✕ Clear filters
2,564 lessons

🔐 Cybersecurity

Ethical hacking, penetration testing, network security, CTFs and defensive security

All ▶ YouTube 201,345📚 Coursera 18,228🎤 TED 1
Live Hacking - Internetwache CTF 2016 - crypto60, crypto70, crypto90
Cybersecurity
Live Hacking - Internetwache CTF 2016 - crypto60, crypto70, crypto90
LiveOverflow Intermediate 10y ago
Python Challenge! 17 COOKIES
Cybersecurity
Python Challenge! 17 COOKIES
John Hammond Intermediate 10y ago
LASACTF: "Grep Request" Challenge
Cybersecurity
LASACTF: "Grep Request" Challenge
John Hammond Intermediate 10y ago
Live Hacking - Internetwache CTF 2016 - web50, web60, web80
Cybersecurity
Live Hacking - Internetwache CTF 2016 - web50, web60, web80
LiveOverflow Intermediate 10y ago
Running a Buffer Overflow Attack - Computerphile
Cybersecurity
Running a Buffer Overflow Attack - Computerphile
Computerphile Intermediate 10y ago
SANS VetSuccess Academy: Identifying Top Cyber Talent
Cybersecurity
SANS VetSuccess Academy: Identifying Top Cyber Talent
SANS Institute Intermediate 10y ago
Brain Scanner - Computerphile
Cybersecurity
Brain Scanner - Computerphile
Computerphile Intermediate 10y ago
The 2015 SANS Holiday Hack Challenge
Cybersecurity
The 2015 SANS Holiday Hack Challenge
SANS Institute Intermediate 10y ago
LASACTF: "Four Oh Four" Challenge
Cybersecurity
LASACTF: "Four Oh Four" Challenge
John Hammond Intermediate 10y ago
Python Challenge! 16: MOZART
Cybersecurity
Python Challenge! 16: MOZART
John Hammond Intermediate 10y ago
LASACTF: "R3ndom Eye" Challenge
Cybersecurity
LASACTF: "R3ndom Eye" Challenge
John Hammond Intermediate 10y ago
LASACTF: "Shifty Letters" Challenge
Cybersecurity
LASACTF: "Shifty Letters" Challenge
John Hammond Intermediate 10y ago
05 SOLUTION: Hazy Days
Cybersecurity
05 SOLUTION: Hazy Days
John Hammond Intermediate 10y ago
05 CHALLENGE: Hazy Days
Cybersecurity
05 CHALLENGE: Hazy Days
John Hammond Intermediate 10y ago
04 SOLUTION: Spelling States
Cybersecurity
04 SOLUTION: Spelling States
John Hammond Intermediate 10y ago
04 CHALLENGE: Spelling States
Cybersecurity
04 CHALLENGE: Spelling States
John Hammond Intermediate 10y ago
03 SOLUTION: Dog Showdown
Cybersecurity
03 SOLUTION: Dog Showdown
John Hammond Intermediate 10y ago
03 CHALLENGE: Dog Showdown
Cybersecurity
03 CHALLENGE: Dog Showdown
John Hammond Intermediate 10y ago
02 SOLUTION: Missing Numbers
Cybersecurity
02 SOLUTION: Missing Numbers
John Hammond Intermediate 10y ago
02 CHALLENGE: Missing Numbers
Cybersecurity
02 CHALLENGE: Missing Numbers
John Hammond Intermediate 10y ago
01 SOLUTION: Word Find
Cybersecurity
01 SOLUTION: Word Find
John Hammond Intermediate 10y ago
01 CHALLENGE: Word Find
Cybersecurity
01 CHALLENGE: Word Find
John Hammond Intermediate 10y ago
Template BASH Script
Cybersecurity
Template BASH Script
John Hammond Intermediate 10y ago
Creating a BitBucket Repository
Cybersecurity
Creating a BitBucket Repository
John Hammond Intermediate 10y ago
LaTeX 01: Text Formatting
Cybersecurity
LaTeX 01: Text Formatting
John Hammond Intermediate 10y ago
LaTeX 00: Hello World!
Cybersecurity
LaTeX 00: Hello World!
John Hammond Intermediate 10y ago
Python 04: PEP8 Coding
Cybersecurity
Python 04: PEP8 Coding
John Hammond Intermediate 10y ago
Arbitrary write with House of Force (heap exploit) - BKPCTF cookbook (pwn 6) part 3
Cybersecurity
Arbitrary write with House of Force (heap exploit) - BKPCTF cookbook (pwn 6) part 3
LiveOverflow Intermediate 10y ago
