Tech Skills

Cybersecurity

Ethical hacking, penetration testing, network security, CTFs and defensive security

6347
lessons
Best Computer for Hacking in 2023
๐Ÿ” Cybersecurity
Best Computer for Hacking in 2023
The Cyber Mentor Beginner 2y ago
Stanford Webinar - How to Get A Cybersecurity Job
๐Ÿ” Cybersecurity
Stanford Webinar - How to Get A Cybersecurity Job
Stanford Online Beginner 2y ago
When She Can't Hack the Lock, She Hacks the Security Guard๐ŸŽ™Darknet Diaries Ep. 90: Jenny
๐Ÿ” Cybersecurity
When She Can't Hack the Lock, She Hacks the Security Guard๐ŸŽ™Darknet Diaries Ep. 90: Jenny
Jack Rhysider Intermediate 2y ago
Why did the FBI pay $1 million to hack this iPhone?
๐Ÿ” Cybersecurity
Why did the FBI pay $1 million to hack this iPhone?
Jack Rhysider Intermediate 2y ago
Flipper Zero vs Alarm? (will the Bike alarm stop it?) #shorts
๐Ÿ” Cybersecurity
Flipper Zero vs Alarm? (will the Bike alarm stop it?) #shorts
David Bombal Intermediate 2y ago
Seasonal Cycle Embodied, with Deborah Woolf
๐Ÿ” Cybersecurity
Seasonal Cycle Embodied, with Deborah Woolf
TCM Academy Intermediate 2y ago
Kali Linux USB Live Boot with Persistence (in 5 minutes)
๐Ÿ” Cybersecurity
Kali Linux USB Live Boot with Persistence (in 5 minutes)
David Bombal Beginner 2y ago
HackTheBox - Mailroom
๐Ÿ” Cybersecurity
HackTheBox - Mailroom
IppSec Beginner 2y ago
2023 Roadmap To Your First Cybersecurity Job
๐Ÿ” Cybersecurity
2023 Roadmap To Your First Cybersecurity Job
The Cyber Mentor Beginner 2y ago
Analysis on legit tools abused in human-operated ransomware
๐Ÿ” Cybersecurity
Analysis on legit tools abused in human-operated ransomware
SANS Institute Beginner 2y ago
A RaaS-ipe for Disaster: The Evolving RaaS Space, as Told Through Tools, Techniques, and Procedures
๐Ÿ” Cybersecurity
A RaaS-ipe for Disaster: The Evolving RaaS Space, as Told Through Tools, Techniques, and Procedures
SANS Institute Beginner 2y ago
Not All ZIP Files Are Equal
๐Ÿ” Cybersecurity
Not All ZIP Files Are Equal
John Hammond Intermediate 2y ago
I Learned How To Hack WiFi In 2 Days...
๐Ÿ” Cybersecurity
I Learned How To Hack WiFi In 2 Days...
Tech With Tim Intermediate 2y ago
HackTheBox - Busqueda
๐Ÿ” Cybersecurity
HackTheBox - Busqueda
IppSec Beginner 2y ago
Capture the Flag at Blackhat USA 2023!
๐Ÿ” Cybersecurity
Capture the Flag at Blackhat USA 2023!
John Hammond Intermediate 2y ago
Elisabeth Rochat de la Vallรฉe. "The master phrase of the Daodejing is Bu Zheng"
๐Ÿ” Cybersecurity
Elisabeth Rochat de la Vallรฉe. "The master phrase of the Daodejing is Bu Zheng"
TCM Academy Beginner 2y ago
Building a Career in Cybersecurity
๐Ÿ” Cybersecurity
Building a Career in Cybersecurity
NVIDIA Developer Beginner 2y ago
Earn a Cybersecurity Degree | University of London MSc Cybersecurity
๐Ÿ” Cybersecurity
Earn a Cybersecurity Degree | University of London MSc Cybersecurity
Coursera Beginner 2y ago
The 3 types of hackers
๐Ÿ” Cybersecurity
The 3 types of hackers
Jack Rhysider Intermediate 2y ago
Are you looking for live PNPT training with virtual labs? Look no further!
