✕ Clear filters
1,410 lessons

🔐 Cybersecurity

Ethical hacking, penetration testing, network security, CTFs and defensive security

All ▶ YouTube 201,098📚 Coursera 18,198🎤 TED 1
MITRE CTF 2019 - Linux [100] Replacing Binaries in the PATH
Cybersecurity
MITRE CTF 2019 - Linux [100] Replacing Binaries in the PATH
John Hammond Intermediate 7y ago
MITRE CTF 2019 - Linux [50] Escaping RBASH with SSH
Cybersecurity
MITRE CTF 2019 - Linux [50] Escaping RBASH with SSH
John Hammond Intermediate 7y ago
BSIDES LONG ISLAND 2019 CTF
Cybersecurity
BSIDES LONG ISLAND 2019 CTF
John Hammond Intermediate 7y ago
ACTIVE DIRECTORY PRIVILEGES [05] Kringlecon: SANS Holiday Hack Challenge
Cybersecurity
ACTIVE DIRECTORY PRIVILEGES [05] Kringlecon: SANS Holiday Hack Challenge
John Hammond Intermediate 7y ago
GIT REPOSITORY ANALYSIS [05] Kringlecon: SANS Holiday Hack Challenge
Cybersecurity
GIT REPOSITORY ANALYSIS [05] Kringlecon: SANS Holiday Hack Challenge
John Hammond Intermediate 7y ago
DE BRUJIN SEQUENCE [04] Kringlecon: SANS Holiday Hack Challenge
Cybersecurity
DE BRUJIN SEQUENCE [04] Kringlecon: SANS Holiday Hack Challenge
John Hammond Intermediate 7y ago
DIRECTORY TRAVERSAL [03] Kringlecon: SANS Holiday Hack Challenge
Cybersecurity
DIRECTORY TRAVERSAL [03] Kringlecon: SANS Holiday Hack Challenge
John Hammond Intermediate 7y ago
ORIENTATION CHALLENGE [02] Kringlecon: SANS Holiday Hack Challenge
Cybersecurity
ORIENTATION CHALLENGE [02] Kringlecon: SANS Holiday Hack Challenge
John Hammond Intermediate 7y ago
KRINGLECON: 2018 SANS Holiday Hack Challenge | Getting Started
Cybersecurity
KRINGLECON: 2018 SANS Holiday Hack Challenge | Getting Started
John Hammond Beginner 7y ago
XMAS CTF HIGHLIGHTS
Cybersecurity
XMAS CTF HIGHLIGHTS
John Hammond Intermediate 7y ago
Coordinates to IMAGE & Back w/ PYTHON PIL
Cybersecurity
Coordinates to IMAGE & Back w/ PYTHON PIL
John Hammond Intermediate 7y ago
Server-Side Template Injection w/ Flask | Flaskcards [34] picoCTF 2018
Cybersecurity
Server-Side Template Injection w/ Flask | Flaskcards [34] picoCTF 2018
John Hammond Intermediate 7y ago
Examining Variables in GDB | learn gdb [33] picoCTF 2018
Cybersecurity
Examining Variables in GDB | learn gdb [33] picoCTF 2018
John Hammond Beginner 7y ago
Leaking the Stack / Printf Format Vulnerability | echooo [32] picoCTF 2018
Cybersecurity
Leaking the Stack / Printf Format Vulnerability | echooo [32] picoCTF 2018
John Hammond Intermediate 7y ago
Registry Carving & Network Connections w/ Volatility [02] OtterCTF
Cybersecurity
Registry Carving & Network Connections w/ Volatility [02] OtterCTF
John Hammond Intermediate 7y ago
Manual HTTP Requests | Artisinal Handcrafted HTTP 3 [31] picoCTF 2018
Cybersecurity
Manual HTTP Requests | Artisinal Handcrafted HTTP 3 [31] picoCTF 2018
John Hammond Intermediate 7y ago
LSADump: Dumping Passwords w/ Volatility [01] OtterCTF
Cybersecurity
LSADump: Dumping Passwords w/ Volatility [01] OtterCTF
John Hammond Intermediate 7y ago
Piping Stdin & Redirecting Stderr | in out error [30] picoCTF 2018
Cybersecurity
Piping Stdin & Redirecting Stderr | in out error [30] picoCTF 2018
John Hammond Intermediate 7y ago
Patching Binaries with Pwntools | BE QUICK OR BE DEAD 2 [29] picoCTF 2018
Cybersecurity
Patching Binaries with Pwntools | BE QUICK OR BE DEAD 2 [29] picoCTF 2018
John Hammond Intermediate 7y ago
picoCTF 2018 [28] RSA Madlibs
Cybersecurity
picoCTF 2018 [28] RSA Madlibs
John Hammond Intermediate 7y ago
Pros vs. Joes CTF at BsidesDC 2018
Cybersecurity
Pros vs. Joes CTF at BsidesDC 2018
John Hammond Intermediate 7y ago
picoCTF 2018 [27] ret2libc Exploits (got 2 learn libc)
Cybersecurity
picoCTF 2018 [27] ret2libc Exploits (got 2 learn libc)
John Hammond Beginner 7y ago
picoCTF 2018 [26] Caesar Cipher 2
Cybersecurity
picoCTF 2018 [26] Caesar Cipher 2
John Hammond Intermediate 7y ago
picoCTF 2018 [25] Controlling Function Arguments | Buffer Overflow 2
Cybersecurity
picoCTF 2018 [25] Controlling Function Arguments | Buffer Overflow 2
John Hammond Intermediate 7y ago
Multi-Exponent RSA Cryptography | Square CTF "Flipped Bits"
Cybersecurity
