✕ Clear filters
1,211 lessons

Intermediate Lessons

Curated from top practitioners. Filtered, not flooded.

All ▶ YouTube 201,098📚 Coursera 18,198🎤 TED 1
Caesar Cipher | "Caesar Salad" (Hackcon2018 CTF)
Cybersecurity
Caesar Cipher | "Caesar Salad" (Hackcon2018 CTF)
John Hammond Intermediate 7y ago
Wireshark Decrypting SSL | "Ssleepy" TJCTF 2018
Cybersecurity
Wireshark Decrypting SSL | "Ssleepy" TJCTF 2018
John Hammond Intermediate 7y ago
Off-By-One Error | "Titled Troop" TJCTF 2018
Cybersecurity
Off-By-One Error | "Titled Troop" TJCTF 2018
John Hammond Intermediate 7y ago
LSB Steganography | "Lexington State Bank" TJCTF 2018
Cybersecurity
LSB Steganography | "Lexington State Bank" TJCTF 2018
John Hammond Intermediate 7y ago
Brute-forcing Vignere Cipher | "Vinegar" TJCTF 2018
Cybersecurity
Brute-forcing Vignere Cipher | "Vinegar" TJCTF 2018
John Hammond Intermediate 7y ago
HTTP Cookies | "Cookie Monster" TJCTF 2018
Cybersecurity
HTTP Cookies | "Cookie Monster" TJCTF 2018
John Hammond Intermediate 7y ago
HTML Source Code | "Blank" TJCTF 2018
Cybersecurity
HTML Source Code | "Blank" TJCTF 2018
John Hammond Intermediate 7y ago
String Extension w/ Ltrace | "Validator" TJCTF 2018
Cybersecurity
String Extension w/ Ltrace | "Validator" TJCTF 2018
John Hammond Intermediate 7y ago
Brute-Force Attack | "Python Reversing" TJCTF 2018
Cybersecurity
Brute-Force Attack | "Python Reversing" TJCTF 2018
John Hammond Intermediate 7y ago
Joining Discord | "Discord" TJCTF 2018
Cybersecurity
Joining Discord | "Discord" TJCTF 2018
John Hammond Intermediate 7y ago
Git Repository Depth | "Huuuuuge" TJCTF 2018
Cybersecurity
Git Repository Depth | "Huuuuuge" TJCTF 2018
John Hammond Intermediate 7y ago
Decimal to Hex | "Nothing But Everything" TJCTF 2018
Cybersecurity
Decimal to Hex | "Nothing But Everything" TJCTF 2018
John Hammond Intermediate 7y ago
Infinite JavaScript Scrolling | "Moar Horses" TJCTF 2018
Cybersecurity
Infinite JavaScript Scrolling | "Moar Horses" TJCTF 2018
John Hammond Intermediate 7y ago
Uncommon SQL Injection | "Ess Kyoo Ell" TJCTF 2018
Cybersecurity
Uncommon SQL Injection | "Ess Kyoo Ell" TJCTF 2018
John Hammond Intermediate 7y ago
Local File Inclusion | "Programmable Hyperlinked Pasta" TJCTF 2018
Cybersecurity
Local File Inclusion | "Programmable Hyperlinked Pasta" TJCTF 2018
John Hammond Intermediate 7y ago
GIF Strings | "Trippy" TJCTF 2018
Cybersecurity
GIF Strings | "Trippy" TJCTF 2018
John Hammond Intermediate 7y ago
HTTP Request Options | "Request Me" TJCTF 2018
Cybersecurity
HTTP Request Options | "Request Me" TJCTF 2018
John Hammond Intermediate 7y ago
Stego with Stegsolve.jar | "Weird Logo" TJCTF 2018
Cybersecurity
Stego with Stegsolve.jar | "Weird Logo" TJCTF 2018
John Hammond Intermediate 7y ago
RGB Color Threshold | "Interference" TJCTF 2018
Cybersecurity
RGB Color Threshold | "Interference" TJCTF 2018
John Hammond Intermediate 7y ago
Solving Wordsearches | "Caesar's Complication" TJCTF 2018
Cybersecurity
Solving Wordsearches | "Caesar's Complication" TJCTF 2018
John Hammond Intermediate 7y ago
RSA Cryptography | "Classic" TJCTF 2018
Cybersecurity
RSA Cryptography | "Classic" TJCTF 2018
John Hammond Intermediate 7y ago
MD5 Hash Crack | "Central Savings Agency" TJCTF 2018
Cybersecurity
MD5 Hash Crack | "Central Savings Agency" TJCTF 2018
John Hammond Intermediate 7y ago
PicoCTF 2017 [33] A Thing Called the Stack
Cybersecurity
PicoCTF 2017 [33] A Thing Called the Stack
John Hammond Intermediate 7y ago
Chinese Remainder Theorem | PicoCTF 2017 [32] Weird RSA
Cybersecurity
Chinese Remainder Theorem | PicoCTF 2017 [32] Weird RSA
John Hammond Intermediate 7y ago
How Did You Get Into Programming?
Cybersecurity
How Did You Get Into Programming?
John Hammond Intermediate 7y ago
PicoCTF 2017 [31] LeakedHashes
Cybersecurity
PicoCTF 2017 [31] LeakedHashes
John Hammond Intermediate 7y ago
Pseudorandom Number Generators | PicoCTF [30] SoRandom
Image & Video AI
Pseudorandom Number Generators | PicoCTF [30] SoRandom
