✕ Clear filters
1,805 lessons

Browse Lessons

Curated from top practitioners. Filtered, not flooded.

All ▶ YouTube 201,202📚 Coursera 18,210🎤 TED 1
Counting Colors w/ Python PIL & PrettyTable
Cybersecurity
Counting Colors w/ Python PIL & PrettyTable
John Hammond Intermediate 7y ago
RED TEAM HACKING | CyberForce 2018
Cybersecurity
RED TEAM HACKING | CyberForce 2018
John Hammond Intermediate 7y ago
MITRE CTF 2019 - Web [150] Accessible Bazaar Repositories
Cybersecurity
MITRE CTF 2019 - Web [150] Accessible Bazaar Repositories
John Hammond Intermediate 7y ago
MITRE CTF 2019 - Web [100] Googling Alan Turing
Cybersecurity
MITRE CTF 2019 - Web [100] Googling Alan Turing
John Hammond Intermediate 7y ago
MITRE CTF 2019 - Web [50] HTTPS Certificate Valid Addresses
Cybersecurity
MITRE CTF 2019 - Web [50] HTTPS Certificate Valid Addresses
John Hammond Intermediate 7y ago
MITRE CTF 2019 - JOURNEY TO THE CENTER OF THE FILE | ZIP Archive Matryoshka Doll
Cybersecurity
MITRE CTF 2019 - JOURNEY TO THE CENTER OF THE FILE | ZIP Archive Matryoshka Doll
John Hammond Intermediate 7y ago
MITRE CTF 2019 - Grab Bag [100] Rick Roll, Nomination & Strings
Cybersecurity
MITRE CTF 2019 - Grab Bag [100] Rick Roll, Nomination & Strings
John Hammond Intermediate 7y ago
MITRE CTF 2019 - Grab Bag [50] Filtering Nyan Cat
Cybersecurity
MITRE CTF 2019 - Grab Bag [50] Filtering Nyan Cat
John Hammond Intermediate 7y ago
MITRE CTF 2019 - Linux [200] Race Conditions with BASH
Cybersecurity
MITRE CTF 2019 - Linux [200] Race Conditions with BASH
John Hammond Intermediate 7y ago
MITRE CTF 2019 - Linux [150] Understanding Processes with /proc
Cybersecurity
MITRE CTF 2019 - Linux [150] Understanding Processes with /proc
John Hammond Intermediate 7y ago
MITRE CTF 2019 - Linux [100] Calling Shell commands with VIM
Cybersecurity
MITRE CTF 2019 - Linux [100] Calling Shell commands with VIM
John Hammond Intermediate 7y ago
MITRE CTF 2019 - Linux [100] Replacing Binaries in the PATH
Cybersecurity
MITRE CTF 2019 - Linux [100] Replacing Binaries in the PATH
John Hammond Intermediate 7y ago
MITRE CTF 2019 - Linux [50] Escaping RBASH with SSH
Cybersecurity
MITRE CTF 2019 - Linux [50] Escaping RBASH with SSH
John Hammond Intermediate 7y ago
BSIDES LONG ISLAND 2019 CTF
Cybersecurity
BSIDES LONG ISLAND 2019 CTF
John Hammond Intermediate 7y ago
ACTIVE DIRECTORY PRIVILEGES [05] Kringlecon: SANS Holiday Hack Challenge
Cybersecurity
ACTIVE DIRECTORY PRIVILEGES [05] Kringlecon: SANS Holiday Hack Challenge
John Hammond Intermediate 7y ago
GIT REPOSITORY ANALYSIS [05] Kringlecon: SANS Holiday Hack Challenge
Cybersecurity
GIT REPOSITORY ANALYSIS [05] Kringlecon: SANS Holiday Hack Challenge
John Hammond Intermediate 7y ago
DE BRUJIN SEQUENCE [04] Kringlecon: SANS Holiday Hack Challenge
Cybersecurity
DE BRUJIN SEQUENCE [04] Kringlecon: SANS Holiday Hack Challenge
John Hammond Intermediate 7y ago
DIRECTORY TRAVERSAL [03] Kringlecon: SANS Holiday Hack Challenge
Cybersecurity
DIRECTORY TRAVERSAL [03] Kringlecon: SANS Holiday Hack Challenge
John Hammond Intermediate 7y ago
ORIENTATION CHALLENGE [02] Kringlecon: SANS Holiday Hack Challenge
Cybersecurity
ORIENTATION CHALLENGE [02] Kringlecon: SANS Holiday Hack Challenge
John Hammond Intermediate 7y ago
KRINGLECON: 2018 SANS Holiday Hack Challenge | Getting Started
Cybersecurity
KRINGLECON: 2018 SANS Holiday Hack Challenge | Getting Started
John Hammond Beginner 7y ago
XMAS CTF HIGHLIGHTS
Cybersecurity
XMAS CTF HIGHLIGHTS
John Hammond Intermediate 7y ago
Coordinates to IMAGE & Back w/ PYTHON PIL
Cybersecurity
Coordinates to IMAGE & Back w/ PYTHON PIL
John Hammond Intermediate 7y ago
Server-Side Template Injection w/ Flask | Flaskcards [34] picoCTF 2018
Cybersecurity
Server-Side Template Injection w/ Flask | Flaskcards [34] picoCTF 2018
John Hammond Intermediate 7y ago
Examining Variables in GDB | learn gdb [33] picoCTF 2018
Cybersecurity
Examining Variables in GDB | learn gdb [33] picoCTF 2018
John Hammond Beginner 7y ago
Leaking the Stack / Printf Format Vulnerability | echooo [32] picoCTF 2018
Cybersecurity