Multi-Exponent RSA Cryptography | Square CTF "Flipped Bits"
John Hammond Intermediate 7y ago
picoCTF 2018 [24] Assembly 2
Cybersecurity
picoCTF 2018 [24] Assembly 2
John Hammond Intermediate 7y ago
MORSE CODE Steganography (2/2) BsidesCT CTF 2018
Cybersecurity
MORSE CODE Steganography (2/2) BsidesCT CTF 2018
John Hammond Intermediate 7y ago
Steganography (1/2) BsidesCT CTF 2018
Cybersecurity
Steganography (1/2) BsidesCT CTF 2018
John Hammond Intermediate 7y ago
BsidesCT 2018 TRIVIA Challenges
Cybersecurity
BsidesCT 2018 TRIVIA Challenges
John Hammond Intermediate 7y ago
REPLICATING THE FACEBOOK HACK
Cybersecurity
REPLICATING THE FACEBOOK HACK
John Hammond Intermediate 7y ago
Securing Windows with DISA STIGs
Cybersecurity
Securing Windows with DISA STIGs
John Hammond Intermediate 7y ago
picoCTF 2018 [23] Absolutely Relative
Cybersecurity
picoCTF 2018 [23] Absolutely Relative
John Hammond Intermediate 7y ago
picoCTF 2018 [22] The Vault & What's My Name
Cybersecurity
picoCTF 2018 [22] The Vault & What's My Name
John Hammond Intermediate 7y ago
picoCTF 2018 [20] You Cant See Me & Buttons
Cybersecurity
picoCTF 2018 [20] You Cant See Me & Buttons
John Hammond Intermediate 7y ago
picoCTF 2018 [19] What Base Is This?
Cybersecurity
picoCTF 2018 [19] What Base Is This?
John Hammond Intermediate 7y ago
picoCTF 2018 [18] Shellcode
Cybersecurity
picoCTF 2018 [18] Shellcode
John Hammond Intermediate 7y ago
Reversing Engineering XOR | picoCTF [17] quackme
Cybersecurity
Reversing Engineering XOR | picoCTF [17] quackme
John Hammond Intermediate 7y ago
picoCTF 2018 [16] leak me & Now You See Me
Cybersecurity
picoCTF 2018 [16] leak me & Now You See Me
John Hammond Intermediate 7y ago
picoCTF 2018 [15] Buffer Overflow 1 & Hertz 2
Cybersecurity
picoCTF 2018 [15] Buffer Overflow 1 & Hertz 2
John Hammond Intermediate 7y ago
picoCTF 2018 [14] be-quick-or-be-dead 1 & blaise's cipher
Cybersecurity
picoCTF 2018 [14] be-quick-or-be-dead 1 & blaise's cipher
John Hammond Intermediate 7y ago
picoCTF 2018 [13] Truly an Artist & Assembly 1
Cybersecurity
picoCTF 2018 [13] Truly an Artist & Assembly 1
John Hammond Intermediate 7y ago
picoCTF 2018 [11] Hex Editor, SSH, Irish Name Repo
Cybersecurity
picoCTF 2018 [11] Hex Editor, SSH, Irish Name Repo
John Hammond Intermediate 7y ago
picoCTF 2018 [10] Caesar Cipher 1, ENV, & Hertz
Cybersecurity
picoCTF 2018 [10] Caesar Cipher 1, ENV, & Hertz
John Hammond Intermediate 7y ago
picoCTF 2018 [09] Assembly 0 & Buffer Overflow 0
Cybersecurity
picoCTF 2018 [09] Assembly 0 & Buffer Overflow 0
John Hammond Intermediate 7y ago
picoCTF 2018 [08] Recovering From The Snap & Admin Panel
Cybersecurity
picoCTF 2018 [08] Recovering From The Snap & Admin Panel
John Hammond Intermediate 7y ago
picoCTF 2018 [07] Logon & Reading Between The Eyes
Cybersecurity
picoCTF 2018 [07] Logon & Reading Between The Eyes
John Hammond Intermediate 7y ago
picoCTF 2018 [06] grep2, Aca-Shell-A, Client Side is Still Bad
Cybersecurity
picoCTF 2018 [06] grep2, Aca-Shell-A, Client Side is Still Bad
John Hammond Intermediate 7y ago
picoCTF 2018 [05] strings, pipe & Inspect Me
Cybersecurity
picoCTF 2018 [05] strings, pipe & Inspect Me
John Hammond Intermediate 7y ago
📚 Coursera Courses Opens on Coursera · Free to audit
1 / 3 View all →
Encryption and Decryption using C++
📚 Coursera Course ↗
Self-paced
Encryption and Decryption using C++
Opens on Coursera ↗
Handling Security Incidents Across Domains
📚 Coursera Course ↗
Self-paced
Handling Security Incidents Across Domains
Opens on Coursera ↗
Hacking COVID-19 — Course 1: Identifying a Deadly Pathogen
📚 Coursera Course ↗
Self-paced
Hacking COVID-19 — Course 1: Identifying a Deadly Pathogen
Opens on Coursera ↗
Hacking COVID-19 — Course 5: Tracing SARS-CoV-2's Evolution
📚 Coursera Course ↗
Self-paced
Hacking COVID-19 — Course 5: Tracing SARS-CoV-2's Evolution
Opens on Coursera ↗
Pentesting Fundamentals for Beginners
📚 Coursera Course ↗
Self-paced
Pentesting Fundamentals for Beginners
Opens on Coursera ↗
Cloud Next Generation Firewall: avaliação de requisitos
📚 Coursera Course ↗
Self-paced
Cloud Next Generation Firewall: avaliação de requisitos
Opens on Coursera ↗