✕ Clear filters
1,408 lessons

🔐 Cybersecurity

Ethical hacking, penetration testing, network security, CTFs and defensive security

All ▶ YouTube 201,014📚 Coursera 18,184🎤 TED 1
Hacking with Bloodhound: Map Your Environment
Cybersecurity
Hacking with Bloodhound: Map Your Environment
John Hammond Intermediate 2y ago
How Hackers Hide From Memory Scanners
Cybersecurity
How Hackers Hide From Memory Scanners
John Hammond Beginner 2y ago
they're selling WHAT on Telegram?!?
Cybersecurity
they're selling WHAT on Telegram?!?
John Hammond Intermediate 2y ago
ChatGPT Learns the Rust Programming Language
Cybersecurity
ChatGPT Learns the Rust Programming Language
John Hammond Beginner 2y ago
I Stole a Microsoft 365 Account. Here's How.
Cybersecurity
I Stole a Microsoft 365 Account. Here's How.
John Hammond Intermediate 2y ago
this Cybersecurity Platform is FREE
Cybersecurity
this Cybersecurity Platform is FREE
John Hammond Intermediate 2y ago
Hacking Websites: NodeJS Server-Side Template Injection
Cybersecurity
Hacking Websites: NodeJS Server-Side Template Injection
John Hammond Intermediate 2y ago
Fetch the Flag CTF is Live Right Now
Cybersecurity
Fetch the Flag CTF is Live Right Now
John Hammond Intermediate 2y ago
The 3CX Hack In Retrospect
Cybersecurity
The 3CX Hack In Retrospect
John Hammond Intermediate 2y ago
Cloud Security with Microsoft 365 Developer Tenants
Cybersecurity
Cloud Security with Microsoft 365 Developer Tenants
John Hammond Intermediate 2y ago
RagnarLocker Ransomware Seized by Law Enforcement
Cybersecurity
RagnarLocker Ransomware Seized by Law Enforcement
John Hammond Intermediate 2y ago
They Made QR Codes LONGER?!?
Cybersecurity
They Made QR Codes LONGER?!?
John Hammond Intermediate 2y ago
3 FREE Resources for Cyber Defenders
Cybersecurity
3 FREE Resources for Cyber Defenders
John Hammond Intermediate 2y ago
Hunting for Hackers with Sigma Rules
Cybersecurity
Hunting for Hackers with Sigma Rules
John Hammond Intermediate 2y ago
Create Your Own Dark Web Website
Cybersecurity
Create Your Own Dark Web Website
John Hammond Beginner 2y ago
Website Vulnerabilities to Fully Hacked Server
Cybersecurity
Website Vulnerabilities to Fully Hacked Server
John Hammond Intermediate 2y ago
Detect Hackers & Malware on your Computer (literally for free)
Cybersecurity
Detect Hackers & Malware on your Computer (literally for free)
John Hammond Intermediate 2y ago
How Hackers Exploit Vulnerable Drivers
Cybersecurity
How Hackers Exploit Vulnerable Drivers
John Hammond Beginner 2y ago
Hackers Are Exploiting Critical Vulnerabilities in File Transfer Software
Cybersecurity
Hackers Are Exploiting Critical Vulnerabilities in File Transfer Software
John Hammond Beginner 2y ago
VULNERABLE Kernel Drivers for Security Research
Cybersecurity
VULNERABLE Kernel Drivers for Security Research
John Hammond Advanced 2y ago
New "Dark Web" Generative AI Chatbots?!
Cybersecurity
New "Dark Web" Generative AI Chatbots?!
John Hammond Intermediate 2y ago
Exploring the Latest Malware Samples
Cybersecurity
Exploring the Latest Malware Samples
John Hammond Advanced 2y ago
I Explored Ransomware Cybercrime on the Dark Web
Cybersecurity
I Explored Ransomware Cybercrime on the Dark Web
John Hammond Beginner 2y ago
How To Pivot Through a Network with Chisel
Cybersecurity
How To Pivot Through a Network with Chisel
John Hammond Intermediate 2y ago
Classify Malware with YARA
Cybersecurity
Classify Malware with YARA
John Hammond Intermediate 2y ago
Learn Active Directory Kerberoasting
Cybersecurity
Learn Active Directory Kerberoasting
John Hammond Beginner 2y ago
Your Computer could be For Sale on the Dark Web
Cybersecurity
Your Computer could be For Sale on the Dark Web
John Hammond Intermediate 2y ago
Not All ZIP Files Are Equal
Cybersecurity
