✕ Clear filters
1,803 lessons

Browse Lessons

Curated from top practitioners. Filtered, not flooded.

All ▶ YouTube 201,014📚 Coursera 18,184🎤 TED 1
TryHackMe! Advent of Cyber 2023 Kick-Off
Cybersecurity
TryHackMe! Advent of Cyber 2023 Kick-Off
John Hammond Intermediate 2y ago
Incident Response: Azure Log Analysis
Cybersecurity
Incident Response: Azure Log Analysis
John Hammond Advanced 2y ago
Can ChatGPT Find Smart Contract Vulnerabilities?
Cybersecurity
Can ChatGPT Find Smart Contract Vulnerabilities?
John Hammond Beginner 2y ago
Capture the Flag: Hacking Yet Another Markup Language
Cybersecurity
Capture the Flag: Hacking Yet Another Markup Language
John Hammond Intermediate 2y ago
This Cybercrime Forum Is Full Of Hackers
Cybersecurity
This Cybercrime Forum Is Full Of Hackers
John Hammond Intermediate 2y ago
How Hackers Compromise Other Users
Cybersecurity
How Hackers Compromise Other Users
John Hammond Intermediate 2y ago
The MOVEit Hack In Retrospect
Cybersecurity
The MOVEit Hack In Retrospect
John Hammond Intermediate 2y ago
where do you ACTUALLY submit vulnerabilities?
Cybersecurity
where do you ACTUALLY submit vulnerabilities?
John Hammond Intermediate 2y ago
I Took Over a Microsoft Cloud Account. Again.
Cybersecurity
I Took Over a Microsoft Cloud Account. Again.
John Hammond Intermediate 2y ago
Testing Your Cybersecurity Defenses
Cybersecurity
Testing Your Cybersecurity Defenses
John Hammond Intermediate 2y ago
Hacking with Bloodhound: Map Your Environment
Cybersecurity
Hacking with Bloodhound: Map Your Environment
John Hammond Intermediate 2y ago
How Hackers Hide From Memory Scanners
Cybersecurity
How Hackers Hide From Memory Scanners
John Hammond Beginner 2y ago
they're selling WHAT on Telegram?!?
Cybersecurity
they're selling WHAT on Telegram?!?
John Hammond Intermediate 2y ago
ChatGPT Learns the Rust Programming Language
Cybersecurity
ChatGPT Learns the Rust Programming Language
John Hammond Beginner 2y ago
I Stole a Microsoft 365 Account. Here's How.
Cybersecurity
I Stole a Microsoft 365 Account. Here's How.
John Hammond Intermediate 2y ago
this Cybersecurity Platform is FREE
Cybersecurity
this Cybersecurity Platform is FREE
John Hammond Intermediate 2y ago
Hacking Websites: NodeJS Server-Side Template Injection
Cybersecurity
Hacking Websites: NodeJS Server-Side Template Injection
John Hammond Intermediate 2y ago
Fetch the Flag CTF is Live Right Now
Cybersecurity
Fetch the Flag CTF is Live Right Now
John Hammond Intermediate 2y ago
The 3CX Hack In Retrospect
Cybersecurity
The 3CX Hack In Retrospect
John Hammond Intermediate 2y ago
Cloud Security with Microsoft 365 Developer Tenants
Cybersecurity
Cloud Security with Microsoft 365 Developer Tenants
John Hammond Intermediate 2y ago
RagnarLocker Ransomware Seized by Law Enforcement
Cybersecurity
RagnarLocker Ransomware Seized by Law Enforcement
John Hammond Intermediate 2y ago
They Made QR Codes LONGER?!?
Cybersecurity
They Made QR Codes LONGER?!?
John Hammond Intermediate 2y ago
3 FREE Resources for Cyber Defenders
Cybersecurity
3 FREE Resources for Cyber Defenders
John Hammond Intermediate 2y ago
Hunting for Hackers with Sigma Rules
Cybersecurity
Hunting for Hackers with Sigma Rules
John Hammond Intermediate 2y ago
Create Your Own Dark Web Website
Cybersecurity
Create Your Own Dark Web Website
John Hammond Beginner 2y ago
Website Vulnerabilities to Fully Hacked Server
Cybersecurity
Website Vulnerabilities to Fully Hacked Server
John Hammond Intermediate 2y ago
Detect Hackers & Malware on your Computer (literally for free)
Cybersecurity
Detect Hackers & Malware on your Computer (literally for free)
John Hammond Intermediate 2y ago
How Hackers Exploit Vulnerable Drivers
Cybersecurity
How Hackers Exploit Vulnerable Drivers
John Hammond Beginner 2y ago
Hackers Are Exploiting Critical Vulnerabilities in File Transfer Software
Cybersecurity
Hackers Are Exploiting Critical Vulnerabilities in File Transfer Software
John Hammond Beginner 2y ago
VULNERABLE Kernel Drivers for Security Research
Cybersecurity
VULNERABLE Kernel Drivers for Security Research
John Hammond Advanced 2y ago
New "Dark Web" Generative AI Chatbots?!
Cybersecurity
New "Dark Web" Generative AI Chatbots?!
John Hammond Intermediate 2y ago
Exploring the Latest Malware Samples
Cybersecurity
Exploring the Latest Malware Samples
John Hammond Advanced 2y ago
Run ANY Linux Program In Memory
AI Safety & Ethics
Run ANY Linux Program In Memory
John Hammond Intermediate 2y ago
Which Visual Studio Code Extensions Can Be Hacked?
AI News & Updates
Which Visual Studio Code Extensions Can Be Hacked?
John Hammond Intermediate 2y ago
I Explored Ransomware Cybercrime on the Dark Web
Cybersecurity
I Explored Ransomware Cybercrime on the Dark Web
John Hammond Beginner 2y ago
The Mysterious "Office Hotkey"..
AI Safety & Ethics
The Mysterious "Office Hotkey"..
John Hammond Intermediate 2y ago
How To Pivot Through a Network with Chisel
Cybersecurity
How To Pivot Through a Network with Chisel
John Hammond Intermediate 2y ago
Classify Malware with YARA
Cybersecurity
Classify Malware with YARA
John Hammond Intermediate 2y ago
AT&T Email List Exposed
AI Safety & Ethics
AT&T Email List Exposed
John Hammond Intermediate 2y ago
Learn Active Directory Kerberoasting
Cybersecurity
Learn Active Directory Kerberoasting
John Hammond Beginner 2y ago
Trick Hackers with a Fake User
AI Safety & Ethics
Trick Hackers with a Fake User
John Hammond Advanced 2y ago
The FBI Disrupted a HUGE Malware Strain
AI News & Updates
The FBI Disrupted a HUGE Malware Strain
John Hammond Intermediate 2y ago
Your Computer could be For Sale on the Dark Web
Cybersecurity
Your Computer could be For Sale on the Dark Web
John Hammond Intermediate 2y ago
How Does Malware Know It's Being Monitored?
AI Safety & Ethics
How Does Malware Know It's Being Monitored?
John Hammond Beginner 2y ago
We Hacked An AWS Account. Again.
Large Language Models
We Hacked An AWS Account. Again.
John Hammond Beginner 2y ago
I Had ChatGPT Analyze My Code
Large Language Models
I Had ChatGPT Analyze My Code
John Hammond Intermediate 2y ago
Spoof Your Computer
AI Safety & Ethics
Spoof Your Computer
John Hammond Advanced 2y ago
Not All ZIP Files Are Equal
Cybersecurity
Not All ZIP Files Are Equal
John Hammond Intermediate 2y ago