✕ Clear filters
1,408 lessons

🔐 Cybersecurity

Ethical hacking, penetration testing, network security, CTFs and defensive security

All ▶ YouTube 201,014📚 Coursera 18,184🎤 TED 1
Kubernetes Hacking: From Weak Applications to Cluster Control
Cybersecurity
Kubernetes Hacking: From Weak Applications to Cluster Control
John Hammond Intermediate 2y ago
Python Pwntools Hacking: ret2libc GOT & PLT
Cybersecurity
Python Pwntools Hacking: ret2libc GOT & PLT
John Hammond Intermediate 2y ago
Cybersecurity Labs (FOR FREE) - Linux Backdoor Analysis
Cybersecurity
Cybersecurity Labs (FOR FREE) - Linux Backdoor Analysis
John Hammond Beginner 2y ago
How FAST Can You Write a Pentest Report?
Cybersecurity
How FAST Can You Write a Pentest Report?
John Hammond Beginner 3y ago
Password Hacking in Kali Linux
Cybersecurity
Password Hacking in Kali Linux
John Hammond Intermediate 3y ago
Hackers Bypass Google Two-Factor Authentication (2FA) SMS
Cybersecurity
Hackers Bypass Google Two-Factor Authentication (2FA) SMS
John Hammond Intermediate 3y ago
CI/CD GOAT: Mad Hatter Capture The Flag
Cybersecurity
CI/CD GOAT: Mad Hatter Capture The Flag
John Hammond Beginner 3y ago
Free Hacking APIs Course (APISEC University!)
Cybersecurity
Free Hacking APIs Course (APISEC University!)
John Hammond Beginner 3y ago
Hacking CI/CD (Basic Pipeline Poisoning)
Cybersecurity
Hacking CI/CD (Basic Pipeline Poisoning)
John Hammond Intermediate 3y ago
Unraveling Discord Token Stealer (python MALWARE)
Cybersecurity
Unraveling Discord Token Stealer (python MALWARE)
John Hammond Beginner 3y ago
Is This Website LEAKING?
Cybersecurity
Is This Website LEAKING?
John Hammond Beginner 3y ago
Strange File in Downloads Folder? Gootloader Malware Analysis
Cybersecurity
Strange File in Downloads Folder? Gootloader Malware Analysis
John Hammond Beginner 3y ago
Carving Exfiltrated Network Data from a Hack (Python & Scapy)
Cybersecurity
Carving Exfiltrated Network Data from a Hack (Python & Scapy)
John Hammond Beginner 3y ago
I Tried The HackTheBox Certified Pentester Exam
Cybersecurity
I Tried The HackTheBox Certified Pentester Exam
John Hammond Advanced 3y ago
Evading Filters to Dump Databases (like a hacker)
Cybersecurity
Evading Filters to Dump Databases (like a hacker)
John Hammond Advanced 3y ago
How Hackers Can Bypass Your Security Defenses
Cybersecurity
How Hackers Can Bypass Your Security Defenses
John Hammond Intermediate 3y ago
How To Bypass Website File Upload Restrictions
Cybersecurity
How To Bypass Website File Upload Restrictions
John Hammond Beginner 3y ago
Certified Penetration Testing Specialist! Chat with HackTheBox
Cybersecurity
Certified Penetration Testing Specialist! Chat with HackTheBox
John Hammond Beginner 3y ago
Filter Evasion in a REVERSE SHELL (no spaces!!)
Cybersecurity
Filter Evasion in a REVERSE SHELL (no spaces!!)
John Hammond Beginner 3y ago
ROP is DEAD! Kernel Driver Binary Exploitation
Cybersecurity
ROP is DEAD! Kernel Driver Binary Exploitation
John Hammond Beginner 3y ago
Start Hacking with the HEARTBLEED vulnerability: NahamCon CTF
Cybersecurity
Start Hacking with the HEARTBLEED vulnerability: NahamCon CTF
John Hammond Beginner 3y ago
Capture The Flag!  NahamCon EU CTF "MMORPG"
Cybersecurity
Capture The Flag! NahamCon EU CTF "MMORPG"
John Hammond Beginner 3y ago
Hardware Hacking! Day 19 - TryHackMe Advent of Cyber
Cybersecurity
Hardware Hacking! Day 19 - TryHackMe Advent of Cyber
John Hammond Beginner 3y ago
How To Manage Your Business Technology
Cybersecurity
How To Manage Your Business Technology
John Hammond Beginner 3y ago
Is this a SECURE laptop?
Cybersecurity
Is this a SECURE laptop?
John Hammond Beginner 3y ago
Unraveling the IcedID Malware Stager & Phishing Email
