✕ Clear filters
6,395 lessons

🔐 Cybersecurity

Ethical hacking, penetration testing, network security, CTFs and defensive security

All ▶ YouTube 201,177📚 Coursera 18,210🎤 TED 1
Three Ways to Hack Mobile Apps
Cybersecurity
Three Ways to Hack Mobile Apps
John Hammond Beginner 1y ago
🔥 Cybersecurity Certification | Top 5 Cybersecurity Certifications To Get In 2025 | Edureka
Cybersecurity
🔥 Cybersecurity Certification | Top 5 Cybersecurity Certifications To Get In 2025 | Edureka
edureka! Beginner 1y ago
Start Web App Pentesting for FREE (Legally!)
Cybersecurity
Start Web App Pentesting for FREE (Legally!)
The Cyber Mentor Beginner 1y ago
Lightning Talk: Co-bots, Not Robots: Artificial Intelligence in Security Operations
Cybersecurity
Lightning Talk: Co-bots, Not Robots: Artificial Intelligence in Security Operations
SANS Institute Intermediate 1y ago
They Say This Malware is INSANE
Cybersecurity
They Say This Malware is INSANE
John Hammond Beginner 1y ago
mobman 2
Cybersecurity
mobman 2
Jack Rhysider Intermediate 1y ago
HackTheBox - EvilCUPS
Cybersecurity
HackTheBox - EvilCUPS
IppSec Beginner 1y ago
Bug Bounty explained in 40 seconds | Best Websites
Cybersecurity
Bug Bounty explained in 40 seconds | Best Websites
GeeksforGeeks Beginner 1y ago
India's Historic win!
Cybersecurity
India's Historic win!
Full Disclosure Intermediate 1y ago
Are phones and cars next? Hacker explains: The Cybersecurity threat you need to worry about?
Cybersecurity
Are phones and cars next? Hacker explains: The Cybersecurity threat you need to worry about?
David Bombal Beginner 1y ago
Stanford's Neil Daswani Shares the Top 5 Cybersecurity Job Myths
Cybersecurity
Stanford's Neil Daswani Shares the Top 5 Cybersecurity Job Myths
Stanford Online Beginner 1y ago
Learn Regex in 15 Minutes
Cybersecurity
Learn Regex in 15 Minutes
The Cyber Mentor Beginner 1y ago
Hack a network and capture passwords using Python and Kali Linux // FREE CCNA 200-301 Course
Cybersecurity
Hack a network and capture passwords using Python and Kali Linux // FREE CCNA 200-301 Course
David Bombal Beginner 1y ago
SANS Threat Analysis Rundown with Katie Nickels | Sep. 2024 Edition
Cybersecurity
SANS Threat Analysis Rundown with Katie Nickels | Sep. 2024 Edition
SANS Institute Beginner 1y ago
15 Essential Skills Every Cybersecurity Analyst Needs
Cybersecurity
15 Essential Skills Every Cybersecurity Analyst Needs
Coursera Beginner 1y ago
he hacked my websites
Cybersecurity
he hacked my websites
NetworkChuck Beginner 1y ago
CS50x 2025 - Lecture 2 - Arrays
Cybersecurity
CS50x 2025 - Lecture 2 - Arrays
CS50 Beginner 1y ago
Hide your files like a hacker (5 Ways)
Cybersecurity
Hide your files like a hacker (5 Ways)
NetworkChuck Beginner 1y ago
Darknet Diaries 𝙲𝚈𝙱𝙴𝚁𝚆𝙰𝚅𝙴 Remix
Cybersecurity
Darknet Diaries 𝙲𝚈𝙱𝙴𝚁𝚆𝙰𝚅𝙴 Remix
Jack Rhysider Intermediate 1y ago
HackTheBox - Intuition
Cybersecurity
HackTheBox - Intuition
IppSec Beginner 1y ago
Gregory Aldrete: The Roman Empire - Rise and Fall of Ancient Rome | Lex Fridman Podcast #443
Cybersecurity
Gregory Aldrete: The Roman Empire - Rise and Fall of Ancient Rome | Lex Fridman Podcast #443
Lex Fridman Beginner 1y ago
Career Spotlight: Cybersecurity Analyst
Cybersecurity
Career Spotlight: Cybersecurity Analyst
Coursera Intermediate 1y ago
AWS Network Firewall TLS Inspection: 3 Pitfalls to Avoid
Cybersecurity
AWS Network Firewall TLS Inspection: 3 Pitfalls to Avoid
AWS Developers Intermediate 1y ago
How I Find Fail-Proof SEO Niches
Cybersecurity
How I Find Fail-Proof SEO Niches
Matt Diggity Beginner 1y ago
Top web series every techie must watch | Netflix
Cybersecurity
Top web series every techie must watch | Netflix
GeeksforGeeks Beginner 1y ago
Hacking from Cloud to Endpoint (and vice versa)
Cybersecurity
Hacking from Cloud to Endpoint (and vice versa)
John Hammond Beginner 1y ago
Where Does Malware Go On Your Computer?
Cybersecurity
