Tech Skills

Cybersecurity

Ethical hacking, penetration testing, network security, CTFs and defensive security

6357
lessons
What is fat? - George Zaidan
🔐 Cybersecurity
What is fat? - George Zaidan
TED-Ed Beginner 12y ago
19th Century Reforms: Crash Course US History #15
🔐 Cybersecurity
19th Century Reforms: Crash Course US History #15
CrashCourse Beginner 12y ago
Fail.
🔐 Cybersecurity
Fail.
John Hammond Intermediate 12y ago
Python [curses] 19 Unicurses/Curses No Background Check
🔐 Cybersecurity
Python [curses] 19 Unicurses/Curses No Background Check
John Hammond Intermediate 12y ago
XBee Basics - Lesson 5 - API mode: Send Digital Output to a Rmote XBee
🔐 Cybersecurity
XBee Basics - Lesson 5 - API mode: Send Digital Output to a Rmote XBee
Jack Rhysider Beginner 13y ago
XBee Basics - Lesson 4 - API mode: Reading analog data from remote XBee
🔐 Cybersecurity
XBee Basics - Lesson 4 - API mode: Reading analog data from remote XBee
Jack Rhysider Beginner 13y ago
How To Use The Internet
🔐 Cybersecurity
How To Use The Internet
John Hammond Intermediate 12y ago
Python [curses] 00 Installing Unicurses on Windows
🔐 Cybersecurity
Python [curses] 00 Installing Unicurses on Windows
John Hammond Intermediate 12y ago
Python [curses] 18 Background Fix
🔐 Cybersecurity
Python [curses] 18 Background Fix
John Hammond Intermediate 12y ago
Python [curses] 17 "Rooms"
🔐 Cybersecurity
Python [curses] 17 "Rooms"
John Hammond Intermediate 12y ago
Python [curses] 16 Unicurses vs. Curses
🔐 Cybersecurity
Python [curses] 16 Unicurses vs. Curses
John Hammond Intermediate 13y ago
Python [curses] 15 Lines
🔐 Cybersecurity
Python [curses] 15 Lines
John Hammond Intermediate 13y ago
Python [curses] 14 Creating a "Player"
🔐 Cybersecurity
Python [curses] 14 Creating a "Player"
John Hammond Intermediate 13y ago
Python [curses] 13 Organize Colors
🔐 Cybersecurity
Python [curses] 13 Organize Colors
John Hammond Intermediate 13y ago
Python [curses] 12 Safety First
🔐 Cybersecurity
Python [curses] 12 Safety First
John Hammond Intermediate 13y ago
Python [curses] 11 Window Background
🔐 Cybersecurity
Python [curses] 11 Window Background
John Hammond Intermediate 13y ago
Python [curses] 10 Panels
🔐 Cybersecurity
Python [curses] 10 Panels
John Hammond Intermediate 13y ago
Python [curses] 09 Window Box
🔐 Cybersecurity
Python [curses] 09 Window Box
John Hammond Intermediate 13y ago
Python [curses] 08 Windows
🔐 Cybersecurity
Python [curses] 08 Windows
John Hammond Intermediate 13y ago
Python [curses] 06 Color
🔐 Cybersecurity
Python [curses] 06 Color
John Hammond Intermediate 13y ago
Python [curses] 07 Handy Dandy Functions
🔐 Cybersecurity
Python [curses] 07 Handy Dandy Functions
John Hammond Intermediate 13y ago
Python [curses] 02 The Move Function
🔐 Cybersecurity
Python [curses] 02 The Move Function
John Hammond Intermediate 13y ago
Python [curses] 05 Attributes
🔐 Cybersecurity
Python [curses] 05 Attributes
John Hammond Intermediate 13y ago
Python [curses] 03 Exploring Getch
🔐 Cybersecurity
Python [curses] 03 Exploring Getch
John Hammond Intermediate 13y ago
Python [curses] 04 The Getmaxyx Function
🔐 Cybersecurity
Python [curses] 04 The Getmaxyx Function
John Hammond Intermediate 13y ago
Python [curses] 01 Intro and Hello World
🔐 Cybersecurity
Python [curses] 01 Intro and Hello World
John Hammond Beginner 13y ago
Python [urllib] 04 Proxy
🔐 Cybersecurity
Python [urllib] 04 Proxy
John Hammond Intermediate 13y ago
