✕ Clear filters
1,410 lessons

🔐 Cybersecurity

Ethical hacking, penetration testing, network security, CTFs and defensive security

All ▶ YouTube 201,177📚 Coursera 18,205🎤 TED 1
Python 35 Reading From Files
Cybersecurity
Python 35 Reading From Files
John Hammond Intermediate 14y ago
Python 34 Writing To Files
Cybersecurity
Python 34 Writing To Files
John Hammond Intermediate 14y ago
Python 33 Dictionary Parameters
Cybersecurity
Python 33 Dictionary Parameters
John Hammond Intermediate 14y ago
Python 32 Tuple Parameters
Cybersecurity
Python 32 Tuple Parameters
John Hammond Intermediate 14y ago
Python 31 Multiple Inheritance
Cybersecurity
Python 31 Multiple Inheritance
John Hammond Intermediate 14y ago
Python 30 Inheritance
Cybersecurity
Python 30 Inheritance
John Hammond Intermediate 14y ago
Python 29 Constructor Parameters
Cybersecurity
Python 29 Constructor Parameters
John Hammond Intermediate 14y ago
Python 28 Constructors and Deconstructors
Cybersecurity
Python 28 Constructors and Deconstructors
John Hammond Intermediate 14y ago
Python 27 Classes and Self
Cybersecurity
Python 27 Classes and Self
John Hammond Intermediate 14y ago
Python 26 Object Oriented Programming
Cybersecurity
Python 26 Object Oriented Programming
John Hammond Intermediate 14y ago
Python 25 Dictionaries
Cybersecurity
Python 25 Dictionaries
John Hammond Intermediate 14y ago
Python 24 Slicing Lists, Strings, and Tuples
Cybersecurity
Python 24 Slicing Lists, Strings, and Tuples
John Hammond Intermediate 14y ago
Python 23 List Assignment and Tuples
Cybersecurity
Python 23 List Assignment and Tuples
John Hammond Intermediate 14y ago
Python 01 Experimenting with IDLE
Cybersecurity
Python 01 Experimenting with IDLE
John Hammond Intermediate 14y ago
Python 22 Lists
Cybersecurity
Python 22 Lists
John Hammond Intermediate 14y ago
Python 21 Break and Continue
Cybersecurity
Python 21 Break and Continue
John Hammond Intermediate 14y ago
Python 20 For Loops
Cybersecurity
Python 20 For Loops
John Hammond Intermediate 14y ago
Python 19 While Loop
Cybersecurity
Python 19 While Loop
John Hammond Intermediate 14y ago
Python 18 Logical Operators
Cybersecurity
Python 18 Logical Operators
John Hammond Intermediate 14y ago
Python 17 Nesting
Cybersecurity
Python 17 Nesting
John Hammond Intermediate 14y ago
Python 16 Else and Elif
Cybersecurity
Python 16 Else and Elif
John Hammond Intermediate 14y ago
Python 15 Testing Operators
Cybersecurity
Python 15 Testing Operators
John Hammond Intermediate 14y ago
Python 14 If Statement
Cybersecurity
Python 14 If Statement
John Hammond Intermediate 14y ago
Python 13 Function Return
Cybersecurity
Python 13 Function Return
John Hammond Intermediate 14y ago
Python 12 Default Parameters
Cybersecurity
Python 12 Default Parameters
John Hammond Intermediate 14y ago
Python 11 Function Parameters
Cybersecurity
Python 11 Function Parameters
John Hammond Intermediate 14y ago
Python 10 Functions Scope
Cybersecurity
Python 10 Functions Scope
John Hammond Intermediate 14y ago
Python 09 Basic Functions
Cybersecurity
Python 09 Basic Functions
John Hammond Intermediate 14y ago
Python 08 Programming Style and Comments
Cybersecurity
Python 08 Programming Style and Comments
John Hammond Intermediate 14y ago
Python 07 Input and Output
Cybersecurity
Python 07 Input and Output
John Hammond Intermediate 14y ago
Python 06 Running Scripts
Cybersecurity
Python 06 Running Scripts
John Hammond Intermediate 14y ago
Python 05 Variables
Cybersecurity
Python 05 Variables
John Hammond Intermediate 14y ago
Python 04 Working With Strings
Cybersecurity
Python 04 Working With Strings
John Hammond Intermediate 14y ago
Python 03 Operating on Data
Cybersecurity
Python 03 Operating on Data
John Hammond Intermediate 14y ago
Python 02 Data Types
Cybersecurity
Python 02 Data Types
John Hammond Intermediate 14y ago
Python 75 List Reverse
Cybersecurity
Python 75 List Reverse
John Hammond Intermediate 14y ago
Sure has been a while!
Cybersecurity
Sure has been a while!
John Hammond Intermediate 14y ago
Fix dates with PHP?
Cybersecurity
Fix dates with PHP?
John Hammond Intermediate 14y ago
2012, Baby!
Cybersecurity
2012, Baby!
John Hammond Intermediate 14y ago
GM Shell, and Notes!
Cybersecurity
GM Shell, and Notes!
John Hammond Intermediate 14y ago
Christmas, Vacation and Python!
Cybersecurity
Christmas, Vacation and Python!
John Hammond Intermediate 14y ago
It's almost Christmas!
Cybersecurity
It's almost Christmas!
John Hammond Intermediate 14y ago
English Vocab, and More Python!
Cybersecurity
English Vocab, and More Python!
John Hammond Intermediate 14y ago
HTML, Net Shares, GML!
Cybersecurity
HTML, Net Shares, GML!
John Hammond Intermediate 14y ago
Python Experiments!
Cybersecurity
Python Experiments!
John Hammond Intermediate 14y ago
GML, OpenShot and Ubuntu 11.10!
Cybersecurity
GML, OpenShot and Ubuntu 11.10!
John Hammond Intermediate 14y ago
HTML Tables in Python!
Cybersecurity
HTML Tables in Python!
John Hammond Intermediate 14y ago
Finishing up Hamlet!
Cybersecurity
Finishing up Hamlet!
John Hammond Intermediate 14y ago
📚 Coursera Courses Opens on Coursera · Free to audit
1 / 3 View all →
Evalúa tus necesidades con Cloud Next Generation Firewall
📚 Coursera Course ↗
Self-paced
Evalúa tus necesidades con Cloud Next Generation Firewall
Opens on Coursera ↗
The Art of Storytelling
📚 Coursera Course ↗
Self-paced
The Art of Storytelling
Opens on Coursera ↗
AWS: Infrastructure Security
📚 Coursera Course ↗
Self-paced
AWS: Infrastructure Security
Opens on Coursera ↗
Security Fundamentals & Network Automation
📚 Coursera Course ↗
Self-paced
Security Fundamentals & Network Automation
Opens on Coursera ↗
Cyber Security for Absolute Beginners – Part 1
📚 Coursera Course ↗
Self-paced
Cyber Security for Absolute Beginners – Part 1
Opens on Coursera ↗
Cyber Security Professional – Beginner’s Career Guide
📚 Coursera Course ↗
Self-paced
Cyber Security Professional – Beginner’s Career Guide
Opens on Coursera ↗