✕ Clear filters
1,211 lessons

Intermediate Lessons

Curated from top practitioners. Filtered, not flooded.

All ▶ YouTube 200,970📚 Coursera 18,181🎤 TED 1
they're selling WHAT on Telegram?!?
Cybersecurity
they're selling WHAT on Telegram?!?
John Hammond Intermediate 2y ago
I Stole a Microsoft 365 Account. Here's How.
Cybersecurity
I Stole a Microsoft 365 Account. Here's How.
John Hammond Intermediate 2y ago
this Cybersecurity Platform is FREE
Cybersecurity
this Cybersecurity Platform is FREE
John Hammond Intermediate 2y ago
Hacking Websites: NodeJS Server-Side Template Injection
Cybersecurity
Hacking Websites: NodeJS Server-Side Template Injection
John Hammond Intermediate 2y ago
Fetch the Flag CTF is Live Right Now
Cybersecurity
Fetch the Flag CTF is Live Right Now
John Hammond Intermediate 2y ago
The 3CX Hack In Retrospect
Cybersecurity
The 3CX Hack In Retrospect
John Hammond Intermediate 2y ago
Cloud Security with Microsoft 365 Developer Tenants
Cybersecurity
Cloud Security with Microsoft 365 Developer Tenants
John Hammond Intermediate 2y ago
RagnarLocker Ransomware Seized by Law Enforcement
Cybersecurity
RagnarLocker Ransomware Seized by Law Enforcement
John Hammond Intermediate 2y ago
They Made QR Codes LONGER?!?
Cybersecurity
They Made QR Codes LONGER?!?
John Hammond Intermediate 2y ago
3 FREE Resources for Cyber Defenders
Cybersecurity
3 FREE Resources for Cyber Defenders
John Hammond Intermediate 2y ago
Hunting for Hackers with Sigma Rules
Cybersecurity
Hunting for Hackers with Sigma Rules
John Hammond Intermediate 2y ago
Website Vulnerabilities to Fully Hacked Server
Cybersecurity
Website Vulnerabilities to Fully Hacked Server
John Hammond Intermediate 2y ago
Detect Hackers & Malware on your Computer (literally for free)
Cybersecurity
Detect Hackers & Malware on your Computer (literally for free)
John Hammond Intermediate 2y ago
New "Dark Web" Generative AI Chatbots?!
Cybersecurity
New "Dark Web" Generative AI Chatbots?!
John Hammond Intermediate 2y ago
Run ANY Linux Program In Memory
AI Safety & Ethics
Run ANY Linux Program In Memory
John Hammond Intermediate 2y ago
Which Visual Studio Code Extensions Can Be Hacked?
AI News & Updates
Which Visual Studio Code Extensions Can Be Hacked?
John Hammond Intermediate 2y ago
The Mysterious "Office Hotkey"..
AI Safety & Ethics
The Mysterious "Office Hotkey"..
John Hammond Intermediate 2y ago
How To Pivot Through a Network with Chisel
Cybersecurity
How To Pivot Through a Network with Chisel
John Hammond Intermediate 2y ago
Classify Malware with YARA
Cybersecurity
Classify Malware with YARA
John Hammond Intermediate 2y ago
AT&T Email List Exposed
AI Safety & Ethics
AT&T Email List Exposed
John Hammond Intermediate 2y ago
The FBI Disrupted a HUGE Malware Strain
AI News & Updates
The FBI Disrupted a HUGE Malware Strain
John Hammond Intermediate 2y ago
Your Computer could be For Sale on the Dark Web
Cybersecurity
Your Computer could be For Sale on the Dark Web
John Hammond Intermediate 2y ago
I Had ChatGPT Analyze My Code
Large Language Models
I Had ChatGPT Analyze My Code
John Hammond Intermediate 2y ago
Not All ZIP Files Are Equal
Cybersecurity
Not All ZIP Files Are Equal
John Hammond Intermediate 2y ago
How to Hack ArgoCD to Cluster Administrator
AI News & Updates
How to Hack ArgoCD to Cluster Administrator
John Hammond Intermediate 2y ago
Capture the Flag at Blackhat USA 2023!
Cybersecurity
Capture the Flag at Blackhat USA 2023!
John Hammond Intermediate 2y ago
Telegram Cybercrime is INSANE
Cybersecurity
Telegram Cybercrime is INSANE
John Hammond Intermediate 2y ago
I Broke Threads
AI Safety & Ethics
I Broke Threads
John Hammond Intermediate 2y ago
Compromising Terraform & AWS Atlantis Build Jobs
AI Tools & Apps
Compromising Terraform & AWS Atlantis Build Jobs
