✕ Clear filters
6,399 lessons

🔐 Cybersecurity

Ethical hacking, penetration testing, network security, CTFs and defensive security

All ▶ YouTube 201,335📚 Coursera 18,225🎤 TED 1
I Took Over a Microsoft Cloud Account. Again.
Cybersecurity
I Took Over a Microsoft Cloud Account. Again.
John Hammond Intermediate 2y ago
DEFCon31 - AI CTF Solution Stream!
Cybersecurity
DEFCon31 - AI CTF Solution Stream!
Rob Mulla Beginner 2y ago
Thinking Outside the Firewall: Unconventional Cybersecurity Journeys | Host: Rich Greene
Cybersecurity
Thinking Outside the Firewall: Unconventional Cybersecurity Journeys | Host: Rich Greene
SANS Institute Intermediate 2y ago
Celebrating Cybersecurity Awareness Month with a little study session!
Cybersecurity
Celebrating Cybersecurity Awareness Month with a little study session!
Coursera Beginner 2y ago
SANS Network Security 2023 Recap: Cybersecurity, Night Talks, & Puppies!
Cybersecurity
SANS Network Security 2023 Recap: Cybersecurity, Night Talks, & Puppies!
SANS Institute Advanced 2y ago
ESG and Sustainable Financial Strategy Course
Cybersecurity
ESG and Sustainable Financial Strategy Course
Saïd Business School, University of Oxford Intermediate 2y ago
Top 4 Cybersecurity Things you better be doing! #shorts #cybersecurity #hacking
Cybersecurity
Top 4 Cybersecurity Things you better be doing! #shorts #cybersecurity #hacking
David Bombal Advanced 2y ago
Testing Your Cybersecurity Defenses
Cybersecurity
Testing Your Cybersecurity Defenses
John Hammond Intermediate 2y ago
Guarding LLM and NLP APIs: A Trailblazing Odyssey for Enhanced Security //Ads Dawson // Podcast #190
Cybersecurity
Guarding LLM and NLP APIs: A Trailblazing Odyssey for Enhanced Security //Ads Dawson // Podcast #190
MLOps.community Intermediate 2y ago
NoSQLi Tutorial Using PortSwigger (with labs)
Cybersecurity
NoSQLi Tutorial Using PortSwigger (with labs)
The Cyber Mentor Beginner 2y ago
Linux for Hackers Python pip, Git, Apt NEW Tools Install with OTW! (Episode 4)
Cybersecurity
Linux for Hackers Python pip, Git, Apt NEW Tools Install with OTW! (Episode 4)
David Bombal Beginner 2y ago
One Click, $9 Million In Student Debt Erased🎙Darknet Diaries Ep. 139: D3f4ult
Cybersecurity
One Click, $9 Million In Student Debt Erased🎙Darknet Diaries Ep. 139: D3f4ult
Jack Rhysider Intermediate 2y ago
The malware disguised as a Word document
Cybersecurity
The malware disguised as a Word document
Jack Rhysider Intermediate 2y ago
Master JSON in 8 Minutes
Cybersecurity
Master JSON in 8 Minutes
The Cyber Mentor Beginner 2y ago
HackTheBox - Broker
Cybersecurity
HackTheBox - Broker
IppSec Beginner 2y ago
How Can You Build Essential Cybersecurity Skills for Your Resume
Cybersecurity
How Can You Build Essential Cybersecurity Skills for Your Resume
Coursera Beginner 2y ago
HackTheBox - Topology
Cybersecurity
HackTheBox - Topology
IppSec Beginner 2y ago
EXACTLY How To Negotiate Your Salary? Watch and Learn | Full Disclosure
Cybersecurity
EXACTLY How To Negotiate Your Salary? Watch and Learn | Full Disclosure
Full Disclosure Beginner 2y ago
CISSP Mastery Unleashed | CISSP Training | Edureka Live
Cybersecurity
CISSP Mastery Unleashed | CISSP Training | Edureka Live
edureka! Beginner 2y ago
SANS Cyber Defense Initiative® 2023 in Washington, DC
Cybersecurity
SANS Cyber Defense Initiative® 2023 in Washington, DC
SANS Institute Advanced 2y ago
Kapil Assudani: Cloud, AI, and Reducing the Attack Surface
Cybersecurity
Kapil Assudani: Cloud, AI, and Reducing the Attack Surface
SANS Institute Advanced 2y ago
Top 3 Cybersecurity Threats in 2024? #shorts #cybersecurity #hacking
Cybersecurity
Top 3 Cybersecurity Threats in 2024? #shorts #cybersecurity #hacking
David Bombal Advanced 2y ago
Hacking with Bloodhound: Map Your Environment
Cybersecurity
Hacking with Bloodhound: Map Your Environment
John Hammond Intermediate 2y ago
Why Was Puerto Rico's Lottery Leaking Millions of Dollars a Month? 💸 Darknet Diaries Ep 101: Lotería
Cybersecurity
Why Was Puerto Rico's Lottery Leaking Millions of Dollars a Month? 💸 Darknet Diaries Ep 101: Lotería
Jack Rhysider Beginner 2y ago
What Can You Gain with Cybersecurity Certificates?
Cybersecurity
What Can You Gain with Cybersecurity Certificates?
Coursera Intermediate 2y ago
