✕ Clear filters
1,805 lessons

Browse Lessons

Curated from top practitioners. Filtered, not flooded.

All ▶ YouTube 201,072📚 Coursera 18,193🎤 TED 1
How To Test Your Security with Atomic Red Team
Cybersecurity
How To Test Your Security with Atomic Red Team
John Hammond Intermediate 2y ago
Quick Forensics of Windows Event Logs (DeepBlueCLI)
AI Safety & Ethics
Quick Forensics of Windows Event Logs (DeepBlueCLI)
John Hammond Beginner 2y ago
winget: Install ROGUE Software & Packages?
Cybersecurity
winget: Install ROGUE Software & Packages?
John Hammond Intermediate 2y ago
What SECRETS are in your Clipboard?
Cybersecurity
What SECRETS are in your Clipboard?
John Hammond Beginner 2y ago
Kubernetes Hacking: From Weak Applications to Cluster Control
Cybersecurity
Kubernetes Hacking: From Weak Applications to Cluster Control
John Hammond Intermediate 2y ago
Python Pwntools Hacking: ret2libc GOT & PLT
Cybersecurity
Python Pwntools Hacking: ret2libc GOT & PLT
John Hammond Intermediate 2y ago
Cybersecurity Labs (FOR FREE) - Linux Backdoor Analysis
Cybersecurity
Cybersecurity Labs (FOR FREE) - Linux Backdoor Analysis
John Hammond Beginner 2y ago
Most ChatGPT Extensions Are Just Malware
Large Language Models
Most ChatGPT Extensions Are Just Malware
John Hammond Advanced 2y ago
How FAST Can You Write a Pentest Report?
Cybersecurity
How FAST Can You Write a Pentest Report?
John Hammond Beginner 3y ago
Password Hacking in Kali Linux
Cybersecurity
Password Hacking in Kali Linux
John Hammond Intermediate 3y ago
The Latest YouTube Malware Scam
Copywriting & Content Strategy
The Latest YouTube Malware Scam
John Hammond Beginner 3y ago
3CX VOIP Compromised & Supply Chain Threat
AI News & Updates
3CX VOIP Compromised & Supply Chain Threat
John Hammond Beginner 3y ago
You Can BUY This Hacked YouTube Channel
AI Safety & Ethics
You Can BUY This Hacked YouTube Channel
John Hammond Intermediate 3y ago
So Linus Tech Tips Got Hacked...
AI Safety & Ethics
So Linus Tech Tips Got Hacked...
John Hammond Intermediate 3y ago
Hackers Bypass Google Two-Factor Authentication (2FA) SMS
Cybersecurity
Hackers Bypass Google Two-Factor Authentication (2FA) SMS
John Hammond Intermediate 3y ago
CI/CD GOAT: Mad Hatter Capture The Flag
Cybersecurity
CI/CD GOAT: Mad Hatter Capture The Flag
John Hammond Beginner 3y ago
Kali Linux for DEFENSE? (Kali Purple 2023.1 Review)
AI Tools & Apps
Kali Linux for DEFENSE? (Kali Purple 2023.1 Review)
John Hammond Intermediate 3y ago
I Found Your Github Secrets
AI Safety & Ethics
I Found Your Github Secrets
John Hammond Intermediate 3y ago
Free Hacking APIs Course (APISEC University!)
Cybersecurity
Free Hacking APIs Course (APISEC University!)
John Hammond Beginner 3y ago
Hacking CI/CD (Basic Pipeline Poisoning)
Cybersecurity
Hacking CI/CD (Basic Pipeline Poisoning)
John Hammond Intermediate 3y ago
How YouTubers Are Getting Hacked
AI Safety & Ethics
How YouTubers Are Getting Hacked
John Hammond Intermediate 3y ago
a Hacker's Backdoor: Service Control Manager
AI News & Updates
a Hacker's Backdoor: Service Control Manager
John Hammond Beginner 3y ago
Unraveling Discord Token Stealer (python MALWARE)
Cybersecurity
Unraveling Discord Token Stealer (python MALWARE)
John Hammond Beginner 3y ago
My Password Was Pwned 13 Times
AI Safety & Ethics
My Password Was Pwned 13 Times
John Hammond Intermediate 3y ago
New IT & Security Event: MSPGEEKCON
AI Safety & Ethics
New IT & Security Event: MSPGEEKCON
John Hammond Intermediate 3y ago
Is This Website LEAKING?
Cybersecurity
Is This Website LEAKING?
John Hammond Beginner 3y ago
Strange File in Downloads Folder? Gootloader Malware Analysis
Cybersecurity
Strange File in Downloads Folder? Gootloader Malware Analysis
John Hammond Beginner 3y ago
Carving Exfiltrated Network Data from a Hack (Python & Scapy)
