✕ Clear filters
6,393 lessons

🔐 Cybersecurity

Ethical hacking, penetration testing, network security, CTFs and defensive security

All ▶ YouTube 201,157📚 Coursera 18,202🎤 TED 1
REPORT THIS ACCOUNT
Cybersecurity
REPORT THIS ACCOUNT
John Hammond Beginner 1y ago
How I Got Malware From Discord!
Cybersecurity
How I Got Malware From Discord!
The Cyber Mentor Beginner 1y ago
How to get a job in IT (2025)
Cybersecurity
How to get a job in IT (2025)
NetworkChuck Intermediate 1y ago
Super Bowl Advertiser Roundtable
Cybersecurity
Super Bowl Advertiser Roundtable
GaryVee Intermediate 1y ago
A Cheap Jammer That Disrupted Airport Communications
Cybersecurity
A Cheap Jammer That Disrupted Airport Communications
Jack Rhysider Intermediate 1y ago
LIVE: Blue Team | MyDFIR | AMA | Cybersecurity
Cybersecurity
LIVE: Blue Team | MyDFIR | AMA | Cybersecurity
The Cyber Mentor Beginner 1y ago
Inside the World of Cyber Threat Intelligence with Ondra Rojcik
Cybersecurity
Inside the World of Cyber Threat Intelligence with Ondra Rojcik
SANS Institute Beginner 1y ago
The SECRET to Embedding Metasploit Payloads in VBA Macros
Cybersecurity
The SECRET to Embedding Metasploit Payloads in VBA Macros
HackerSploit Intermediate 1y ago
backdooring local git repositories
Cybersecurity
backdooring local git repositories
John Hammond Beginner 1y ago
Firewalls vs Firewalling #shorts #firewall #cisco #hack
Cybersecurity
Firewalls vs Firewalling #shorts #firewall #cisco #hack
David Bombal Intermediate 1y ago
A Wild Website Where People Lose Millions of Dollars
Cybersecurity
A Wild Website Where People Lose Millions of Dollars
Jack Rhysider Intermediate 1y ago
Exploring Offensive Cybersecurity: Threat Emulation | John Rodriguez
Cybersecurity
Exploring Offensive Cybersecurity: Threat Emulation | John Rodriguez
SANS Institute Intermediate 1y ago
New Way Now: Dunelm delivers style to homes securely with Google Cloud
Cybersecurity
New Way Now: Dunelm delivers style to homes securely with Google Cloud
Google Cloud Intermediate 1y ago
TOP Cybersecurity Jobs in 2025
Cybersecurity
TOP Cybersecurity Jobs in 2025
Sajjaad Khader Intermediate 1y ago
HackTheBox - MagicGardens
Cybersecurity
HackTheBox - MagicGardens
IppSec Beginner 1y ago
SQL Database in Fabric - Secured and governed by default | Data Exposed
Cybersecurity
SQL Database in Fabric - Secured and governed by default | Data Exposed
Microsoft Developer Beginner 1y ago
OpenAI o3-mini Model: The Master Move in Cost-Effective STEM AI | Edureka
Cybersecurity
OpenAI o3-mini Model: The Master Move in Cost-Effective STEM AI | Edureka
edureka! Beginner 1y ago
Cyber Kill Chain | What is Cyber Kill Chain? | The Seven Stages of a Cyberattack | Edureka
Cybersecurity
Cyber Kill Chain | What is Cyber Kill Chain? | The Seven Stages of a Cyberattack | Edureka
edureka! Beginner 1y ago
Is DeepSeek Lying to you? #shorts #wireshark #deepseek #privacy #cybersecurity
Cybersecurity
Is DeepSeek Lying to you? #shorts #wireshark #deepseek #privacy #cybersecurity
David Bombal Intermediate 1y ago
Offensive VBA 0x4 - Reverse Shell Macro with Powercat
Cybersecurity
Offensive VBA 0x4 - Reverse Shell Macro with Powercat
HackerSploit Intermediate 1y ago
Raspberry Pi MONITOR??
Cybersecurity
Raspberry Pi MONITOR??
NetworkChuck (2) Intermediate 1y ago
HackTheBox - Trickster
Cybersecurity
HackTheBox - Trickster
IppSec Beginner 1y ago
Cybersecurity v Computer Science 2025 ‼️
Cybersecurity
Cybersecurity v Computer Science 2025 ‼️
Sajjaad Khader Intermediate 1y ago
PayPal Was NEVER Meant to Be PayPal!    #shorts
Cybersecurity
PayPal Was NEVER Meant to Be PayPal! #shorts
Jacky Chou from Indexsy Beginner 1y ago
why the Raspberry Pi 500 is BETTER
Cybersecurity
why the Raspberry Pi 500 is BETTER
NetworkChuck (2) Intermediate 1y ago
#279 Customer Strategy in the Age of AI | David Edelman, Harvard Business School Fellow
Cybersecurity
#279 Customer Strategy in the Age of AI | David Edelman, Harvard Business School Fellow
DataCamp Beginner 1y ago
Empowering the Future of Cybersecurity: Women Leading the Way