Cybersecurity Professional Certificate or Degree: Which is a Fit for You?
Cybersecurity
Cybersecurity Professional Certificate or Degree: Which is a Fit for You?
Coursera Beginner 2y ago
4 Entry-Level Cybersecurity Roles: What Do You Need to Know?
Cybersecurity
4 Entry-Level Cybersecurity Roles: What Do You Need to Know?
Coursera Beginner 2y ago
How Do Degrees and Certificates Help You in Your Cybersecurity Job Search?
Cybersecurity
How Do Degrees and Certificates Help You in Your Cybersecurity Job Search?
Coursera Beginner 2y ago
How Hackers Hide From Memory Scanners
Cybersecurity
How Hackers Hide From Memory Scanners
John Hammond Beginner 2y ago
Three Cloud Security Differentiators for Leaders
Cybersecurity
Three Cloud Security Differentiators for Leaders
SANS Institute Intermediate 2y ago
Weird Security Voyeurs Unite | Host: Ryan Chapman | Guest: Sherrod Degrippo
Cybersecurity
Weird Security Voyeurs Unite | Host: Ryan Chapman | Guest: Sherrod Degrippo
SANS Institute Intermediate 2y ago
they're selling WHAT on Telegram?!?
Cybersecurity
they're selling WHAT on Telegram?!?
John Hammond Intermediate 2y ago
Getting Started with CTF's
Cybersecurity
Getting Started with CTF's
The Cyber Mentor Beginner 2y ago
Mike Melo: The Case for DSPM vs. CSPM
Cybersecurity
Mike Melo: The Case for DSPM vs. CSPM
SANS Institute Advanced 2y ago
ChatGPT Learns the Rust Programming Language
Cybersecurity
ChatGPT Learns the Rust Programming Language
John Hammond Beginner 2y ago
The malware that hides in your Dropbox
Cybersecurity
The malware that hides in your Dropbox
Jack Rhysider Intermediate 2y ago
New Mobile Penetration Testing Certification
Cybersecurity
New Mobile Penetration Testing Certification
The Cyber Mentor Beginner 2y ago
Raspberry Pi 5 Kali Linux install in 10 minutes (with WiFi hacking)
Cybersecurity
Raspberry Pi 5 Kali Linux install in 10 minutes (with WiFi hacking)
David Bombal Beginner 2y ago
How Amat Cama hacked Samsung for 3 years straight
Cybersecurity
How Amat Cama hacked Samsung for 3 years straight
Jack Rhysider Intermediate 2y ago
I Stole a Microsoft 365 Account. Here's How.
Cybersecurity
I Stole a Microsoft 365 Account. Here's How.
John Hammond Intermediate 2y ago
Applying the Science of Human Behavior to Cybersecurity
Cybersecurity
Applying the Science of Human Behavior to Cybersecurity
SANS Institute Beginner 2y ago
Does an in-demand role in a high-growth field like cybersecurity sound exciting?
Cybersecurity
Does an in-demand role in a high-growth field like cybersecurity sound exciting?
Coursera Beginner 2y ago
macOS to Kali Linux to Windows 98? (back to the future copy and paste) #shorts #linux #windows
Cybersecurity
macOS to Kali Linux to Windows 98? (back to the future copy and paste) #shorts #linux #windows
David Bombal Intermediate 2y ago
this Cybersecurity Platform is FREE
Cybersecurity
this Cybersecurity Platform is FREE
John Hammond Intermediate 2y ago
Building a Winning Team Culture
Cybersecurity
Building a Winning Team Culture
The Cyber Mentor Beginner 2y ago
Hacking Websites: NodeJS Server-Side Template Injection
Cybersecurity
Hacking Websites: NodeJS Server-Side Template Injection
John Hammond Intermediate 2y ago
Jadee Hanson: Balancing CISO, CIO, and Product Leadership
Cybersecurity
Jadee Hanson: Balancing CISO, CIO, and Product Leadership
SANS Institute Intermediate 2y ago
The Russian cyberattack that crippled Ukraine
Cybersecurity
The Russian cyberattack that crippled Ukraine
Jack Rhysider Intermediate 2y ago
📚 Coursera Courses Opens on Coursera · Free to audit
1 / 3 View all →
Hands-on Hacking
📚 Coursera Course ↗
Self-paced
Hands-on Hacking
Opens on Coursera ↗
Network Traffic Analysis with Wireshark
📚 Coursera Course ↗
Self-paced
Network Traffic Analysis with Wireshark
Opens on Coursera ↗
Introduction to AWS Pentesting
📚 Coursera Course ↗
Self-paced
Introduction to AWS Pentesting
Opens on Coursera ↗
Certified Ethical Hacker (CEH): Unit 1
📚 Coursera Course ↗
Self-paced
Certified Ethical Hacker (CEH): Unit 1
Opens on Coursera ↗
Cybersecurity Job Search, Resume, and Interview Prep
📚 Coursera Course ↗
Self-paced
Cybersecurity Job Search, Resume, and Interview Prep
Opens on Coursera ↗
Communication and Network Security
📚 Coursera Course ↗
Self-paced
Communication and Network Security
Opens on Coursera ↗