John Hammond Intermediate 7y ago
USB Devices in Wireshark | PicoCTF 2017 [29] Just Keyp Trying
Cybersecurity
USB Devices in Wireshark | PicoCTF 2017 [29] Just Keyp Trying
John Hammond Intermediate 7y ago
Port Knocking Attack | Ryan's CTF [17] Knock-Knock FINALE
Cybersecurity
Port Knocking Attack | Ryan's CTF [17] Knock-Knock FINALE
John Hammond Intermediate 7y ago
PCAP Manipulation | Ryan's CTF [16] Custom Encoded Data
Cybersecurity
PCAP Manipulation | Ryan's CTF [16] Custom Encoded Data
John Hammond Intermediate 7y ago
Sudo ltrace | Ryan's CTF [15] Strings wont help you
Cybersecurity
Sudo ltrace | Ryan's CTF [15] Strings wont help you
John Hammond Intermediate 7y ago
Embedded GZIP | Ryan's CTF [14] Mystery File
Cybersecurity
Embedded GZIP | Ryan's CTF [14] Mystery File
John Hammond Intermediate 7y ago
BASIC Buffer Overflow | Ryan's CTF [13] Everyday I'm Bufferin
Cybersecurity
BASIC Buffer Overflow | Ryan's CTF [13] Everyday I'm Bufferin
John Hammond Intermediate 7y ago
Command Injection | Ryan's CTF [12] Input Validation
Cybersecurity
Command Injection | Ryan's CTF [12] Input Validation
John Hammond Intermediate 7y ago
ALIAS Commands | Ryan's CTF [11] Find Flag Again
Cybersecurity
ALIAS Commands | Ryan's CTF [11] Find Flag Again
John Hammond Intermediate 7y ago
Reversing Android APK | Ryan's CTF [10] These are not the droids
Cybersecurity
Reversing Android APK | Ryan's CTF [10] These are not the droids
John Hammond Intermediate 7y ago
Binary ltrace | Ryan's CTF [08] What's the password?
Cybersecurity
Binary ltrace | Ryan's CTF [08] What's the password?
John Hammond Intermediate 7y ago
Image Strings | Ryan's CTF [07] "Stenography"
Cybersecurity
Image Strings | Ryan's CTF [07] "Stenography"
John Hammond Intermediate 7y ago
VIM Shell | Ryan's CTF [06] Escape the Jail
Cybersecurity
VIM Shell | Ryan's CTF [06] Escape the Jail
John Hammond Intermediate 7y ago
MySQL Password Administration | Ryan's CTF [05] Database Password
Data Analytics & Business Intelligence
MySQL Password Administration | Ryan's CTF [05] Database Password
John Hammond Intermediate 7y ago
HTTP Authentication | Ryan's CTF [04] Encoded Credentials
Cybersecurity
HTTP Authentication | Ryan's CTF [04] Encoded Credentials
John Hammond Intermediate 7y ago
PATH Environment Variable | Ryan's CTF [09] Find the Flag
Cybersecurity
PATH Environment Variable | Ryan's CTF [09] Find the Flag
John Hammond Intermediate 7y ago
Ryan's CTF [02] FTP File Transfer
Cybersecurity
Ryan's CTF [02] FTP File Transfer
John Hammond Intermediate 7y ago
Ryan's CTF [01] Hidden Web Flag
Cybersecurity
Ryan's CTF [01] Hidden Web Flag
John Hammond Intermediate 7y ago
FULL 2 HOUR Ryan's CTF
Cybersecurity
FULL 2 HOUR Ryan's CTF
John Hammond Intermediate 7y ago
Ryan's CTF TIMELAPSE
Cybersecurity
Ryan's CTF TIMELAPSE
John Hammond Intermediate 7y ago
PicoCTF 2017 [18] computeAES
Cybersecurity
PicoCTF 2017 [18] computeAES
John Hammond Intermediate 7y ago
Git/Linux Hacking | Bandit: OverTheWire (Level 32)
Cybersecurity
Git/Linux Hacking | Bandit: OverTheWire (Level 32)
John Hammond Intermediate 7y ago
📚 Coursera Courses Opens on Coursera · Free to audit
1 / 3 View all →
Development Economics
📚 Coursera Course ↗
Self-paced
Development Economics
Opens on Coursera ↗
Create an Employee Feedback Survey with TypeForm
📚 Coursera Course ↗
Self-paced
Create an Employee Feedback Survey with TypeForm
Opens on Coursera ↗
Git and GitHub: Version Control for Modern Development
📚 Coursera Course ↗
Self-paced
Git and GitHub: Version Control for Modern Development
Opens on Coursera ↗
Advanced Portfolio Construction and Analysis with Python
📚 Coursera Course ↗
Self-paced
Advanced Portfolio Construction and Analysis with Python
Opens on Coursera ↗
Link Analytics to Strategy
📚 Coursera Course ↗
Self-paced
Link Analytics to Strategy
Opens on Coursera ↗
Unreal Engine 5 For Beginners: Characters & Interiors
📚 Coursera Course ↗
Self-paced
Unreal Engine 5 For Beginners: Characters & Interiors
Opens on Coursera ↗