✕ Clear filters
1,803 lessons

Browse Lessons

Curated from top practitioners. Filtered, not flooded.

All ▶ YouTube 200,947📚 Coursera 18,180🎤 TED 1
Exploring Alpine Docker: Manipulating User Files Securely
AI Safety & Ethics
Exploring Alpine Docker: Manipulating User Files Securely
John Hammond Intermediate 1y ago
Understanding Cookies: Netscape Format & Malware Insights
AI Safety & Ethics
Understanding Cookies: Netscape Format & Malware Insights
John Hammond Intermediate 1y ago
Master the Container Image Workflow: A Step-by-Step Guide
AI Tools & Apps
Master the Container Image Workflow: A Step-by-Step Guide
John Hammond Beginner 1y ago
Unmasking Session Hijacking: Defend Your Accounts Now
AI Safety & Ethics
Unmasking Session Hijacking: Defend Your Accounts Now
John Hammond Intermediate 1y ago
Master Docker with Alpine: Simple Commands You Need
AI Safety & Ethics
Master Docker with Alpine: Simple Commands You Need
John Hammond Beginner 1y ago
Mastering Python: Monitor Cookie Leaks with Poetry
AI Safety & Ethics
Mastering Python: Monitor Cookie Leaks with Poetry
John Hammond Intermediate 1y ago
🎄🎅HOLIDAY HACK CHALLENGE🎅🎄
Cybersecurity
🎄🎅HOLIDAY HACK CHALLENGE🎅🎄
John Hammond Beginner 1y ago
Mastering Text Editors: Unveiling Injection Points
AI Safety & Ethics
Mastering Text Editors: Unveiling Injection Points
John Hammond Intermediate 1y ago
Protect Your Business: Flare's New Cookie Security Feature
AI Safety & Ethics
Protect Your Business: Flare's New Cookie Security Feature
John Hammond Intermediate 1y ago
Exploring Remote Code Execution Triggers in Build Scripts
AI Safety & Ethics
Exploring Remote Code Execution Triggers in Build Scripts
John Hammond Intermediate 1y ago
Session Hijacking: Hack Reddit with GoLogin Tools
AI Safety & Ethics
Session Hijacking: Hack Reddit with GoLogin Tools
John Hammond Intermediate 1y ago
Streamline Your Alpine Container with Target.tar Transformation
AI Safety & Ethics
Streamline Your Alpine Container with Target.tar Transformation
John Hammond Intermediate 1y ago
Uncovering InfoStealer Malware: What Does It Find?
AI Safety & Ethics
Uncovering InfoStealer Malware: What Does It Find?
John Hammond Intermediate 1y ago
Boost Your Skills: Secure Your Apps with Snyk
AI Safety & Ethics
Boost Your Skills: Secure Your Apps with Snyk
John Hammond Intermediate 1y ago
Unlocking Website Cookies: Your Guide to Authentication
AI Safety & Ethics
Unlocking Website Cookies: Your Guide to Authentication
John Hammond Beginner 1y ago
Uncovering Hidden Vulnerabilities in Custom Services
AI Safety & Ethics
Uncovering Hidden Vulnerabilities in Custom Services
John Hammond Intermediate 1y ago
Stop Session Hijacking: How to Secure Your Cookies Now
AI Safety & Ethics
Stop Session Hijacking: How to Secure Your Cookies Now
John Hammond Intermediate 1y ago
Uncovering TAR Payload Secrets: Extracting the Right Layers
AI Safety & Ethics
Uncovering TAR Payload Secrets: Extracting the Right Layers
John Hammond Intermediate 1y ago
Uncovering Redline Info Stealer
AI Safety & Ethics
Uncovering Redline Info Stealer
John Hammond Intermediate 1y ago
Unpacking Code for CTF Challenges: Create Your Dirty Image
Cybersecurity
Unpacking Code for CTF Challenges: Create Your Dirty Image
John Hammond Intermediate 1y ago
Preventing Session Hijacking: Essential Cybersecurity Strategies
Cybersecurity
Preventing Session Hijacking: Essential Cybersecurity Strategies
John Hammond Intermediate 1y ago
Docker Tutorial: Building a Custom Tar Image with Ease
AI Tools & Apps
Docker Tutorial: Building a Custom Tar Image with Ease
John Hammond Beginner 1y ago
Unlocking Secrets: Hacking With InfoStealer Malware
Cybersecurity
Unlocking Secrets: Hacking With InfoStealer Malware
John Hammond Intermediate 1y ago
Mastering tar Command Injection: A Deep Dive
AI Safety & Ethics
Mastering tar Command Injection: A Deep Dive
John Hammond Intermediate 1y ago
Hacking a Reddit Account: A Step-by-Step Demonstration
Cybersecurity
Hacking a Reddit Account: A Step-by-Step Demonstration
John Hammond Intermediate 1y ago
Discover the Hidden Vulnerability in Command Injection!
AI Safety & Ethics
Discover the Hidden Vulnerability in Command Injection!
John Hammond Intermediate 1y ago
Protect Yourself: The Dangers of InfoStealer Malware
