✕ Clear filters
3,577 lessons

🔐 Cybersecurity

Ethical hacking, penetration testing, network security, CTFs and defensive security

All ▶ YouTube 201,202📚 Coursera 18,210🎤 TED 1
How to Prepare for The Practical Web Pentest Professional Exam
Cybersecurity
How to Prepare for The Practical Web Pentest Professional Exam
The Cyber Mentor Beginner 1y ago
Hack your water and electricity! Myth or Reality?
Cybersecurity
Hack your water and electricity! Myth or Reality?
David Bombal Beginner 1y ago
Pentesting Diaries 0x1 - SQL Injection 101
Cybersecurity
Pentesting Diaries 0x1 - SQL Injection 101
HackerSploit Beginner 1y ago
Advance your career in business with Royal Holloway, University of London
Cybersecurity
Advance your career in business with Royal Holloway, University of London
Coursera Beginner 1y ago
Hacking a Smart Camera: IoT Hacking With Andrew Bellini (Part 5 - Conclusion)
Cybersecurity
Hacking a Smart Camera: IoT Hacking With Andrew Bellini (Part 5 - Conclusion)
The Cyber Mentor Beginner 1y ago
Simon Sinek: "Strong Thigh Muscles = More friends", This Is Why You Can't Make Friends!
Cybersecurity
Simon Sinek: "Strong Thigh Muscles = More friends", This Is Why You Can't Make Friends!
The Diary Of A CEO Beginner 1y ago
HackTheBox - Crafty
Cybersecurity
HackTheBox - Crafty
IppSec Beginner 1y ago
Stealing Computer Passwords on Login
Cybersecurity
Stealing Computer Passwords on Login
John Hammond Beginner 1y ago
HackTheBox - POV
Cybersecurity
HackTheBox - POV
IppSec Beginner 1y ago
The Future of Cybersecurity with Cisco & Splunk's $28 billion investment!
Cybersecurity
The Future of Cybersecurity with Cisco & Splunk's $28 billion investment!
David Bombal Beginner 1y ago
For the Win: Aligning Security Initiatives with the Business
Cybersecurity
For the Win: Aligning Security Initiatives with the Business
SANS Institute Beginner 1y ago
Navigating the AI Security Horizon: A CISO’s Guide to Sustaining Cyber Resilience
Cybersecurity
Navigating the AI Security Horizon: A CISO’s Guide to Sustaining Cyber Resilience
SANS Institute Beginner 1y ago
FBI Stops World's Largest Botnet
Cybersecurity
FBI Stops World's Largest Botnet
John Hammond Beginner 1y ago
Kevin Spacey: Power, Controversy, Betrayal, Truth & Love in Film and Life | Lex Fridman Podcast #432
Cybersecurity
Kevin Spacey: Power, Controversy, Betrayal, Truth & Love in Film and Life | Lex Fridman Podcast #432
Lex Fridman Beginner 1y ago
Dartmouth's Meet Alexis Abramson, Dean of the Thayer School of Engineering at Dartmouth 5.23.24
Cybersecurity
Dartmouth's Meet Alexis Abramson, Dean of the Thayer School of Engineering at Dartmouth 5.23.24
Coursera Beginner 1y ago
HackerSploit Channel Update 2024
Cybersecurity
HackerSploit Channel Update 2024
HackerSploit Beginner 1y ago
AI in Cybersecurity | Working of AI in Cybersecurity | Need for AI in Cybersecurity | Edureka
Cybersecurity
AI in Cybersecurity | Working of AI in Cybersecurity | Need for AI in Cybersecurity | Edureka
edureka! Beginner 1y ago
🔍 Master Amazon SEO : Outrank Competitors Easily! #shorts
Cybersecurity
🔍 Master Amazon SEO : Outrank Competitors Easily! #shorts
Jacky Chou from Indexsy Beginner 1y ago
OSINT Deep Dive: What Voter Records Can Tell You
Cybersecurity
OSINT Deep Dive: What Voter Records Can Tell You
The Cyber Mentor Beginner 1y ago
Fuzz Faster with Turbo Intruder
Cybersecurity
Fuzz Faster with Turbo Intruder
The Cyber Mentor Beginner 1y ago
3 Tips to Pass Your Next Pentesting Exam | Cybersecurity and Hacking
Cybersecurity
3 Tips to Pass Your Next Pentesting Exam | Cybersecurity and Hacking
The Cyber Mentor Beginner 1y ago
What to Know About IT Certifications
Cybersecurity
What to Know About IT Certifications
The Cyber Mentor Beginner 1y ago
Three Mental Models for Cybersecurity
Cybersecurity
Three Mental Models for Cybersecurity
The Cyber Mentor Beginner 1y ago
Use This Code for Your Next Internal Penetration Test
Cybersecurity
Use This Code for Your Next Internal Penetration Test
The Cyber Mentor Beginner 1y ago
Linux Hackers Become Root with CURL & Sudo
Cybersecurity
Linux Hackers Become Root with CURL & Sudo
John Hammond Beginner 1y ago
Learn to Build a Web App
