✕ Clear filters
2,561 lessons

🔐 Cybersecurity

Ethical hacking, penetration testing, network security, CTFs and defensive security

All ▶ YouTube 200,964📚 Coursera 18,180🎤 TED 1
When they ask you to share your screen 😱 #officehumor
Cybersecurity
When they ask you to share your screen 😱 #officehumor
Yoast Intermediate 1mo ago
The 2 AM Call: A Ransomware Negotiator's Playbook with Wade Gettle
Cybersecurity
The 2 AM Call: A Ransomware Negotiator's Playbook with Wade Gettle
SANS Institute Intermediate 1mo ago
Keynote | Failing Forward: Neurodiversity in Cyber
Cybersecurity
Keynote | Failing Forward: Neurodiversity in Cyber
SANS Institute Intermediate 1mo ago
OpenClaw Security Guide: Risks, Mitigations & Best Practices
Cybersecurity
OpenClaw Security Guide: Risks, Mitigations & Best Practices
Analytics Vidhya Intermediate 2mo ago
The Most Common IoT Security Flaws
Cybersecurity
The Most Common IoT Security Flaws
The Cyber Mentor Intermediate 2mo ago
DeepKeep: Secure your AI agents and applications end-to-end
Cybersecurity
DeepKeep: Secure your AI agents and applications end-to-end
Google Cloud Intermediate 2mo ago
Over 100 Millions Pwned Accounts added in 2026 Already ☹️
Cybersecurity
Over 100 Millions Pwned Accounts added in 2026 Already ☹️
David Bombal Intermediate 2mo ago
DON'T miss Zero Trust World 2026
Cybersecurity
DON'T miss Zero Trust World 2026
David Bombal Intermediate 2mo ago
Sorry, I have places to be 🤷‍♀️ #tgif #weekend #officehumor
Cybersecurity
Sorry, I have places to be 🤷‍♀️ #tgif #weekend #officehumor
Yoast Intermediate 2mo ago
[Demo] Network Security integration with Fortinet
Cybersecurity
[Demo] Network Security integration with Fortinet
Google Cloud Tech Intermediate 2mo ago
Build an Autonomous AI Red Team Agent from Scratch | LangGraph + Metasploit + Neo4j Full Tutorial
Cybersecurity
Build an Autonomous AI Red Team Agent from Scratch | LangGraph + Metasploit + Neo4j Full Tutorial
The Gradient Path Intermediate 2mo ago
HARDEST Comp Sci Challenge for $500 🤑🤑
Cybersecurity
HARDEST Comp Sci Challenge for $500 🤑🤑
Sajjaad Khader Intermediate 2mo ago
The Hacker War That Ended the Cyber Golden Age ⚔ Darknet Diaries Ep. 169 MoD
Cybersecurity
The Hacker War That Ended the Cyber Golden Age ⚔ Darknet Diaries Ep. 169 MoD
Jack Rhysider Intermediate 2mo ago
NTUSER.MAN
Cybersecurity
NTUSER.MAN
John Hammond Intermediate 2mo ago
Cybersecurity Innovation with Sanjay Beri, CEO of Netskope
Cybersecurity
Cybersecurity Innovation with Sanjay Beri, CEO of Netskope
The Information Intermediate 2mo ago
Top Cybersecurity Interview Questions & Answers | Cybersecurity Career Prep #shorts #simplilearn
Cybersecurity
Top Cybersecurity Interview Questions & Answers | Cybersecurity Career Prep #shorts #simplilearn
Simplilearn Intermediate 2mo ago
Cybersecurity & AI
Cybersecurity
Cybersecurity & AI
The Information Intermediate 2mo ago
Simplilearn Reviews | How Emaad Bridged the Skill Gap Through Upskilling #GetCertifiedGetAhead
Cybersecurity
Simplilearn Reviews | How Emaad Bridged the Skill Gap Through Upskilling #GetCertifiedGetAhead
Simplilearn Intermediate 3mo ago
The Secret Phone Numbers That Unlocked the Entire Network 📞 Darknet Diaries Ep. 168: LoD
Cybersecurity
The Secret Phone Numbers That Unlocked the Entire Network 📞 Darknet Diaries Ep. 168: LoD
Jack Rhysider Intermediate 3mo ago
How Piracy Created the Freemium Model 💡   #shorts
Cybersecurity
How Piracy Created the Freemium Model 💡 #shorts
Jacky Chou from Indexsy Intermediate 3mo ago
Offensive Cybersecurity VS Full stack Software Engineer 😤
Cybersecurity
Offensive Cybersecurity VS Full stack Software Engineer 😤
Sajjaad Khader Intermediate 3mo ago
The 2 Parts of Auth You Need To Know
Cybersecurity
The 2 Parts of Auth You Need To Know
Web Dev Simplified Intermediate 3mo ago
Can you use AI models to red team other AI models
Cybersecurity
Can you use AI models to red team other AI models
MLOps.community Intermediate 3mo ago
Are simulations red teaming a system
Cybersecurity
Are simulations red teaming a system
MLOps.community Intermediate 3mo ago
Data Intelligence Day Hong Kong 2025 - Highlights
Cybersecurity
Data Intelligence Day Hong Kong 2025 - Highlights
Databricks Intermediate 3mo ago
Scam Researcher shows how he tricks scammers with AI
Cybersecurity
Scam Researcher shows how he tricks scammers with AI
NetworkChuck Intermediate 4mo ago
Vertical Christmas from Dave's Garage!
Cybersecurity
Vertical Christmas from Dave's Garage!
Dave's Garage Intermediate 4mo ago
