck)
Cybersecurity
Moltbook is still weird (and AI skills suck)
John Hammond Beginner 1mo ago
The Payload Podcast #001 with Jonny Johnson & Max Harley
Cybersecurity
The Payload Podcast #001 with Jonny Johnson & Max Harley
John Hammond Beginner 2mo ago
🦞🤖MOAR CLAWDBOT CRAP🦞🤖
Cybersecurity
🦞🤖MOAR CLAWDBOT CRAP🦞🤖
John Hammond Beginner 2mo ago
🦞🤖CLAWDBOT SECURITY??🦞🤖
Cybersecurity
🦞🤖CLAWDBOT SECURITY??🦞🤖
John Hammond Beginner 2mo ago
🤖🤖🤖
Cybersecurity
🤖🤖🤖
John Hammond Beginner 2mo ago
🤖🤖
Cybersecurity
🤖🤖
John Hammond Beginner 2mo ago
🤖
Cybersecurity
🤖
John Hammond Beginner 2mo ago
"I made an Evil MCP server" (and AI fell for it)
Cybersecurity
"I made an Evil MCP server" (and AI fell for it)
John Hammond Beginner 2mo ago
Learn Cyber Deception!
Cybersecurity
Learn Cyber Deception!
John Hammond Beginner 3mo ago
Hacking Endpoint to Identity (Microsoft 365): "ConsentFix"
Cybersecurity
Hacking Endpoint to Identity (Microsoft 365): "ConsentFix"
John Hammond Beginner 3mo ago
Infostealer Malware Logs Analyzed by... AI !?!
Cybersecurity
Infostealer Malware Logs Analyzed by... AI !?!
John Hammond Beginner 3mo ago
carving emails & AI prompt injection hacking
Cybersecurity
carving emails & AI prompt injection hacking
John Hammond Beginner 3mo ago
Beginner Blue Team Training!
Cybersecurity
Beginner Blue Team Training!
John Hammond Beginner 4mo ago
Phishing for Passwords! (Advent of Cyber Day 02)
Cybersecurity
Phishing for Passwords! (Advent of Cyber Day 02)
John Hammond Beginner 4mo ago
NPM malware now has multiple targets!
Cybersecurity
NPM malware now has multiple targets!
John Hammond Beginner 4mo ago
Learn Cybersecurity: Advent of Cyber 2025 (TryHackMe!)
Cybersecurity
Learn Cybersecurity: Advent of Cyber 2025 (TryHackMe!)
John Hammond Beginner 4mo ago
Keylogger Malware Analysis
Cybersecurity
Keylogger Malware Analysis
John Hammond Beginner 4mo ago
Wazuh gives visibility to EVERYTHING
Cybersecurity
Wazuh gives visibility to EVERYTHING
John Hammond Beginner 4mo ago
hacking twitch chat
Cybersecurity
hacking twitch chat
John Hammond Beginner 4mo ago
RAW videos from REAL hackers
Cybersecurity
RAW videos from REAL hackers
John Hammond Beginner 4mo ago
Microsoft Entra ID INSECURE DEFAULTS
Cybersecurity
Microsoft Entra ID INSECURE DEFAULTS
John Hammond Beginner 4mo ago
Hacking with Nuclei: Uncovering .git Secrets
Cybersecurity
Hacking with Nuclei: Uncovering .git Secrets
John Hammond Beginner 4mo ago
a new kind of Capture The Flag hacking
Cybersecurity
a new kind of Capture The Flag hacking
John Hammond Beginner 4mo ago
I Had Claude MCP Hack Me
Cybersecurity
I Had Claude MCP Hack Me
John Hammond Beginner 4mo ago
microsoft turned me down
Cybersecurity
microsoft turned me down
John Hammond Beginner 4mo ago
Lua Infostealer Analysis ("My Hawaii Vacation" CTF)
Cybersecurity
Lua Infostealer Analysis ("My Hawaii Vacation" CTF)
John Hammond Beginner 4mo ago
Fake DMCA MALWARE Scam
Cybersecurity
Fake DMCA MALWARE Scam
John Hammond Beginner 5mo ago
How Hackers Become Admin (they just ask)
Cybersecurity
How Hackers Become Admin (they just ask)
John Hammond Beginner 5mo ago
when you change your password, it's already stolen
Cybersecurity
when you change your password, it's already stolen
John Hammond Beginner 5mo ago
Learn Hardware Hacking!
Cybersecurity
Learn Hardware Hacking!
John Hammond Beginner 5mo ago
hacking copilot AI (with Tobias Diehl)
Cybersecurity
hacking copilot AI (with Tobias Diehl)
John Hammond Beginner 5mo ago
Regex for Hackers (with Python)
Cybersecurity
Regex for Hackers (with Python)
John Hammond Beginner 5mo ago
📚 Coursera Courses Opens on Coursera · Free to audit
1 / 3 View all →
Ethical Hacking with Metasploit, SQL & Crypto
📚 Coursera Course ↗
Self-paced
Ethical Hacking with Metasploit, SQL & Crypto
Opens on Coursera ↗
Business Implementation and Security
📚 Coursera Course ↗
Self-paced
Business Implementation and Security
Opens on Coursera ↗
Cloud Security on AWS
📚 Coursera Course ↗
Self-paced
Cloud Security on AWS
Opens on Coursera ↗
Hardware and Operating System Foundations III
📚 Coursera Course ↗
Self-paced
Hardware and Operating System Foundations III
Opens on Coursera ↗
Cybersecurity: Overlooked Threats to Your Strategy
📚 Coursera Course ↗
Self-paced
Cybersecurity: Overlooked Threats to Your Strategy
Opens on Coursera ↗
Security Command Center: Identify and Prioritize Risks
📚 Coursera Course ↗
Self-paced
Security Command Center: Identify and Prioritize Risks
Opens on Coursera ↗