✕ Clear filters
1,408 lessons

🔐 Cybersecurity

Ethical hacking, penetration testing, network security, CTFs and defensive security

All ▶ YouTube 200,970📚 Coursera 18,181🎤 TED 1
Hunting Scam Popups
Cybersecurity
Hunting Scam Popups
John Hammond Beginner 1y ago
Binary Ninja Scripting with Python!
Cybersecurity
Binary Ninja Scripting with Python!
John Hammond Beginner 1y ago
Detection Engineering with Wazuh
Cybersecurity
Detection Engineering with Wazuh
John Hammond Beginner 1y ago
The State of Cybercrime [2024]
Cybersecurity
The State of Cybercrime [2024]
John Hammond Beginner 1y ago
BLOB Based Phishing Scams
Cybersecurity
BLOB Based Phishing Scams
John Hammond Beginner 1y ago
Learn Active Directory!
Cybersecurity
Learn Active Directory!
John Hammond Beginner 1y ago
Godot Game Used As Malware
Cybersecurity
Godot Game Used As Malware
John Hammond Advanced 1y ago
Spying on Scammers
Cybersecurity
Spying on Scammers
John Hammond Beginner 1y ago
🎄🎅HOLIDAY HACK CHALLENGE🎅🎄
Cybersecurity
🎄🎅HOLIDAY HACK CHALLENGE🎅🎄
John Hammond Beginner 1y ago
Unpacking Code for CTF Challenges: Create Your Dirty Image
Cybersecurity
Unpacking Code for CTF Challenges: Create Your Dirty Image
John Hammond Intermediate 1y ago
Preventing Session Hijacking: Essential Cybersecurity Strategies
Cybersecurity
Preventing Session Hijacking: Essential Cybersecurity Strategies
John Hammond Intermediate 1y ago
Unlocking Secrets: Hacking With InfoStealer Malware
Cybersecurity
Unlocking Secrets: Hacking With InfoStealer Malware
John Hammond Intermediate 1y ago
Hacking a Reddit Account: A Step-by-Step Demonstration
Cybersecurity
Hacking a Reddit Account: A Step-by-Step Demonstration
John Hammond Intermediate 1y ago
I Stole My Own Reddit Account. Here's How.
Cybersecurity
I Stole My Own Reddit Account. Here's How.
John Hammond Beginner 1y ago
Learn Cryptography!
Cybersecurity
Learn Cryptography!
John Hammond Beginner 1y ago
Linux Challenges for Holiday Hacking
Cybersecurity
Linux Challenges for Holiday Hacking
John Hammond Intermediate 1y ago
Inside the Registry Challenge: CTF Zone Finals 2024
Cybersecurity
Inside the Registry Challenge: CTF Zone Finals 2024
John Hammond Intermediate 1y ago
Capture the Flag! Command Injection by Docker Layers
Cybersecurity
Capture the Flag! Command Injection by Docker Layers
John Hammond Beginner 1y ago
From Novice to Pro: Unleashing Hacking Genius
Cybersecurity
From Novice to Pro: Unleashing Hacking Genius
John Hammond Intermediate 1y ago
Unlock Your Cybersecurity Potential with Hands-On Labs
Cybersecurity
Unlock Your Cybersecurity Potential with Hands-On Labs
John Hammond Intermediate 1y ago
Unlocking Privilege Escalation in EntraID: The Essentials
Cybersecurity
Unlocking Privilege Escalation in EntraID: The Essentials
John Hammond Intermediate 1y ago
Exposing Vulnerabilities in EntraID: Ethical Hacking Insights
Cybersecurity
Exposing Vulnerabilities in EntraID: Ethical Hacking Insights
John Hammond Intermediate 1y ago
Hacking Everyday Items: The Truth Behind Suitcase Locks
Cybersecurity
Hacking Everyday Items: The Truth Behind Suitcase Locks
John Hammond Intermediate 1y ago
Collaborative Hacking with HHC 2024
Cybersecurity
Collaborative Hacking with HHC 2024
John Hammond Intermediate 1y ago
A Holiday Hacking Dream
Cybersecurity
A Holiday Hacking Dream
John Hammond Intermediate 1y ago
World Building for SANS Holiday Hack Challenge
Cybersecurity
World Building for SANS Holiday Hack Challenge
John Hammond Beginner 1y ago
Cities Skylines II Malware [FULL REVERSE ENGINEERING ANALYSIS]
Cybersecurity
