✕ Clear filters
2,561 lessons

🔐 Cybersecurity

Ethical hacking, penetration testing, network security, CTFs and defensive security

All ▶ YouTube 200,970📚 Coursera 18,181🎤 TED 1
From Special Forces to Cybersecurity: Rich Greene on Communication and Persuasion in Infosec
Cybersecurity
From Special Forces to Cybersecurity: Rich Greene on Communication and Persuasion in Infosec
SANS Institute Intermediate 12mo ago
How FIN6 Exfiltrates Files Over FTP
Cybersecurity
How FIN6 Exfiltrates Files Over FTP
HackerSploit Intermediate 12mo ago
We bought stolen election access before the hackers did
Cybersecurity
We bought stolen election access before the hackers did
Weights & Biases Intermediate 12mo ago
I Backdoored Cursor AI
Cybersecurity
I Backdoored Cursor AI
John Hammond Intermediate 12mo ago
RevOps: "Don't worry. Zapier will wake it up."
Cybersecurity
RevOps: "Don't worry. Zapier will wake it up."
Zapier Intermediate 1y ago
Burpsuite proxy browser and App Interception
Cybersecurity
Burpsuite proxy browser and App Interception
David Bombal Intermediate 1y ago
Turn Your Hard-Earned Experience into Impact
Cybersecurity
Turn Your Hard-Earned Experience into Impact
SANS Institute Intermediate 1y ago
Fraud Detection in the AI Era // Rafael Sandroni // MLOps Podcast #301
Cybersecurity
Fraud Detection in the AI Era // Rafael Sandroni // MLOps Podcast #301
MLOps.community Intermediate 1y ago
Secrets of Defcon: Untold Stories From the World's Greatest Hacker Conference 💾 Ep.157: Grifter
Cybersecurity
Secrets of Defcon: Untold Stories From the World's Greatest Hacker Conference 💾 Ep.157: Grifter
Jack Rhysider Intermediate 1y ago
Why nobody likes cybersecurity
Cybersecurity
Why nobody likes cybersecurity
Weights & Biases Intermediate 1y ago
this MP3 file is malware
Cybersecurity
this MP3 file is malware
John Hammond Intermediate 1y ago
Can you hack a hub? #shorts #hub #switch #network #wireshark #ccna
Cybersecurity
Can you hack a hub? #shorts #hub #switch #network #wireshark #ccna
David Bombal Intermediate 1y ago
Wasm on feature phones with Cloud Phone's Thomas Barrasso
Cybersecurity
Wasm on feature phones with Cloud Phone's Thomas Barrasso
Chrome for Developers Intermediate 1y ago
IBM Cybersecurity Analyst Professional Certificate: Build Critical Skills for a Thriving Career
Cybersecurity
IBM Cybersecurity Analyst Professional Certificate: Build Critical Skills for a Thriving Career
Coursera Intermediate 1y ago
Oxford Cyber Security for Business Leaders Programme
Cybersecurity
Oxford Cyber Security for Business Leaders Programme
Saïd Business School, University of Oxford Intermediate 1y ago
Hacking in Tamil Movies! Reality 🤣 #scienceandtechnology #facts #techintamil
Cybersecurity
Hacking in Tamil Movies! Reality 🤣 #scienceandtechnology #facts #techintamil
Arivi by HCL GUVI Intermediate 1y ago
Get Hired In Cybersecurity Without Previous Experience
Cybersecurity
Get Hired In Cybersecurity Without Previous Experience
The Cyber Mentor Intermediate 1y ago
Burner Phone vs China's Great Firewall
Cybersecurity
Burner Phone vs China's Great Firewall
Dwarkesh Patel Intermediate 1y ago
IBM Cybersecurity Certificate: Your Path to a Top Tech Career
Cybersecurity
IBM Cybersecurity Certificate: Your Path to a Top Tech Career
Coursera Intermediate 1y ago
The Hacker Who Testified Before Congress & Changed Everything🎙Darknet Diaries Ep 155: Kingpin
Cybersecurity
The Hacker Who Testified Before Congress & Changed Everything🎙Darknet Diaries Ep 155: Kingpin
Jack Rhysider Intermediate 1y ago
Top 5 Common API Security Mistakes & How to Avoid Them ( Tamil )
Cybersecurity
Top 5 Common API Security Mistakes & How to Avoid Them ( Tamil )
TechArchLab Intermediate 1y ago
BREAK INTO Cybersecurity in 2025 💰
Cybersecurity
BREAK INTO Cybersecurity in 2025 💰
Sajjaad Khader Intermediate 1y ago
It only takes one photo
Cybersecurity
It only takes one photo
NetworkChuck Intermediate 1y ago
Computer Virus: How It Got Its Name! #facts #techintamil #scienceandtechnology
Cybersecurity
Computer Virus: How It Got Its Name! #facts #techintamil #scienceandtechnology
Arivi by HCL GUVI Intermediate 1y ago
How to get a job in IT (2025)
Cybersecurity
How to get a job in IT (2025)
NetworkChuck Intermediate 1y ago
Super Bowl Advertiser Roundtable
Cybersecurity
Super Bowl Advertiser Roundtable
