✕ Clear filters
6,399 lessons

🔐 Cybersecurity

Ethical hacking, penetration testing, network security, CTFs and defensive security

All ▶ YouTube 201,406📚 Coursera 18,233🎤 TED 1
3 Year Cybersecurity Career Roadmap
Cybersecurity
3 Year Cybersecurity Career Roadmap
HackerSploit Beginner 3y ago
Find and Exploit NoSQL Injection
Cybersecurity
Find and Exploit NoSQL Injection
The Cyber Mentor Beginner 3y ago
HackTheBox - Ambassador
Cybersecurity
HackTheBox - Ambassador
IppSec Beginner 3y ago
Warflying! Hack WiFi from the Sky
Cybersecurity
Warflying! Hack WiFi from the Sky
The Cyber Mentor Beginner 3y ago
【MINECRAFT】 KIRIN MUST BUILD
Cybersecurity
【MINECRAFT】 KIRIN MUST BUILD
Ceres Fauna Ch. hololive-EN Beginner 3y ago
This Hacker Makes $160K a Day ⁠— After He Got Out of Federal Prison🎙Darknet Diaries Ep. 60: dawgyg
Cybersecurity
This Hacker Makes $160K a Day ⁠— After He Got Out of Federal Prison🎙Darknet Diaries Ep. 60: dawgyg
Jack Rhysider Intermediate 3y ago
【MINECRAFT】 *kirin joins your new minecraft server*
Cybersecurity
【MINECRAFT】 *kirin joins your new minecraft server*
Ceres Fauna Ch. hololive-EN Beginner 3y ago
Characteristics of successful CISO
Cybersecurity
Characteristics of successful CISO
SANS Institute Beginner 3y ago
WiFi Hacking Linux Phone? #shorts
Cybersecurity
WiFi Hacking Linux Phone? #shorts
David Bombal Intermediate 3y ago
They Had Permission to Break In, So Why Are They In Jail?🎙Darknet Diaries Ep. 59: The Courthouse
Cybersecurity
They Had Permission to Break In, So Why Are They In Jail?🎙Darknet Diaries Ep. 59: The Courthouse
Jack Rhysider Intermediate 3y ago
She hacked a billionaire, a bank and you could be next. Do this now to protect yourself!
Cybersecurity
She hacked a billionaire, a bank and you could be next. Do this now to protect yourself!
David Bombal Beginner 3y ago
HackTheBox - Shoppy
Cybersecurity
HackTheBox - Shoppy
IppSec Beginner 3y ago
The Secret to Being the One Warrior Amongst a Hundred | David Goggins | #Shorts
Cybersecurity
The Secret to Being the One Warrior Amongst a Hundred | David Goggins | #Shorts
Evan Carmichael Intermediate 3y ago
Linux Red Team Defense Evasion Techniques - Hiding Linux Processes
Cybersecurity
Linux Red Team Defense Evasion Techniques - Hiding Linux Processes
HackerSploit Beginner 3y ago
the hacker’s roadmap (how to get started in IT in 2023)
Cybersecurity
the hacker’s roadmap (how to get started in IT in 2023)
NetworkChuck Beginner 3y ago
Biggest Takeaway from Expert Interviews in 2022 for @datascienceharp
Cybersecurity
Biggest Takeaway from Expert Interviews in 2022 for @datascienceharp
AssemblyAI Beginner 3y ago
Betül Kaçar: Origin of Life, Ancient DNA, Panspermia, and Aliens | Lex Fridman Podcast #350
Cybersecurity
Betül Kaçar: Origin of Life, Ancient DNA, Panspermia, and Aliens | Lex Fridman Podcast #350
Lex Fridman Beginner 3y ago
Get paid to hack? Sign me up. 💻
Cybersecurity
Get paid to hack? Sign me up. 💻
Coursera Beginner 3y ago
Broken Object Level Authorization (BOLA) Explained
Cybersecurity
Broken Object Level Authorization (BOLA) Explained
The Cyber Mentor Beginner 3y ago
TCMS Exam Platform Preview
Cybersecurity
TCMS Exam Platform Preview
The Cyber Mentor Beginner 3y ago
【Pokémon Violet】 This is my daughter and she will beat you up | #7
Cybersecurity
【Pokémon Violet】 This is my daughter and she will beat you up | #7
Ceres Fauna Ch. hololive-EN Beginner 3y ago
Find and Exploit Server-Side Request Forgery (SSRF)
Cybersecurity
Find and Exploit Server-Side Request Forgery (SSRF)
The Cyber Mentor Beginner 3y ago
PNPT Giveaway
Cybersecurity
PNPT Giveaway
The Cyber Mentor Beginner 3y ago
【Penumbra Overture】 Kirin Plays Classic Horror Game By Herself and Regrets Her Decisions
Cybersecurity
【Penumbra Overture】 Kirin Plays Classic Horror Game By Herself and Regrets Her Decisions
Ceres Fauna Ch. hololive-EN Beginner 3y ago
【Cities: Skylines】 Building The City of Your Nightmares
Cybersecurity
【Cities: Skylines】 Building The City of Your Nightmares
Ceres Fauna Ch. hololive-EN Beginner 3y ago
Wireless Passwords are Stored in Cleartext #shorts #cybersecurity #hacker
Cybersecurity
Wireless Passwords are Stored in Cleartext #shorts #cybersecurity #hacker
The Cyber Mentor Beginner 3y ago
How to Be An Ethical Hacker: 2023 Edition
Cybersecurity
How to Be An Ethical Hacker: 2023 Edition
The Cyber Mentor Beginner 3y ago
