✕ Clear filters
6,392 lessons

🔐 Cybersecurity

Ethical hacking, penetration testing, network security, CTFs and defensive security

All ▶ YouTube 201,127📚 Coursera 18,202🎤 TED 1
Open Source Vs  Closed Source Model | Amr Awadallah | Data Science Dojo #opensource #ai
Cybersecurity
Open Source Vs Closed Source Model | Amr Awadallah | Data Science Dojo #opensource #ai
Data Science Dojo Beginner 11mo ago
Panel | Mentors and Mentees: Navigating Cybersecurity's Path Together
Cybersecurity
Panel | Mentors and Mentees: Navigating Cybersecurity's Path Together
SANS Institute Intermediate 11mo ago
A Day in the Life of a Network Security Engineer
Cybersecurity
A Day in the Life of a Network Security Engineer
SANS Institute Advanced 11mo ago
Finding Web App Vulnerabilities with AI
Cybersecurity
Finding Web App Vulnerabilities with AI
John Hammond Intermediate 11mo ago
RevOps: "The CRM AI did what!? I know what to do. Zapier."
Cybersecurity
RevOps: "The CRM AI did what!? I know what to do. Zapier."
Zapier Intermediate 12mo ago
HackTheBox - LinkVortex
Cybersecurity
HackTheBox - LinkVortex
IppSec Beginner 12mo ago
Cybersecurity Skills You NEED To Learn (2026) | The Most In-Demand Cybersecurity Skills | Edureka
Cybersecurity
Cybersecurity Skills You NEED To Learn (2026) | The Most In-Demand Cybersecurity Skills | Edureka
edureka! Beginner 12mo ago
Screenshot.jpg (When They Got Hacked)
Cybersecurity
Screenshot.jpg (When They Got Hacked)
John Hammond Beginner 12mo ago
How AI Dating Scams Are Getting Dangerously Smart in 2025
Cybersecurity
How AI Dating Scams Are Getting Dangerously Smart in 2025
The Cyber Mentor Beginner 12mo ago
LIVE: Memory Forensics | Volatility | Cybersecurity | Blue Team | AMA
Cybersecurity
LIVE: Memory Forensics | Volatility | Cybersecurity | Blue Team | AMA
The Cyber Mentor Beginner 12mo ago
Hide Your Secrets Like a Pro! #tricks #techintamil #tech
Cybersecurity
Hide Your Secrets Like a Pro! #tricks #techintamil #tech
Arivi by HCL GUVI Beginner 12mo ago
How FIN6 Exfiltrates Files Over FTP
Cybersecurity
How FIN6 Exfiltrates Files Over FTP
HackerSploit Intermediate 12mo ago
From Zero to Zero Day (and beyond) - Life of a Hacker: Jonathan Jacobi
Cybersecurity
From Zero to Zero Day (and beyond) - Life of a Hacker: Jonathan Jacobi
LiveOverflow Beginner 1y ago
We bought stolen election access before the hackers did
Cybersecurity
We bought stolen election access before the hackers did
Weights & Biases Intermediate 1y ago
RevOps: "Don't worry. Zapier will wake it up."
Cybersecurity
RevOps: "Don't worry. Zapier will wake it up."
Zapier Intermediate 1y ago
Burpsuite proxy browser and App Interception
Cybersecurity
Burpsuite proxy browser and App Interception
David Bombal Intermediate 1y ago
The hunt for America's most wanted computer scientist...
Cybersecurity
The hunt for America's most wanted computer scientist...
Fireship Beginner 1y ago
CZ Enhances Healthcare Innovation with the Databricks Data Intelligence Platform
Cybersecurity
CZ Enhances Healthcare Innovation with the Databricks Data Intelligence Platform
Databricks Beginner 1y ago
Fraud Detection in the AI Era // Rafael Sandroni // MLOps Podcast #301
Cybersecurity
Fraud Detection in the AI Era // Rafael Sandroni // MLOps Podcast #301
MLOps.community Intermediate 1y ago
Secrets of Defcon: Untold Stories From the World's Greatest Hacker Conference 💾 Ep.157: Grifter
Cybersecurity
Secrets of Defcon: Untold Stories From the World's Greatest Hacker Conference 💾 Ep.157: Grifter
Jack Rhysider Intermediate 1y ago
Movie vs Reality: Tech Hacking Scene from Singam! #scienceandtechnology #techintamil #hackingscenes
Cybersecurity
Movie vs Reality: Tech Hacking Scene from Singam! #scienceandtechnology #techintamil #hackingscenes
Arivi by HCL GUVI Beginner 1y ago
HackTheBox - BlockBlock
Cybersecurity
HackTheBox - BlockBlock
IppSec Beginner 1y ago
Create Your Own Raspberry Pi File Server in Minutes (SMB Share)
Cybersecurity
Create Your Own Raspberry Pi File Server in Minutes (SMB Share)
