Tech Skills

Cybersecurity

Ethical hacking, penetration testing, network security, CTFs and defensive security

2558
lessons
Batch 52 Command Prompt Properties
🔐 Cybersecurity
Batch 52 Command Prompt Properties
John Hammond Intermediate 13y ago
Batch 51 Console Color
🔐 Cybersecurity
Batch 51 Console Color
John Hammond Intermediate 13y ago
The Android Challenge
🔐 Cybersecurity
The Android Challenge
ColdFusion Intermediate 13y ago
Batch 50.5 Quick Output of File
🔐 Cybersecurity
Batch 50.5 Quick Output of File
John Hammond Intermediate 13y ago
Batch 50 Deleting Files
🔐 Cybersecurity
Batch 50 Deleting Files
John Hammond Intermediate 13y ago
Batch 48 Moving and Renaming
🔐 Cybersecurity
Batch 48 Moving and Renaming
John Hammond Intermediate 13y ago
Batch 47 Working with Folders
🔐 Cybersecurity
Batch 47 Working with Folders
John Hammond Intermediate 13y ago
Batch 46 Even More Redirection
🔐 Cybersecurity
Batch 46 Even More Redirection
John Hammond Intermediate 13y ago
Batch 45 Some More Redirection
🔐 Cybersecurity
Batch 45 Some More Redirection
John Hammond Intermediate 13y ago
Batch 44 More Redirection
🔐 Cybersecurity
Batch 44 More Redirection
John Hammond Intermediate 13y ago
Batch 42 Breakin' Outta the For Loop
🔐 Cybersecurity
Batch 42 Breakin' Outta the For Loop
John Hammond Intermediate 13y ago
Batch 41 For through String
🔐 Cybersecurity
Batch 41 For through String
John Hammond Intermediate 13y ago
Batch 40 For Command Output
🔐 Cybersecurity
Batch 40 For Command Output
John Hammond Intermediate 13y ago
Batch 39 For 'EOL' Option
🔐 Cybersecurity
Batch 39 For 'EOL' Option
John Hammond Intermediate 13y ago
Batch 38 For Options
🔐 Cybersecurity
Batch 38 For Options
John Hammond Intermediate 13y ago
Batch 37 For through File Content
🔐 Cybersecurity
Batch 37 For through File Content
John Hammond Intermediate 13y ago
Batch 36 For through Files
🔐 Cybersecurity
Batch 36 For through Files
John Hammond Intermediate 13y ago
Batch 35 For through Directories
🔐 Cybersecurity
Batch 35 For through Directories
John Hammond Intermediate 13y ago
Batch 34 For through Numbers
🔐 Cybersecurity
Batch 34 For through Numbers
John Hammond Intermediate 13y ago
Batch 33.5 The "Set"
🔐 Cybersecurity
Batch 33.5 The "Set"
John Hammond Intermediate 13y ago
Batch 32 "While Loop"
🔐 Cybersecurity
Batch 32 "While Loop"
John Hammond Intermediate 13y ago
Batch 31 Delayed Variable Expansion
🔐 Cybersecurity
Batch 31 Delayed Variable Expansion
John Hammond Intermediate 13y ago
Batch 30 Nesting
🔐 Cybersecurity
Batch 30 Nesting
John Hammond Intermediate 13y ago
Batch 29 Else Statement
🔐 Cybersecurity
Batch 29 Else Statement
John Hammond Intermediate 13y ago
Batch 28 Comparison Operators
🔐 Cybersecurity
Batch 28 Comparison Operators
John Hammond Intermediate 13y ago
Batch 27 If Statement
🔐 Cybersecurity
Batch 27 If Statement
John Hammond Intermediate 13y ago
Batch 26 Returning Passed in Variables
🔐 Cybersecurity
Batch 26 Returning Passed in Variables
John Hammond Intermediate 13y ago
