✕ Clear filters
3,573 lessons

🔐 Cybersecurity

Ethical hacking, penetration testing, network security, CTFs and defensive security

All ▶ YouTube 201,127📚 Coursera 18,202🎤 TED 1
Never Charge Your Phone in Public Without Watching This! #phonetheft #usefultips #techintamil
Cybersecurity
Never Charge Your Phone in Public Without Watching This! #phonetheft #usefultips #techintamil
Arivi by HCL GUVI Beginner 11mo ago
10 Marketing Strategies That Actually Work (For ANY Business)
Cybersecurity
10 Marketing Strategies That Actually Work (For ANY Business)
Adam Erhart Beginner 11mo ago
Janna Levin: Black Holes, Wormholes, Aliens, Paradoxes & Extra Dimensions | Lex Fridman Podcast #468
Cybersecurity
Janna Levin: Black Holes, Wormholes, Aliens, Paradoxes & Extra Dimensions | Lex Fridman Podcast #468
Lex Fridman Beginner 11mo ago
How to Pass the PNPT: From Zero to Hero!
Cybersecurity
How to Pass the PNPT: From Zero to Hero!
The Cyber Mentor Beginner 11mo ago
How I Almost Got Phished From a Text Message!
Cybersecurity
How I Almost Got Phished From a Text Message!
The Cyber Mentor Beginner 11mo ago
Introduction to Cloud Next Generation Firewall
Cybersecurity
Introduction to Cloud Next Generation Firewall
Google Cloud Beginner 11mo ago
Evaluate Your Cloud Next Generation Firewall Needs
Cybersecurity
Evaluate Your Cloud Next Generation Firewall Needs
Google Cloud Beginner 11mo ago
Uncovering the Reality of OTP Hacking in 2026 | How Hackers Steal Your OTPs | OTP Security | Edureka
Cybersecurity
Uncovering the Reality of OTP Hacking in 2026 | How Hackers Steal Your OTPs | OTP Security | Edureka
edureka! Beginner 11mo ago
Why Most People Stay Broke | MASTER Discipline to Build Unshakable Wealth!
Cybersecurity
Why Most People Stay Broke | MASTER Discipline to Build Unshakable Wealth!
Evan Carmichael Beginner 11mo ago
HackTheBox - Vintage
Cybersecurity
HackTheBox - Vintage
IppSec Beginner 11mo ago
Giving Back to the Cybersecurity Community Through Teaching
Cybersecurity
Giving Back to the Cybersecurity Community Through Teaching
SANS Institute Beginner 11mo ago
DDoS Attack | What is a DDoS Attack? | DDoS Attack Explained | Edureka
Cybersecurity
DDoS Attack | What is a DDoS Attack? | DDoS Attack Explained | Edureka
edureka! Beginner 11mo ago
Level Up Your Security Team Through Automation
Cybersecurity
Level Up Your Security Team Through Automation
SANS Institute Beginner 11mo ago
IT Skills You'll Learn in the IBM IT Support Professional Certificate Program
Cybersecurity
IT Skills You'll Learn in the IBM IT Support Professional Certificate Program
Coursera Beginner 11mo ago
HackTheBox - Administrator
Cybersecurity
HackTheBox - Administrator
IppSec Beginner 11mo ago
Hidden Dangers of Phone Cameras! #PhoneCameraSpy #CameraHack #CyberSecurity
Cybersecurity
Hidden Dangers of Phone Cameras! #PhoneCameraSpy #CameraHack #CyberSecurity
Arivi by HCL GUVI Beginner 11mo ago
4chan penetrated by a gang of soyjaks…
Cybersecurity
4chan penetrated by a gang of soyjaks…
Fireship Beginner 11mo ago
Open Source Vs  Closed Source Model | Amr Awadallah | Data Science Dojo #opensource #ai
Cybersecurity
Open Source Vs Closed Source Model | Amr Awadallah | Data Science Dojo #opensource #ai
Data Science Dojo Beginner 11mo ago
Screenshot.jpg (When They Got Hacked)
Cybersecurity
Screenshot.jpg (When They Got Hacked)
John Hammond Beginner 12mo ago
From Zero to Zero Day (and beyond) - Life of a Hacker: Jonathan Jacobi
Cybersecurity
From Zero to Zero Day (and beyond) - Life of a Hacker: Jonathan Jacobi
LiveOverflow Beginner 1y ago
Learn Cybersecurity Defense!
Cybersecurity
Learn Cybersecurity Defense!
John Hammond Beginner 1y ago
The hunt for America's most wanted computer scientist...
Cybersecurity
The hunt for America's most wanted computer scientist...
Fireship Beginner 1y ago
LIVE: Exploit Development | Shellcoding | Cybersecurity | Red Team | AMA
Cybersecurity
LIVE: Exploit Development | Shellcoding | Cybersecurity | Red Team | AMA
The Cyber Mentor Beginner 11mo ago
3 Tech Books You MUST Read
Cybersecurity
3 Tech Books You MUST Read
The Cyber Mentor Beginner 11mo ago
The Best and The Worst of Cybersecurity Career Advice!
Cybersecurity
The Best and The Worst of Cybersecurity Career Advice!
The Cyber Mentor Beginner 11mo ago
Will AI Replace Your Tech Job in 2025?
Cybersecurity
Will AI Replace Your Tech Job in 2025?
The Cyber Mentor Beginner 11mo ago
LIVE: PowerShell Deobfuscation | Cybersecurity | Blue Team | AMA
Cybersecurity
LIVE: PowerShell Deobfuscation | Cybersecurity | Blue Team | AMA
The Cyber Mentor Beginner 11mo ago
Penetration Testing For Beginners | Phases of Penetration Testing | Penetration Testing Tutorial
Cybersecurity