John Hammond Intermediate 2y ago
Hunting Malware with Velociraptor (YARA & Memory Forensics)
AI Safety & Ethics
Hunting Malware with Velociraptor (YARA & Memory Forensics)
John Hammond Intermediate 2y ago
Mass Digital Forensics & Incident Response with Velociraptor
Cybersecurity
Mass Digital Forensics & Incident Response with Velociraptor
John Hammond Intermediate 2y ago
How to Trick Hackers & Web Crawlers with Spidertrap
AI Safety & Ethics
How to Trick Hackers & Web Crawlers with Spidertrap
John Hammond Intermediate 2y ago
MOVEit Transfer Exploitation (my API presentation recording)
AI Safety & Ethics
MOVEit Transfer Exploitation (my API presentation recording)
John Hammond Intermediate 2y ago
How Hackers Use netsh.exe For Persistence & Code Execution (Sliver C2)
Cybersecurity
How Hackers Use netsh.exe For Persistence & Code Execution (Sliver C2)
John Hammond Intermediate 2y ago
Scale Your Cloud Infrastructure (Hosting CTFs)
Cybersecurity
Scale Your Cloud Infrastructure (Hosting CTFs)
John Hammond Intermediate 2y ago
Inside a Cybercrime Scam Operation
AI Tools & Apps
Inside a Cybercrime Scam Operation
John Hammond Intermediate 2y ago
How Hackers Evade Program Allowlists with DLLs
Cybersecurity
How Hackers Evade Program Allowlists with DLLs
John Hammond Intermediate 2y ago
How To Extract Plaintext Google Chrome Passwords
AI News & Updates
How To Extract Plaintext Google Chrome Passwords
John Hammond Intermediate 2y ago
Now Scammers Can RENT Email Addresses for Cybercrime
AI Safety & Ethics
Now Scammers Can RENT Email Addresses for Cybercrime
John Hammond Intermediate 2y ago
Rapid Windows Memory Analysis with Volatility 3
Cybersecurity
Rapid Windows Memory Analysis with Volatility 3
John Hammond Intermediate 2y ago
Exploring the Latest Dark Web Onion Sites
Cybersecurity
Exploring the Latest Dark Web Onion Sites
John Hammond Intermediate 2y ago
This Dark Web URL Shortener Sucks
AI Safety & Ethics
This Dark Web URL Shortener Sucks
John Hammond Intermediate 2y ago
Raspberry Pi Malware uses IRC Remote Access Trojan (RAT)
AI Safety & Ethics
Raspberry Pi Malware uses IRC Remote Access Trojan (RAT)
John Hammond Intermediate 2y ago
ChatGPT Analyzes Fake ChatGPT Malware
Large Language Models
ChatGPT Analyzes Fake ChatGPT Malware
John Hammond Intermediate 2y ago
Why Don't People Want Security?
Data Analytics & Business Intelligence
Why Don't People Want Security?
John Hammond Intermediate 2y ago
Hide a Hacker's Reverse Shell in ONE Command
Cybersecurity
Hide a Hacker's Reverse Shell in ONE Command
John Hammond Intermediate 2y ago
How To Setup ELK | Elastic Agents & Sysmon for Cybersecurity
AI Agents & Automation
How To Setup ELK | Elastic Agents & Sysmon for Cybersecurity
John Hammond Intermediate 2y ago
PowerShell CRYPTOSTEALER through DNS
AI Safety & Ethics
PowerShell CRYPTOSTEALER through DNS
John Hammond Intermediate 2y ago
📚 Coursera Courses Opens on Coursera · Free to audit
1 / 3 View all →
Critical Thinking Skills for University Success
📚 Coursera Course ↗
Self-paced
Critical Thinking Skills for University Success
Opens on Coursera ↗
Validating and Safeguarding Production AI
📚 Coursera Course ↗
Self-paced
Validating and Safeguarding Production AI
Opens on Coursera ↗
A Tour of Cloud Networking
📚 Coursera Course ↗
Self-paced
A Tour of Cloud Networking
Opens on Coursera ↗
AI Social Media Marketing with ChatGPT & Gemini
📚 Coursera Course ↗
Self-paced
AI Social Media Marketing with ChatGPT & Gemini
Opens on Coursera ↗
Planning and Control Using Microsoft Project 365 and 2021
📚 Coursera Course ↗
Self-paced
Planning and Control Using Microsoft Project 365 and 2021
Opens on Coursera ↗
AI Presentation Generation: Comprehensive Guide
📚 Coursera Course ↗
Self-paced
AI Presentation Generation: Comprehensive Guide
Opens on Coursera ↗