Tech Skills

Cybersecurity

Ethical hacking, penetration testing, network security, CTFs and defensive security

2558
lessons
Python [gtk] 07 Box Functionality
🔐 Cybersecurity
Python [gtk] 07 Box Functionality
John Hammond Intermediate 12y ago
Python [re] 08 The Question Mark
🔐 Cybersecurity
Python [re] 08 The Question Mark
John Hammond Intermediate 12y ago
Cross Site Request Forgery - Computerphile
🔐 Cybersecurity
Cross Site Request Forgery - Computerphile
Computerphile Intermediate 12y ago
Hacking Websites with SQL Injection - Computerphile
🔐 Cybersecurity
Hacking Websites with SQL Injection - Computerphile
Computerphile Intermediate 12y ago
Atheism 2.0 - Alain de Botton
🔐 Cybersecurity
Atheism 2.0 - Alain de Botton
TED-Ed Intermediate 12y ago
Python [re] 07 Backslashed Special Characters
🔐 Cybersecurity
Python [re] 07 Backslashed Special Characters
John Hammond Intermediate 12y ago
Python [re] 06 Multiple Occurences
🔐 Cybersecurity
Python [re] 06 Multiple Occurences
John Hammond Intermediate 12y ago
Python Challenge! 04 Follow the Chain
🔐 Cybersecurity
Python Challenge! 04 Follow the Chain
John Hammond Intermediate 12y ago
Python [re] 05 Findall
🔐 Cybersecurity
Python [re] 05 Findall
John Hammond Intermediate 12y ago
Python Challenge! 03 Big Bodyguards
🔐 Cybersecurity
Python Challenge! 03 Big Bodyguards
John Hammond Intermediate 12y ago
Python [re] 04 ^, $, & Multiline
🔐 Cybersecurity
Python [re] 04 ^, $, & Multiline
John Hammond Intermediate 12y ago
Python [re] 03 Flags
🔐 Cybersecurity
Python [re] 03 Flags
John Hammond Intermediate 12y ago
Python [re] 02 Adding to the Environment
🔐 Cybersecurity
Python [re] 02 Adding to the Environment
John Hammond Intermediate 12y ago
Python [re] 01 Building a Testing Environment
🔐 Cybersecurity
Python [re] 01 Building a Testing Environment
John Hammond Intermediate 12y ago
Merry Christmas! Videos in the next two weeks!
🔐 Cybersecurity
Merry Christmas! Videos in the next two weeks!
John Hammond Intermediate 12y ago
Python [threading] 08 Locks
🔐 Cybersecurity
Python [threading] 08 Locks
John Hammond Intermediate 12y ago
Python [threading] 07 Daemon Threads
🔐 Cybersecurity
Python [threading] 07 Daemon Threads
John Hammond Intermediate 12y ago
Python [threading] 07 Blooper!
🔐 Cybersecurity
Python [threading] 07 Blooper!
John Hammond Intermediate 12y ago
Python [threading] 06 Thread Identification Number
🔐 Cybersecurity
Python [threading] 06 Thread Identification Number
John Hammond Intermediate 12y ago
Python [threading] 05 Thread Join
🔐 Cybersecurity
Python [threading] 05 Thread Join
John Hammond Intermediate 12y ago
Python [threading] 04 Thread is_alive() and Name
🔐 Cybersecurity
Python [threading] 04 Thread is_alive() and Name
John Hammond Intermediate 12y ago
Python [threading] 03 Terminating a Thread
🔐 Cybersecurity
Python [threading] 03 Terminating a Thread
John Hammond Intermediate 12y ago
Python [threading] 02 Creating Our Own Thread Object
🔐 Cybersecurity
Python [threading] 02 Creating Our Own Thread Object
John Hammond Intermediate 12y ago
Python [threading] 01 ActiveCount, Enumerate, & CurrentThread
🔐 Cybersecurity
Python [threading] 01 ActiveCount, Enumerate, & CurrentThread
John Hammond Intermediate 12y ago
Virtual Machines Power the Cloud - Computerphile
🔐 Cybersecurity
Virtual Machines Power the Cloud - Computerphile
Computerphile Intermediate 12y ago
Python Challenge! 02 MAYBE in the source!
🔐 Cybersecurity
Python Challenge! 02 MAYBE in the source!
John Hammond Intermediate 12y ago
Python [PIL Image] 15 Rotate
🔐 Cybersecurity
