✕ Clear filters
2,562 lessons

🔐 Cybersecurity

Ethical hacking, penetration testing, network security, CTFs and defensive security

All ▶ YouTube 201,098📚 Coursera 18,198🎤 TED 1
If they can't hack your password, maybe they can buy it
Cybersecurity
If they can't hack your password, maybe they can buy it
Jack Rhysider Intermediate 2y ago
How They Hacked the Prime Minister From 1 Instagram Post🎙Darknet Diaries Ep. 84: Jet-setters
Cybersecurity
How They Hacked the Prime Minister From 1 Instagram Post🎙Darknet Diaries Ep. 84: Jet-setters
Jack Rhysider Intermediate 2y ago
Strategy 10: Measure Performance to Improve Performance
Cybersecurity
Strategy 10: Measure Performance to Improve Performance
SANS Institute Intermediate 2y ago
The Evolution of Windows.    #windows #evolution #windowsos #windowsevolution
Cybersecurity
The Evolution of Windows. #windows #evolution #windowsos #windowsevolution
CydexCode Intermediate 2y ago
Strategy 9: Communicate Clearly, Collaborate Often, Share Generously
Cybersecurity
Strategy 9: Communicate Clearly, Collaborate Often, Share Generously
SANS Institute Intermediate 2y ago
Web App Hacking with Caido.io
Cybersecurity
Web App Hacking with Caido.io
The Cyber Mentor Intermediate 2y ago
The Most Important Thing I Learned About Core Values!
Cybersecurity
The Most Important Thing I Learned About Core Values!
Evan Carmichael Intermediate 2y ago
How Hackers Use netsh.exe For Persistence & Code Execution (Sliver C2)
Cybersecurity
How Hackers Use netsh.exe For Persistence & Code Execution (Sliver C2)
John Hammond Intermediate 2y ago
Scale Your Cloud Infrastructure (Hosting CTFs)
Cybersecurity
Scale Your Cloud Infrastructure (Hosting CTFs)
John Hammond Intermediate 2y ago
How does the PNPT compare to other Pentest Certifications?  #PNPT #pentester #pentesting
Cybersecurity
How does the PNPT compare to other Pentest Certifications? #PNPT #pentester #pentesting
The Cyber Mentor Intermediate 2y ago
Take Charge of Your Indexability: How to Optimize Your Technical Work [MozCon 2021] — Areej AbuAli
Cybersecurity
Take Charge of Your Indexability: How to Optimize Your Technical Work [MozCon 2021] — Areej AbuAli
Moz Intermediate 2y ago
Cybersecurity Live - CS50 #Reels
Cybersecurity
Cybersecurity Live - CS50 #Reels
CS50 Intermediate 2y ago
I got Pwned ... and so did you! (you're likely in the 12 Billion)
Cybersecurity
I got Pwned ... and so did you! (you're likely in the 12 Billion)
David Bombal Intermediate 2y ago
He made millions (illegally) hacking online poker
Cybersecurity
He made millions (illegally) hacking online poker
Jack Rhysider Intermediate 2y ago
Even Governments Are No Match for a Hack This Big🎙Darknet Diaries Ep. 135 The D.R. Incident
Cybersecurity
Even Governments Are No Match for a Hack This Big🎙Darknet Diaries Ep. 135 The D.R. Incident
Jack Rhysider Intermediate 2y ago
This boring website is actually a top secret CIA comms channel
Cybersecurity
This boring website is actually a top secret CIA comms channel
Jack Rhysider Intermediate 2y ago
Keynote | Demonstrating CISO ROI with the C-Suite
Cybersecurity
Keynote | Demonstrating CISO ROI with the C-Suite
SANS Institute Intermediate 2y ago
Panel | The Intersection of Cybersecurity and Law
Cybersecurity
Panel | The Intersection of Cybersecurity and Law
SANS Institute Intermediate 2y ago
Leading High Performing Teams During Lean Times
Cybersecurity
Leading High Performing Teams During Lean Times
SANS Institute Intermediate 2y ago
How Super Hackers Take Total Control With One Click🎙Darknet Diaries Ep. 82: Master of Pwn
Cybersecurity
How Super Hackers Take Total Control With One Click🎙Darknet Diaries Ep. 82: Master of Pwn
Jack Rhysider Intermediate 2y ago
Strategy 8: Leverage Tools and Support Analyst Workflow
Cybersecurity
Strategy 8: Leverage Tools and Support Analyst Workflow
SANS Institute Intermediate 2y ago
$540 million of crypto was stolen through an unlikely loophole: LinkedIn
Cybersecurity
$540 million of crypto was stolen through an unlikely loophole: LinkedIn
Jack Rhysider Intermediate 2y ago
Blueprint Live at the SANS Blue Team Summit 2023
Cybersecurity
Blueprint Live at the SANS Blue Team Summit 2023
SANS Institute Intermediate 2y ago
They Laundered Dirty Bitcoin at a Supermarket Café🎙Darknet Diaries Ep. 81: The Vendor
Cybersecurity
They Laundered Dirty Bitcoin at a Supermarket Café🎙Darknet Diaries Ep. 81: The Vendor
Jack Rhysider Intermediate 2y ago
One click gives hackers all the holes on your PC
Cybersecurity
One click gives hackers all the holes on your PC
Jack Rhysider Intermediate 2y ago
Strategy 7: Select and Collect the Right Data
Cybersecurity
Strategy 7: Select and Collect the Right Data
SANS Institute Intermediate 2y ago
Don't fall for this fake FBI malware