Python [urllib] 03 Recreating 'Quote' Functions
🔐 Cybersecurity
Python [urllib] 03 Recreating 'Quote' Functions
John Hammond Intermediate 13y ago
Python [urllib] 02 URL Retrieve
🔐 Cybersecurity
Python [urllib] 02 URL Retrieve
John Hammond Intermediate 13y ago
Python [urllib] 01 URL Open
🔐 Cybersecurity
Python [urllib] 01 URL Open
John Hammond Intermediate 13y ago
Python [pyfiglet] Pyfiglet
🔐 Cybersecurity
Python [pyfiglet] Pyfiglet
John Hammond Intermediate 13y ago
Python [subprocess] 03 Popen Instances
🔐 Cybersecurity
Python [subprocess] 03 Popen Instances
John Hammond Intermediate 13y ago
Python [subprocess] 02 Check Output
🔐 Cybersecurity
Python [subprocess] 02 Check Output
John Hammond Intermediate 13y ago
Python [subprocess] 01 Call
🔐 Cybersecurity
Python [subprocess] 01 Call
John Hammond Intermediate 13y ago
Python 01 Experimenting with IDLE
🔐 Cybersecurity
Python 01 Experimenting with IDLE
John Hammond Intermediate 13y ago
Python 02 Data Types
🔐 Cybersecurity
Python 02 Data Types
John Hammond Intermediate 13y ago
Python 00 Installing IDLE on Linux
🔐 Cybersecurity
Python 00 Installing IDLE on Linux
John Hammond Intermediate 13y ago
Python 00 Installing IDLE on Windows
🔐 Cybersecurity
Python 00 Installing IDLE on Windows
John Hammond Intermediate 13y ago
XBee Basics - Lesson 1 - General Information and Initial Setup
🔐 Cybersecurity
XBee Basics - Lesson 1 - General Information and Initial Setup
Jack Rhysider Beginner 13y ago
XBee Basics - Lesson 3 - API Mode: Digital Input from Remote Sensor
🔐 Cybersecurity
XBee Basics - Lesson 3 - API Mode: Digital Input from Remote Sensor
Jack Rhysider Beginner 13y ago
Python [glob] The Glob Module
🔐 Cybersecurity
Python [glob] The Glob Module
John Hammond Intermediate 13y ago
Python [hashlib] 06 Crappy Conclusion
🔐 Cybersecurity
Python [hashlib] 06 Crappy Conclusion
John Hammond Intermediate 13y ago
Python [hashlib] 05 SHA512 Hashing
🔐 Cybersecurity
Python [hashlib] 05 SHA512 Hashing
John Hammond Intermediate 13y ago
Python [hashlib] 01 Introduction
🔐 Cybersecurity
Python [hashlib] 01 Introduction
John Hammond Beginner 13y ago
Python [hashlib] 03 MD5 Hashing
🔐 Cybersecurity
Python [hashlib] 03 MD5 Hashing
John Hammond Intermediate 13y ago
Python [hashlib] 02 Algorithms
🔐 Cybersecurity
Python [hashlib] 02 Algorithms
John Hammond Intermediate 13y ago
Python [hashlib] 04 SHA1 Hashing
🔐 Cybersecurity
Python [hashlib] 04 SHA1 Hashing
John Hammond Intermediate 13y ago
Python [getpass] 02 Get Password
🔐 Cybersecurity
Python [getpass] 02 Get Password
John Hammond Intermediate 13y ago
📚 Coursera Courses Opens on Coursera · Free to audit
1 / 3 View all →
Cybersecurity Compliance Framework, Standards & Regulations
📚 Coursera Course ↗
Self-paced
Cybersecurity Compliance Framework, Standards & Regulations
Opens on Coursera ↗
An Introduction to Ethical Hacking with Kali Linux
📚 Coursera Course ↗
Self-paced
An Introduction to Ethical Hacking with Kali Linux
Opens on Coursera ↗
AI for Cybersecurity
📚 Coursera Course ↗
Self-paced
AI for Cybersecurity
Opens on Coursera ↗
AWS Security, Logging & DevOps for Data Engineers
📚 Coursera Course ↗
Self-paced
AWS Security, Logging & DevOps for Data Engineers
Opens on Coursera ↗
Cloud Data & Application Security
📚 Coursera Course ↗
Self-paced
Cloud Data & Application Security
Opens on Coursera ↗
Python Hacking: Apply, Implement & Analyze
📚 Coursera Course ↗
Self-paced
Python Hacking: Apply, Implement & Analyze
Opens on Coursera ↗