✕ Clear filters
255 lessons

🔐 Cybersecurity

Ethical hacking, penetration testing, network security, CTFs and defensive security

All ▶ YouTube 200,970📚 Coursera 18,181🎤 TED 1
What’s New in SEC401: Security Essentials Bootcamp Style
Cybersecurity
What’s New in SEC401: Security Essentials Bootcamp Style
SANS Institute Advanced 5y ago
Introduction to Metasploit w/ Jeff McJunkin - SANS Cyber Camp
Cybersecurity
Introduction to Metasploit w/ Jeff McJunkin - SANS Cyber Camp
SANS Institute Advanced 5y ago
It all changes today.
Cybersecurity
It all changes today.
David Bombal Advanced 5y ago
Wiresharking CURL - How a single GET request translates to 10 TCP Packets
Cybersecurity
Wiresharking CURL - How a single GET request translates to 10 TCP Packets
Hussein Nasser Advanced 5y ago
How End-to-End encryption Works?
Cybersecurity
How End-to-End encryption Works?
Hussein Nasser Advanced 5y ago
Penetration Testing Bootcamp - Passive Information Gathering Techniques & Tools
Cybersecurity
Penetration Testing Bootcamp - Passive Information Gathering Techniques & Tools
HackerSploit Advanced 6y ago
Penetration Testing Bootcamp - Information Gathering
Cybersecurity
Penetration Testing Bootcamp - Information Gathering
HackerSploit Advanced 6y ago
UniFi Dream Machine - the BEST WiFi router (Review and Advanced Setup)
Cybersecurity
UniFi Dream Machine - the BEST WiFi router (Review and Advanced Setup)
NetworkChuck Advanced 6y ago
No more excuses! Take ownership of your career. Your life. Your future. Your choice!
Cybersecurity
No more excuses! Take ownership of your career. Your life. Your future. Your choice!
David Bombal Advanced 6y ago
Need for Speed: Cracking Hashes to Pwn Passwords w/ Jason Nickola - SANS Cyber Camp: New to Cyber
Cybersecurity
Need for Speed: Cracking Hashes to Pwn Passwords w/ Jason Nickola - SANS Cyber Camp: New to Cyber
SANS Institute Advanced 5y ago
The Human Side of Threats: Why it Matters that Adversaries are Human Too | Katie Nickels
Cybersecurity
The Human Side of Threats: Why it Matters that Adversaries are Human Too | Katie Nickels
SANS Institute Advanced 5y ago
No SQL Injection in MongoDB Applications | SANS@MIC Talk
Cybersecurity
No SQL Injection in MongoDB Applications | SANS@MIC Talk
SANS Institute Advanced 5y ago
Git'ing Users for OSINT: Analysis of All GitHub Users | SANS@MIC Talk
Cybersecurity
Git'ing Users for OSINT: Analysis of All GitHub Users | SANS@MIC Talk
SANS Institute Advanced 5y ago
The 14 Absolute Truths of Security | SANS@MIC Talk
Cybersecurity
The 14 Absolute Truths of Security | SANS@MIC Talk
SANS Institute Advanced 5y ago
#LevelUpLabs | SANS@MIC Talk
Cybersecurity
#LevelUpLabs | SANS@MIC Talk
SANS Institute Advanced 5y ago
SEC510: Multicloud Security Assessment and Defense | SANS@MIC Talk
Cybersecurity
SEC510: Multicloud Security Assessment and Defense | SANS@MIC Talk
SANS Institute Advanced 5y ago
Threat Hunting via DNS | SANS@MIC Talk
Cybersecurity
Threat Hunting via DNS | SANS@MIC Talk
SANS Institute Advanced 5y ago
No SQL Injection in MongoDB Applications | SANS@MIC Talk
Cybersecurity
No SQL Injection in MongoDB Applications | SANS@MIC Talk
SANS Institute Advanced 5y ago
The Only Constant is Change: Tracking Adversary Trends | STAR Webcast
Cybersecurity
The Only Constant is Change: Tracking Adversary Trends | STAR Webcast
SANS Institute Advanced 5y ago
Shellcode Analysis 101 | SANS@MIC Talk
Cybersecurity
Shellcode Analysis 101 | SANS@MIC Talk
SANS Institute Advanced 5y ago
SANS Live Online Interactive Local Lab Demo – FOR508: Advanced Incident Response
Cybersecurity
SANS Live Online Interactive Local Lab Demo – FOR508: Advanced Incident Response
SANS Institute Advanced 5y ago
Threat Hunting and the Rise of Targeted eCrime Intrusions | STAR Webcast
Cybersecurity
Threat Hunting and the Rise of Targeted eCrime Intrusions | STAR Webcast
SANS Institute Advanced 5y ago
Find_Evil - Threat Hunting | SANS@MIC Talk
Cybersecurity
Find_Evil - Threat Hunting | SANS@MIC Talk
SANS Institute Advanced 5y ago
Tricking modern endpoint security products | SANS@MIC Talk
Cybersecurity
Tricking modern endpoint security products | SANS@MIC Talk
SANS Institute Advanced 5y ago
The Hackers Apprentice | SANS@MIC Talk
Cybersecurity
The Hackers Apprentice | SANS@MIC Talk
SANS Institute Advanced 5y ago
How Threats are Responding to COVID-19 | STAR Webcast
Cybersecurity
How Threats are Responding to COVID-19 | STAR Webcast