Encryption(Protecting Data in Motion)
Cybersecurity
Encryption(Protecting Data in Motion)
Next Gen Synthetix Intermediate 4mo ago
Why You Need a Pocket Router and How To Use One for Travel - Hotels/Airports/AirBNB/Cruises/More
Cybersecurity
Why You Need a Pocket Router and How To Use One for Travel - Hotels/Airports/AirBNB/Cruises/More
Dave's Garage Intermediate 4mo ago
Mostly Stupid Hacks
Cybersecurity
Mostly Stupid Hacks
John Hammond Intermediate 4mo ago
Build Stunning Websites with Vercel and v0 #shorts #aitools #aitraining
Cybersecurity
Build Stunning Websites with Vercel and v0 #shorts #aitools #aitraining
AI Anytime Intermediate 4mo ago
AI as a Neurodivergent Ally in Cybersecurity
Cybersecurity
AI as a Neurodivergent Ally in Cybersecurity
SANS Institute Intermediate 1mo ago
Happy Monday everyone! ☕️ #officelife
Cybersecurity
Happy Monday everyone! ☕️ #officelife
Yoast Intermediate 2mo ago
Infiltration Alert! How to Catch Fake IT Employees in Your Network with Zak Stufflebeam
Cybersecurity
Infiltration Alert! How to Catch Fake IT Employees in Your Network with Zak Stufflebeam
SANS Institute Intermediate 3mo ago
From Learner to Cybersecurity Professional | Manas Success Story #shorts #simplilearn
Cybersecurity
From Learner to Cybersecurity Professional | Manas Success Story #shorts #simplilearn
Simplilearn Intermediate 3mo ago
Salary of Penetration Tester | How Much does a Penetration Tester Make? #shorts #simplilearn
Cybersecurity
Salary of Penetration Tester | How Much does a Penetration Tester Make? #shorts #simplilearn
Simplilearn Intermediate 3mo ago
Top Cybersecurity Projects for 2026 | Cybersecurity Projects to Get Hired | #shorts | #simplilearn
Cybersecurity
Top Cybersecurity Projects for 2026 | Cybersecurity Projects to Get Hired | #shorts | #simplilearn
Simplilearn Intermediate 3mo ago
Cybersecurity Analyst Salary in 2025 | Pay Scale, Skills and Career Growth | #shorts | #simplilearn
Cybersecurity
Cybersecurity Analyst Salary in 2025 | Pay Scale, Skills and Career Growth | #shorts | #simplilearn
Simplilearn Intermediate 3mo ago
ServiceNow's $7.75 Billion Bet
Cybersecurity
ServiceNow's $7.75 Billion Bet
The Information Intermediate 3mo ago
Live Special: Securing the Connected World with Thomas Harvey 
Cybersecurity
Live Special: Securing the Connected World with Thomas Harvey 
SANS Institute Intermediate 3mo ago
Rubrik CEO's Cyber Resilience Promise
Cybersecurity
Rubrik CEO's Cyber Resilience Promise
The Information Intermediate 3mo ago
$600 Smart Toilet Spies on You
Cybersecurity
$600 Smart Toilet Spies on You
David Bombal Intermediate 4mo ago
Beyond Best Practice: How We Really Build a Safer Digital World with Curtis Dukes
Cybersecurity
Beyond Best Practice: How We Really Build a Safer Digital World with Curtis Dukes
SANS Institute Intermediate 4mo ago
There's No Way Into This Tech Company's Server Room ... Except Through the Sewer💧Episode 166: Maxie
Cybersecurity
There's No Way Into This Tech Company's Server Room ... Except Through the Sewer💧Episode 166: Maxie
Jack Rhysider Intermediate 4mo ago
MFA: The One Click That Blocks 90% of Hackers
Cybersecurity
MFA: The One Click That Blocks 90% of Hackers
SANS Institute Intermediate 4mo ago
Free Wi-Fi? Free for Hackers Too.
Cybersecurity
Free Wi-Fi? Free for Hackers Too.
SANS Institute Intermediate 4mo ago
Does Traditional Encryption End in 2027?
Cybersecurity
Does Traditional Encryption End in 2027?
David Bombal Intermediate 4mo ago
The Cybersecurity 'Escalation War' & The Role of AI in Defense
Cybersecurity
The Cybersecurity 'Escalation War' & The Role of AI in Defense
The Information Intermediate 4mo ago
📚 Coursera Courses Opens on Coursera · Free to audit
1 / 3 View all →
Introduction to TCP/IP
📚 Coursera Course ↗
Self-paced
Introduction to TCP/IP
Opens on Coursera ↗
Ethical Hacking with Kali Linux: Analyze & Apply
📚 Coursera Course ↗
Self-paced
Ethical Hacking with Kali Linux: Analyze & Apply
Opens on Coursera ↗
Cyber Security: Applied Cryptography
📚 Coursera Course ↗
Self-paced
Cyber Security: Applied Cryptography
Opens on Coursera ↗
CISSP Domain 5: Identity and Access Management (IAM)
📚 Coursera Course ↗
Self-paced
CISSP Domain 5: Identity and Access Management (IAM)
Opens on Coursera ↗
Threat Hunting Techniques
📚 Coursera Course ↗
Self-paced
Threat Hunting Techniques
Opens on Coursera ↗
Introduction to Software-Defined (SD) Branch
📚 Coursera Course ↗
Self-paced
Introduction to Software-Defined (SD) Branch
Opens on Coursera ↗