✕ Clear filters
2,562 lessons

🔐 Cybersecurity

Ethical hacking, penetration testing, network security, CTFs and defensive security

All ▶ YouTube 201,111📚 Coursera 18,200🎤 TED 1
Cybersecurity Career Roadmap
Cybersecurity
Cybersecurity Career Roadmap
HackerSploit Intermediate 4y ago
Application Security: Web Apps, APIs & Microservices | #Replay
Cybersecurity
Application Security: Web Apps, APIs & Microservices | #Replay
SANS Institute Intermediate 4y ago
Windows Red Team Credential Access Techniques | Mimikatz & WCE
Cybersecurity
Windows Red Team Credential Access Techniques | Mimikatz & WCE
HackerSploit Intermediate 4y ago
Cleaning Up Our Cyber Hygiene
Cybersecurity
Cleaning Up Our Cyber Hygiene
SANS Institute Intermediate 4y ago
How I Deepfaked VTuber Gawr Gura with AI
Cybersecurity
How I Deepfaked VTuber Gawr Gura with AI
bycloud Intermediate 4y ago
Implementing Security Best Practices for Amazon WorkSpaces and Amazon AppStream 2.0
Cybersecurity
Implementing Security Best Practices for Amazon WorkSpaces and Amazon AppStream 2.0
AWS Developers Intermediate 4y ago
UHC - Spooktrol
Cybersecurity
UHC - Spooktrol
IppSec Intermediate 4y ago
The Treatment of Diarrhea in Cancer Patients & the General Public
Cybersecurity
The Treatment of Diarrhea in Cancer Patients & the General Public
TCM Academy Intermediate 4y ago
Alaine Duncan: Discharging Arousal (from Integrating Chinese Medicine with Neurobiology)
Cybersecurity
Alaine Duncan: Discharging Arousal (from Integrating Chinese Medicine with Neurobiology)
TCM Academy Intermediate 4y ago
Running Applications Across Elastic Beanstalk and AWS App Runner - AWS Online Tech Talk
Cybersecurity
Running Applications Across Elastic Beanstalk and AWS App Runner - AWS Online Tech Talk
AWS Developers Intermediate 4y ago
Security in Software Development Process / PART 2: Hints for developers
Cybersecurity
Security in Software Development Process / PART 2: Hints for developers
Stepwise Intermediate 4y ago
SnykCon CTF - "Random Flag Generator" Weak PRNG Seed
Cybersecurity
SnykCon CTF - "Random Flag Generator" Weak PRNG Seed
John Hammond Intermediate 4y ago
SnykCon CTF - "Invisible Ink" Prototype Pollution
Cybersecurity
SnykCon CTF - "Invisible Ink" Prototype Pollution
John Hammond Intermediate 4y ago
Hidden keylogger // Bypass Linux & macOS logon screens! Rubber Ducky scripts for Hak5 OMG cable
Cybersecurity
Hidden keylogger // Bypass Linux & macOS logon screens! Rubber Ducky scripts for Hak5 OMG cable
David Bombal Intermediate 4y ago
UHC - Jarmis
Cybersecurity
UHC - Jarmis
IppSec Intermediate 4y ago
Thumbnail A/B Test Experiment for CTR
Cybersecurity
Thumbnail A/B Test Experiment for CTR
LiveUnderflow Intermediate 4y ago
Talking about File Formats with Ange "Corkami" Albertini
Cybersecurity
Talking about File Formats with Ange "Corkami" Albertini
LiveUnderflow Intermediate 4y ago
So you think your phone or iPad are safe? Rubber Ducky script for mobile targets and Hak5 OMG cables
Cybersecurity
So you think your phone or iPad are safe? Rubber Ducky script for mobile targets and Hak5 OMG cables
David Bombal Intermediate 4y ago
"Controversial Security" // BSides Berlin 2021
Cybersecurity
"Controversial Security" // BSides Berlin 2021
LiveOverflow Intermediate 4y ago
What Keeps You Up At Night?
Cybersecurity
What Keeps You Up At Night?
SANS Institute Intermediate 4y ago
Linux Red Team Exploitation Techniques | Exploiting WordPress & MySQL
Cybersecurity
Linux Red Team Exploitation Techniques | Exploiting WordPress & MySQL
HackerSploit Intermediate 4y ago
Windows Red Team Exploitation Techniques | Luckystrike & PowerShell Empire
Cybersecurity
Windows Red Team Exploitation Techniques | Luckystrike & PowerShell Empire
HackerSploit Intermediate 4y ago
Red Team Reconnaissance Techniques
Cybersecurity
Red Team Reconnaissance Techniques
HackerSploit Intermediate 4y ago
Red Team Adversary Emulation With Caldera
Cybersecurity
Red Team Adversary Emulation With Caldera
HackerSploit Intermediate 4y ago
Windows Post Exploitation - Dumping Hashes With Mimikatz
Cybersecurity
Windows Post Exploitation - Dumping Hashes With Mimikatz
HackerSploit Intermediate 4y ago
Active Directory Enumeration With BloodHound
Cybersecurity
Active Directory Enumeration With BloodHound
HackerSploit Intermediate 4y ago
Active Directory Enumeration With PowerView
Cybersecurity