【Pokémon Violet】 Ara ara, who do we have here? | #6
Cybersecurity
【Pokémon Violet】 Ara ara, who do we have here? | #6
Ceres Fauna Ch. hololive-EN Beginner 3y ago
Should Help Desk be Your First IT Job?
Cybersecurity
Should Help Desk be Your First IT Job?
The Cyber Mentor Beginner 3y ago
Scary Websites I Found on the Internet, part 1 #tech #technology #cyber #cybersecurity #techcareer
Cybersecurity
Scary Websites I Found on the Internet, part 1 #tech #technology #cyber #cybersecurity #techcareer
The Cyber Mentor Beginner 3y ago
Prototype Pollution in 60 Seconds #shorts #cybersecurity #hacker
Cybersecurity
Prototype Pollution in 60 Seconds #shorts #cybersecurity #hacker
The Cyber Mentor Beginner 3y ago
【Slice & Dice】 Is hard mode impossible?
Cybersecurity
【Slice & Dice】 Is hard mode impossible?
Ceres Fauna Ch. hololive-EN Beginner 3y ago
Top 3 Burp Suite Plugins for a More Collaborative Workflow
Cybersecurity
Top 3 Burp Suite Plugins for a More Collaborative Workflow
The Cyber Mentor Beginner 3y ago
【supa catchup】 jetlagged deer chats and reads superchats 🤓
Cybersecurity
【supa catchup】 jetlagged deer chats and reads superchats 🤓
Ceres Fauna Ch. hololive-EN Beginner 3y ago
【JUMP KING】 Remember Fauna? This is her now. Feel old yet?
Cybersecurity
【JUMP KING】 Remember Fauna? This is her now. Feel old yet?
Ceres Fauna Ch. hololive-EN Beginner 3y ago
The Mistake That Brought Down a Darknet Drug Lord🎙Darknet Diaries Ep. 58: OxyMonster
Cybersecurity
The Mistake That Brought Down a Darknet Drug Lord🎙Darknet Diaries Ep. 58: OxyMonster
Jack Rhysider Intermediate 3y ago
Stop making these mistakes on your resume and interview
Cybersecurity
Stop making these mistakes on your resume and interview
David Bombal Beginner 3y ago
HackTheBox - Health
Cybersecurity
HackTheBox - Health
IppSec Beginner 3y ago
Linux Red Team Persistence Techniques - SSH Keys, Web Shells & Cron Jobs
Cybersecurity
Linux Red Team Persistence Techniques - SSH Keys, Web Shells & Cron Jobs
HackerSploit Beginner 3y ago
【Nintendo Switch Sports OFF COLLAB】 KIRIN LOVES SPORTS (AND OWL AND RAT)
Cybersecurity
【Nintendo Switch Sports OFF COLLAB】 KIRIN LOVES SPORTS (AND OWL AND RAT)
Ceres Fauna Ch. hololive-EN Beginner 3y ago
2023 Roadmap to Master Hacker
Cybersecurity
2023 Roadmap to Master Hacker
David Bombal Beginner 3y ago
ChatGPT For Cybersecurity
Cybersecurity
ChatGPT For Cybersecurity
HackerSploit Beginner 3y ago
Linux Red Team Privilege Escalation Techniques - Kernel Exploits & SUDO Permissions
Cybersecurity
Linux Red Team Privilege Escalation Techniques - Kernel Exploits & SUDO Permissions
HackerSploit Beginner 3y ago
How Bitcoin Tracers Rescued 23 Kids From Sex Abuse🎙Darknet Diaries Ep. 131: Welcome to Video
Cybersecurity
How Bitcoin Tracers Rescued 23 Kids From Sex Abuse🎙Darknet Diaries Ep. 131: Welcome to Video
Jack Rhysider Intermediate 3y ago
He Was Flirting in an AOL Chatroom When the FBI Showed Up🎙Darknet Diaries Ep. 56: Jordan
Cybersecurity
He Was Flirting in an AOL Chatroom When the FBI Showed Up🎙Darknet Diaries Ep. 56: Jordan
Jack Rhysider Intermediate 3y ago
LastPass Data Breach - Password Security 101
Cybersecurity
LastPass Data Breach - Password Security 101
HackerSploit Beginner 3y ago
Windows Red Team Lateral Movement Techniques - PsExec & RDP
Cybersecurity
Windows Red Team Lateral Movement Techniques - PsExec & RDP
HackerSploit Beginner 3y ago
Windows Red Team Privilege Escalation Techniques - Bypassing UAC & Kernel Exploits
Cybersecurity
Windows Red Team Privilege Escalation Techniques - Bypassing UAC & Kernel Exploits
HackerSploit Beginner 3y ago
📚 Coursera Courses Opens on Coursera · Free to audit
1 / 3 View all →
Cloud Security Basics
📚 Coursera Course ↗
Self-paced
Cloud Security Basics
Opens on Coursera ↗
Fortify Confluence Security
📚 Coursera Course ↗
Self-paced
Fortify Confluence Security
Opens on Coursera ↗
Advanced Prometheus Alerting and Monitoring
📚 Coursera Course ↗
Self-paced
Advanced Prometheus Alerting and Monitoring
Opens on Coursera ↗
 IT Security: Defense against the digital dark arts
📚 Coursera Course ↗
Self-paced
IT Security: Defense against the digital dark arts
Opens on Coursera ↗
Introduction to Python for Cybersecurity
📚 Coursera Course ↗
Self-paced
Introduction to Python for Cybersecurity
Opens on Coursera ↗
Cybersecurity and Its Ten Domains
📚 Coursera Course ↗
Self-paced
Cybersecurity and Its Ten Domains
Opens on Coursera ↗