Cybersecurity
Learn to Build a Web App
The Cyber Mentor Beginner 1y ago
HackTheBox - Analysis
Cybersecurity
HackTheBox - Analysis
IppSec Beginner 1y ago
Exploiting the Front-End: Challenge Walkthrough
Cybersecurity
Exploiting the Front-End: Challenge Walkthrough
The Cyber Mentor Beginner 1y ago
Did you know this about Linux? // Linux for Hackers Ep 5
Cybersecurity
Did you know this about Linux? // Linux for Hackers Ep 5
David Bombal Beginner 1y ago
Start Your Hacking Journey as a Beginner
Cybersecurity
Start Your Hacking Journey as a Beginner
The Cyber Mentor Beginner 1y ago
Security Governance | The 8 Domains of the Cloud Security Maturity Model | Part 3
Cybersecurity
Security Governance | The 8 Domains of the Cloud Security Maturity Model | Part 3
SANS Institute Beginner 1y ago
Hacking The Davinci Code: WebDAV Cybersecurity
Cybersecurity
Hacking The Davinci Code: WebDAV Cybersecurity
John Hammond Beginner 1y ago
Capture The Flag! NahamCon 2024 CTF Warmups
Cybersecurity
Capture The Flag! NahamCon 2024 CTF Warmups
John Hammond Beginner 1y ago
Install Nessus for Free and scan for Vulnerabilities (New Way)
Cybersecurity
Install Nessus for Free and scan for Vulnerabilities (New Way)
David Bombal Beginner 1y ago
HackTheBox - Bizness
Cybersecurity
HackTheBox - Bizness
IppSec Beginner 1y ago
How to Prevent, Detect, and Respond to Attacks with this Free Tool?
Cybersecurity
How to Prevent, Detect, and Respond to Attacks with this Free Tool?
The Cyber Mentor Beginner 1y ago
NahamCon 2024 CTF is LIVE Right Now
Cybersecurity
NahamCon 2024 CTF is LIVE Right Now
John Hammond Beginner 1y ago
A Quick Beginner's Guide to CTFs | Tips for Starting Your First CTF
Cybersecurity
A Quick Beginner's Guide to CTFs | Tips for Starting Your First CTF
The Cyber Mentor Beginner 1y ago
Expertise isn't all you need - Building an AI Red Team
Cybersecurity
Expertise isn't all you need - Building an AI Red Team
SANS Institute Beginner 1y ago
IAM | The 8 Domains of the Cloud Security Maturity Model | Part 2
Cybersecurity
IAM | The 8 Domains of the Cloud Security Maturity Model | Part 2
SANS Institute Beginner 1y ago
I Put a Vulnerable Server on The Internet
Cybersecurity
I Put a Vulnerable Server on The Internet
John Hammond Beginner 1y ago
3 of the Top Note-Taking Apps Ranked
Cybersecurity
3 of the Top Note-Taking Apps Ranked
The Cyber Mentor Beginner 1y ago
Discussing Active Directory & Internal Network Security
Cybersecurity
Discussing Active Directory & Internal Network Security
John Hammond Beginner 1y ago
You have to look out for these hacks in 2024! (plus get FREE training)
Cybersecurity
You have to look out for these hacks in 2024! (plus get FREE training)
David Bombal Beginner 1y ago
HackTheBox - Ouija
Cybersecurity
HackTheBox - Ouija
IppSec Beginner 1y ago
Learn Any Programming Language (from scratch)
Cybersecurity
Learn Any Programming Language (from scratch)
The Cyber Mentor Beginner 1y ago
3 Ways to Find and Exploit Command Injection
Cybersecurity
3 Ways to Find and Exploit Command Injection
The Cyber Mentor Beginner 1y ago
How Accurate is Your Recovery Timeline? | The Incident Commander Series Ep. 2
Cybersecurity
How Accurate is Your Recovery Timeline? | The Incident Commander Series Ep. 2
SANS Institute Beginner 1y ago
📚 Coursera Courses Opens on Coursera · Free to audit
1 / 3 View all →
Leadership and Change Management for Sustainability Success
📚 Coursera Course ↗
Self-paced
Leadership and Change Management for Sustainability Success
Opens on Coursera ↗
Linux Fundamentals: Configure, Secure & Manage
📚 Coursera Course ↗
Self-paced
Linux Fundamentals: Configure, Secure & Manage
Opens on Coursera ↗
Writing Secure Code in ASP.NET
📚 Coursera Course ↗
Self-paced
Writing Secure Code in ASP.NET
Opens on Coursera ↗
Ethical Hacking Essentials: Hands-On Edition
📚 Coursera Course ↗
Self-paced
Ethical Hacking Essentials: Hands-On Edition
Opens on Coursera ↗
Cyber Incident Response
📚 Coursera Course ↗
Self-paced
Cyber Incident Response
Opens on Coursera ↗
Introduction to Ethical Hacking and Recon Techniques
📚 Coursera Course ↗
Self-paced
Introduction to Ethical Hacking and Recon Techniques
Opens on Coursera ↗