✕ Clear filters
6,392 lessons

🔐 Cybersecurity

Ethical hacking, penetration testing, network security, CTFs and defensive security

All ▶ YouTube 201,127📚 Coursera 18,202🎤 TED 1
Blocking EVERYTHING with Windows Firewall
Cybersecurity
Blocking EVERYTHING with Windows Firewall
John Hammond Intermediate 11mo ago
10 Marketing Strategies That Actually Work (For ANY Business)
Cybersecurity
10 Marketing Strategies That Actually Work (For ANY Business)
Adam Erhart Beginner 11mo ago
Janna Levin: Black Holes, Wormholes, Aliens, Paradoxes & Extra Dimensions | Lex Fridman Podcast #468
Cybersecurity
Janna Levin: Black Holes, Wormholes, Aliens, Paradoxes & Extra Dimensions | Lex Fridman Podcast #468
Lex Fridman Beginner 11mo ago
I Received a SCARY Text from My Boss and Here's What Happened Next
Cybersecurity
I Received a SCARY Text from My Boss and Here's What Happened Next
Manish Sharma Intermediate 11mo ago
RevOps: "Chill. Zapier's got this."
Cybersecurity
RevOps: "Chill. Zapier's got this."
Zapier Intermediate 11mo ago
Capture and Replay Phone Calls with Kali Linux and Wireshark (MITM / VoIP replay)
Cybersecurity
Capture and Replay Phone Calls with Kali Linux and Wireshark (MITM / VoIP replay)
David Bombal Intermediate 11mo ago
Try Hack Me! Hands-on hacking labs (free & paid) 😀 #shorts #cybersecurity #iphone #android
Cybersecurity
Try Hack Me! Hands-on hacking labs (free & paid) 😀 #shorts #cybersecurity #iphone #android
David Bombal Intermediate 11mo ago
How to Pass the PNPT: From Zero to Hero!
Cybersecurity
How to Pass the PNPT: From Zero to Hero!
The Cyber Mentor Beginner 11mo ago
How I Almost Got Phished From a Text Message!
Cybersecurity
How I Almost Got Phished From a Text Message!
The Cyber Mentor Beginner 11mo ago
Introduction to Cloud Next Generation Firewall
Cybersecurity
Introduction to Cloud Next Generation Firewall
Google Cloud Beginner 11mo ago
Evaluate Your Cloud Next Generation Firewall Needs
Cybersecurity
Evaluate Your Cloud Next Generation Firewall Needs
Google Cloud Beginner 11mo ago
Uncovering the Reality of OTP Hacking in 2026 | How Hackers Steal Your OTPs | OTP Security | Edureka
Cybersecurity
Uncovering the Reality of OTP Hacking in 2026 | How Hackers Steal Your OTPs | OTP Security | Edureka
edureka! Beginner 11mo ago
Why Most People Stay Broke | MASTER Discipline to Build Unshakable Wealth!
Cybersecurity
Why Most People Stay Broke | MASTER Discipline to Build Unshakable Wealth!
Evan Carmichael Beginner 11mo ago
RevOps: "Zapier to end Sprints automatically. Done."
Cybersecurity
RevOps: "Zapier to end Sprints automatically. Done."
Zapier Intermediate 11mo ago
HackTheBox - Vintage
Cybersecurity
HackTheBox - Vintage
IppSec Beginner 11mo ago
Giving Back to the Cybersecurity Community Through Teaching
Cybersecurity
Giving Back to the Cybersecurity Community Through Teaching
SANS Institute Beginner 11mo ago
DDoS Attack | What is a DDoS Attack? | DDoS Attack Explained | Edureka
Cybersecurity
DDoS Attack | What is a DDoS Attack? | DDoS Attack Explained | Edureka
edureka! Beginner 11mo ago
Level Up Your Security Team Through Automation
Cybersecurity
Level Up Your Security Team Through Automation
SANS Institute Beginner 11mo ago
Top Skills You’ll Build with the Microsoft Cybersecurity Certificate on Coursera
Cybersecurity
Top Skills You’ll Build with the Microsoft Cybersecurity Certificate on Coursera
Coursera Intermediate 11mo ago
AI Cybersecurity for Product Managers - AI PM Community Session #79
Cybersecurity
AI Cybersecurity for Product Managers - AI PM Community Session #79
PM Exercises Intermediate 11mo ago
IT Skills You'll Learn in the IBM IT Support Professional Certificate Program
Cybersecurity
IT Skills You'll Learn in the IBM IT Support Professional Certificate Program
Coursera Beginner 11mo ago
Amazon Cybersecurity HACKER Q&A 🤫
Cybersecurity
Amazon Cybersecurity HACKER Q&A 🤫
Sajjaad Khader Intermediate 11mo ago
HackTheBox - Administrator
Cybersecurity
HackTheBox - Administrator
IppSec Beginner 11mo ago
Hidden Dangers of Phone Cameras! #PhoneCameraSpy #CameraHack #CyberSecurity
Cybersecurity
Hidden Dangers of Phone Cameras! #PhoneCameraSpy #CameraHack #CyberSecurity
Arivi by HCL GUVI Beginner 11mo ago
Jim Rohn’s 12 Pillars of Unshakable Success | The Ultimate Personal Code
Cybersecurity
Jim Rohn’s 12 Pillars of Unshakable Success | The Ultimate Personal Code
Evan Carmichael Intermediate 11mo ago
4chan penetrated by a gang of soyjaks…
Cybersecurity
4chan penetrated by a gang of soyjaks…
Fireship Beginner 11mo ago
Real-Time cyber threats
Cybersecurity