Penetration Testing For Beginners | Phases of Penetration Testing | Penetration Testing Tutorial
edureka! Beginner 11mo ago
Ethical Hacking for Beginners | 5 Phases of Ethical Hacking | Ethical Hacking Tutorial | Edureka
Cybersecurity
Ethical Hacking for Beginners | 5 Phases of Ethical Hacking | Ethical Hacking Tutorial | Edureka
edureka! Beginner 11mo ago
How Hackers Break Into Servers Through IoT Hardware
Cybersecurity
How Hackers Break Into Servers Through IoT Hardware
The Cyber Mentor Beginner 11mo ago
What is the MITRE CVE Program - and Why It Matters So Much
Cybersecurity
What is the MITRE CVE Program - and Why It Matters So Much
The Cyber Mentor Beginner 11mo ago
RIP CVE Program?! How the MITRE Funding Crisis Threatens Cybersecurity
Cybersecurity
RIP CVE Program?! How the MITRE Funding Crisis Threatens Cybersecurity
The Cyber Mentor Beginner 11mo ago
LIVE: Moose on the loose | CVE | Cybersecurity | AMA
Cybersecurity
LIVE: Moose on the loose | CVE | Cybersecurity | AMA
The Cyber Mentor Beginner 11mo ago
Hardware Reverse Engineering with a Logic Analyzer
Cybersecurity
Hardware Reverse Engineering with a Logic Analyzer
The Cyber Mentor Beginner 11mo ago
Lightning Talk | Ever sucked into Wikipedia for three hours? CTI might be for you!
Cybersecurity
Lightning Talk | Ever sucked into Wikipedia for three hours? CTI might be for you!
SANS Institute Beginner 11mo ago
A Day in the Life of a Threat Emulation Specialist: Demystifying Offensive Cybersecurity
Cybersecurity
A Day in the Life of a Threat Emulation Specialist: Demystifying Offensive Cybersecurity
SANS Institute Beginner 11mo ago
Lightning Talk | Negating the Noise: Prioritize Your Cybersecurity
Cybersecurity
Lightning Talk | Negating the Noise: Prioritize Your Cybersecurity
SANS Institute Beginner 11mo ago
Cyber Adjacent: 5 Lessons Learned from a Day in the Life of an IT Project Manager
Cybersecurity
Cyber Adjacent: 5 Lessons Learned from a Day in the Life of an IT Project Manager
SANS Institute Beginner 11mo ago
From TV news to cybersecurity: the 5 steps I took to completely change careers
Cybersecurity
From TV news to cybersecurity: the 5 steps I took to completely change careers
SANS Institute Beginner 11mo ago
Going Technical, Against All Odds: From Digital Communications to Reverse Engineering Malware
Cybersecurity
Going Technical, Against All Odds: From Digital Communications to Reverse Engineering Malware
SANS Institute Beginner 11mo ago
HackTheBox - LinkVortex
Cybersecurity
HackTheBox - LinkVortex
IppSec Beginner 12mo ago
Cybersecurity Skills You NEED To Learn (2026) | The Most In-Demand Cybersecurity Skills | Edureka
Cybersecurity
Cybersecurity Skills You NEED To Learn (2026) | The Most In-Demand Cybersecurity Skills | Edureka
edureka! Beginner 12mo ago
How AI Dating Scams Are Getting Dangerously Smart in 2025
Cybersecurity
How AI Dating Scams Are Getting Dangerously Smart in 2025
The Cyber Mentor Beginner 12mo ago
LIVE: Memory Forensics | Volatility | Cybersecurity | Blue Team | AMA
Cybersecurity
LIVE: Memory Forensics | Volatility | Cybersecurity | Blue Team | AMA
The Cyber Mentor Beginner 12mo ago
Hide Your Secrets Like a Pro! #tricks #techintamil #tech
Cybersecurity
Hide Your Secrets Like a Pro! #tricks #techintamil #tech
Arivi by HCL GUVI Beginner 12mo ago
Watch Out for this AI Prompt Injection Hack!
Cybersecurity
Watch Out for this AI Prompt Injection Hack!
The Cyber Mentor Beginner 1y ago
How to Avoid These Cybersecurity Resume Mistakes
Cybersecurity
How to Avoid These Cybersecurity Resume Mistakes
The Cyber Mentor Beginner 1y ago
LIVE: Exploit Development | Shellcoding | Cybersecurity | Red Team | AMA
Cybersecurity
LIVE: Exploit Development | Shellcoding | Cybersecurity | Red Team | AMA
The Cyber Mentor Beginner 1y ago
📚 Coursera Courses Opens on Coursera · Free to audit
1 / 3 View all →
Basics of Cyber Threat Intelligence
📚 Coursera Course ↗
Self-paced
Basics of Cyber Threat Intelligence
Opens on Coursera ↗
Burp Suite Unfiltered - Go from a Beginner to Advanced
📚 Coursera Course ↗
Self-paced
Burp Suite Unfiltered - Go from a Beginner to Advanced
Opens on Coursera ↗
How to Prioritize ESG Initiatives
📚 Coursera Course ↗
Self-paced
How to Prioritize ESG Initiatives
Opens on Coursera ↗
CCNA Expert – Network Automation, Cloud, and Emerging Technologies
📚 Coursera Course ↗
Self-paced
CCNA Expert – Network Automation, Cloud, and Emerging Technologies
Opens on Coursera ↗
SC-200 Microsoft Security Operations Analyst
📚 Coursera Course ↗
Self-paced
SC-200 Microsoft Security Operations Analyst
Opens on Coursera ↗
Risk Management and Incident Response
📚 Coursera Course ↗
Self-paced
Risk Management and Incident Response
Opens on Coursera ↗