Tech Skills

Cybersecurity

Ethical hacking, penetration testing, network security, CTFs and defensive security

6347
lessons
Cybersecurity Live - CS50 #Reels
๐Ÿ” Cybersecurity
Cybersecurity Live - CS50 #Reels
CS50 Intermediate 2y ago
the CHEAPEST path to becoming an ethical hacker
๐Ÿ” Cybersecurity
the CHEAPEST path to becoming an ethical hacker
The Cyber Mentor Beginner 2y ago
Your credit card isn't really safe online
๐Ÿ” Cybersecurity
Your credit card isn't really safe online
Jack Rhysider Intermediate 2y ago
The Emerging Technologies of AI, Edge and Quantum computing that are important to know about...
๐Ÿ” Cybersecurity
The Emerging Technologies of AI, Edge and Quantum computing that are important to know about...
David Bombal Beginner 2y ago
HackTheBox - Soccer
๐Ÿ” Cybersecurity
HackTheBox - Soccer
IppSec Beginner 2y ago
When You Lie for a Living, Everyone & Everything Is Hackable๐ŸŽ™Darknet Diaries Ep. 134: Deviant
๐Ÿ” Cybersecurity
When You Lie for a Living, Everyone & Everything Is Hackable๐ŸŽ™Darknet Diaries Ep. 134: Deviant
Jack Rhysider Intermediate 2y ago
Blind SQL Injection Made Easy
๐Ÿ” Cybersecurity
Blind SQL Injection Made Easy
The Cyber Mentor Beginner 2y ago
Cybersecurity's BIG Problem. Why it needs to change.
๐Ÿ” Cybersecurity
Cybersecurity's BIG Problem. Why it needs to change.
David Bombal Beginner 2y ago
SANS Live Training Student Success Story: Mackenize Morris
๐Ÿ” Cybersecurity
SANS Live Training Student Success Story: Mackenize Morris
SANS Institute Beginner 2y ago
HackTheBox - TwoMillion
๐Ÿ” Cybersecurity
HackTheBox - TwoMillion
IppSec Beginner 2y ago
Bert Kreischer: Comedy, Drinking, Rogan, Segura, Churchill & Kim Jong Un | Lex Fridman Podcast #382
๐Ÿ” Cybersecurity
Bert Kreischer: Comedy, Drinking, Rogan, Segura, Churchill & Kim Jong Un | Lex Fridman Podcast #382
Lex Fridman Beginner 2y ago
Strategy 5: Prioritize Incident Response
๐Ÿ” Cybersecurity
Strategy 5: Prioritize Incident Response
SANS Institute Intermediate 2y ago
Rapid Windows Memory Analysis with Volatility 3
๐Ÿ” Cybersecurity
Rapid Windows Memory Analysis with Volatility 3
John Hammond Intermediate 2y ago
Exploring the Latest Dark Web Onion Sites
๐Ÿ” Cybersecurity
Exploring the Latest Dark Web Onion Sites
John Hammond Intermediate 2y ago
Fatherhoodโ€™s Power: How Men Protect, Provide, and PRESIDE!
๐Ÿ” Cybersecurity
Fatherhoodโ€™s Power: How Men Protect, Provide, and PRESIDE!
Evan Carmichael Intermediate 2y ago
Next Level API Hacking with Kiterunner
๐Ÿ” Cybersecurity
Next Level API Hacking with Kiterunner
The Cyber Mentor Beginner 2y ago
Banks are impossible to hack, unless...
๐Ÿ” Cybersecurity
Banks are impossible to hack, unless...
Jack Rhysider Intermediate 2y ago
I got Pwned ... and so did you! (you're likely in the 12 Billion)
๐Ÿ” Cybersecurity
I got Pwned ... and so did you! (you're likely in the 12 Billion)
David Bombal Intermediate 2y ago
HackTheBox - Bagel
๐Ÿ” Cybersecurity
HackTheBox - Bagel
IppSec Beginner 2y ago
Practical Junior Penetration Tester (PJPT) - Certification Overview
๐Ÿ” Cybersecurity
Practical Junior Penetration Tester (PJPT) - Certification Overview
The Cyber Mentor Beginner 2y ago
Windows Pentest Tutorial (Active Directory Game Over!)
๐Ÿ” Cybersecurity
Windows Pentest Tutorial (Active Directory Game Over!)