Real-Time cyber threats
Weights & Biases Intermediate 11mo ago
cybersecurity just got f***ed
Cybersecurity
cybersecurity just got f***ed
John Hammond Intermediate 11mo ago
LIVE: Exploit Development | Shellcoding | Cybersecurity | Red Team | AMA
Cybersecurity
LIVE: Exploit Development | Shellcoding | Cybersecurity | Red Team | AMA
The Cyber Mentor Beginner 11mo ago
3 Tech Books You MUST Read
Cybersecurity
3 Tech Books You MUST Read
The Cyber Mentor Beginner 11mo ago
The Best and The Worst of Cybersecurity Career Advice!
Cybersecurity
The Best and The Worst of Cybersecurity Career Advice!
The Cyber Mentor Beginner 11mo ago
Will AI Replace Your Tech Job in 2025?
Cybersecurity
Will AI Replace Your Tech Job in 2025?
The Cyber Mentor Beginner 11mo ago
SANS Cyber Compliance Countdown: Guidance to Meet Global Directives
Cybersecurity
SANS Cyber Compliance Countdown: Guidance to Meet Global Directives
SANS Institute Advanced 11mo ago
LIVE: PowerShell Deobfuscation | Cybersecurity | Blue Team | AMA
Cybersecurity
LIVE: PowerShell Deobfuscation | Cybersecurity | Blue Team | AMA
The Cyber Mentor Beginner 11mo ago
Penetration Testing For Beginners | Phases of Penetration Testing | Penetration Testing Tutorial
Cybersecurity
Penetration Testing For Beginners | Phases of Penetration Testing | Penetration Testing Tutorial
edureka! Beginner 11mo ago
Ethical Hacking for Beginners | 5 Phases of Ethical Hacking | Ethical Hacking Tutorial | Edureka
Cybersecurity
Ethical Hacking for Beginners | 5 Phases of Ethical Hacking | Ethical Hacking Tutorial | Edureka
edureka! Beginner 11mo ago
How Hackers Break Into Servers Through IoT Hardware
Cybersecurity
How Hackers Break Into Servers Through IoT Hardware
The Cyber Mentor Beginner 11mo ago
The Myth: You Need to Be an Expert Hacker to Work in Cybersecurity
Cybersecurity
The Myth: You Need to Be an Expert Hacker to Work in Cybersecurity
SANS Institute Advanced 11mo ago
The Myth: Cybersecurity Is Only For People in IT
Cybersecurity
The Myth: Cybersecurity Is Only For People in IT
SANS Institute Advanced 11mo ago
The Myth: I'm Not a Target, So I Don't Need to Be Cybersecurity Aware
Cybersecurity
The Myth: I'm Not a Target, So I Don't Need to Be Cybersecurity Aware
SANS Institute Advanced 11mo ago
RevOps: "Oh, an artifact from the Pre-Zapier Era."
Cybersecurity
RevOps: "Oh, an artifact from the Pre-Zapier Era."
Zapier Intermediate 11mo ago
RevOps: "OR... I can set up Zapier to scan the contents..."
Cybersecurity
RevOps: "OR... I can set up Zapier to scan the contents..."
Zapier Intermediate 11mo ago
What is the MITRE CVE Program - and Why It Matters So Much
Cybersecurity
What is the MITRE CVE Program - and Why It Matters So Much
The Cyber Mentor Beginner 11mo ago
The brain of a pea? #shorts #hub #switch #network #wireshark #ccna
Cybersecurity
The brain of a pea? #shorts #hub #switch #network #wireshark #ccna
David Bombal Intermediate 11mo ago
RIP CVE Program?! How the MITRE Funding Crisis Threatens Cybersecurity
Cybersecurity
RIP CVE Program?! How the MITRE Funding Crisis Threatens Cybersecurity
The Cyber Mentor Beginner 11mo ago
LIVE: Moose on the loose | CVE | Cybersecurity | AMA
Cybersecurity
LIVE: Moose on the loose | CVE | Cybersecurity | AMA
The Cyber Mentor Beginner 11mo ago
Hardware Reverse Engineering with a Logic Analyzer
Cybersecurity
Hardware Reverse Engineering with a Logic Analyzer
The Cyber Mentor Beginner 11mo ago
Do you agree? Using Open WiFi networks in 2025? #shorts #wifi #iphone #android #cybersecurity
Cybersecurity
Do you agree? Using Open WiFi networks in 2025? #shorts #wifi #iphone #android #cybersecurity
David Bombal Intermediate 11mo ago
📚 Coursera Courses Opens on Coursera · Free to audit
1 / 3 View all →
Introduction to Data Protection and Privacy
📚 Coursera Course ↗
Self-paced
Introduction to Data Protection and Privacy
Opens on Coursera ↗
Protege GKE con Cloud Next Generation Firewall
📚 Coursera Course ↗
Self-paced
Protege GKE con Cloud Next Generation Firewall
Opens on Coursera ↗
Business English: Finance and Economics
📚 Coursera Course ↗
Self-paced
Business English: Finance and Economics
Opens on Coursera ↗
Cybersecurity Awareness Essentials for Employees
📚 Coursera Course ↗
Self-paced
Cybersecurity Awareness Essentials for Employees
Opens on Coursera ↗
Cybersecurity basics for everyone
📚 Coursera Course ↗
Self-paced
Cybersecurity basics for everyone
Opens on Coursera ↗
AWS: Network Security, Compliance and Governance
📚 Coursera Course ↗
Self-paced
AWS: Network Security, Compliance and Governance
Opens on Coursera ↗