✕ Clear filters
1,410 lessons

🔐 Cybersecurity

Ethical hacking, penetration testing, network security, CTFs and defensive security

All ▶ YouTube 201,098📚 Coursera 18,198🎤 TED 1
TryHackMe! Advent of Cyber - 2021 KICKOFF: 25 Days of Learning CYBERSECURITY
Cybersecurity
TryHackMe! Advent of Cyber - 2021 KICKOFF: 25 Days of Learning CYBERSECURITY
John Hammond Beginner 4y ago
COBALT STRIKE Forensics: PCAP & Memdump - "Strike Back" HackTheBox University CTF 2021
Cybersecurity
COBALT STRIKE Forensics: PCAP & Memdump - "Strike Back" HackTheBox University CTF 2021
John Hammond Beginner 4y ago
SnykCon CTF - Sauerkraut - Python Pickle Vulnerabilities
Cybersecurity
SnykCon CTF - Sauerkraut - Python Pickle Vulnerabilities
John Hammond Beginner 4y ago
SnykCon CTF - "Random Flag Generator" Weak PRNG Seed
Cybersecurity
SnykCon CTF - "Random Flag Generator" Weak PRNG Seed
John Hammond Intermediate 4y ago
SnykCon CTF - "Invisible Ink" Prototype Pollution
Cybersecurity
SnykCon CTF - "Invisible Ink" Prototype Pollution
John Hammond Intermediate 4y ago
Snip3 Crypter/RAT Loader - DcRat MALWARE ANALYSIS
Cybersecurity
Snip3 Crypter/RAT Loader - DcRat MALWARE ANALYSIS
John Hammond Beginner 4y ago
VOD - TryHackMe! Attacking Kerberos
Cybersecurity
VOD - TryHackMe! Attacking Kerberos
John Hammond Intermediate 4y ago
VOD - TryHackMe! Game Zone - Recreating a Metasploit Exploit in Python
Cybersecurity
VOD - TryHackMe! Game Zone - Recreating a Metasploit Exploit in Python
John Hammond Intermediate 4y ago
VOD - TryHackMe! Steel Mountain with Metasploit
Cybersecurity
VOD - TryHackMe! Steel Mountain with Metasploit
John Hammond Intermediate 4y ago
KOVTER Malware Analysis - Fileless Persistence in Registry
Cybersecurity
KOVTER Malware Analysis - Fileless Persistence in Registry
John Hammond Beginner 4y ago
AES-CFB Cryptography Mistakes - HackTheBox Business CTF "Domain Controller"
Cybersecurity
AES-CFB Cryptography Mistakes - HackTheBox Business CTF "Domain Controller"
John Hammond Beginner 4y ago
XLM Macros & Unhiding Excel Worksheets - HackTheBox Biz CTF "OldSchool"
Cybersecurity
XLM Macros & Unhiding Excel Worksheets - HackTheBox Biz CTF "OldSchool"
John Hammond Intermediate 4y ago
BAD RANSOMWARE - HackTheBox Business CTF
Cybersecurity
BAD RANSOMWARE - HackTheBox Business CTF
John Hammond Intermediate 4y ago
Reverse Engineering Loops - "Syncopation" HackTheBox Business CTF
Cybersecurity
Reverse Engineering Loops - "Syncopation" HackTheBox Business CTF
John Hammond Intermediate 4y ago
Laravel CVE / PHP Deserialization - "Larablog" HTB Business CTF
Cybersecurity
Laravel CVE / PHP Deserialization - "Larablog" HTB Business CTF
John Hammond Intermediate 4y ago
JSON Web Keys (JWK & JWT) - "Emergency" - HackTheBox Business CTF
Cybersecurity
JSON Web Keys (JWK & JWT) - "Emergency" - HackTheBox Business CTF
John Hammond Intermediate 4y ago
GraphQL Introspection - HackTheBox "Business CTF" - NoteQL
Cybersecurity
GraphQL Introspection - HackTheBox "Business CTF" - NoteQL
John Hammond Beginner 4y ago
HackTheBox "Business CTF" - Time - Command Injection
Cybersecurity
HackTheBox "Business CTF" - Time - Command Injection
John Hammond Intermediate 4y ago
HackTheBox "Business CTF" - discordvm - Node.js Sandbox Escape
Cybersecurity
HackTheBox "Business CTF" - discordvm - Node.js Sandbox Escape
