Tech Skills

Cybersecurity

Ethical hacking, penetration testing, network security, CTFs and defensive security

2558
lessons
Python [sys] 05 Autoreset
🔐 Cybersecurity
Python [sys] 05 Autoreset
John Hammond Intermediate 13y ago
Python [sys] 08 Conclusion
🔐 Cybersecurity
Python [sys] 08 Conclusion
John Hammond Intermediate 13y ago
Python [sys] 07 Command-line Arguments
🔐 Cybersecurity
Python [sys] 07 Command-line Arguments
John Hammond Intermediate 13y ago
Python [sys] 06 Streams
🔐 Cybersecurity
Python [sys] 06 Streams
John Hammond Intermediate 13y ago
Python [sys] 05 Exit Codes
🔐 Cybersecurity
Python [sys] 05 Exit Codes
John Hammond Intermediate 13y ago
Python [sys] 04 Windows Version
🔐 Cybersecurity
Python [sys] 04 Windows Version
John Hammond Intermediate 13y ago
Python [sys] 03 Platform
🔐 Cybersecurity
Python [sys] 03 Platform
John Hammond Intermediate 13y ago
Python [sys] 02 Module Madness
🔐 Cybersecurity
Python [sys] 02 Module Madness
John Hammond Intermediate 13y ago
Python [sys] 01 Basic Information
🔐 Cybersecurity
Python [sys] 01 Basic Information
John Hammond Intermediate 13y ago
Batch 93 Ipconfig Command
🔐 Cybersecurity
Batch 93 Ipconfig Command
John Hammond Intermediate 13y ago
Batch 92 Nslookup Command
🔐 Cybersecurity
Batch 92 Nslookup Command
John Hammond Intermediate 13y ago
nullshell.com Forum!
🔐 Cybersecurity
nullshell.com Forum!
John Hammond Intermediate 13y ago
Batch 91 Custom Shell
🔐 Cybersecurity
Batch 91 Custom Shell
John Hammond Intermediate 13y ago
Batch 90 Array Reverse
🔐 Cybersecurity
Batch 90 Array Reverse
John Hammond Intermediate 13y ago
Batch 89 Array Remove
🔐 Cybersecurity
Batch 89 Array Remove
John Hammond Intermediate 13y ago
Batch 88 Array Insert
🔐 Cybersecurity
Batch 88 Array Insert
John Hammond Intermediate 13y ago
Batch 87 Array Index
🔐 Cybersecurity
Batch 87 Array Index
John Hammond Intermediate 13y ago
Batch 86 Array Count
🔐 Cybersecurity
Batch 86 Array Count
John Hammond Intermediate 13y ago
Batch 85 Array Append
🔐 Cybersecurity
Batch 85 Array Append
John Hammond Intermediate 13y ago
Batch 84 String Swapcase
🔐 Cybersecurity
Batch 84 String Swapcase
John Hammond Intermediate 13y ago
Batch 83 String to Upper
🔐 Cybersecurity
Batch 83 String to Upper
John Hammond Intermediate 13y ago
Batch 82 String to Lower
🔐 Cybersecurity
Batch 82 String to Lower
John Hammond Intermediate 13y ago
Batch 81 String Join
🔐 Cybersecurity
Batch 81 String Join
John Hammond Intermediate 13y ago
Batch 80 String is Upper
🔐 Cybersecurity
Batch 80 String is Upper
John Hammond Intermediate 13y ago
Batch 79 String is Full of Digits
🔐 Cybersecurity
Batch 79 String is Full of Digits
John Hammond Intermediate 13y ago
Batch 78 String is Lower
🔐 Cybersecurity
Batch 78 String is Lower
John Hammond Intermediate 13y ago
Batch 77 String is Alphabetical
🔐 Cybersecurity
Batch 77 String is Alphabetical
John Hammond Intermediate 13y ago
Batch 76 String Find
🔐 Cybersecurity
Batch 76 String Find
John Hammond Intermediate 13y ago
