✕ Clear filters
2,562 lessons

🔐 Cybersecurity

Ethical hacking, penetration testing, network security, CTFs and defensive security

All ▶ YouTube 201,098📚 Coursera 18,198🎤 TED 1
How to prepare for a career in cybersecurity with no prior experience.
Cybersecurity
How to prepare for a career in cybersecurity with no prior experience.
Coursera Intermediate 2y ago
The Penetration Test That Went Horribly Wrong🎙Darknet Diaries Ep. 95: Jon & Brian's Big Adventure
Cybersecurity
The Penetration Test That Went Horribly Wrong🎙Darknet Diaries Ep. 95: Jon & Brian's Big Adventure
Jack Rhysider Intermediate 2y ago
New "Dark Web" Generative AI Chatbots?!
Cybersecurity
New "Dark Web" Generative AI Chatbots?!
John Hammond Intermediate 2y ago
Your Windows Passwords 😱 #shorts #windows
Cybersecurity
Your Windows Passwords 😱 #shorts #windows
David Bombal Intermediate 2y ago
The Economic Case for Generative AI with a16z's Martin Casado
Cybersecurity
The Economic Case for Generative AI with a16z's Martin Casado
a16z Intermediate 2y ago
How "Mimikatz" works
Cybersecurity
How "Mimikatz" works
Jack Rhysider Intermediate 2y ago
Cybersecurity Roadmap 2023 ! #cybersecurity
Cybersecurity
Cybersecurity Roadmap 2023 ! #cybersecurity
Shweta Intermediate 2y ago
How To Pivot Through a Network with Chisel
Cybersecurity
How To Pivot Through a Network with Chisel
John Hammond Intermediate 2y ago
AI for Good Specialization: Learn AI's role in addressing real-world challenges
Cybersecurity
AI for Good Specialization: Learn AI's role in addressing real-world challenges
DeepLearningAI Intermediate 2y ago
Phases in Cybersecurity  | Cybersecurity Training | Edureka | Cybersecurity Rewind - 2
Cybersecurity
Phases in Cybersecurity | Cybersecurity Training | Edureka | Cybersecurity Rewind - 2
edureka! Intermediate 2y ago
Flipper Zero vs Alarm? (will the Bike alarm stop it?) #shorts
Cybersecurity
Flipper Zero vs Alarm? (will the Bike alarm stop it?) #shorts
David Bombal Intermediate 2y ago
Seasonal Cycle Embodied, with Deborah Woolf
Cybersecurity
Seasonal Cycle Embodied, with Deborah Woolf
TCM Academy Intermediate 2y ago
I Learned How To Hack WiFi In 2 Days...
Cybersecurity
I Learned How To Hack WiFi In 2 Days...
Tech With Tim Intermediate 2y ago
Bonus Episode: What does it take to author a cybersecurity book?
Cybersecurity
Bonus Episode: What does it take to author a cybersecurity book?
SANS Institute Intermediate 2y ago
Cyber Leadership Analogies and Metaphors
Cybersecurity
Cyber Leadership Analogies and Metaphors
SANS Institute Intermediate 2y ago
How to Stop an Army of 14 Million Zombie Computers🎙Darknet Diaries Ep. 94: Mariposa Botnet
Cybersecurity
How to Stop an Army of 14 Million Zombie Computers🎙Darknet Diaries Ep. 94: Mariposa Botnet
Jack Rhysider Intermediate 2y ago
India hacks Pakistani websites post-terrorist attack
Cybersecurity
India hacks Pakistani websites post-terrorist attack
Jack Rhysider Intermediate 2y ago
This scammer milked Facebook for millions
Cybersecurity
This scammer milked Facebook for millions
Jack Rhysider Intermediate 2y ago
OneCoin exposed as the biggest crypto scam!
Cybersecurity
OneCoin exposed as the biggest crypto scam!
Jack Rhysider Intermediate 2y ago
Classify Malware with YARA
Cybersecurity
Classify Malware with YARA
John Hammond Intermediate 2y ago
They made $2.5 million a week holding companies hostage
Cybersecurity
They made $2.5 million a week holding companies hostage
Jack Rhysider Intermediate 2y ago
Blackmail, Moles, and Awful Passwords: Defending the World Bank from Hackers🎙Ep. 91: webjedi
Cybersecurity
Blackmail, Moles, and Awful Passwords: Defending the World Bank from Hackers🎙Ep. 91: webjedi
Jack Rhysider Intermediate 2y ago
Your Computer could be For Sale on the Dark Web
Cybersecurity
Your Computer could be For Sale on the Dark Web
John Hammond Intermediate 2y ago
When She Can't Hack the Lock, She Hacks the Security Guard🎙Darknet Diaries Ep. 90: Jenny
Cybersecurity
When She Can't Hack the Lock, She Hacks the Security Guard🎙Darknet Diaries Ep. 90: Jenny
Jack Rhysider Intermediate 2y ago
Why did the FBI pay $1 million to hack this iPhone?
Cybersecurity
Why did the FBI pay $1 million to hack this iPhone?
Jack Rhysider Intermediate 2y ago
The 3 types of hackers
Cybersecurity
The 3 types of hackers
Jack Rhysider Intermediate 2y ago
Not All ZIP Files Are Equal
Cybersecurity
Not All ZIP Files Are Equal
John Hammond Intermediate 2y ago
Flipper Zero WiFi Hacking (Fake WiFi networks) #shorts
