✕ Clear filters
1,408 lessons

🔐 Cybersecurity

Ethical hacking, penetration testing, network security, CTFs and defensive security

All ▶ YouTube 200,970📚 Coursera 18,181🎤 TED 1
Microsoft Entra ID INSECURE DEFAULTS
Cybersecurity
Microsoft Entra ID INSECURE DEFAULTS
John Hammond Beginner 4mo ago
Hacking with Nuclei: Uncovering .git Secrets
Cybersecurity
Hacking with Nuclei: Uncovering .git Secrets
John Hammond Beginner 4mo ago
a new kind of Capture The Flag hacking
Cybersecurity
a new kind of Capture The Flag hacking
John Hammond Beginner 4mo ago
The State of Cybercrime in 2025 (with Nick Ascoli!)
Cybersecurity
The State of Cybercrime in 2025 (with Nick Ascoli!)
John Hammond Advanced 4mo ago
I Had Claude MCP Hack Me
Cybersecurity
I Had Claude MCP Hack Me
John Hammond Beginner 4mo ago
microsoft turned me down
Cybersecurity
microsoft turned me down
John Hammond Beginner 4mo ago
Lua Infostealer Analysis ("My Hawaii Vacation" CTF)
Cybersecurity
Lua Infostealer Analysis ("My Hawaii Vacation" CTF)
John Hammond Beginner 4mo ago
Window Batch Malware Analysis!
Cybersecurity
Window Batch Malware Analysis!
John Hammond Advanced 5mo ago
Fake DMCA MALWARE Scam
Cybersecurity
Fake DMCA MALWARE Scam
John Hammond Beginner 5mo ago
How Hackers Become Admin (they just ask)
Cybersecurity
How Hackers Become Admin (they just ask)
John Hammond Beginner 5mo ago
Cybersecurity Awareness for Hackers! with Huntress and Just Hacking Training
Cybersecurity
Cybersecurity Awareness for Hackers! with Huntress and Just Hacking Training
John Hammond Intermediate 5mo ago
Hackers Bruteforce Passwords to Microsoft Online
Cybersecurity
Hackers Bruteforce Passwords to Microsoft Online
John Hammond Intermediate 5mo ago
when you change your password, it's already stolen
Cybersecurity
when you change your password, it's already stolen
John Hammond Beginner 5mo ago
Learn Hardware Hacking!
Cybersecurity
Learn Hardware Hacking!
John Hammond Beginner 5mo ago
Script-Based Malware Analysis!
Cybersecurity
Script-Based Malware Analysis!
John Hammond Advanced 5mo ago
hacking copilot AI (with Tobias Diehl)
Cybersecurity
hacking copilot AI (with Tobias Diehl)
John Hammond Beginner 5mo ago
Regex for Hackers (with Python)
Cybersecurity
Regex for Hackers (with Python)
John Hammond Beginner 5mo ago
a hacker's new website
Cybersecurity
a hacker's new website
John Hammond Beginner 6mo ago
Learn API Hacking with InsiderPhD!
Cybersecurity
Learn API Hacking with InsiderPhD!
John Hammond Beginner 6mo ago
reverse engineering doesn't have to be hard
Cybersecurity
reverse engineering doesn't have to be hard
John Hammond Beginner 6mo ago
new capture the flag (hacking competition)
Cybersecurity
new capture the flag (hacking competition)
John Hammond Intermediate 6mo ago
Exploring the Dark Web
Cybersecurity
Exploring the Dark Web
John Hammond Beginner 6mo ago
Open Source SIEM and EDR Security
Cybersecurity
Open Source SIEM and EDR Security
John Hammond Beginner 6mo ago
ServiceUI.exe
Cybersecurity
ServiceUI.exe
John Hammond Beginner 6mo ago
Learn Python!
Cybersecurity
Learn Python!
John Hammond Beginner 6mo ago
6.pdf
Cybersecurity
6.pdf
John Hammond Beginner 6mo ago
LARGEST SUPPLY CHAIN HACK IN HISTORY ZOMG!!!!111
Cybersecurity
LARGEST SUPPLY CHAIN HACK IN HISTORY ZOMG!!!!111
John Hammond Beginner 7mo ago
Just Hacking Training - Windows Malware Development
Cybersecurity
Just Hacking Training - Windows Malware Development