๐Ÿ” Cybersecurity
Are you looking for live PNPT training with virtual labs? Look no further!
The Cyber Mentor Beginner 2y ago
NICE Workforce for Cyber Security: Recruiting, Developing, and Planning Your Cybersecurity Workforce
๐Ÿ” Cybersecurity
NICE Workforce for Cyber Security: Recruiting, Developing, and Planning Your Cybersecurity Workforce
SANS Institute Beginner 2y ago
Flipper Zero WiFi Hacking (Fake WiFi networks) #shorts
๐Ÿ” Cybersecurity
Flipper Zero WiFi Hacking (Fake WiFi networks) #shorts
David Bombal Intermediate 2y ago
Google Cybersecurity Certificate - First Thoughts
๐Ÿ” Cybersecurity
Google Cybersecurity Certificate - First Thoughts
The Cyber Mentor Beginner 2y ago
Buffer Overflow Hacking Tutorial (Bypass Passwords)
๐Ÿ” Cybersecurity
Buffer Overflow Hacking Tutorial (Bypass Passwords)
David Bombal Beginner 2y ago
Finding Vulnerabilities in IoT Firmware
๐Ÿ” Cybersecurity
Finding Vulnerabilities in IoT Firmware
The Cyber Mentor Beginner 2y ago
How I Logged Into Donald Trump's Twitter Account (Again)๐ŸŽ™Darknet Diaries Ep. 88: Victor
๐Ÿ” Cybersecurity
How I Logged Into Donald Trump's Twitter Account (Again)๐ŸŽ™Darknet Diaries Ep. 88: Victor
Jack Rhysider Intermediate 2y ago
Rule-Breakers Unite: Reimagining SANS HackFest
๐Ÿ” Cybersecurity
Rule-Breakers Unite: Reimagining SANS HackFest
SANS Institute Advanced 2y ago
Flipper Zero WiFi Hacking (Rogue AP) #shorts
๐Ÿ” Cybersecurity
Flipper Zero WiFi Hacking (Rogue AP) #shorts
David Bombal Intermediate 2y ago
WordPress Vulnerabilities Part 2
๐Ÿ” Cybersecurity
WordPress Vulnerabilities Part 2
The Cyber Mentor Beginner 2y ago
Books! Books! Books! Which author should I interview? #shorts
๐Ÿ” Cybersecurity
Books! Books! Books! Which author should I interview? #shorts
David Bombal Intermediate 2y ago
Real World Hacking with OTW (Privacy and Cybersecurity IoT warning)
๐Ÿ” Cybersecurity
Real World Hacking with OTW (Privacy and Cybersecurity IoT warning)
David Bombal Beginner 2y ago
Hacking Active Directory for Beginners (over 5 hours of content!)
๐Ÿ” Cybersecurity
Hacking Active Directory for Beginners (over 5 hours of content!)
The Cyber Mentor Beginner 2y ago
Modding Your Switch Can Land You In Prison๐ŸŽ™Darknet Diaries Ep. 136: Team Xecuter
๐Ÿ” Cybersecurity
Modding Your Switch Can Land You In Prison๐ŸŽ™Darknet Diaries Ep. 136: Team Xecuter
Jack Rhysider Beginner 2y ago
No Experience Required โ€“ Gaining Clarity for a Career in Cybersecurity
๐Ÿ” Cybersecurity
No Experience Required โ€“ Gaining Clarity for a Career in Cybersecurity
SANS Institute Beginner 2y ago
Bonus Episode: What does it take to author a cybersecurity book?
๐Ÿ” Cybersecurity
Bonus Episode: What does it take to author a cybersecurity book?