Cybersecurity
Unraveling the IcedID Malware Stager & Phishing Email
John Hammond Beginner 3y ago
Become a Certified Penetration Tester with HackTheBox CPTS!
Cybersecurity
Become a Certified Penetration Tester with HackTheBox CPTS!
John Hammond Beginner 3y ago
Setup EXTREME VULNERABLE Kernel Driver (HEVD)
Cybersecurity
Setup EXTREME VULNERABLE Kernel Driver (HEVD)
John Hammond Beginner 3y ago
Linux Portbending Explained
Cybersecurity
Linux Portbending Explained
John Hammond Beginner 3y ago
run SHELLCODE within BASH!?!
Cybersecurity
run SHELLCODE within BASH!?!
John Hammond Beginner 3y ago
Start KERNEL HACKING with VirtualKD!
Cybersecurity
Start KERNEL HACKING with VirtualKD!
John Hammond Beginner 3y ago
explore a Wordpress PHP BACKDOOR webshell
Cybersecurity
explore a Wordpress PHP BACKDOOR webshell
John Hammond Beginner 3y ago
TryHackMe! Advent of Cyber 2022 Kick-Off
Cybersecurity
TryHackMe! Advent of Cyber 2022 Kick-Off
John Hammond Beginner 3y ago
catch EVERY reverse shell while hacking! (VILLAIN)
Cybersecurity
catch EVERY reverse shell while hacking! (VILLAIN)
John Hammond Beginner 3y ago
Your choices matter… Responsible Red Teaming w/ HuskyHacks
Cybersecurity
Your choices matter… Responsible Red Teaming w/ HuskyHacks
John Hammond Beginner 3y ago
you should be using PODMAN
Cybersecurity
you should be using PODMAN
John Hammond Beginner 3y ago
CUSTOM Java Deserialization Exploit - Serial Snyker
Cybersecurity
CUSTOM Java Deserialization Exploit - Serial Snyker
John Hammond Beginner 3y ago
Cybercrime & Dark Web Conversations (w/ Shmuel!)
Cybersecurity
Cybercrime & Dark Web Conversations (w/ Shmuel!)
John Hammond Beginner 3y ago
Node.js "Pug" Server-Side Template Injection
Cybersecurity
Node.js "Pug" Server-Side Template Injection
John Hammond Beginner 3y ago
The King Of Malware is Back
Cybersecurity
The King Of Malware is Back
John Hammond Beginner 3y ago
Backup Server Hacked - SUPPLY CHAIN Code Execution
Cybersecurity
Backup Server Hacked - SUPPLY CHAIN Code Execution
John Hammond Beginner 3y ago
I store ALL my Passwords in AWS
Cybersecurity
I store ALL my Passwords in AWS
John Hammond Beginner 3y ago
NEW Python 3.11 !!!
Cybersecurity
NEW Python 3.11 !!!
John Hammond Beginner 3y ago
zip files & hack... (CVE-2022-1271 zgrep/gzip)
Cybersecurity
zip files & hack... (CVE-2022-1271 zgrep/gzip)
John Hammond Beginner 3y ago
How Hackers Hide
Cybersecurity
How Hackers Hide
John Hammond Beginner 3y ago
PASSWORDS LEFT OUT IN THE OPEN (Active Directory #10)
Cybersecurity
PASSWORDS LEFT OUT IN THE OPEN (Active Directory #10)
John Hammond Beginner 3y ago
VULNERABLE File Uploads (Python Django)
Cybersecurity
VULNERABLE File Uploads (Python Django)
John Hammond Beginner 3y ago
ACCESS what you WERE NEVER SUPPOSED TO
Cybersecurity
ACCESS what you WERE NEVER SUPPOSED TO
John Hammond Beginner 3y ago
📚 Coursera Courses Opens on Coursera · Free to audit
1 / 3 View all →
Cybersecurity Prevention and Detection: Unit 2
📚 Coursera Course ↗
Self-paced
Cybersecurity Prevention and Detection: Unit 2
Opens on Coursera ↗
CCNA Cybersecurity (200-201) - Video Training Series
📚 Coursera Course ↗
Self-paced
CCNA Cybersecurity (200-201) - Video Training Series
Opens on Coursera ↗
Cyber Security: Data Security and Information Privacy
📚 Coursera Course ↗
Self-paced
Cyber Security: Data Security and Information Privacy
Opens on Coursera ↗
Consultative Selling and Buyer Engagement
📚 Coursera Course ↗
Self-paced
Consultative Selling and Buyer Engagement
Opens on Coursera ↗
Ethical Hacking Fundamentals
📚 Coursera Course ↗
Self-paced
Ethical Hacking Fundamentals
Opens on Coursera ↗
AI for Cybersecurity
📚 Coursera Course ↗
Self-paced
AI for Cybersecurity
Opens on Coursera ↗