Not All ZIP Files Are Equal
John Hammond Intermediate 2y ago
Capture the Flag at Blackhat USA 2023!
Cybersecurity
Capture the Flag at Blackhat USA 2023!
John Hammond Intermediate 2y ago
Telegram Cybercrime is INSANE
Cybersecurity
Telegram Cybercrime is INSANE
John Hammond Intermediate 2y ago
Zimbra ZCS 0-day Exploited In The Wild
Cybersecurity
Zimbra ZCS 0-day Exploited In The Wild
John Hammond Beginner 2y ago
"Please Hack My Computer"
Cybersecurity
"Please Hack My Computer"
John Hammond Advanced 2y ago
Mass Digital Forensics & Incident Response with Velociraptor
Cybersecurity
Mass Digital Forensics & Incident Response with Velociraptor
John Hammond Intermediate 2y ago
Dark Web Dumpster Diving (Hunting Infostealer Malware)
Cybersecurity
Dark Web Dumpster Diving (Hunting Infostealer Malware)
John Hammond Beginner 2y ago
TryHackMe! Finding Computer Artifacts with osquery
Cybersecurity
TryHackMe! Finding Computer Artifacts with osquery
John Hammond Beginner 2y ago
How Hackers Use netsh.exe For Persistence & Code Execution (Sliver C2)
Cybersecurity
How Hackers Use netsh.exe For Persistence & Code Execution (Sliver C2)
John Hammond Intermediate 2y ago
Scale Your Cloud Infrastructure (Hosting CTFs)
Cybersecurity
Scale Your Cloud Infrastructure (Hosting CTFs)
John Hammond Intermediate 2y ago
How Hackers Evade Program Allowlists with DLLs
Cybersecurity
How Hackers Evade Program Allowlists with DLLs
John Hammond Intermediate 2y ago
Ethical Hacking: Bypass Passwords with Linux PAM Degradation Attack
Cybersecurity
Ethical Hacking: Bypass Passwords with Linux PAM Degradation Attack
John Hammond Beginner 2y ago
Rapid Windows Memory Analysis with Volatility 3
Cybersecurity
Rapid Windows Memory Analysis with Volatility 3
John Hammond Intermediate 2y ago
Exploring the Latest Dark Web Onion Sites
Cybersecurity
Exploring the Latest Dark Web Onion Sites
John Hammond Intermediate 2y ago
Hide a Hacker's Reverse Shell in ONE Command
Cybersecurity
Hide a Hacker's Reverse Shell in ONE Command
John Hammond Intermediate 2y ago
Getting Started in Firmware Analysis & IoT Reverse Engineering
Cybersecurity
Getting Started in Firmware Analysis & IoT Reverse Engineering
John Hammond Beginner 2y ago
Hacking Complex Passwords with Rules & Munging
Cybersecurity
Hacking Complex Passwords with Rules & Munging
John Hammond Intermediate 2y ago
Living Off The Land - Windows Disk Cleaner Persistence
Cybersecurity
Living Off The Land - Windows Disk Cleaner Persistence
John Hammond Intermediate 2y ago
How To Test Your Security with Atomic Red Team
Cybersecurity
How To Test Your Security with Atomic Red Team
John Hammond Intermediate 2y ago
winget: Install ROGUE Software & Packages?
Cybersecurity
winget: Install ROGUE Software & Packages?
John Hammond Intermediate 2y ago
What SECRETS are in your Clipboard?
Cybersecurity
What SECRETS are in your Clipboard?
John Hammond Beginner 2y ago
📚 Coursera Courses Opens on Coursera · Free to audit
1 / 3 View all →
Leadership: Impactful Feedback in a Hybrid World
📚 Coursera Course ↗
Self-paced
Leadership: Impactful Feedback in a Hybrid World
Opens on Coursera ↗
Azure Cybersecurity Solutions And Microsoft Defender
📚 Coursera Course ↗
Self-paced
Azure Cybersecurity Solutions And Microsoft Defender
Opens on Coursera ↗
Cybersecurity Testing and Prevention
📚 Coursera Course ↗
Self-paced
Cybersecurity Testing and Prevention
Opens on Coursera ↗
Advanced Networking, Virtualization, and IT Security
📚 Coursera Course ↗
Self-paced
Advanced Networking, Virtualization, and IT Security
Opens on Coursera ↗
Securing Systems and Networks
📚 Coursera Course ↗
Self-paced
Securing Systems and Networks
Opens on Coursera ↗
Introduction to Python for Cybersecurity
📚 Coursera Course ↗
Self-paced
Introduction to Python for Cybersecurity
Opens on Coursera ↗