SANS Institute Intermediate 2y ago
How We Hacked Donald Trump's Twitter Account๐ŸŽ™Darknet Diaries Ep. 87: Guild of the Grumpy Old Hackers
๐Ÿ” Cybersecurity
How We Hacked Donald Trump's Twitter Account๐ŸŽ™Darknet Diaries Ep. 87: Guild of the Grumpy Old Hackers
Jack Rhysider Intermediate 2y ago
Unpacking the New SEC Regulations with John Pescatore
๐Ÿ” Cybersecurity
Unpacking the New SEC Regulations with John Pescatore
SANS Institute Advanced 2y ago
The Five Critical Controls for ICS | Host: Robert M. Lee | August 1, 2023
๐Ÿ” Cybersecurity
The Five Critical Controls for ICS | Host: Robert M. Lee | August 1, 2023
SANS Institute Beginner 2y ago
Flipper Zero RFID Fuzzer (Fuzz RFID) #shorts
๐Ÿ” Cybersecurity
Flipper Zero RFID Fuzzer (Fuzz RFID) #shorts
David Bombal Intermediate 2y ago
Telegram Cybercrime is INSANE
๐Ÿ” Cybersecurity
Telegram Cybercrime is INSANE
John Hammond Intermediate 2y ago
Our Best Bug Bounty Tips
๐Ÿ” Cybersecurity
Our Best Bug Bounty Tips
The Cyber Mentor Beginner 2y ago
Real World Hacking Tools Tutorial (Target: Tesla)
๐Ÿ” Cybersecurity
Real World Hacking Tools Tutorial (Target: Tesla)
David Bombal Beginner 2y ago
HackTheBox - Cerberus
๐Ÿ” Cybersecurity
HackTheBox - Cerberus
IppSec Beginner 2y ago
The Top Open-Source Vulnerabilities (and how to fix them)
๐Ÿ” Cybersecurity
The Top Open-Source Vulnerabilities (and how to fix them)
The Cyber Mentor Beginner 2y ago
Your Social Accounts Are Never Safe, Even If You Use Great Passwords๐ŸŽ™Ep. 86 The LinkedIn Incident
๐Ÿ” Cybersecurity
Your Social Accounts Are Never Safe, Even If You Use Great Passwords๐ŸŽ™Ep. 86 The LinkedIn Incident
Jack Rhysider Intermediate 2y ago
Cyber Leadership Analogies and Metaphors
๐Ÿ” Cybersecurity
Cyber Leadership Analogies and Metaphors
SANS Institute Intermediate 2y ago
Should Countries Ban Ransomware Payments? | Host: Ryan Chapman | July 25, 2023
๐Ÿ” Cybersecurity
Should Countries Ban Ransomware Payments? | Host: Ryan Chapman | July 25, 2023
SANS Institute Advanced 2y ago
The Secret Version of the Internet
๐Ÿ” Cybersecurity
The Secret Version of the Internet
Jack Rhysider Beginner 2y ago
๐Ÿ“š Coursera Courses Opens on Coursera ยท Free to audit
1 / 3 View all โ†’
Cybersecurity Fundamentals for High-Tech Manufacturing
๐Ÿ“š Coursera Course โ†—
Self-paced
Cybersecurity Fundamentals for High-Tech Manufacturing
Opens on Coursera โ†—
Python Case Study - Cryptography
๐Ÿ“š Coursera Course โ†—
Self-paced
Python Case Study - Cryptography
Opens on Coursera โ†—
CCNA Advanced โ€“ WAN, Security, and Network Services
๐Ÿ“š Coursera Course โ†—
Self-paced
CCNA Advanced โ€“ WAN, Security, and Network Services
Opens on Coursera โ†—
IP Addressing and Core Protocols
๐Ÿ“š Coursera Course โ†—
Self-paced
IP Addressing and Core Protocols
Opens on Coursera โ†—
Road to the CISO โ€“ Culminating Project Course
๐Ÿ“š Coursera Course โ†—
Self-paced
Road to the CISO โ€“ Culminating Project Course
Opens on Coursera โ†—
AWS Wickr Getting Started
๐Ÿ“š Coursera Course โ†—
Self-paced
AWS Wickr Getting Started
Opens on Coursera โ†—