John Hammond Intermediate 4y ago
JScript Deobfuscation - More WSHRAT (Malware Analysis)
Cybersecurity
JScript Deobfuscation - More WSHRAT (Malware Analysis)
John Hammond Intermediate 4y ago
Information Stealer - Malware Analysis (PowerShell to .NET)
Cybersecurity
Information Stealer - Malware Analysis (PowerShell to .NET)
John Hammond Beginner 4y ago
AES-CTR Cryptography: Reused Key Weakness - HackTheBox Cyber Apocalypse CTF
Cybersecurity
AES-CTR Cryptography: Reused Key Weakness - HackTheBox Cyber Apocalypse CTF
John Hammond Beginner 4y ago
PowerPoint Phishing Malware Analysis - HackTheBox Cyber Apocalypse CTF
Cybersecurity
PowerPoint Phishing Malware Analysis - HackTheBox Cyber Apocalypse CTF
John Hammond Intermediate 4y ago
Phishing Document "Invitation" - HackTheBox Cyber Apocalypse CTF
Cybersecurity
Phishing Document "Invitation" - HackTheBox Cyber Apocalypse CTF
John Hammond Intermediate 4y ago
Nodejs Nunjucks Template Injection - HackTheBox Cyber Apocalypse CTF
Cybersecurity
Nodejs Nunjucks Template Injection - HackTheBox Cyber Apocalypse CTF
John Hammond Intermediate 4y ago
Cloudflare CDN CSP - XSS Bypass / HackTheBox Cyber Apocalypse CTF
Cybersecurity
Cloudflare CDN CSP - XSS Bypass / HackTheBox Cyber Apocalypse CTF
John Hammond Beginner 4y ago
IFrame Parent XSS - HackTheBox Cyber Apocalypse CTF
Cybersecurity
IFrame Parent XSS - HackTheBox Cyber Apocalypse CTF
John Hammond Beginner 4y ago
Blind MongoDB NoSQL Injection - HackTheBox Cyber Apocalypse CTF
Cybersecurity
Blind MongoDB NoSQL Injection - HackTheBox Cyber Apocalypse CTF
John Hammond Intermediate 4y ago
HackTheBox CA CTF - Using Snyk to Find & Fix Vulnerabilities
Cybersecurity
HackTheBox CA CTF - Using Snyk to Find & Fix Vulnerabilities
John Hammond Beginner 4y ago
XML Object Exfiltration - HackTheBox Cyber Apocalypse CTF "E. Tree"
Cybersecurity
XML Object Exfiltration - HackTheBox Cyber Apocalypse CTF "E. Tree"
John Hammond Beginner 4y ago
SQLite Blind SQL Injection - HackTheBox Cyber Apocalypse CTF
Cybersecurity
SQLite Blind SQL Injection - HackTheBox Cyber Apocalypse CTF
John Hammond Beginner 4y ago
HTB Cyber Apocalypse - cURL As a Service
Cybersecurity
HTB Cyber Apocalypse - cURL As a Service
John Hammond Beginner 4y ago
HTA JScript to PowerShell - Novter Malware Analysis
Cybersecurity
HTA JScript to PowerShell - Novter Malware Analysis
John Hammond Intermediate 4y ago
TryHackMe - OSCP Voucher GIVEAWAY & Presentation
Cybersecurity
TryHackMe - OSCP Voucher GIVEAWAY & Presentation
John Hammond Intermediate 4y ago
BEGINNER Capture The Flag - PicoCTF 2021 001 "Obedient Cat"
Cybersecurity
BEGINNER Capture The Flag - PicoCTF 2021 001 "Obedient Cat"
John Hammond Beginner 4y ago
$2 MILLION DOLLARS STOLEN in Bitcoin/Ethereum - JScript Malware Analysis
Cybersecurity
$2 MILLION DOLLARS STOLEN in Bitcoin/Ethereum - JScript Malware Analysis
John Hammond Intermediate 5y ago
GuidePoint Security CTF - Custom Base64 Languages - Kirby & Alphabet
Cybersecurity
GuidePoint Security CTF - Custom Base64 Languages - Kirby & Alphabet
John Hammond Beginner 5y ago
FAKE Antivirus? Malware Analysis of Decoy 'kaspersky.exe'
Cybersecurity
FAKE Antivirus? Malware Analysis of Decoy 'kaspersky.exe'
John Hammond Intermediate 5y ago
NahamCon is COMING BACK!