Leaking the Stack / Printf Format Vulnerability | echooo [32] picoCTF 2018
John Hammond Intermediate 7y ago
Registry Carving & Network Connections w/ Volatility [02] OtterCTF
Cybersecurity
Registry Carving & Network Connections w/ Volatility [02] OtterCTF
John Hammond Intermediate 7y ago
Manual HTTP Requests | Artisinal Handcrafted HTTP 3 [31] picoCTF 2018
Cybersecurity
Manual HTTP Requests | Artisinal Handcrafted HTTP 3 [31] picoCTF 2018
John Hammond Intermediate 7y ago
LSADump: Dumping Passwords w/ Volatility [01] OtterCTF
Cybersecurity
LSADump: Dumping Passwords w/ Volatility [01] OtterCTF
John Hammond Intermediate 7y ago
Piping Stdin & Redirecting Stderr | in out error [30] picoCTF 2018
Cybersecurity
Piping Stdin & Redirecting Stderr | in out error [30] picoCTF 2018
John Hammond Intermediate 7y ago
Patching Binaries with Pwntools | BE QUICK OR BE DEAD 2 [29] picoCTF 2018
Cybersecurity
Patching Binaries with Pwntools | BE QUICK OR BE DEAD 2 [29] picoCTF 2018
John Hammond Intermediate 7y ago
picoCTF 2018 [28] RSA Madlibs
Cybersecurity
picoCTF 2018 [28] RSA Madlibs
John Hammond Intermediate 7y ago
Pros vs. Joes CTF at BsidesDC 2018
Cybersecurity
Pros vs. Joes CTF at BsidesDC 2018
John Hammond Intermediate 7y ago
picoCTF 2018 [27] ret2libc Exploits (got 2 learn libc)
Cybersecurity
picoCTF 2018 [27] ret2libc Exploits (got 2 learn libc)
John Hammond Beginner 7y ago
picoCTF 2018 [26] Caesar Cipher 2
Cybersecurity
picoCTF 2018 [26] Caesar Cipher 2
John Hammond Intermediate 7y ago
picoCTF 2018 [25] Controlling Function Arguments | Buffer Overflow 2
Cybersecurity
picoCTF 2018 [25] Controlling Function Arguments | Buffer Overflow 2
John Hammond Intermediate 7y ago
Multi-Exponent RSA Cryptography | Square CTF "Flipped Bits"
Cybersecurity
Multi-Exponent RSA Cryptography | Square CTF "Flipped Bits"
John Hammond Intermediate 7y ago
picoCTF 2018 [24] Assembly 2
Cybersecurity
picoCTF 2018 [24] Assembly 2
John Hammond Intermediate 7y ago
MORSE CODE Steganography (2/2) BsidesCT CTF 2018
Cybersecurity
MORSE CODE Steganography (2/2) BsidesCT CTF 2018
John Hammond Intermediate 7y ago
Steganography (1/2) BsidesCT CTF 2018
Cybersecurity
Steganography (1/2) BsidesCT CTF 2018
John Hammond Intermediate 7y ago
BsidesCT 2018 TRIVIA Challenges
Cybersecurity
BsidesCT 2018 TRIVIA Challenges
John Hammond Intermediate 7y ago
REPLICATING THE FACEBOOK HACK
Cybersecurity
REPLICATING THE FACEBOOK HACK
John Hammond Intermediate 7y ago
Securing Windows with DISA STIGs
Cybersecurity
Securing Windows with DISA STIGs
John Hammond Intermediate 7y ago
picoCTF 2018 [23] Absolutely Relative
Cybersecurity
picoCTF 2018 [23] Absolutely Relative
John Hammond Intermediate 7y ago
picoCTF 2018 [22] The Vault & What's My Name
Cybersecurity
picoCTF 2018 [22] The Vault & What's My Name
John Hammond Intermediate 7y ago
picoCTF 2018 [21] Super Ext Magic
AI Safety & Ethics
picoCTF 2018 [21] Super Ext Magic
John Hammond Intermediate 7y ago
picoCTF 2018 [20] You Cant See Me & Buttons
Cybersecurity
picoCTF 2018 [20] You Cant See Me & Buttons
John Hammond Intermediate 7y ago
picoCTF 2018 [19] What Base Is This?
Cybersecurity
picoCTF 2018 [19] What Base Is This?
John Hammond Intermediate 7y ago
picoCTF 2018 [18] Shellcode
Cybersecurity
picoCTF 2018 [18] Shellcode
John Hammond Intermediate 7y ago
📚 Coursera Courses Opens on Coursera · Free to audit
1 / 3 View all →
Learn Bootstrap
📚 Coursera Course ↗
Self-paced
Learn Bootstrap
Opens on Coursera ↗
AI Social Media Marketing with ChatGPT & Gemini
📚 Coursera Course ↗
Self-paced
AI Social Media Marketing with ChatGPT & Gemini
Opens on Coursera ↗
Where, Why, and How of Lambda Functions in Python
📚 Coursera Course ↗
Self-paced
Where, Why, and How of Lambda Functions in Python
Opens on Coursera ↗
Crear Presentaciones Interactivas con Microsoft PowerPoint
📚 Coursera Course ↗
Self-paced
Crear Presentaciones Interactivas con Microsoft PowerPoint
Opens on Coursera ↗
AI & Law
📚 Coursera Course ↗
Self-paced
AI & Law
Opens on Coursera ↗
Linux for beginners with Hands-on Labs
📚 Coursera Course ↗
Self-paced
Linux for beginners with Hands-on Labs
Opens on Coursera ↗