Cybersecurity
Empowering the Future of Cybersecurity: Women Leading the Way
SANS Institute Beginner 1y ago
cloudflare.bat
Cybersecurity
cloudflare.bat
John Hammond Beginner 1y ago
Flipper Culture Is Wilder Than You Think
Cybersecurity
Flipper Culture Is Wilder Than You Think
Jack Rhysider Intermediate 1y ago
The Story Behind Bike Index
Cybersecurity
The Story Behind Bike Index
Jack Rhysider Intermediate 1y ago
How to Show Impact With SSRF (in Under 10 Minutes!)
Cybersecurity
How to Show Impact With SSRF (in Under 10 Minutes!)
The Cyber Mentor Beginner 1y ago
LIVE IoT Hacking | Matt Brown | AMA | Hardware Hacking
Cybersecurity
LIVE IoT Hacking | Matt Brown | AMA | Hardware Hacking
The Cyber Mentor Beginner 1y ago
Largest Bike Theft Network in the US
Cybersecurity
Largest Bike Theft Network in the US
Jack Rhysider Intermediate 1y ago
A Day in the Life of a Network Security Engineer | Sanjay Poddar
Cybersecurity
A Day in the Life of a Network Security Engineer | Sanjay Poddar
SANS Institute Intermediate 1y ago
This Simple Race Condition Made Everything FREE
Cybersecurity
This Simple Race Condition Made Everything FREE
The Cyber Mentor Beginner 1y ago
Hijacked Line
Cybersecurity
Hijacked Line
Jack Rhysider Intermediate 1y ago
Level Up Your Cyber Skills with the KC7 Threat Hunter CTF | New2Cyber Summit 2025
Cybersecurity
Level Up Your Cyber Skills with the KC7 Threat Hunter CTF | New2Cyber Summit 2025
SANS Institute Beginner 1y ago
almost got scammed
Cybersecurity
almost got scammed
John Hammond Beginner 1y ago
Are VPNs even safe now? Hacker Explains
Cybersecurity
Are VPNs even safe now? Hacker Explains
David Bombal Beginner 1y ago
How Hackers Target a Victim
Cybersecurity
How Hackers Target a Victim
Jack Rhysider Intermediate 1y ago
How to Become a Web App Pentester in 2025!
Cybersecurity
How to Become a Web App Pentester in 2025!
The Cyber Mentor Beginner 1y ago
Who's going to win this hack? #shorts #hak5 #threatlocker #cybersecurity
Cybersecurity
Who's going to win this hack? #shorts #hak5 #threatlocker #cybersecurity
David Bombal Beginner 1y ago
From IT Support to Cybersecurity Leader: Jay James’ Keynote Journey
Cybersecurity
From IT Support to Cybersecurity Leader: Jay James’ Keynote Journey
SANS Institute Intermediate 1y ago
Non-Technical to Technical: Breaking into Reverse Engineering | Alex Perotti
Cybersecurity
Non-Technical to Technical: Breaking into Reverse Engineering | Alex Perotti
SANS Institute Intermediate 1y ago
the FBI gottem
Cybersecurity
the FBI gottem
John Hammond Beginner 1y ago
LIVE: Blue Teaming | Sherlocks 🔎 |  Cybersecurity | HackTheBox | AMA
Cybersecurity
LIVE: Blue Teaming | Sherlocks 🔎 | Cybersecurity | HackTheBox | AMA
The Cyber Mentor Beginner 1y ago
Break Into Cybersecurity Through Cyber-Adjacent Roles | Aaron Yerian
Cybersecurity
Break Into Cybersecurity Through Cyber-Adjacent Roles | Aaron Yerian
SANS Institute Beginner 1y ago
Don't Make This Rookie Mistake as a Professional Pentester
Cybersecurity
Don't Make This Rookie Mistake as a Professional Pentester
The Cyber Mentor Beginner 1y ago
📚 Coursera Courses Opens on Coursera · Free to audit
1 / 3 View all →
CyberSec First Responder (CFR-310)
📚 Coursera Course ↗
Self-paced
CyberSec First Responder (CFR-310)
Opens on Coursera ↗
Hacking COVID-19 — Course 5: Tracing SARS-CoV-2's Evolution
📚 Coursera Course ↗
Self-paced
Hacking COVID-19 — Course 5: Tracing SARS-CoV-2's Evolution
Opens on Coursera ↗
Quantum Computing For Everyone - An Introduction
📚 Coursera Course ↗
Self-paced
Quantum Computing For Everyone - An Introduction
Opens on Coursera ↗
Security Command Center: Identify and Prioritize Risks
📚 Coursera Course ↗
Self-paced
Security Command Center: Identify and Prioritize Risks
Opens on Coursera ↗
CISSP Domain 7: Security Operations
📚 Coursera Course ↗
Self-paced
CISSP Domain 7: Security Operations
Opens on Coursera ↗
pfSense 2.4.4: Open Source Firewall
📚 Coursera Course ↗
Self-paced
pfSense 2.4.4: Open Source Firewall
Opens on Coursera ↗