Cybersecurity
Don't fall for this fake FBI malware
Jack Rhysider Intermediate 2y ago
Locking It Down: Best Practices for Strong Passwords and Authentication Tools.
Cybersecurity
Locking It Down: Best Practices for Strong Passwords and Authentication Tools.
SANS Institute Intermediate 2y ago
How Hackers Evade Program Allowlists with DLLs
Cybersecurity
How Hackers Evade Program Allowlists with DLLs
John Hammond Intermediate 2y ago
There's 2 ways the U.S. military fights a war
Cybersecurity
There's 2 ways the U.S. military fights a war
Jack Rhysider Intermediate 2y ago
Strategy 6: Illuminate Adversaries with Cyber Threat Intelligence
Cybersecurity
Strategy 6: Illuminate Adversaries with Cyber Threat Intelligence
SANS Institute Intermediate 2y ago
Your credit card isn't really safe online
Cybersecurity
Your credit card isn't really safe online
Jack Rhysider Intermediate 2y ago
When You Lie for a Living, Everyone & Everything Is Hackable🎙Darknet Diaries Ep. 134: Deviant
Cybersecurity
When You Lie for a Living, Everyone & Everything Is Hackable🎙Darknet Diaries Ep. 134: Deviant
Jack Rhysider Intermediate 2y ago
Banks are impossible to hack, unless...
Cybersecurity
Banks are impossible to hack, unless...
Jack Rhysider Intermediate 2y ago
Strategy 5: Prioritize Incident Response
Cybersecurity
Strategy 5: Prioritize Incident Response
SANS Institute Intermediate 2y ago
Three ways to level up your Windows Privilege Escalation skills #windows  #privesc #techtok #infosec
Cybersecurity
Three ways to level up your Windows Privilege Escalation skills #windows #privesc #techtok #infosec
The Cyber Mentor Intermediate 2y ago
Rapid Windows Memory Analysis with Volatility 3
Cybersecurity
Rapid Windows Memory Analysis with Volatility 3
John Hammond Intermediate 2y ago
Exploring the Latest Dark Web Onion Sites
Cybersecurity
Exploring the Latest Dark Web Onion Sites
John Hammond Intermediate 2y ago
Strategy 4: Hire AND Grow Quality Staff
Cybersecurity
Strategy 4: Hire AND Grow Quality Staff
SANS Institute Intermediate 2y ago
Experience a Real Pentest with the PNPT Exam #pentesting  #ethicalhacking   #pnpt
Cybersecurity
Experience a Real Pentest with the PNPT Exam #pentesting #ethicalhacking #pnpt
The Cyber Mentor Intermediate 2y ago
The Worm That Crashed the Winter Games Was Full of False Flags🎙Ep. 77: Olympics Destroyer
Cybersecurity
The Worm That Crashed the Winter Games Was Full of False Flags🎙Ep. 77: Olympics Destroyer
Jack Rhysider Intermediate 2y ago
Keynote | Neurodivergent Associates are an Asset: A CISO’s Perspective on Retention and Inclusion
Cybersecurity
Keynote | Neurodivergent Associates are an Asset: A CISO’s Perspective on Retention and Inclusion
SANS Institute Intermediate 2y ago
Opening Keynote | Investing in Neurodiversity
Cybersecurity
Opening Keynote | Investing in Neurodiversity
SANS Institute Intermediate 2y ago
Who Tapped These 106 Govt Cell Phones?
Cybersecurity
Who Tapped These 106 Govt Cell Phones?
Jack Rhysider Intermediate 2y ago
Strategy 3: Build a SOC Structure to Match Your Organizational Needs
Cybersecurity
Strategy 3: Build a SOC Structure to Match Your Organizational Needs
SANS Institute Intermediate 2y ago
Who Would Hack the Largest U.S. Bank, But Not Steal a Penny?🎙Darknet Diaries Ep. 76: Knaves Out
Cybersecurity
Who Would Hack the Largest U.S. Bank, But Not Steal a Penny?🎙Darknet Diaries Ep. 76: Knaves Out
Jack Rhysider Intermediate 2y ago
Here's a quick look at a path to becoming a webapp pentester! #webapp #pentesting #cybersecurity
Cybersecurity
Here's a quick look at a path to becoming a webapp pentester! #webapp #pentesting #cybersecurity
The Cyber Mentor Intermediate 2y ago
Strategy 2: Give the SOC the Authority to Do Its Job
Cybersecurity
Strategy 2: Give the SOC the Authority to Do Its Job
SANS Institute Intermediate 2y ago
📚 Coursera Courses Opens on Coursera · Free to audit
1 / 3 View all →
Effective .NET Memory Management
📚 Coursera Course ↗
Self-paced
Effective .NET Memory Management
Opens on Coursera ↗
Aspiring CIO & CISO: Leadership Development Guide
📚 Coursera Course ↗
Self-paced
Aspiring CIO & CISO: Leadership Development Guide
Opens on Coursera ↗
CCST Cybersecurity Video Training Series
📚 Coursera Course ↗
Self-paced
CCST Cybersecurity Video Training Series
Opens on Coursera ↗
Cybersecurity Essentials - From Zero to Secure
📚 Coursera Course ↗
Self-paced
Cybersecurity Essentials - From Zero to Secure
Opens on Coursera ↗
Security and Troubleshooting Essentials
📚 Coursera Course ↗
Self-paced
Security and Troubleshooting Essentials
Opens on Coursera ↗
Discrete Math for Computer Science - Algorithms & Recursion
📚 Coursera Course ↗
Self-paced
Discrete Math for Computer Science - Algorithms & Recursion
Opens on Coursera ↗