✕ Clear filters
1,211 lessons

Intermediate Lessons

Curated from top practitioners. Filtered, not flooded.

All ▶ YouTube 200,964📚 Coursera 18,180🎤 TED 1
QR Codes on Linux
AI Safety & Ethics
QR Codes on Linux
John Hammond Intermediate 1y ago
Decode Hex on Linux
AI Safety & Ethics
Decode Hex on Linux
John Hammond Intermediate 1y ago
CrowdStrike Outage Recovery with BitLocker
AI Safety & Ethics
CrowdStrike Outage Recovery with BitLocker
John Hammond Intermediate 1y ago
How Hackers Compromise BIG Networks (with NetExec)
Cybersecurity
How Hackers Compromise BIG Networks (with NetExec)
John Hammond Intermediate 2y ago
The Apex Legends Hack.
Cybersecurity
The Apex Legends Hack.
John Hammond Intermediate 2y ago
Finding WEIRD Typosquatting Websites
Cybersecurity
Finding WEIRD Typosquatting Websites
John Hammond Intermediate 2y ago
The Secrets of The Tor Browser
Cybersecurity
The Secrets of The Tor Browser
John Hammond Intermediate 2y ago
Can a PDF File be Malware?
Cybersecurity
Can a PDF File be Malware?
John Hammond Intermediate 2y ago
Free Coding Tool Distributes Malware
Cybersecurity
Free Coding Tool Distributes Malware
John Hammond Intermediate 2y ago
Notepad.exe Will Snitch On You (full coding project)
Cybersecurity
Notepad.exe Will Snitch On You (full coding project)
John Hammond Intermediate 2y ago
One Code Mistake Ruined This Website
Cybersecurity
One Code Mistake Ruined This Website
John Hammond Intermediate 2y ago
Tracking Cybercrime on Telegram
Cybersecurity
Tracking Cybercrime on Telegram
John Hammond Intermediate 2y ago
Don't Forget This One Hacking Trick
Cybersecurity
Don't Forget This One Hacking Trick
John Hammond Intermediate 2y ago
SMB Shares & Cronjob to Initial Access (Proving Grounds: Dawn)
Cybersecurity
SMB Shares & Cronjob to Initial Access (Proving Grounds: Dawn)
John Hammond Intermediate 2y ago
Enterprise security one step at a time
Cybersecurity
Enterprise security one step at a time
John Hammond Intermediate 2y ago
I AUTOMATED a Penetration Test!?
Cybersecurity
I AUTOMATED a Penetration Test!?
John Hammond Intermediate 2y ago
Healthcare Software Exploit: CVE-2023-43208
Cybersecurity
Healthcare Software Exploit: CVE-2023-43208
John Hammond Intermediate 2y ago
Run this script with Eval
Cybersecurity
Run this script with Eval
John Hammond Intermediate 2y ago
Debug with JS-Beautify
Cybersecurity
Debug with JS-Beautify
John Hammond Intermediate 2y ago
Debug with Visual Studio
Cybersecurity
Debug with Visual Studio
John Hammond Intermediate 2y ago
Exploring the BIGGEST SCAMS in the Dark Web
Cybersecurity
Exploring the BIGGEST SCAMS in the Dark Web
John Hammond Intermediate 2y ago
Welcome back, Ryan Chapman
Cybersecurity
Welcome back, Ryan Chapman
John Hammond Intermediate 2y ago
PikaBot Malware Analysis: Debugging in Visual Studio
Cybersecurity
PikaBot Malware Analysis: Debugging in Visual Studio
John Hammond Intermediate 2y ago
Make Malware Analysis FASTER with Binary Emulation
Cybersecurity
Make Malware Analysis FASTER with Binary Emulation
John Hammond Intermediate 2y ago
Dig Deeper and Faster with AI
Cybersecurity
Dig Deeper and Faster with AI
John Hammond Intermediate 2y ago
I Made a Custom Threat Intel Feed (Connecting Apps with n8n)
Cybersecurity
I Made a Custom Threat Intel Feed (Connecting Apps with n8n)
John Hammond Intermediate 2y ago
NetworkChuck's Life Hack
Cybersecurity
NetworkChuck's Life Hack
John Hammond Intermediate 2y ago
How to Extract Plaintext Wi-Fi Passwords (with Rust)
Cybersecurity