Cybersecurity
Carving Exfiltrated Network Data from a Hack (Python & Scapy)
John Hammond Beginner 3y ago
I Tried The HackTheBox Certified Pentester Exam
Cybersecurity
I Tried The HackTheBox Certified Pentester Exam
John Hammond Advanced 3y ago
Can You Find Where a Picture was Taken?
AI Safety & Ethics
Can You Find Where a Picture was Taken?
John Hammond Intermediate 3y ago
Evading Filters to Dump Databases (like a hacker)
Cybersecurity
Evading Filters to Dump Databases (like a hacker)
John Hammond Advanced 3y ago
How Hackers Can Bypass Your Security Defenses
Cybersecurity
How Hackers Can Bypass Your Security Defenses
John Hammond Intermediate 3y ago
I Saw 8 MILLION Phishing Scams
AI Safety & Ethics
I Saw 8 MILLION Phishing Scams
John Hammond Intermediate 3y ago
Internet Explorer Forced to Run Malware
AI Safety & Ethics
Internet Explorer Forced to Run Malware
John Hammond Beginner 3y ago
Fake OBS Studio Hack Targeting YouTubers
AI Safety & Ethics
Fake OBS Studio Hack Targeting YouTubers
John Hammond Beginner 3y ago
3 Things You Didn't Know about Windows Command Prompt
AI Safety & Ethics
3 Things You Didn't Know about Windows Command Prompt
John Hammond Beginner 3y ago
How to Proxy Command Execution: "Living Off The Land" Hacks
Data Analytics & Business Intelligence
How to Proxy Command Execution: "Living Off The Land" Hacks
John Hammond Intermediate 3y ago
How To Bypass Website File Upload Restrictions
Cybersecurity
How To Bypass Website File Upload Restrictions
John Hammond Beginner 3y ago
Certified Penetration Testing Specialist! Chat with HackTheBox
Cybersecurity
Certified Penetration Testing Specialist! Chat with HackTheBox
John Hammond Beginner 3y ago
Filter Evasion in a REVERSE SHELL (no spaces!!)
Cybersecurity
Filter Evasion in a REVERSE SHELL (no spaces!!)
John Hammond Beginner 3y ago
ROP is DEAD! Kernel Driver Binary Exploitation
Cybersecurity
ROP is DEAD! Kernel Driver Binary Exploitation
John Hammond Beginner 3y ago
Start Hacking with the HEARTBLEED vulnerability: NahamCon CTF
Cybersecurity
Start Hacking with the HEARTBLEED vulnerability: NahamCon CTF
John Hammond Beginner 3y ago
Capture The Flag!  NahamCon EU CTF "MMORPG"
Cybersecurity
Capture The Flag! NahamCon EU CTF "MMORPG"
John Hammond Beginner 3y ago
Hardware Hacking! Day 19 - TryHackMe Advent of Cyber
Cybersecurity
Hardware Hacking! Day 19 - TryHackMe Advent of Cyber
John Hammond Beginner 3y ago
How To Manage Your Business Technology
Cybersecurity
How To Manage Your Business Technology
John Hammond Beginner 3y ago
Is this a SECURE laptop?
Cybersecurity
Is this a SECURE laptop?
John Hammond Beginner 3y ago
Unraveling the IcedID Malware Stager & Phishing Email
Cybersecurity
Unraveling the IcedID Malware Stager & Phishing Email
John Hammond Beginner 3y ago
Become a Certified Penetration Tester with HackTheBox CPTS!
Cybersecurity
Become a Certified Penetration Tester with HackTheBox CPTS!
John Hammond Beginner 3y ago
📚 Coursera Courses Opens on Coursera · Free to audit
1 / 3 View all →
Implementation of PhET Activities for STEM Education
📚 Coursera Course ↗
Self-paced
Implementation of PhET Activities for STEM Education
Opens on Coursera ↗
AWS: Model Training , Optimization & Deployment
📚 Coursera Course ↗
Self-paced
AWS: Model Training , Optimization & Deployment
Opens on Coursera ↗
Principles of Data Science
📚 Coursera Course ↗
Self-paced
Principles of Data Science
Opens on Coursera ↗
Red Hat Enterprise Linux 8
📚 Coursera Course ↗
Self-paced
Red Hat Enterprise Linux 8
Opens on Coursera ↗
 An Employee's Guide to Cybersecurity
📚 Coursera Course ↗
Self-paced
An Employee's Guide to Cybersecurity
Opens on Coursera ↗
Storying the Self: (Re)Claiming our Voices
📚 Coursera Course ↗
Self-paced
Storying the Self: (Re)Claiming our Voices
Opens on Coursera ↗