Tech Skills

Cybersecurity

Ethical hacking, penetration testing, network security, CTFs and defensive security

2831
videos
Google Dorking (Hacking) Part 2: Find HIDDEN Files on Google
๐Ÿ” Cybersecurity
Google Dorking (Hacking) Part 2: Find HIDDEN Files on Google
David Bombal Beginner 2mo ago
"I made an Evil MCP server" (and AI fell for it)
๐Ÿ” Cybersecurity
"I made an Evil MCP server" (and AI fell for it)
John Hammond Beginner 2mo ago
Will LLMs Always Hallucinate?
๐Ÿ” Cybersecurity
Will LLMs Always Hallucinate?
The Cyber Mentor Beginner 2mo ago
Top 13 Hacking Tools for 2026 (ft. OTW)
๐Ÿ” Cybersecurity
Top 13 Hacking Tools for 2026 (ft. OTW)
David Bombal Beginner 2mo ago
How Iโ€™m Approaching Cybersecurity Goals in 2026
๐Ÿ” Cybersecurity
How Iโ€™m Approaching Cybersecurity Goals in 2026
The Cyber Mentor Beginner 2mo ago
Certifications vs. Raw Skills: Which is Better?
๐Ÿ” Cybersecurity
Certifications vs. Raw Skills: Which is Better?
The Cyber Mentor Beginner 2mo ago
Why cybersecurity basics are important for everyone to know - not just devs.
๐Ÿ” Cybersecurity
Why cybersecurity basics are important for everyone to know - not just devs.
freeCodeCamp.org Beginner 2mo ago
HackTheBox - Previous
๐Ÿ” Cybersecurity
HackTheBox - Previous
IppSec Beginner 2mo ago
With Network Forensics, Sometimes You Just Get Lucky...
๐Ÿ” Cybersecurity
With Network Forensics, Sometimes You Just Get Lucky...
The Cyber Mentor Beginner 2mo ago
LIVE: ๐Ÿ•ต๏ธ New Year New Me | Sherlocks | Cybersecurity
๐Ÿ” Cybersecurity
LIVE: ๐Ÿ•ต๏ธ New Year New Me | Sherlocks | Cybersecurity
The Cyber Mentor Beginner 2mo ago
A Cybersecurity Interview Gone Wrong
๐Ÿ” Cybersecurity
A Cybersecurity Interview Gone Wrong
The Cyber Mentor Beginner 2mo ago
2026 Cybersecurity Roadmap with a Master Hacker
๐Ÿ” Cybersecurity
2026 Cybersecurity Roadmap with a Master Hacker
David Bombal Beginner 2mo ago
What to Expect From the 2026 Cybersecurity Job Market
๐Ÿ” Cybersecurity
What to Expect From the 2026 Cybersecurity Job Market
The Cyber Mentor Beginner 2mo ago
Heath's Last Stream
๐Ÿ” Cybersecurity
Heath's Last Stream
The Cyber Mentor Beginner 2mo ago
Gen AI and ML Full course in 11 Hours [ 2026 | Gen Ai and Ml for beginner | Edureka Live
๐Ÿ” Cybersecurity
Gen AI and ML Full course in 11 Hours [ 2026 | Gen Ai and Ml for beginner | Edureka Live
edureka! Beginner 2mo ago
Going From Blue Team to Red Team
๐Ÿ” Cybersecurity
Going From Blue Team to Red Team
The Cyber Mentor Beginner 3mo ago
Where to Find Cybersecurity News
๐Ÿ” Cybersecurity
Where to Find Cybersecurity News
The Cyber Mentor Beginner 3mo ago
Will Secrets Be Impossible in the Future? ๐Ÿ”’ Jensen Huang on Quantum Computing #nextgenai #nvidia
๐Ÿ” Cybersecurity
Will Secrets Be Impossible in the Future? ๐Ÿ”’ Jensen Huang on Quantum Computing #nextgenai #nvidia
AI Beyond Infinity Beginner 3mo ago
How Hackers Steal Your JWT Tokens | 4 Real Attack Scenarios + AI-Enhanced Techniques
๐Ÿ” Cybersecurity
How Hackers Steal Your JWT Tokens | 4 Real Attack Scenarios + AI-Enhanced Techniques
The Gradient Path Beginner 3mo ago
How a chatbot can get hijacked
๐Ÿ” Cybersecurity
How a chatbot can get hijacked
Lenny's Podcast Beginner 3mo ago
Catching "99% of attacks" isn't enough
๐Ÿ” Cybersecurity
Catching "99% of attacks" isn't enough
Lenny's Podcast Beginner 3mo ago
When It's an Engineer's Turn to do Elf on the Shelf ๐ŸŽ…
๐Ÿ” Cybersecurity
When It's an Engineer's Turn to do Elf on the Shelf ๐ŸŽ…
The Cyber Mentor Beginner 3mo ago
Default to Deny: Why Network Security Is Shifting to "Zero Trust" โ›” Ep. 167 ThreatLocker
๐Ÿ” Cybersecurity
Default to Deny: Why Network Security Is Shifting to "Zero Trust" โ›” Ep. 167 ThreatLocker
Jack Rhysider Beginner 3mo ago
The two ways people trick AI
๐Ÿ” Cybersecurity
The two ways people trick AI
Lenny's Podcast Beginner 3mo ago