SANS Institute Advanced 5y ago
SANS Institute - Self Paced Online Training
Cybersecurity
SANS Institute - Self Paced Online Training
SANS Institute Advanced 6y ago
The Hackers Apprentice | SANS@MIC Talk
Cybersecurity
The Hackers Apprentice | SANS@MIC Talk
SANS Institute Advanced 6y ago
xHunt - An Anime Fan's Attack Campaign in the Middle East | STAR Webcast
Cybersecurity
xHunt - An Anime Fan's Attack Campaign in the Middle East | STAR Webcast
SANS Institute Advanced 6y ago
Penetration Testing Bootcamp - Penetration Testing Methodologies
Cybersecurity
Penetration Testing Bootcamp - Penetration Testing Methodologies
HackerSploit Advanced 6y ago
Penetration Testing Bootcamp - Penetration Testing Terminology
Cybersecurity
Penetration Testing Bootcamp - Penetration Testing Terminology
HackerSploit Advanced 6y ago
Cyber Threats to Electric Industry - What You Need to Know | STAR Webcast
Cybersecurity
Cyber Threats to Electric Industry - What You Need to Know | STAR Webcast
SANS Institute Advanced 6y ago
Build Effective Cybersecurity Team Skills | SANS Team-Based Training
Cybersecurity
Build Effective Cybersecurity Team Skills | SANS Team-Based Training
SANS Institute Advanced 6y ago
SPECIAL WEBCAST: What you need to know about the Crypt32.dll / CryptoAPI Flaw
Cybersecurity
SPECIAL WEBCAST: What you need to know about the Crypt32.dll / CryptoAPI Flaw
SANS Institute Advanced 6y ago
How HTTPS Work?
Cybersecurity
How HTTPS Work?
Hussein Nasser Advanced 6y ago
Latest Techniques in Hacking the Human | SANS Security Awareness Summit
Cybersecurity
Latest Techniques in Hacking the Human | SANS Security Awareness Summit
SANS Institute Advanced 6y ago
Remcos RAT Review - The Most Advanced Remote Access Tool
Cybersecurity
Remcos RAT Review - The Most Advanced Remote Access Tool
HackerSploit Advanced 6y ago
ICS Security Summit 2019: What to Expect
Cybersecurity
ICS Security Summit 2019: What to Expect
SANS Institute Advanced 7y ago
Flare-On FireEye 2018 CTF - Malware Analysis With Amr Thabet - Flare Minesweeper
Cybersecurity
Flare-On FireEye 2018 CTF - Malware Analysis With Amr Thabet - Flare Minesweeper
HackerSploit Advanced 7y ago
SANS ICS Security Summit & Training 2019
Cybersecurity
SANS ICS Security Summit & Training 2019
SANS Institute Advanced 7y ago
SANS STX Cyber Range
Cybersecurity
SANS STX Cyber Range
SANS Institute Advanced 7y ago
Practical Advice for Submitting to Speak at a Cybersecurity Conference
Cybersecurity
Practical Advice for Submitting to Speak at a Cybersecurity Conference
SANS Institute Advanced 7y ago
SANS Webcast - Perimeter Security and Why it is Obsolete
Cybersecurity
SANS Webcast - Perimeter Security and Why it is Obsolete
SANS Institute Advanced 7y ago
Modern Malware Demands Modern Defense – SANS ICS Summit 2018
Cybersecurity
Modern Malware Demands Modern Defense – SANS ICS Summit 2018
SANS Institute Advanced 7y ago
Kali Linux On Windows 10 Official - WSL - Installation & Configuration
Cybersecurity
Kali Linux On Windows 10 Official - WSL - Installation & Configuration
HackerSploit Advanced 8y ago
SANS Automotive Summit Webcast
Cybersecurity
SANS Automotive Summit Webcast
SANS Institute Advanced 8y ago
Nikto Web Vulnerability Scanner - Web Penetration Testing - #1
Cybersecurity
Nikto Web Vulnerability Scanner - Web Penetration Testing - #1
HackerSploit Advanced 8y ago
Generating A PHP Backdoor with weevely
Cybersecurity
Generating A PHP Backdoor with weevely
HackerSploit Advanced 8y ago
📚 Coursera Courses Opens on Coursera · Free to audit
1 / 3 View all →
IT-Sicherheit: Grundlagen für Sicherheitsarchitektur
📚 Coursera Course ↗
Self-paced
IT-Sicherheit: Grundlagen für Sicherheitsarchitektur
Opens on Coursera ↗
Secure Healthcare Data: Encrypt, Audit, Protect
📚 Coursera Course ↗
Self-paced
Secure Healthcare Data: Encrypt, Audit, Protect
Opens on Coursera ↗
Introduction to Detection and Incident Response
📚 Coursera Course ↗
Self-paced
Introduction to Detection and Incident Response
Opens on Coursera ↗
AWS: Threat Detection, Logging and Monitoring
📚 Coursera Course ↗
Self-paced
AWS: Threat Detection, Logging and Monitoring
Opens on Coursera ↗
Apply Intermediate Flutter UI Design & Interaction
📚 Coursera Course ↗
Self-paced
Apply Intermediate Flutter UI Design & Interaction
Opens on Coursera ↗
Wireshark for Packet Capture: Analyze web traffic
📚 Coursera Course ↗
Self-paced
Wireshark for Packet Capture: Analyze web traffic
Opens on Coursera ↗