John Hammond Beginner 7mo ago
Top 5 Ways You Get Hacked
Cybersecurity
Top 5 Ways You Get Hacked
John Hammond Beginner 7mo ago
it's just too easy
Cybersecurity
it's just too easy
John Hammond Beginner 7mo ago
The "Police" Scammed Us
Cybersecurity
The "Police" Scammed Us
John Hammond Beginner 7mo ago
hackers have gone TOO FAR
Cybersecurity
hackers have gone TOO FAR
John Hammond Advanced 7mo ago
The Entire Internet is Broken
Cybersecurity
The Entire Internet is Broken
John Hammond Advanced 7mo ago
Lesser Known Linux Persistence Mechanisms
Cybersecurity
Lesser Known Linux Persistence Mechanisms
John Hammond Beginner 7mo ago
hack Windows before even finishing setup
Cybersecurity
hack Windows before even finishing setup
John Hammond Beginner 7mo ago
this symbol is LYING TO YOU
Cybersecurity
this symbol is LYING TO YOU
John Hammond Beginner 7mo ago
BloodHound can map ANYTHING
Cybersecurity
BloodHound can map ANYTHING
John Hammond Beginner 7mo ago
i need your help.
Cybersecurity
i need your help.
John Hammond Beginner 7mo ago
how hackers hide (Intro to Beacon Object Files - with Empire C2!)
Cybersecurity
how hackers hide (Intro to Beacon Object Files - with Empire C2!)
John Hammond Beginner 8mo ago
how hackers avoid getting caught
Cybersecurity
how hackers avoid getting caught
John Hammond Beginner 9mo ago
Reverse Engineering Anti-Debugging Techniques (with Nathan Baggs!)
Cybersecurity
Reverse Engineering Anti-Debugging Techniques (with Nathan Baggs!)
John Hammond Beginner 9mo ago
this malware hides in a WALLPAPER
Cybersecurity
this malware hides in a WALLPAPER
John Hammond Advanced 9mo ago
hackers trick everyone to run malware (FileFix)
Cybersecurity
hackers trick everyone to run malware (FileFix)
John Hammond Beginner 9mo ago
How You Can Impersonate Anyone in Active Directory (with Shikata!)
Cybersecurity
How You Can Impersonate Anyone in Active Directory (with Shikata!)
John Hammond Intermediate 9mo ago
Learn Capture the Flag!
Cybersecurity
Learn Capture the Flag!
John Hammond Beginner 9mo ago
Evading Antivirus Detection in C (with Dahvid Schloss)
Cybersecurity
Evading Antivirus Detection in C (with Dahvid Schloss)
John Hammond Intermediate 9mo ago
Learning to Hack Active Directory Certificate Services (with Shikata!)
Cybersecurity
Learning to Hack Active Directory Certificate Services (with Shikata!)
John Hammond Intermediate 9mo ago
Learn Phishing!
Cybersecurity
Learn Phishing!
John Hammond Beginner 9mo ago
📚 Coursera Courses Opens on Coursera · Free to audit
1 / 3 View all →
Designing Software-Defined Branch Infrastructures
📚 Coursera Course ↗
Self-paced
Designing Software-Defined Branch Infrastructures
Opens on Coursera ↗
Digital Identity & Security – Introduction to PKI
📚 Coursera Course ↗
Self-paced
Digital Identity & Security – Introduction to PKI
Opens on Coursera ↗
Web Hacking Expert - Full-Stack Exploitation Mastery
📚 Coursera Course ↗
Self-paced
Web Hacking Expert - Full-Stack Exploitation Mastery
Opens on Coursera ↗
Systems and Application Security
📚 Coursera Course ↗
Self-paced
Systems and Application Security
Opens on Coursera ↗
Cybersecurity Awareness For Everyone: Final Assessment
📚 Coursera Course ↗
Self-paced
Cybersecurity Awareness For Everyone: Final Assessment
Opens on Coursera ↗
Certified Ethical Hacker (CEH): Unit 1
📚 Coursera Course ↗
Self-paced
Certified Ethical Hacker (CEH): Unit 1
Opens on Coursera ↗