Active Directory Enumeration With PowerView
HackerSploit Intermediate 4y ago
Windows Post Exploitation - Local Enumeration
Cybersecurity
Windows Post Exploitation - Local Enumeration
HackerSploit Intermediate 4y ago
TryHackMe - Steel Mountain Walkthrough - Manual Windows Exploitation
Cybersecurity
TryHackMe - Steel Mountain Walkthrough - Manual Windows Exploitation
HackerSploit Intermediate 4y ago
Host Discovery & Vulnerability Scanning With Nessus
Cybersecurity
Host Discovery & Vulnerability Scanning With Nessus
HackerSploit Intermediate 4y ago
What Keeps You Up At Night? with James Beeson
Cybersecurity
What Keeps You Up At Night? with James Beeson
SANS Institute Intermediate 4y ago
How To Install & Configure Nessus
Cybersecurity
How To Install & Configure Nessus
HackerSploit Intermediate 4y ago
Fuzzing & Directory Brute-Force With ffuf
Cybersecurity
Fuzzing & Directory Brute-Force With ffuf
HackerSploit Intermediate 4y ago
Identifying & Countering Cognitive Bias
Cybersecurity
Identifying & Countering Cognitive Bias
SANS Institute Intermediate 4y ago
Migrate mainframe applications to AWS using automated code refactoring - AWS Virtual Workshop
Cybersecurity
Migrate mainframe applications to AWS using automated code refactoring - AWS Virtual Workshop
AWS Developers Intermediate 4y ago
Why Do We Have Neck Pains? The Classical Acupuncture Approach of Rani Ayal
Cybersecurity
Why Do We Have Neck Pains? The Classical Acupuncture Approach of Rani Ayal
TCM Academy Intermediate 4y ago
HackTheBox Mirai - Raspberry Pi Pentesting
Cybersecurity
HackTheBox Mirai - Raspberry Pi Pentesting
HackerSploit Intermediate 4y ago
Creating a secure foundation for SAP on AWS - AWS Virtual Workshop
Cybersecurity
Creating a secure foundation for SAP on AWS - AWS Virtual Workshop
AWS Developers Intermediate 4y ago
HackTheBox Nibbles - Exploiting Arbitrary File Upload
Cybersecurity
HackTheBox Nibbles - Exploiting Arbitrary File Upload
HackerSploit Intermediate 4y ago
VOD - TryHackMe! Attacking Kerberos
Cybersecurity
VOD - TryHackMe! Attacking Kerberos
John Hammond Intermediate 4y ago
Not in Cyber Security? No Problem! Creative Ways to Gain Experience With No Experience
Cybersecurity
Not in Cyber Security? No Problem! Creative Ways to Gain Experience With No Experience
SANS Institute Intermediate 4y ago
VOD - TryHackMe! Game Zone - Recreating a Metasploit Exploit in Python
Cybersecurity
VOD - TryHackMe! Game Zone - Recreating a Metasploit Exploit in Python
John Hammond Intermediate 4y ago
VOD - TryHackMe! Steel Mountain with Metasploit
Cybersecurity
VOD - TryHackMe! Steel Mountain with Metasploit
John Hammond Intermediate 4y ago
SSRF without impact is NOT a vulnerability
Cybersecurity
SSRF without impact is NOT a vulnerability
LiveUnderflow Intermediate 4y ago
Why White-box Security Tests are Better!
Cybersecurity
Why White-box Security Tests are Better!
LiveUnderflow Intermediate 4y ago
Making-of a LiveOverflow YouTube Thumbnail
Cybersecurity
Making-of a LiveOverflow YouTube Thumbnail
LiveUnderflow Intermediate 4y ago
Better than Stack Overflow for Development
Cybersecurity
Better than Stack Overflow for Development
LiveUnderflow Intermediate 4y ago
HackTheBox Knife - Linux Privilege Escalation With GTFOBins
Cybersecurity
HackTheBox Knife - Linux Privilege Escalation With GTFOBins
HackerSploit Intermediate 4y ago
📚 Coursera Courses Opens on Coursera · Free to audit
1 / 3 View all →
Mastering BFSI Interviews: Resumes & Mock Interviews
📚 Coursera Course ↗
Self-paced
Mastering BFSI Interviews: Resumes & Mock Interviews
Opens on Coursera ↗
Implementing Security in IoT and Edge Devices
📚 Coursera Course ↗
Self-paced
Implementing Security in IoT and Edge Devices
Opens on Coursera ↗
Nmap for Penetration Testing: From Beginner to Advanced
📚 Coursera Course ↗
Self-paced
Nmap for Penetration Testing: From Beginner to Advanced
Opens on Coursera ↗
Game Development and Prototyping
📚 Coursera Course ↗
Self-paced
Game Development and Prototyping
Opens on Coursera ↗
Segurança de redes VPC com Cloud Next Generation Firewall
📚 Coursera Course ↗
Self-paced
Segurança de redes VPC com Cloud Next Generation Firewall
Opens on Coursera ↗
CCNA Expert – Network Automation, Cloud, and Emerging Technologies
📚 Coursera Course ↗
Self-paced
CCNA Expert – Network Automation, Cloud, and Emerging Technologies
Opens on Coursera ↗