AI Safety & Ethics
Protect Yourself: The Dangers of InfoStealer Malware
John Hammond Intermediate 1y ago
Exploring Docker: Downloading and Testing Build Scripts
AI Safety & Ethics
Exploring Docker: Downloading and Testing Build Scripts
John Hammond Intermediate 1y ago
Stop Session Hijacking: Protect Your Accounts Now!
AI Safety & Ethics
Stop Session Hijacking: Protect Your Accounts Now!
John Hammond Intermediate 1y ago
I Stole My Own Reddit Account. Here's How.
Cybersecurity
I Stole My Own Reddit Account. Here's How.
John Hammond Beginner 1y ago
Unlocking Microsoft Tenant Access: A Step-by-Step Guide
AI News & Updates
Unlocking Microsoft Tenant Access: A Step-by-Step Guide
John Hammond Beginner 1y ago
Mastering Command Injection: Extracting Layer.tar Like a Pro
AI Safety & Ethics
Mastering Command Injection: Extracting Layer.tar Like a Pro
John Hammond Intermediate 1y ago
Mastering Token Access: Uncovering Microsoft Graph API Secrets
Large Language Models
Mastering Token Access: Uncovering Microsoft Graph API Secrets
John Hammond Intermediate 1y ago
Unlocking Docker Inside Docker: The DIND Revolution
AI Safety & Ethics
Unlocking Docker Inside Docker: The DIND Revolution
John Hammond Intermediate 1y ago
Learn Cryptography!
Cybersecurity
Learn Cryptography!
John Hammond Beginner 1y ago
Social Engineering: Accessing Microsoft Graph API Secrets
AI News & Updates
Social Engineering: Accessing Microsoft Graph API Secrets
John Hammond Intermediate 1y ago
Mastering Docker: Build Your Own Authentication & Registry Service
AI Safety & Ethics
Mastering Docker: Build Your Own Authentication & Registry Service
John Hammond Intermediate 1y ago
Clone Security Groups: Unveiling Rogue User Risks
AI Safety & Ethics
Clone Security Groups: Unveiling Rogue User Risks
John Hammond Intermediate 1y ago
Unlocking the Secrets of Docker: A Creative Journey
AI Safety & Ethics
Unlocking the Secrets of Docker: A Creative Journey
John Hammond Intermediate 1y ago
Unlocking Our Backdoor Account: Dynamic Admin Setup Made Easy
AI Safety & Ethics
Unlocking Our Backdoor Account: Dynamic Admin Setup Made Easy
John Hammond Beginner 1y ago
Unlocking Service User Secrets: Bypassing Authentication Flaws
AI Safety & Ethics
Unlocking Service User Secrets: Bypassing Authentication Flaws
John Hammond Intermediate 1y ago
Unlocking Guest Invites: Secrets of EntraID
AI Safety & Ethics
Unlocking Guest Invites: Secrets of EntraID
John Hammond Intermediate 1y ago
Master Docker Images with Scopio: Simplify Your Workflow
AI Tools & Apps
Master Docker Images with Scopio: Simplify Your Workflow
John Hammond Intermediate 1y ago
Effortlessly Invite Guests with Graphrunner's Commandlet
AI Safety & Ethics
Effortlessly Invite Guests with Graphrunner's Commandlet
John Hammond Intermediate 1y ago
Linux Challenges for Holiday Hacking
Cybersecurity
Linux Challenges for Holiday Hacking
John Hammond Intermediate 1y ago
Inside the Registry Challenge: CTF Zone Finals 2024
Cybersecurity
Inside the Registry Challenge: CTF Zone Finals 2024
John Hammond Intermediate 1y ago
Capture the Flag! Command Injection by Docker Layers
Cybersecurity
Capture the Flag! Command Injection by Docker Layers
John Hammond Beginner 1y ago
Master Dynamic Groups: Unlocking Privileges in Graphrunner
AI Safety & Ethics
Master Dynamic Groups: Unlocking Privileges in Graphrunner
John Hammond Intermediate 1y ago
📚 Coursera Courses Opens on Coursera · Free to audit
1 / 3 View all →
Innovation Through Design: Think, Make, Break, Repeat
📚 Coursera Course ↗
Self-paced
Innovation Through Design: Think, Make, Break, Repeat
Opens on Coursera ↗
The Business of Social
📚 Coursera Course ↗
Self-paced
The Business of Social
Opens on Coursera ↗
Emotional Intelligence in the Workplace
📚 Coursera Course ↗
Self-paced
Emotional Intelligence in the Workplace
Opens on Coursera ↗
Cryptocurrency Security: Cold Storage & Paper Wallets
📚 Coursera Course ↗
Self-paced
Cryptocurrency Security: Cold Storage & Paper Wallets
Opens on Coursera ↗
For Challenging Times
📚 Coursera Course ↗
Self-paced
For Challenging Times
Opens on Coursera ↗
Mastering EV Cooling: Advanced Thermal Management
📚 Coursera Course ↗
Self-paced
Mastering EV Cooling: Advanced Thermal Management
Opens on Coursera ↗