Cybersecurity
Flipper Zero WiFi Hacking (Fake WiFi networks) #shorts
David Bombal Intermediate 2y ago
How I Logged Into Donald Trump's Twitter Account (Again)🎙Darknet Diaries Ep. 88: Victor
Cybersecurity
How I Logged Into Donald Trump's Twitter Account (Again)🎙Darknet Diaries Ep. 88: Victor
Jack Rhysider Intermediate 2y ago
Flipper Zero WiFi Hacking (Rogue AP) #shorts
Cybersecurity
Flipper Zero WiFi Hacking (Rogue AP) #shorts
David Bombal Intermediate 2y ago
Capture the Flag at Blackhat USA 2023!
Cybersecurity
Capture the Flag at Blackhat USA 2023!
John Hammond Intermediate 2y ago
Books! Books! Books! Which author should I interview? #shorts
Cybersecurity
Books! Books! Books! Which author should I interview? #shorts
David Bombal Intermediate 2y ago
How We Hacked Donald Trump's Twitter Account🎙Darknet Diaries Ep. 87: Guild of the Grumpy Old Hackers
Cybersecurity
How We Hacked Donald Trump's Twitter Account🎙Darknet Diaries Ep. 87: Guild of the Grumpy Old Hackers
Jack Rhysider Intermediate 2y ago
Flipper Zero RFID Fuzzer (Fuzz RFID) #shorts
Cybersecurity
Flipper Zero RFID Fuzzer (Fuzz RFID) #shorts
David Bombal Intermediate 2y ago
Telegram Cybercrime is INSANE
Cybersecurity
Telegram Cybercrime is INSANE
John Hammond Intermediate 2y ago
Your Social Accounts Are Never Safe, Even If You Use Great Passwords🎙Ep. 86 The LinkedIn Incident
Cybersecurity
Your Social Accounts Are Never Safe, Even If You Use Great Passwords🎙Ep. 86 The LinkedIn Incident
Jack Rhysider Intermediate 2y ago
Flipper Zero WiFi Hacking #shorts
Cybersecurity
Flipper Zero WiFi Hacking #shorts
David Bombal Intermediate 2y ago
He Made $5K a Day in High School With This Risky ID Scam🎙Darknet Diaries Ep. 85: Cam the Carder
Cybersecurity
He Made $5K a Day in High School With This Risky ID Scam🎙Darknet Diaries Ep. 85: Cam the Carder
Jack Rhysider Intermediate 2y ago
loveletterforyou.txt tricked a LOT of people back in 2000
Cybersecurity
loveletterforyou.txt tricked a LOT of people back in 2000
Jack Rhysider Intermediate 2y ago
Strategies of a World-Class SOC | Host: John Hubbard | July 18, 2023
Cybersecurity
Strategies of a World-Class SOC | Host: John Hubbard | July 18, 2023
SANS Institute Intermediate 2y ago
Strategy 11: Turn up the Volume by Expanding SOC Functionality
Cybersecurity
Strategy 11: Turn up the Volume by Expanding SOC Functionality
SANS Institute Intermediate 2y ago
Insider Risk & Generative AI
Cybersecurity
Insider Risk & Generative AI
SANS Institute Intermediate 2y ago
Preserving Creativity and the Ethical Implications of AI Art Generators
Cybersecurity
Preserving Creativity and the Ethical Implications of AI Art Generators
SANS Institute Intermediate 2y ago
Navigating the Impact of Emerging Tech on Education: A Teen's Perspective on AI and Cybersecurity
Cybersecurity
Navigating the Impact of Emerging Tech on Education: A Teen's Perspective on AI and Cybersecurity
SANS Institute Intermediate 2y ago
AI and Its Impact on Cybersecurity
Cybersecurity
AI and Its Impact on Cybersecurity
SANS Institute Intermediate 2y ago
New to Cyber: AI-Powered Careers
Cybersecurity
New to Cyber: AI-Powered Careers
SANS Institute Intermediate 2y ago
Addressing Practical and Ethical Issues in AI-Assisted Threat Intelligence Analysis
Cybersecurity
Addressing Practical and Ethical Issues in AI-Assisted Threat Intelligence Analysis
SANS Institute Intermediate 2y ago
Mass Digital Forensics & Incident Response with Velociraptor
Cybersecurity
Mass Digital Forensics & Incident Response with Velociraptor
John Hammond Intermediate 2y ago
📚 Coursera Courses Opens on Coursera · Free to audit
1 / 3 View all →
Design security solutions for applications and data
📚 Coursera Course ↗
Self-paced
Design security solutions for applications and data
Opens on Coursera ↗
IT-Sicherheit: Grundlagen für Sicherheitsarchitektur
📚 Coursera Course ↗
Self-paced
IT-Sicherheit: Grundlagen für Sicherheitsarchitektur
Opens on Coursera ↗
Advanced Security Architecture
📚 Coursera Course ↗
Self-paced
Advanced Security Architecture
Opens on Coursera ↗
Analyze Cybersecurity Risks in Financial Systems
📚 Coursera Course ↗
Self-paced
Analyze Cybersecurity Risks in Financial Systems
Opens on Coursera ↗
Introducción a Cloud Next Generation Firewall
📚 Coursera Course ↗
Self-paced
Introducción a Cloud Next Generation Firewall
Opens on Coursera ↗
Learn Man in the Middle Attacks from Scratch
📚 Coursera Course ↗
Self-paced
Learn Man in the Middle Attacks from Scratch
Opens on Coursera ↗