Leaking Heap and Libc address - BKPCTF cookbook (pwn 6) part 2
Cybersecurity
Leaking Heap and Libc address - BKPCTF cookbook (pwn 6) part 2
LiveOverflow Intermediate 10y ago
Python 03: Variables and Input
Cybersecurity
Python 03: Variables and Input
John Hammond Intermediate 10y ago
Python 01: Hello, World!
Cybersecurity
Python 01: Hello, World!
John Hammond Intermediate 10y ago
Python 02: Data Types
Cybersecurity
Python 02: Data Types
John Hammond Intermediate 10y ago
Sublime Text 2: PPA Install
Cybersecurity
Sublime Text 2: PPA Install
John Hammond Intermediate 10y ago
Reverse Engineering and identifying Bugs - BKPCTF cookbook (pwn 6) part 1
Cybersecurity
Reverse Engineering and identifying Bugs - BKPCTF cookbook (pwn 6) part 1
LiveOverflow Intermediate 10y ago
wget in Python!
Cybersecurity
wget in Python!
John Hammond Intermediate 10y ago
pwnable.kr - Levels: fd, collision, bof, flag
Cybersecurity
pwnable.kr - Levels: fd, collision, bof, flag
LiveOverflow Intermediate 10y ago
Live Hacking - EFF-CTF 2016 - Level 0-4 (Enigma Conference)
Cybersecurity
Live Hacking - EFF-CTF 2016 - Level 0-4 (Enigma Conference)
LiveOverflow Intermediate 10y ago
Live Hacking - Twitch Recording overthewire.org - Vortex 0x01-0x03 (3h)
Cybersecurity
Live Hacking - Twitch Recording overthewire.org - Vortex 0x01-0x03 (3h)
LiveOverflow Intermediate 10y ago
Man in the Middle Attacks & Superfish - Computerphile
Cybersecurity
Man in the Middle Attacks & Superfish - Computerphile
Computerphile Intermediate 10y ago
Zig Zag Decryption - Computerphile
Cybersecurity
Zig Zag Decryption - Computerphile
Computerphile Intermediate 10y ago
Inside a Data Centre - Computerphile
Cybersecurity
Inside a Data Centre - Computerphile
Computerphile Intermediate 10y ago
USCGA Windjammers Ultimate Frisbee
Cybersecurity
USCGA Windjammers Ultimate Frisbee
John Hammond Intermediate 10y ago
Building "Quote" Functions in Python! [urllib] 06
Cybersecurity
Building "Quote" Functions in Python! [urllib] 06
John Hammond Intermediate 10y ago
Python URL "Utility functions" [urllib] 05
Cybersecurity
Python URL "Utility functions" [urllib] 05
John Hammond Intermediate 10y ago
Downloading Web Content with Python [urllib] 02
Cybersecurity
Downloading Web Content with Python [urllib] 02
John Hammond Intermediate 10y ago
Could We Ban Encryption? - Computerphile
Cybersecurity
Could We Ban Encryption? - Computerphile
Computerphile Intermediate 10y ago
Getting Web Content with Python! [urllib] 01
Cybersecurity
Getting Web Content with Python! [urllib] 01
John Hammond Intermediate 10y ago
LiveOverflow - Trailer
Cybersecurity
LiveOverflow - Trailer
LiveOverflow Intermediate 10y ago
📚 Coursera Courses Opens on Coursera · Free to audit
1 / 3 View all →
IoT Cloud
📚 Coursera Course ↗
Self-paced
IoT Cloud
Opens on Coursera ↗
Cybersecurity Governance: 16 Steps with NIST & ISO
📚 Coursera Course ↗
Self-paced
Cybersecurity Governance: 16 Steps with NIST & ISO
Opens on Coursera ↗
Network Defense Essentials (NDE)
📚 Coursera Course ↗
Self-paced
Network Defense Essentials (NDE)
Opens on Coursera ↗
Introduction to Penetration Testing and Ethical Hacking
📚 Coursera Course ↗
Self-paced
Introduction to Penetration Testing and Ethical Hacking
Opens on Coursera ↗
Mastering BFSI Interviews: Resumes & Mock Interviews
📚 Coursera Course ↗
Self-paced
Mastering BFSI Interviews: Resumes & Mock Interviews
Opens on Coursera ↗
Foundations of Cybersecurity
📚 Coursera Course ↗
Self-paced
Foundations of Cybersecurity
Opens on Coursera ↗