✕ Clear filters
1,410 lessons

🔐 Cybersecurity

Ethical hacking, penetration testing, network security, CTFs and defensive security

All ▶ YouTube 201,145📚 Coursera 18,202🎤 TED 1
Python [pygame] 02 Window Functions
Cybersecurity
Python [pygame] 02 Window Functions
John Hammond Intermediate 12y ago
Python [pygame] 01 Basic Window
Cybersecurity
Python [pygame] 01 Basic Window
John Hammond Intermediate 12y ago
Python [gtk] 07 Box Functionality
Cybersecurity
Python [gtk] 07 Box Functionality
John Hammond Intermediate 12y ago
Python [re] 08 The Question Mark
Cybersecurity
Python [re] 08 The Question Mark
John Hammond Intermediate 12y ago
Python [re] 07 Backslashed Special Characters
Cybersecurity
Python [re] 07 Backslashed Special Characters
John Hammond Intermediate 12y ago
Python [re] 06 Multiple Occurences
Cybersecurity
Python [re] 06 Multiple Occurences
John Hammond Intermediate 12y ago
Python Challenge! 04 Follow the Chain
Cybersecurity
Python Challenge! 04 Follow the Chain
John Hammond Intermediate 12y ago
Python [re] 05 Findall
Cybersecurity
Python [re] 05 Findall
John Hammond Intermediate 12y ago
Python Challenge! 03 Big Bodyguards
Cybersecurity
Python Challenge! 03 Big Bodyguards
John Hammond Intermediate 12y ago
Python [re] 04 ^, $, & Multiline
Cybersecurity
Python [re] 04 ^, $, & Multiline
John Hammond Intermediate 12y ago
Python [re] 03 Flags
Cybersecurity
Python [re] 03 Flags
John Hammond Intermediate 12y ago
Python [re] 02 Adding to the Environment
Cybersecurity
Python [re] 02 Adding to the Environment
John Hammond Intermediate 12y ago
Python [re] 01 Building a Testing Environment
Cybersecurity
Python [re] 01 Building a Testing Environment
John Hammond Intermediate 12y ago
Merry Christmas! Videos in the next two weeks!
Cybersecurity
Merry Christmas! Videos in the next two weeks!
John Hammond Intermediate 12y ago
Python [threading] 08 Locks
Cybersecurity
Python [threading] 08 Locks
John Hammond Intermediate 12y ago
Python [threading] 07 Daemon Threads
Cybersecurity
Python [threading] 07 Daemon Threads
John Hammond Intermediate 12y ago
Python [threading] 07 Blooper!
Cybersecurity
Python [threading] 07 Blooper!
John Hammond Intermediate 12y ago
Python [threading] 06 Thread Identification Number
Cybersecurity
Python [threading] 06 Thread Identification Number
John Hammond Intermediate 12y ago
Python [threading] 05 Thread Join
Cybersecurity
Python [threading] 05 Thread Join
John Hammond Intermediate 12y ago
Python [threading] 04 Thread is_alive() and Name
Cybersecurity
Python [threading] 04 Thread is_alive() and Name
John Hammond Intermediate 12y ago
Python [threading] 03 Terminating a Thread
Cybersecurity
Python [threading] 03 Terminating a Thread
John Hammond Intermediate 12y ago
Python [threading] 02 Creating Our Own Thread Object
Cybersecurity
Python [threading] 02 Creating Our Own Thread Object
John Hammond Intermediate 12y ago
Python [threading] 01 ActiveCount, Enumerate, & CurrentThread
Cybersecurity
Python [threading] 01 ActiveCount, Enumerate, & CurrentThread
John Hammond Intermediate 12y ago
Python Challenge! 02 MAYBE in the source!
Cybersecurity
Python Challenge! 02 MAYBE in the source!
John Hammond Intermediate 12y ago
Python [PIL Image] 15 Rotate
Cybersecurity
Python [PIL Image] 15 Rotate
John Hammond Intermediate 12y ago
Python Challenge! 01 The First Challenge
Cybersecurity
Python Challenge! 01 The First Challenge
John Hammond Intermediate 12y ago
Python [PIL Image] 14 The Resize Function
Cybersecurity
Python [PIL Image] 14 The Resize Function