Python [PIL Image] 15 Rotate
John Hammond Intermediate 12y ago
Python Challenge! 01 The First Challenge
🔐 Cybersecurity
Python Challenge! 01 The First Challenge
John Hammond Intermediate 12y ago
Python [PIL Image] 14 The Resize Function
🔐 Cybersecurity
Python [PIL Image] 14 The Resize Function
John Hammond Intermediate 12y ago
Python [PIL Image] 13 Thumbnail
🔐 Cybersecurity
Python [PIL Image] 13 Thumbnail
John Hammond Intermediate 12y ago
Python [PIL Image] 12 The Paste Function
🔐 Cybersecurity
Python [PIL Image] 12 The Paste Function
John Hammond Intermediate 12y ago
Python [PIL Image] 11 GetData
🔐 Cybersecurity
Python [PIL Image] 11 GetData
John Hammond Intermediate 12y ago
Python [PIL Image] 10 GetPixel
🔐 Cybersecurity
Python [PIL Image] 10 GetPixel
John Hammond Intermediate 12y ago
Python [PIL Image] 09 GetColors
🔐 Cybersecurity
Python [PIL Image] 09 GetColors
John Hammond Intermediate 12y ago
Python [PIL Image] 08 Image Size
🔐 Cybersecurity
Python [PIL Image] 08 Image Size
John Hammond Intermediate 12y ago
Python [PIL Image] 07 Filter
🔐 Cybersecurity
Python [PIL Image] 07 Filter
John Hammond Intermediate 12y ago
Python [PIL Image] 06 Crop
🔐 Cybersecurity
Python [PIL Image] 06 Crop
John Hammond Intermediate 12y ago
Python [PIL Image] 05 The convert() Function
🔐 Cybersecurity
Python [PIL Image] 05 The convert() Function
John Hammond Intermediate 12y ago
Python [PIL Image] 04 Composite
🔐 Cybersecurity
Python [PIL Image] 04 Composite
John Hammond Intermediate 12y ago
Python [PIL Image] 03 The Blend Function
🔐 Cybersecurity
Python [PIL Image] 03 The Blend Function
John Hammond Intermediate 12y ago
Python [PIL Image] 02 Image Open
🔐 Cybersecurity
Python [PIL Image] 02 Image Open
John Hammond Intermediate 12y ago
Python [gtk] 06 Boxes
🔐 Cybersecurity
Python [gtk] 06 Boxes
John Hammond Intermediate 12y ago
Python [zipfile] 06 Extracting with a Password
🔐 Cybersecurity
Python [zipfile] 06 Extracting with a Password
John Hammond Intermediate 12y ago
Python [zipfile] 05 ZipInfo Objects
🔐 Cybersecurity
Python [zipfile] 05 ZipInfo Objects
John Hammond Intermediate 12y ago
Python [zipfile] 04 is_zipfile()
🔐 Cybersecurity
Python [zipfile] 04 is_zipfile()
John Hammond Intermediate 12y ago
Python [zipfile] 03 Extracting Babies
🔐 Cybersecurity
Python [zipfile] 03 Extracting Babies
John Hammond Intermediate 12y ago
Python [zipfile] 02 Adding Files to the Archive
🔐 Cybersecurity
Python [zipfile] 02 Adding Files to the Archive
John Hammond Intermediate 12y ago
Python [gtk] 05 The Fixed Object
🔐 Cybersecurity
Python [gtk] 05 The Fixed Object
John Hammond Intermediate 12y ago
📚 Coursera Courses Opens on Coursera · Free to audit
1 / 3 View all →
Digital Identity & Security – Introduction to PKI
📚 Coursera Course ↗
Self-paced
Digital Identity & Security – Introduction to PKI
Opens on Coursera ↗
IT-Sicherheit: Grundlagen für Sicherheitsarchitektur
📚 Coursera Course ↗
Self-paced
IT-Sicherheit: Grundlagen für Sicherheitsarchitektur
Opens on Coursera ↗
Introduction to Contemporary Operating Systems and Hardware 1b
📚 Coursera Course ↗
Self-paced
Introduction to Contemporary Operating Systems and Hardware 1b
Opens on Coursera ↗
Data Visualization & Advanced App Logic
📚 Coursera Course ↗
Self-paced
Data Visualization & Advanced App Logic
Opens on Coursera ↗
Protection of Information Assets
📚 Coursera Course ↗
Self-paced
Protection of Information Assets
Opens on Coursera ↗
Web Hacking Expert - Full-Stack Exploitation Mastery
📚 Coursera Course ↗
Self-paced
Web Hacking Expert - Full-Stack Exploitation Mastery
Opens on Coursera ↗