Batch 25 "Return" in Local Functions
🔐 Cybersecurity
Batch 25 "Return" in Local Functions
John Hammond Intermediate 13y ago
Batch 24 Script Local Scope
🔐 Cybersecurity
Batch 24 Script Local Scope
John Hammond Intermediate 13y ago
Batch 23 Function Local Scope
🔐 Cybersecurity
Batch 23 Function Local Scope
John Hammond Intermediate 13y ago
Batch 22 Function "Return"
🔐 Cybersecurity
Batch 22 Function "Return"
John Hammond Intermediate 13y ago
Batch 21 Function Arguments
🔐 Cybersecurity
Batch 21 Function Arguments
John Hammond Intermediate 13y ago
Batch 20 Basic Functions
🔐 Cybersecurity
Batch 20 Basic Functions
John Hammond Intermediate 13y ago
Batch 19 Comments
🔐 Cybersecurity
Batch 19 Comments
John Hammond Intermediate 13y ago
Batch 18 Goto
🔐 Cybersecurity
Batch 18 Goto
John Hammond Intermediate 13y ago
Batch 17 Labels
🔐 Cybersecurity
Batch 17 Labels
John Hammond Intermediate 13y ago
Batch 16 Input
🔐 Cybersecurity
Batch 16 Input
John Hammond Intermediate 13y ago
Batch 15 Modulus Operator [whoops]
🔐 Cybersecurity
Batch 15 Modulus Operator [whoops]
John Hammond Intermediate 13y ago
Batch 14 Mathematical Expressions
🔐 Cybersecurity
Batch 14 Mathematical Expressions
John Hammond Intermediate 13y ago
Batch 13 "Escape Characters"
🔐 Cybersecurity
Batch 13 "Escape Characters"
John Hammond Intermediate 13y ago
Batch 12 Echo Off
🔐 Cybersecurity
Batch 12 Echo Off
John Hammond Intermediate 13y ago
Batch 11 The @ Symbol
🔐 Cybersecurity
Batch 11 The @ Symbol
John Hammond Intermediate 13y ago
Batch 10 Parameter Help
🔐 Cybersecurity
Batch 10 Parameter Help
John Hammond Intermediate 13y ago
Batch 09 Command Arguments
🔐 Cybersecurity
Batch 09 Command Arguments
John Hammond Intermediate 13y ago
Batch 00 The Windows Command-Line
🔐 Cybersecurity
Batch 00 The Windows Command-Line
John Hammond Intermediate 13y ago
Batch 01 Commands
🔐 Cybersecurity
Batch 01 Commands
John Hammond Intermediate 13y ago
Batch 02 Data Types
🔐 Cybersecurity
Batch 02 Data Types
John Hammond Intermediate 13y ago
Batch 03 Variables
🔐 Cybersecurity
Batch 03 Variables
John Hammond Intermediate 13y ago
📚 Coursera Courses Opens on Coursera · Free to audit
1 / 3 View all →
Microsoft Azure Management Tools and Security Solutions
📚 Coursera Course ↗
Self-paced
Microsoft Azure Management Tools and Security Solutions
Opens on Coursera ↗
What Is Cybersecurity?
📚 Coursera Course ↗
Self-paced
What Is Cybersecurity?
Opens on Coursera ↗
Defense in Depth Cybersecurity – Layered Security Strategy
📚 Coursera Course ↗
Self-paced
Defense in Depth Cybersecurity – Layered Security Strategy
Opens on Coursera ↗
Wireshark 101: Packet Analysis Essentials
📚 Coursera Course ↗
Self-paced
Wireshark 101: Packet Analysis Essentials
Opens on Coursera ↗
Cyber Risk Management Strategies
📚 Coursera Course ↗
Self-paced
Cyber Risk Management Strategies
Opens on Coursera ↗
Introduction to the Threat Intelligence Lifecycle
📚 Coursera Course ↗
Self-paced
Introduction to the Threat Intelligence Lifecycle
Opens on Coursera ↗