John Hammond Intermediate 12y ago
Python Challenge! 00 Introduction
Cybersecurity
Python Challenge! 00 Introduction
John Hammond Beginner 12y ago
Python [PIL Image] 13 Thumbnail
Cybersecurity
Python [PIL Image] 13 Thumbnail
John Hammond Intermediate 12y ago
Python [PIL Image] 12 The Paste Function
Cybersecurity
Python [PIL Image] 12 The Paste Function
John Hammond Intermediate 12y ago
Python [PIL Image] 11 GetData
Cybersecurity
Python [PIL Image] 11 GetData
John Hammond Intermediate 12y ago
Python [PIL Image] 10 GetPixel
Cybersecurity
Python [PIL Image] 10 GetPixel
John Hammond Intermediate 12y ago
Python [PIL Image] 09 GetColors
Cybersecurity
Python [PIL Image] 09 GetColors
John Hammond Intermediate 12y ago
Python [PIL Image] 08 Image Size
Cybersecurity
Python [PIL Image] 08 Image Size
John Hammond Intermediate 12y ago
Python [PIL Image] 07 Filter
Cybersecurity
Python [PIL Image] 07 Filter
John Hammond Intermediate 12y ago
Python [PIL Image] 06 Crop
Cybersecurity
Python [PIL Image] 06 Crop
John Hammond Intermediate 12y ago
Python [PIL Image] 05 The convert() Function
Cybersecurity
Python [PIL Image] 05 The convert() Function
John Hammond Intermediate 12y ago
Python [PIL Image] 04 Composite
Cybersecurity
Python [PIL Image] 04 Composite
John Hammond Intermediate 12y ago
Python [PIL Image] 03 The Blend Function
Cybersecurity
Python [PIL Image] 03 The Blend Function
John Hammond Intermediate 12y ago
Python [PIL Image] 02 Image Open
Cybersecurity
Python [PIL Image] 02 Image Open
John Hammond Intermediate 12y ago
Python [PIL Image] 01 Introduction and New()
Cybersecurity
Python [PIL Image] 01 Introduction and New()
John Hammond Beginner 12y ago
Python [gtk] 06 Boxes
Cybersecurity
Python [gtk] 06 Boxes
John Hammond Intermediate 12y ago
Python [zipfile] 06 Extracting with a Password
Cybersecurity
Python [zipfile] 06 Extracting with a Password
John Hammond Intermediate 12y ago
Python [zipfile] 05 ZipInfo Objects
Cybersecurity
Python [zipfile] 05 ZipInfo Objects
John Hammond Intermediate 12y ago
Python [zipfile] 04 is_zipfile()
Cybersecurity
Python [zipfile] 04 is_zipfile()
John Hammond Intermediate 12y ago
Python [zipfile] 03 Extracting Babies
Cybersecurity
Python [zipfile] 03 Extracting Babies
John Hammond Intermediate 12y ago
Python [zipfile] 02 Adding Files to the Archive
Cybersecurity
Python [zipfile] 02 Adding Files to the Archive
John Hammond Intermediate 12y ago
Python [gtk] 05 The Fixed Object
Cybersecurity
Python [gtk] 05 The Fixed Object
John Hammond Intermediate 12y ago
📚 Coursera Courses Opens on Coursera · Free to audit
1 / 3 View all →
Incident Response and Cyber Forensics
📚 Coursera Course ↗
Self-paced
Incident Response and Cyber Forensics
Opens on Coursera ↗
Check Point Jump Start: Maestro Hyperscale Network Security
📚 Coursera Course ↗
Self-paced
Check Point Jump Start: Maestro Hyperscale Network Security
Opens on Coursera ↗
Number Theory and Cryptography
📚 Coursera Course ↗
Self-paced
Number Theory and Cryptography
Opens on Coursera ↗
Segurança no GKE com Cloud Next Generation Firewall
📚 Coursera Course ↗
Self-paced
Segurança no GKE com Cloud Next Generation Firewall
Opens on Coursera ↗
Segurança de TI: Defesa Contra as Artes Obscuras do Mundo Digital
📚 Coursera Course ↗
Self-paced
Segurança de TI: Defesa Contra as Artes Obscuras do Mundo Digital
Opens on Coursera ↗
The Beginners Cyber Security Awareness Training Course
📚 Coursera Course ↗
Self-paced
The Beginners Cyber Security Awareness Training Course
Opens on Coursera ↗