How to Extract Plaintext Wi-Fi Passwords (with Rust)
John Hammond Intermediate 2y ago
This Computer Malware Steals Your Information
Cybersecurity
This Computer Malware Steals Your Information
John Hammond Intermediate 2y ago
Enhancing Your Environment
Cybersecurity
Enhancing Your Environment
John Hammond Intermediate 2y ago
Kernel Level Exploits
Cybersecurity
Kernel Level Exploits
John Hammond Intermediate 2y ago
Getting Ahead in the Industry
Cybersecurity
Getting Ahead in the Industry
John Hammond Intermediate 2y ago
Cyber Defense is Literally Free
Cybersecurity
Cyber Defense is Literally Free
John Hammond Intermediate 2y ago
How Hackers Move Through Networks (with Ligolo)
Cybersecurity
How Hackers Move Through Networks (with Ligolo)
John Hammond Intermediate 2y ago
This Windows Program can CLONE ITSELF
Cybersecurity
This Windows Program can CLONE ITSELF
John Hammond Intermediate 2y ago
I Hacked Another File Upload Website
Cybersecurity
I Hacked Another File Upload Website
John Hammond Intermediate 2y ago
Digital Forensics with FTK Imager (TryHackMe Advent of Cyber Day 8)
Cybersecurity
Digital Forensics with FTK Imager (TryHackMe Advent of Cyber Day 8)
John Hammond Intermediate 2y ago
How To Hack APIs with Python
Cybersecurity
How To Hack APIs with Python
John Hammond Intermediate 2y ago
This Cybercrime Group Puts Its Hackers Through School
Cybersecurity
This Cybercrime Group Puts Its Hackers Through School
John Hammond Intermediate 2y ago
TryHackMe! Advent of Cyber 2023 Kick-Off
Cybersecurity
TryHackMe! Advent of Cyber 2023 Kick-Off
John Hammond Intermediate 2y ago
Capture the Flag: Hacking Yet Another Markup Language
Cybersecurity
Capture the Flag: Hacking Yet Another Markup Language
John Hammond Intermediate 2y ago
This Cybercrime Forum Is Full Of Hackers
Cybersecurity
This Cybercrime Forum Is Full Of Hackers
John Hammond Intermediate 2y ago
How Hackers Compromise Other Users
Cybersecurity
How Hackers Compromise Other Users
John Hammond Intermediate 2y ago
The MOVEit Hack In Retrospect
Cybersecurity
The MOVEit Hack In Retrospect
John Hammond Intermediate 2y ago
where do you ACTUALLY submit vulnerabilities?
Cybersecurity
where do you ACTUALLY submit vulnerabilities?
John Hammond Intermediate 2y ago
I Took Over a Microsoft Cloud Account. Again.
Cybersecurity
I Took Over a Microsoft Cloud Account. Again.
John Hammond Intermediate 2y ago
Testing Your Cybersecurity Defenses
Cybersecurity
Testing Your Cybersecurity Defenses
John Hammond Intermediate 2y ago
Hacking with Bloodhound: Map Your Environment
Cybersecurity
Hacking with Bloodhound: Map Your Environment
John Hammond Intermediate 2y ago
📚 Coursera Courses Opens on Coursera · Free to audit
1 / 3 View all →
Azure: create a REST API using NodeJS Serverless Functions
📚 Coursera Course ↗
Self-paced
Azure: create a REST API using NodeJS Serverless Functions
Opens on Coursera ↗
AI, Business & the Future of Work
📚 Coursera Course ↗
Self-paced
AI, Business & the Future of Work
Opens on Coursera ↗
AppDynamics (Advanced)
📚 Coursera Course ↗
Self-paced
AppDynamics (Advanced)
Opens on Coursera ↗
Build Healthy Habits With Latest Neuroscience Research
📚 Coursera Course ↗
Self-paced
Build Healthy Habits With Latest Neuroscience Research
Opens on Coursera ↗
Building Web Pages with HTML & CSS
📚 Coursera Course ↗
Self-paced
Building Web Pages with HTML & CSS
Opens on Coursera ↗
Calculus through Data & Modeling: Differentiation Rules
📚 Coursera Course ↗
Self-paced
Calculus through Data & Modeling: Differentiation Rules
Opens on Coursera ↗