Cybersecurity
NahamCon is COMING BACK!
John Hammond Intermediate 5y ago
Is THIS a VIRUS? Finding a Remcos RAT - Malware Analysis
Cybersecurity
Is THIS a VIRUS? Finding a Remcos RAT - Malware Analysis
John Hammond Intermediate 5y ago
MALWARE ANALYSIS - VBScript Decoding & Deobfuscating
Cybersecurity
MALWARE ANALYSIS - VBScript Decoding & Deobfuscating
John Hammond Intermediate 5y ago
TryHackMe! Skynet - Wildcard Injection
Cybersecurity
TryHackMe! Skynet - Wildcard Injection
John Hammond Beginner 5y ago
"Advanced" Tips & Tricks for Capture The Flag
Cybersecurity
"Advanced" Tips & Tricks for Capture The Flag
John Hammond Advanced 5y ago
Help us test our CTF! December is BUSY
Cybersecurity
Help us test our CTF! December is BUSY
John Hammond Intermediate 5y ago
Nested JavaScript Obfuscation - GuidePoint Security CTF Challenge
Cybersecurity
Nested JavaScript Obfuscation - GuidePoint Security CTF Challenge
John Hammond Beginner 5y ago
Custom Wordlists & SQL Injection - GuidePoint Security CTF (Belle)
Cybersecurity
Custom Wordlists & SQL Injection - GuidePoint Security CTF (Belle)
John Hammond Beginner 5y ago
phpMyAdmin Local File Inclusion - GuidePoint Security CTF (Jeffrey)
Cybersecurity
phpMyAdmin Local File Inclusion - GuidePoint Security CTF (Jeffrey)
John Hammond Beginner 5y ago
Basic Buffer Overflow - VulnServer TRUN
Cybersecurity
Basic Buffer Overflow - VulnServer TRUN
John Hammond Beginner 5y ago
📚 Coursera Courses Opens on Coursera · Free to audit
1 / 3 View all →
Assets, Threats, and Vulnerabilities
📚 Coursera Course ↗
Self-paced
Assets, Threats, and Vulnerabilities
Opens on Coursera ↗
Segurança de redes VPC com Cloud Next Generation Firewall
📚 Coursera Course ↗
Self-paced
Segurança de redes VPC com Cloud Next Generation Firewall
Opens on Coursera ↗
Introduction to Computer Security
📚 Coursera Course ↗
Self-paced
Introduction to Computer Security
Opens on Coursera ↗
Advanced Malware and Network Anomaly Detection
📚 Coursera Course ↗
Self-paced
Advanced Malware and Network Anomaly Detection
Opens on Coursera ↗
Introduction to Cybersecurity Careers
📚 Coursera Course ↗
Self-paced
Introduction to Cybersecurity Careers
Opens on Coursera ↗
Beginning Security
📚 Coursera Course ↗
Self-paced
Beginning Security
Opens on Coursera ↗