GaryVee Intermediate 1y ago
The SECRET to Embedding Metasploit Payloads in VBA Macros
Cybersecurity
The SECRET to Embedding Metasploit Payloads in VBA Macros
HackerSploit Intermediate 1y ago
New Way Now: Dunelm delivers style to homes securely with Google Cloud
Cybersecurity
New Way Now: Dunelm delivers style to homes securely with Google Cloud
Google Cloud Intermediate 1y ago
TOP Cybersecurity Jobs in 2025
Cybersecurity
TOP Cybersecurity Jobs in 2025
Sajjaad Khader Intermediate 1y ago
the CRITICAL 9.1 severity Next.js vulnerability
Cybersecurity
the CRITICAL 9.1 severity Next.js vulnerability
John Hammond Intermediate 1y ago
WSL Setup (GPU WiFi Cracking, Wireshark, Remote Desktop and a lot more)
Cybersecurity
WSL Setup (GPU WiFi Cracking, Wireshark, Remote Desktop and a lot more)
David Bombal Intermediate 1y ago
Linux for Windows?
Cybersecurity
Linux for Windows?
David Bombal Intermediate 1y ago
ms teams is now a C2 (command-and-control)
Cybersecurity
ms teams is now a C2 (command-and-control)
John Hammond Intermediate 1y ago
they tried to hack me so i confronted them
Cybersecurity
they tried to hack me so i confronted them
John Hammond Intermediate 1y ago
LOCAL Private Telephone System (PBX) with USA number for $1 a month
Cybersecurity
LOCAL Private Telephone System (PBX) with USA number for $1 a month
David Bombal Intermediate 1y ago
the tools that real hackers use
Cybersecurity
the tools that real hackers use
John Hammond Intermediate 1y ago
are built-in windows programs vulnerable?
Cybersecurity
are built-in windows programs vulnerable?
John Hammond Intermediate 1y ago
The Snyk Fetch the Flag CTF is LIVE right now!!
Cybersecurity
The Snyk Fetch the Flag CTF is LIVE right now!!
John Hammond Intermediate 1y ago
Private Key Encryption - why is it used? #shorts #encryption #hashing #password
Cybersecurity
Private Key Encryption - why is it used? #shorts #encryption #hashing #password
David Bombal Intermediate 1y ago
The real world Iron Man? #shorts #ironman #mcu #cosplay #cybersecurity #zerotrust
Cybersecurity
The real world Iron Man? #shorts #ironman #mcu #cosplay #cybersecurity #zerotrust
David Bombal Intermediate 1y ago
Hacking Before Computers! #facts #scienceandtechnology #techintamil
Cybersecurity
Hacking Before Computers! #facts #scienceandtechnology #techintamil
Arivi by HCL GUVI Intermediate 1y ago
A Cheap Jammer That Disrupted Airport Communications
Cybersecurity
A Cheap Jammer That Disrupted Airport Communications
Jack Rhysider Intermediate 1y ago
Firewalls vs Firewalling #shorts #firewall #cisco #hack
Cybersecurity
Firewalls vs Firewalling #shorts #firewall #cisco #hack
David Bombal Intermediate 1y ago
A Wild Website Where People Lose Millions of Dollars
Cybersecurity
A Wild Website Where People Lose Millions of Dollars
Jack Rhysider Intermediate 1y ago
Exploring Offensive Cybersecurity: Threat Emulation | John Rodriguez
Cybersecurity
Exploring Offensive Cybersecurity: Threat Emulation | John Rodriguez
SANS Institute Intermediate 1y ago
Flipper Culture Is Wilder Than You Think
Cybersecurity
Flipper Culture Is Wilder Than You Think
Jack Rhysider Intermediate 1y ago
The Story Behind Bike Index
Cybersecurity
The Story Behind Bike Index
Jack Rhysider Intermediate 1y ago
Largest Bike Theft Network in the US
Cybersecurity
Largest Bike Theft Network in the US
Jack Rhysider Intermediate 1y ago
📚 Coursera Courses Opens on Coursera · Free to audit
1 / 3 View all →
GenAI for Cybersecurity: Blue Team
📚 Coursera Course ↗
Self-paced
GenAI for Cybersecurity: Blue Team
Opens on Coursera ↗
Secure GKE with Cloud Next Generation Firewall
📚 Coursera Course ↗
Self-paced
Secure GKE with Cloud Next Generation Firewall
Opens on Coursera ↗
Cybersecurity Case Studies and Capstone Project
📚 Coursera Course ↗
Self-paced
Cybersecurity Case Studies and Capstone Project
Opens on Coursera ↗
The Cybersecurity Culture Blueprint: A Proactive Approach
📚 Coursera Course ↗
Self-paced
The Cybersecurity Culture Blueprint: A Proactive Approach
Opens on Coursera ↗
Leadership and Change Management for Sustainability Success
📚 Coursera Course ↗
Self-paced
Leadership and Change Management for Sustainability Success
Opens on Coursera ↗
Azure Network Troubleshooting and Governance
📚 Coursera Course ↗
Self-paced
Azure Network Troubleshooting and Governance
Opens on Coursera ↗