NetworkChuck (2) Beginner 1y ago
Advanced Bruteforce WiFi WPA2 cracking with GPU and Hashcat
Cybersecurity
Advanced Bruteforce WiFi WPA2 cracking with GPU and Hashcat
David Bombal Beginner 1y ago
Why nobody likes cybersecurity
Cybersecurity
Why nobody likes cybersecurity
Weights & Biases Intermediate 1y ago
PayPal Wasn't Always About Payments?! 💰   #shorts
Cybersecurity
PayPal Wasn't Always About Payments?! 💰 #shorts
Jacky Chou from Indexsy Beginner 1y ago
Lightning Talk | Ever sucked into Wikipedia for three hours? CTI might be for you!
Cybersecurity
Lightning Talk | Ever sucked into Wikipedia for three hours? CTI might be for you!
SANS Institute Beginner 11mo ago
A Day in the Life of a Threat Emulation Specialist: Demystifying Offensive Cybersecurity
Cybersecurity
A Day in the Life of a Threat Emulation Specialist: Demystifying Offensive Cybersecurity
SANS Institute Beginner 11mo ago
Lightning Talk | Negating the Noise: Prioritize Your Cybersecurity
Cybersecurity
Lightning Talk | Negating the Noise: Prioritize Your Cybersecurity
SANS Institute Beginner 11mo ago
Cyber Adjacent: 5 Lessons Learned from a Day in the Life of an IT Project Manager
Cybersecurity
Cyber Adjacent: 5 Lessons Learned from a Day in the Life of an IT Project Manager
SANS Institute Beginner 11mo ago
From TV news to cybersecurity: the 5 steps I took to completely change careers
Cybersecurity
From TV news to cybersecurity: the 5 steps I took to completely change careers
SANS Institute Beginner 11mo ago
Going Technical, Against All Odds: From Digital Communications to Reverse Engineering Malware
Cybersecurity
Going Technical, Against All Odds: From Digital Communications to Reverse Engineering Malware
SANS Institute Beginner 11mo ago
From Special Forces to Cybersecurity: Rich Greene on Communication and Persuasion in Infosec
Cybersecurity
From Special Forces to Cybersecurity: Rich Greene on Communication and Persuasion in Infosec
SANS Institute Intermediate 12mo ago
Watch Out for this AI Prompt Injection Hack!
Cybersecurity
Watch Out for this AI Prompt Injection Hack!
The Cyber Mentor Beginner 1y ago
I Backdoored Cursor AI
Cybersecurity
I Backdoored Cursor AI
John Hammond Intermediate 1y ago
Learn Cybersecurity Defense!
Cybersecurity
Learn Cybersecurity Defense!
John Hammond Beginner 1y ago
How to Avoid These Cybersecurity Resume Mistakes
Cybersecurity
How to Avoid These Cybersecurity Resume Mistakes
The Cyber Mentor Beginner 1y ago
Turn Your Hard-Earned Experience into Impact
Cybersecurity
Turn Your Hard-Earned Experience into Impact
SANS Institute Intermediate 1y ago
LIVE: Exploit Development | Shellcoding | Cybersecurity | Red Team | AMA
Cybersecurity
LIVE: Exploit Development | Shellcoding | Cybersecurity | Red Team | AMA
The Cyber Mentor Beginner 1y ago
How I Landed My First Cybersecurity Job
Cybersecurity
How I Landed My First Cybersecurity Job
The Cyber Mentor Beginner 1y ago
Security Operations (SOC) 101 Course - 10+ Hours of Content!
Cybersecurity
Security Operations (SOC) 101 Course - 10+ Hours of Content!
The Cyber Mentor Beginner 1y ago
Cinema Vs. Reality: Decoding Tech Myths in Tamil Movies! | Arivi
Cybersecurity
Cinema Vs. Reality: Decoding Tech Myths in Tamil Movies! | Arivi
Arivi by HCL GUVI Beginner 1y ago
Watch Out for These Common SOC Analysts Mistakes!
Cybersecurity
Watch Out for These Common SOC Analysts Mistakes!
The Cyber Mentor Beginner 1y ago
We're Hosting a Conference
Cybersecurity
We're Hosting a Conference
John Hammond Beginner 1y ago
Get Faster on the Linux Terminal with zoxide!
Cybersecurity
Get Faster on the Linux Terminal with zoxide!
The Cyber Mentor Beginner 1y ago
LIVE: WordPress Intrusion | Cybersecurity | Blue Team | AMA
Cybersecurity
LIVE: WordPress Intrusion | Cybersecurity | Blue Team | AMA
The Cyber Mentor Beginner 1y ago
this MP3 file is malware
Cybersecurity
this MP3 file is malware
John Hammond Intermediate 1y ago
Detecting NTFS Timestomping
Cybersecurity
Detecting NTFS Timestomping
The Cyber Mentor Beginner 1y ago