✕ Clear filters
255 lessons

🔐 Cybersecurity

Ethical hacking, penetration testing, network security, CTFs and defensive security

All ▶ YouTube 200,964📚 Coursera 18,180🎤 TED 1
SANS Cyber Compliance Countdown: Guidance to Meet Global Directives
Cybersecurity
SANS Cyber Compliance Countdown: Guidance to Meet Global Directives
SANS Institute Advanced 6mo ago
He Quit Cybersecurity After 34 Years — Here’s Why
Cybersecurity
He Quit Cybersecurity After 34 Years — Here’s Why
David Bombal Advanced 7mo ago
hackers have gone TOO FAR
Cybersecurity
hackers have gone TOO FAR
John Hammond Advanced 7mo ago
The Entire Internet is Broken
Cybersecurity
The Entire Internet is Broken
John Hammond Advanced 7mo ago
Why Your Privacy Won’t Survive Smart Tech
Cybersecurity
Why Your Privacy Won’t Survive Smart Tech
David Bombal Advanced 7mo ago
How To Crack A Cybersecurity Job Interview | Careers In Cybersecurity | Cybersecurity | Simplilearn
Cybersecurity
How To Crack A Cybersecurity Job Interview | Careers In Cybersecurity | Cybersecurity | Simplilearn
Simplilearn Advanced 8mo ago
Best Practices to Mitigate AI Security Risks
Cybersecurity
Best Practices to Mitigate AI Security Risks
Databricks Advanced 9mo ago
Revolutionizing Cybersecurity: SCB's Journey to a Self-Managed SIEM
Cybersecurity
Revolutionizing Cybersecurity: SCB's Journey to a Self-Managed SIEM
Databricks Advanced 9mo ago
Highest Paying Jobs in 2025 — Top Careers You Should Know!
Cybersecurity
Highest Paying Jobs in 2025 — Top Careers You Should Know!
edureka! Advanced 9mo ago
How cybersecurity is evolving
Cybersecurity
How cybersecurity is evolving
Google Cloud Advanced 9mo ago
Kernel TLS | The Backend Engineering Show
Cybersecurity
Kernel TLS | The Backend Engineering Show
Hussein Nasser Advanced 9mo ago
Smart Phone Forensics Circa 2028
Cybersecurity
Smart Phone Forensics Circa 2028
SANS Institute Advanced 10mo ago
Compare Your Options to Find the Right Cybersecurity Credential for You on Coursera
Cybersecurity
Compare Your Options to Find the Right Cybersecurity Credential for You on Coursera
Coursera Advanced 1y ago
Top 10 Highest Paying Jobs For 2025 | Best Jobs For Future | Top High Paying Jobs 2025 | Edureka
Cybersecurity
Top 10 Highest Paying Jobs For 2025 | Best Jobs For Future | Top High Paying Jobs 2025 | Edureka
edureka! Advanced 1y ago
SIIES Uses Google Security Products to Drive Enhanced Cybersecurity in Yucatán
Cybersecurity
SIIES Uses Google Security Products to Drive Enhanced Cybersecurity in Yucatán
Google Cloud Advanced 1y ago
AI in Prompt Engineering Hacking #SocialEngineering #CyberSecurity #Phishing #AIThreats #aibeware
Cybersecurity
AI in Prompt Engineering Hacking #SocialEngineering #CyberSecurity #Phishing #AIThreats #aibeware
AI Beware Advanced 1y ago
Exploring Chinese Medicine: Dr Yair Maimon and Elisabeth Rochat de la Vallée Discuss Perspectives
Cybersecurity
Exploring Chinese Medicine: Dr Yair Maimon and Elisabeth Rochat de la Vallée Discuss Perspectives
TCM Academy Advanced 1y ago
Protect your workload with Google Cloud next generation firewall
Cybersecurity
Protect your workload with Google Cloud next generation firewall
Google Cloud Tech Advanced 1y ago
this malware hides in a WALLPAPER
Cybersecurity
this malware hides in a WALLPAPER
John Hammond Advanced 9mo ago
LLM SATs FTW
Cybersecurity
LLM SATs FTW
SANS Institute Advanced 10mo ago
FAKE Gambling Cheat Runs Malware
Cybersecurity
FAKE Gambling Cheat Runs Malware
John Hammond Advanced 10mo ago
SANS Cyber Compliance Countdown: Guidance to Meet Global Directives
Cybersecurity
SANS Cyber Compliance Countdown: Guidance to Meet Global Directives
SANS Institute Advanced 11mo ago
The Myth: You Need to Be an Expert Hacker to Work in Cybersecurity
Cybersecurity
The Myth: You Need to Be an Expert Hacker to Work in Cybersecurity
SANS Institute Advanced 11mo ago
The Myth: Cybersecurity Is Only For People in IT
Cybersecurity
The Myth: Cybersecurity Is Only For People in IT
SANS Institute Advanced 11mo ago
The Myth: I'm Not a Target, So I Don't Need to Be Cybersecurity Aware
Cybersecurity
The Myth: I'm Not a Target, So I Don't Need to Be Cybersecurity Aware
SANS Institute Advanced 11mo ago
A Day in the Life of a Network Security Engineer
Cybersecurity
A Day in the Life of a Network Security Engineer
SANS Institute Advanced 11mo ago
Achieve Strategic Security Leadership | Frank Kim on LDR514
Cybersecurity