Where Does Malware Go On Your Computer?
John Hammond Beginner 1y ago
Hacking ALL Levels in this Game!
Cybersecurity
Hacking ALL Levels in this Game!
John Hammond Beginner 1y ago
Healthcare - Industrial Control Security for Pharmaceuticals | Dean Parsons
Cybersecurity
Healthcare - Industrial Control Security for Pharmaceuticals | Dean Parsons
SANS Institute Intermediate 1y ago
Enhanced Vendor Risk Assessment | Tony Turner
Cybersecurity
Enhanced Vendor Risk Assessment | Tony Turner
SANS Institute Advanced 1y ago
Never access the Dark Web without doing this! (Tor and Telegram demos)
Cybersecurity
Never access the Dark Web without doing this! (Tor and Telegram demos)
David Bombal Beginner 1y ago
Detect Intruders and Fix Vulnerabilities With One Free Solution
Cybersecurity
Detect Intruders and Fix Vulnerabilities With One Free Solution
The Cyber Mentor Beginner 1y ago
Cracking Active Directory Passwords & MFA Fatigue
Cybersecurity
Cracking Active Directory Passwords & MFA Fatigue
John Hammond Beginner 1y ago
LIVE: Blue Team with @MalwareCube | New Cert? | Cybersecurity | SOC | PJSA
Cybersecurity
LIVE: Blue Team with @MalwareCube | New Cert? | Cybersecurity | SOC | PJSA
The Cyber Mentor Beginner 1y ago
How to Scrape Telegram with Python
Cybersecurity
How to Scrape Telegram with Python
John Hammond Beginner 1y ago
Fake CAPTCHA Runs Malware
Cybersecurity
Fake CAPTCHA Runs Malware
John Hammond Beginner 1y ago
SANS Hacker Tools & Incident Handling Training Course: SEC504 with Kevin Tyers
Cybersecurity
SANS Hacker Tools & Incident Handling Training Course: SEC504 with Kevin Tyers
SANS Institute Advanced 1y ago
SANS Compliance Countdown 2024
Cybersecurity
SANS Compliance Countdown 2024
SANS Institute Beginner 1y ago
Ransomware In Action: MedusaLocker ReadText34
Cybersecurity
Ransomware In Action: MedusaLocker ReadText34
John Hammond Advanced 1y ago
LIVE: Ransomware Investigation | Cybersecurity | Splunk | Blue Team |
Cybersecurity
LIVE: Ransomware Investigation | Cybersecurity | Splunk | Blue Team |
The Cyber Mentor Beginner 1y ago
Your information is not safe in the hands of authorities
Cybersecurity
Your information is not safe in the hands of authorities
Jack Rhysider Intermediate 1y ago
WiFi Hacking Watch (WiFi Deauther)
Cybersecurity
WiFi Hacking Watch (WiFi Deauther)
David Bombal Intermediate 1y ago
HackTheBox - Mailing
Cybersecurity
HackTheBox - Mailing
IppSec Beginner 1y ago
Thieves stole NFTs with Instagram
Cybersecurity
Thieves stole NFTs with Instagram
Jack Rhysider Intermediate 1y ago
Caido: The Hacking Tool You Didn't Know You Needed
Cybersecurity
Caido: The Hacking Tool You Didn't Know You Needed
The Cyber Mentor Beginner 1y ago
Mini-Stories Vol. 3
Cybersecurity
Mini-Stories Vol. 3
Jack Rhysider Intermediate 1y ago
The Hacker with Hardware Implants (interview)
Cybersecurity
The Hacker with Hardware Implants (interview)
John Hammond Beginner 1y ago
The Secret CIA Backdoor
Cybersecurity
The Secret CIA Backdoor
Jack Rhysider Intermediate 1y ago
📚 Coursera Courses Opens on Coursera · Free to audit
1 / 3 View all →
 Incident Response and Recovery
📚 Coursera Course ↗
Self-paced
Incident Response and Recovery
Opens on Coursera ↗
Cybersecurity Case Studies and Capstone Project
📚 Coursera Course ↗
Self-paced
Cybersecurity Case Studies and Capstone Project
Opens on Coursera ↗
Cloud Next Generation Firewall: avaliação de requisitos
📚 Coursera Course ↗
Self-paced
Cloud Next Generation Firewall: avaliação de requisitos
Opens on Coursera ↗
Cybersecurity Policy for Water and Electricity Infrastructures
📚 Coursera Course ↗
Self-paced
Cybersecurity Policy for Water and Electricity Infrastructures
Opens on Coursera ↗
Ethical Hacking with Kali Linux: Analyze & Defend
📚 Coursera Course ↗
Self-paced
Ethical Hacking with Kali Linux: Analyze & Defend
Opens on Coursera ↗
Network Operations
📚 Coursera Course ↗
Self-paced
Network Operations
Opens on Coursera ↗