Batch 73 String Count
🔐 Cybersecurity
Batch 73 String Count
John Hammond Intermediate 13y ago
Batch 72 String Capitalize
🔐 Cybersecurity
Batch 72 String Capitalize
John Hammond Intermediate 13y ago
Batch 54 Colormsg Script
🔐 Cybersecurity
Batch 54 Colormsg Script
John Hammond Intermediate 13y ago
Batch 71 String Center
🔐 Cybersecurity
Batch 71 String Center
John Hammond Intermediate 13y ago
Batch 70 Sort Function
🔐 Cybersecurity
Batch 70 Sort Function
John Hammond Intermediate 13y ago
Batch 69 Sum Function
🔐 Cybersecurity
Batch 69 Sum Function
John Hammond Intermediate 13y ago
Batch 68 Range Function
🔐 Cybersecurity
Batch 68 Range Function
John Hammond Intermediate 13y ago
Batch 67 Absolute Value Function
🔐 Cybersecurity
Batch 67 Absolute Value Function
John Hammond Intermediate 13y ago
Batch 66 Power Function
🔐 Cybersecurity
Batch 66 Power Function
John Hammond Intermediate 13y ago
Batch 65 Maximum Function
🔐 Cybersecurity
Batch 65 Maximum Function
John Hammond Intermediate 13y ago
Batch 64 Minimum Function
🔐 Cybersecurity
Batch 64 Minimum Function
John Hammond Intermediate 13y ago
Batch 63 Testing Delayed Variable Expansion
🔐 Cybersecurity
Batch 63 Testing Delayed Variable Expansion
John Hammond Intermediate 13y ago
Batch 61 Building Arrays
🔐 Cybersecurity
Batch 61 Building Arrays
John Hammond Intermediate 13y ago
Batch 60 Modifying "Create String" Function
🔐 Cybersecurity
Batch 60 Modifying "Create String" Function
John Hammond Intermediate 13y ago
Batch 59 Continuing "Create String" Function
🔐 Cybersecurity
Batch 59 Continuing "Create String" Function
John Hammond Intermediate 13y ago
Batch 58 Building "Create String" Function
🔐 Cybersecurity
Batch 58 Building "Create String" Function
John Hammond Intermediate 13y ago
Batch 57 String Quotations
🔐 Cybersecurity
Batch 57 String Quotations
John Hammond Intermediate 13y ago
Batch 56 String Substitution
🔐 Cybersecurity
Batch 56 String Substitution
John Hammond Intermediate 13y ago
Batch 55 Substrings
🔐 Cybersecurity
Batch 55 Substrings
John Hammond Intermediate 13y ago
Batch 53 Changing the Prompt
🔐 Cybersecurity
Batch 53 Changing the Prompt
John Hammond Intermediate 13y ago
📚 Coursera Courses Opens on Coursera · Free to audit
1 / 3 View all →
AWS: Resilient Solutions and Security Controls
📚 Coursera Course ↗
Self-paced
AWS: Resilient Solutions and Security Controls
Opens on Coursera ↗
Incident Response Frameworks
📚 Coursera Course ↗
Self-paced
Incident Response Frameworks
Opens on Coursera ↗
Cybersecurity Awareness and Innovation
📚 Coursera Course ↗
Self-paced
Cybersecurity Awareness and Innovation
Opens on Coursera ↗
Practical Pentesting
📚 Coursera Course ↗
Self-paced
Practical Pentesting
Opens on Coursera ↗
Cisco Collaboration Edge Services
📚 Coursera Course ↗
Self-paced
Cisco Collaboration Edge Services
Opens on Coursera ↗
Orchestrate, Analyze, and Evaluate AI Deployments
📚 Coursera Course ↗
Self-paced
Orchestrate, Analyze, and Evaluate AI Deployments
Opens on Coursera ↗