Tech Skills

Cybersecurity

Ethical hacking, penetration testing, network security, CTFs and defensive security

2558
lessons
Python 31 Multiple Inheritance
🔐 Cybersecurity
Python 31 Multiple Inheritance
John Hammond Intermediate 14y ago
Python 30 Inheritance
🔐 Cybersecurity
Python 30 Inheritance
John Hammond Intermediate 14y ago
Python 29 Constructor Parameters
🔐 Cybersecurity
Python 29 Constructor Parameters
John Hammond Intermediate 14y ago
Python 28 Constructors and Deconstructors
🔐 Cybersecurity
Python 28 Constructors and Deconstructors
John Hammond Intermediate 14y ago
Python 27 Classes and Self
🔐 Cybersecurity
Python 27 Classes and Self
John Hammond Intermediate 14y ago
Python 26 Object Oriented Programming
🔐 Cybersecurity
Python 26 Object Oriented Programming
John Hammond Intermediate 14y ago
Python 25 Dictionaries
🔐 Cybersecurity
Python 25 Dictionaries
John Hammond Intermediate 14y ago
Python 24 Slicing Lists, Strings, and Tuples
🔐 Cybersecurity
Python 24 Slicing Lists, Strings, and Tuples
John Hammond Intermediate 14y ago
Python 23 List Assignment and Tuples
🔐 Cybersecurity
Python 23 List Assignment and Tuples
John Hammond Intermediate 14y ago
Python 01 Experimenting with IDLE
🔐 Cybersecurity
Python 01 Experimenting with IDLE
John Hammond Intermediate 14y ago
Python 22 Lists
🔐 Cybersecurity
Python 22 Lists
John Hammond Intermediate 14y ago
Python 21 Break and Continue
🔐 Cybersecurity
Python 21 Break and Continue
John Hammond Intermediate 14y ago
Python 20 For Loops
🔐 Cybersecurity
Python 20 For Loops
John Hammond Intermediate 14y ago
Python 19 While Loop
🔐 Cybersecurity
Python 19 While Loop
John Hammond Intermediate 14y ago
Python 18 Logical Operators
🔐 Cybersecurity
Python 18 Logical Operators
John Hammond Intermediate 14y ago
Python 17 Nesting
🔐 Cybersecurity
Python 17 Nesting
John Hammond Intermediate 14y ago
Python 16 Else and Elif
🔐 Cybersecurity
Python 16 Else and Elif
John Hammond Intermediate 14y ago
Python 15 Testing Operators
🔐 Cybersecurity
Python 15 Testing Operators
John Hammond Intermediate 14y ago
Python 14 If Statement
🔐 Cybersecurity
Python 14 If Statement
John Hammond Intermediate 14y ago
Python 13 Function Return
🔐 Cybersecurity
Python 13 Function Return
John Hammond Intermediate 14y ago
Python 12 Default Parameters
🔐 Cybersecurity
Python 12 Default Parameters
John Hammond Intermediate 14y ago
Python 11 Function Parameters
🔐 Cybersecurity
Python 11 Function Parameters
John Hammond Intermediate 14y ago
Python 10 Functions Scope
🔐 Cybersecurity
Python 10 Functions Scope
John Hammond Intermediate 14y ago
Python 09 Basic Functions
🔐 Cybersecurity
Python 09 Basic Functions
John Hammond Intermediate 14y ago
Python 08 Programming Style and Comments
🔐 Cybersecurity
Python 08 Programming Style and Comments
John Hammond Intermediate 14y ago
Python 07 Input and Output
🔐 Cybersecurity
Python 07 Input and Output
John Hammond Intermediate 14y ago
Python 06 Running Scripts
🔐 Cybersecurity
Python 06 Running Scripts
John Hammond Intermediate 14y ago
Python 05 Variables
🔐 Cybersecurity
Python 05 Variables
John Hammond Intermediate 14y ago
Python 04 Working With Strings
🔐 Cybersecurity
Python 04 Working With Strings
John Hammond Intermediate 14y ago
Python 03 Operating on Data
🔐 Cybersecurity
Python 03 Operating on Data
John Hammond Intermediate 14y ago
Python 02 Data Types
🔐 Cybersecurity
Python 02 Data Types
John Hammond Intermediate 14y ago
Python 75 List Reverse
🔐 Cybersecurity
Python 75 List Reverse
John Hammond Intermediate 14y ago
Sure has been a while!
🔐 Cybersecurity
Sure has been a while!
John Hammond Intermediate 14y ago
Fix dates with PHP?
🔐 Cybersecurity
Fix dates with PHP?
John Hammond Intermediate 14y ago
2012, Baby!
🔐 Cybersecurity
2012, Baby!
John Hammond Intermediate 14y ago
GM Shell, and Notes!
🔐 Cybersecurity
GM Shell, and Notes!
John Hammond Intermediate 14y ago
Christmas, Vacation and Python!
🔐 Cybersecurity
Christmas, Vacation and Python!
John Hammond Intermediate 14y ago
It's almost Christmas!
🔐 Cybersecurity
It's almost Christmas!
John Hammond Intermediate 14y ago
English Vocab, and More Python!
🔐 Cybersecurity
English Vocab, and More Python!
John Hammond Intermediate 14y ago
HTML, Net Shares, GML!
🔐 Cybersecurity
HTML, Net Shares, GML!
John Hammond Intermediate 14y ago
Python Experiments!
🔐 Cybersecurity
Python Experiments!
John Hammond Intermediate 14y ago
GML, OpenShot and Ubuntu 11.10!
🔐 Cybersecurity
GML, OpenShot and Ubuntu 11.10!
John Hammond Intermediate 14y ago
HTML Tables in Python!
🔐 Cybersecurity
HTML Tables in Python!
John Hammond Intermediate 14y ago
Finishing up Hamlet!
🔐 Cybersecurity
Finishing up Hamlet!
John Hammond Intermediate 14y ago
Writing Hamlet in PHP!
🔐 Cybersecurity
Writing Hamlet in PHP!
John Hammond Intermediate 14y ago
Having Fun is Hard Work!
🔐 Cybersecurity
Having Fun is Hard Work!
John Hammond Intermediate 14y ago
Just Another Code Commentary!
🔐 Cybersecurity
Just Another Code Commentary!
John Hammond Intermediate 14y ago
Lot'sa stuff, kids!
🔐 Cybersecurity
Lot'sa stuff, kids!
John Hammond Intermediate 14y ago
📚 Coursera Courses Opens on Coursera · Free to audit
1 / 3 View all →
Create Impactful Marketing Videos using Canva
📚 Coursera Course ↗
Self-paced
Create Impactful Marketing Videos using Canva
Opens on Coursera ↗
Cloud Security Basics
📚 Coursera Course ↗
Self-paced
Cloud Security Basics
Opens on Coursera ↗
Cybersecurity Architecture
📚 Coursera Course ↗
Self-paced
Cybersecurity Architecture
Opens on Coursera ↗
CFR: Reconnaissance, Attack, and Post-Attack Analysis
📚 Coursera Course ↗
Self-paced
CFR: Reconnaissance, Attack, and Post-Attack Analysis
Opens on Coursera ↗
Handling Security Incidents Across Domains
📚 Coursera Course ↗
Self-paced
Handling Security Incidents Across Domains
Opens on Coursera ↗
Security Governance & Compliance
📚 Coursera Course ↗
Self-paced
Security Governance & Compliance
Opens on Coursera ↗