Cities Skylines II Malware [FULL REVERSE ENGINEERING ANALYSIS]
John Hammond Beginner 1y ago
SaaS apps are vulnerable too!!! (ServiceNow Exploitation)
Cybersecurity
SaaS apps are vulnerable too!!! (ServiceNow Exploitation)
John Hammond Beginner 1y ago
How Hackers Persist & Privesc in Microsoft 365
Cybersecurity
How Hackers Persist & Privesc in Microsoft 365
John Hammond Beginner 1y ago
Learn Open-Source Intelligence (OSINT)!
Cybersecurity
Learn Open-Source Intelligence (OSINT)!
John Hammond Beginner 1y ago
Holiday Hack Challenge   Ed Skoudis Interview
Cybersecurity
Holiday Hack Challenge Ed Skoudis Interview
John Hammond Beginner 1y ago
Exploring the Wiz Cloud Security Platform
Cybersecurity
Exploring the Wiz Cloud Security Platform
John Hammond Beginner 1y ago
Windows Servers Can Expose PowerShell on the Web
Cybersecurity
Windows Servers Can Expose PowerShell on the Web
John Hammond Beginner 1y ago
Hackers Abuse MeshCentral for a RAT
Cybersecurity
Hackers Abuse MeshCentral for a RAT
John Hammond Beginner 1y ago
Bruteforcing Windows Defender Exclusions
Cybersecurity
Bruteforcing Windows Defender Exclusions
John Hammond Advanced 1y ago
REAL Ransomware Chat Logs
Cybersecurity
REAL Ransomware Chat Logs
John Hammond Beginner 1y ago
Github Intentionally Lets You Read Deleted & Private Commits
Cybersecurity
Github Intentionally Lets You Read Deleted & Private Commits
John Hammond Beginner 1y ago
Three Ways to Hack Mobile Apps
Cybersecurity
Three Ways to Hack Mobile Apps
John Hammond Beginner 1y ago
They Say This Malware is INSANE
Cybersecurity
They Say This Malware is INSANE
John Hammond Beginner 1y ago
Hacking from Cloud to Endpoint (and vice versa)
Cybersecurity
Hacking from Cloud to Endpoint (and vice versa)
John Hammond Beginner 1y ago
Where Does Malware Go On Your Computer?
Cybersecurity
Where Does Malware Go On Your Computer?
John Hammond Beginner 1y ago
Hacking ALL Levels in this Game!
Cybersecurity
Hacking ALL Levels in this Game!
John Hammond Beginner 1y ago
Cracking Active Directory Passwords & MFA Fatigue
Cybersecurity
Cracking Active Directory Passwords & MFA Fatigue
John Hammond Beginner 1y ago
How to Scrape Telegram with Python
Cybersecurity
How to Scrape Telegram with Python
John Hammond Beginner 1y ago
Fake CAPTCHA Runs Malware
Cybersecurity
Fake CAPTCHA Runs Malware
John Hammond Beginner 1y ago
Ransomware In Action: MedusaLocker ReadText34
Cybersecurity
Ransomware In Action: MedusaLocker ReadText34
John Hammond Advanced 1y ago
The Hacker with Hardware Implants (interview)
Cybersecurity
The Hacker with Hardware Implants (interview)
John Hammond Beginner 1y ago
Hacking Games with MelonLoader
Cybersecurity
Hacking Games with MelonLoader
John Hammond Beginner 1y ago
📚 Coursera Courses Opens on Coursera · Free to audit
1 / 3 View all →
Next-Generation Firewalls and Intrusion Prevention
📚 Coursera Course ↗
Self-paced
Next-Generation Firewalls and Intrusion Prevention
Opens on Coursera ↗
Offensive Security Using Python
📚 Coursera Course ↗
Self-paced
Offensive Security Using Python
Opens on Coursera ↗
Nessus Scanner - Network Scanning from Beginner to Advanced
📚 Coursera Course ↗
Self-paced
Nessus Scanner - Network Scanning from Beginner to Advanced
Opens on Coursera ↗
Conflict Management Essentials
📚 Coursera Course ↗
Self-paced
Conflict Management Essentials
Opens on Coursera ↗
Introdução ao Cloud Next Generation Firewall
📚 Coursera Course ↗
Self-paced
Introdução ao Cloud Next Generation Firewall
Opens on Coursera ↗
CISM: Incident Resilience & Recovery
📚 Coursera Course ↗
Self-paced
CISM: Incident Resilience & Recovery
Opens on Coursera ↗