Achieve Strategic Security Leadership | Frank Kim on LDR514
SANS Institute Advanced 1y ago
Can you handle a cyber attack? TryHackMe SOC Simulator
Cybersecurity
Can you handle a cyber attack? TryHackMe SOC Simulator
John Hammond Advanced 1y ago
stop falling for this (disable Win+R run dialog)
Cybersecurity
stop falling for this (disable Win+R run dialog)
John Hammond Advanced 1y ago
The Booming Business of Cyber Crime with Geoff White
Cybersecurity
The Booming Business of Cyber Crime with Geoff White
SANS Institute Advanced 1y ago
Godot Game Used As Malware
Cybersecurity
Godot Game Used As Malware
John Hammond Advanced 1y ago
Top 10 Technologies To Learn In 2025 | Top Trending Technologies in 2025 | Edureka
Cybersecurity
Top 10 Technologies To Learn In 2025 | Top Trending Technologies in 2025 | Edureka
edureka! Advanced 1y ago
SANS Live Training: Network Security 2024 Recap
Cybersecurity
SANS Live Training: Network Security 2024 Recap
SANS Institute Advanced 1y ago
SANS Live Training: SANSFIRE 2024 Recap
Cybersecurity
SANS Live Training: SANSFIRE 2024 Recap
SANS Institute Advanced 1y ago
Career Transition Episode 48 | Cyber security Career Transition | Edureka Reviews
Cybersecurity
Career Transition Episode 48 | Cyber security Career Transition | Edureka Reviews
edureka! Advanced 1y ago
Bruteforcing Windows Defender Exclusions
Cybersecurity
Bruteforcing Windows Defender Exclusions
John Hammond Advanced 1y ago
Enhanced Vendor Risk Assessment | Tony Turner
Cybersecurity
Enhanced Vendor Risk Assessment | Tony Turner
SANS Institute Advanced 1y ago
SANS Hacker Tools & Incident Handling Training Course: SEC504 with Kevin Tyers
Cybersecurity
SANS Hacker Tools & Incident Handling Training Course: SEC504 with Kevin Tyers
SANS Institute Advanced 1y ago
Ransomware In Action: MedusaLocker ReadText34
Cybersecurity
Ransomware In Action: MedusaLocker ReadText34
John Hammond Advanced 1y ago
CISSP Interview Questions and Answers 2025 | CISSP Exam Preparation | Edureka
Cybersecurity
CISSP Interview Questions and Answers 2025 | CISSP Exam Preparation | Edureka
edureka! Advanced 1y ago
The Pack: How cybersecurity is evolving
Cybersecurity
The Pack: How cybersecurity is evolving
Google Cloud Advanced 1y ago
Leveraging Ethical Hacking Skills for Network and Application Security | Edureka x EC Council
Cybersecurity
Leveraging Ethical Hacking Skills for Network and Application Security | Edureka x EC Council
edureka! Advanced 1y ago
Cyber Security Interview Question and Answers  | CyberSecurity Interview Tips  | Edureka
Cybersecurity
Cyber Security Interview Question and Answers | CyberSecurity Interview Tips | Edureka
edureka! Advanced 1y ago
Dr. Ullrich on Today’s Cyber Threats: SANSFIRE 2024 Insights
Cybersecurity
Dr. Ullrich on Today’s Cyber Threats: SANSFIRE 2024 Insights
SANS Institute Advanced 1y ago
Fileless Malware Analysis & PowerShell Deobfuscation
Cybersecurity
Fileless Malware Analysis & PowerShell Deobfuscation
John Hammond Advanced 1y ago
Inclusive Cybersecurity: Tips for Hacking Barriers
Cybersecurity
Inclusive Cybersecurity: Tips for Hacking Barriers
SANS Institute Advanced 1y ago
Edureka YouTube Channel Has Now 4 Million+ Ridiculously Committed Subscribers
Cybersecurity
Edureka YouTube Channel Has Now 4 Million+ Ridiculously Committed Subscribers
edureka! Advanced 1y ago
Countdown Begins: SANS to Reveal The Five Biggest Cyber Threats at RSAC 2024
Cybersecurity
Countdown Begins: SANS to Reveal The Five Biggest Cyber Threats at RSAC 2024
SANS Institute Advanced 2y ago
📚 Coursera Courses Opens on Coursera · Free to audit
1 / 3 View all →
Modelling Threats - Strategies in Threat Modelling
📚 Coursera Course ↗
Self-paced
Modelling Threats - Strategies in Threat Modelling
Opens on Coursera ↗
Ethical Hacking with Kali Linux
📚 Coursera Course ↗
Self-paced
Ethical Hacking with Kali Linux
Opens on Coursera ↗
Sound the Alarm: Detection and Response
📚 Coursera Course ↗
Self-paced
Sound the Alarm: Detection and Response
Opens on Coursera ↗
Securing Your DevOps Pipelines
📚 Coursera Course ↗
Self-paced
Securing Your DevOps Pipelines
Opens on Coursera ↗
Wireshark for Packet Capture: Analyze web traffic
📚 Coursera Course ↗
Self-paced
Wireshark for Packet Capture: Analyze web traffic
Opens on Coursera ↗
Metasploit para Principiantes: Básicos de explotación
📚 Coursera Course ↗
Self-paced
Metasploit para Principiantes: Básicos de explotación
Opens on Coursera ↗