David Bombal Beginner 2y ago
Three ways to level up your Windows Privilege Escalation skills #windows  #privesc #techtok #infosec
๐Ÿ” Cybersecurity
Three ways to level up your Windows Privilege Escalation skills #windows #privesc #techtok #infosec
The Cyber Mentor Intermediate 2y ago
Catch me if you can! #shorts
๐Ÿ” Cybersecurity
Catch me if you can! #shorts
David Bombal Beginner 2y ago
What the Heck is Going on with Cybersecurity Higher Ed? | Host: Ed Skoudis | May 30, 2023
๐Ÿ” Cybersecurity
What the Heck is Going on with Cybersecurity Higher Ed? | Host: Ed Skoudis | May 30, 2023
SANS Institute Beginner 2y ago
What is the BEST Hacking Platform?
๐Ÿ” Cybersecurity
What is the BEST Hacking Platform?
The Cyber Mentor Beginner 2y ago
Strategy 4: Hire AND Grow Quality Staff
๐Ÿ” Cybersecurity
Strategy 4: Hire AND Grow Quality Staff
SANS Institute Intermediate 2y ago
HackTheBox - Absolute
๐Ÿ” Cybersecurity
HackTheBox - Absolute
IppSec Beginner 2y ago
Building a Password Cracker in Rust
๐Ÿ” Cybersecurity
Building a Password Cracker in Rust
The Cyber Mentor Beginner 2y ago
It's DNS again ๐Ÿ˜ข Did you know this Malware Hack?
๐Ÿ” Cybersecurity
It's DNS again ๐Ÿ˜ข Did you know this Malware Hack?
David Bombal Beginner 2y ago
Experience a Real Pentest with the PNPT Exam #pentesting  #ethicalhacking   #pnpt
๐Ÿ” Cybersecurity
Experience a Real Pentest with the PNPT Exam #pentesting #ethicalhacking #pnpt
The Cyber Mentor Intermediate 2y ago
The Worm That Crashed the Winter Games Was Full of False Flags๐ŸŽ™Ep. 77: Olympics Destroyer
๐Ÿ” Cybersecurity
The Worm That Crashed the Winter Games Was Full of False Flags๐ŸŽ™Ep. 77: Olympics Destroyer
Jack Rhysider Intermediate 2y ago
Kali NetHunter Pro in 6 minutes
๐Ÿ” Cybersecurity
Kali NetHunter Pro in 6 minutes
David Bombal Beginner 2y ago
Keynote | Neurodivergent Associates are an Asset: A CISOโ€™s Perspective on Retention and Inclusion
๐Ÿ” Cybersecurity
Keynote | Neurodivergent Associates are an Asset: A CISOโ€™s Perspective on Retention and Inclusion
SANS Institute Intermediate 2y ago
Opening Keynote | Investing in Neurodiversity
๐Ÿ” Cybersecurity
Opening Keynote | Investing in Neurodiversity
SANS Institute Intermediate 2y ago
This New Web Hacking Tool May Replace Burp Suite
๐Ÿ” Cybersecurity
This New Web Hacking Tool May Replace Burp Suite
The Cyber Mentor Beginner 2y ago
Who Tapped These 106 Govt Cell Phones?
๐Ÿ” Cybersecurity
Who Tapped These 106 Govt Cell Phones?
Jack Rhysider Intermediate 2y ago
Strategy 3: Build a SOC Structure to Match Your Organizational Needs
๐Ÿ” Cybersecurity
Strategy 3: Build a SOC Structure to Match Your Organizational Needs
SANS Institute Intermediate 2y ago
His new gadget any good at catching rogue devices?
๐Ÿ” Cybersecurity
His new gadget any good at catching rogue devices?
David Bombal Beginner 2y ago
HackTheBox - Precious
๐Ÿ” Cybersecurity
HackTheBox - Precious
IppSec Beginner 2y ago
the BEST resources for finding a cybersecurity job
๐Ÿ” Cybersecurity
the BEST resources for finding a cybersecurity job
The Cyber Mentor Beginner 2y ago
Who Would Hack the Largest U.S. Bank, But Not Steal a Penny?๐ŸŽ™Darknet Diaries Ep. 76: Knaves Out
๐Ÿ” Cybersecurity
Who Would Hack the Largest U.S. Bank, But Not Steal a Penny?๐ŸŽ™Darknet Diaries Ep. 76: Knaves Out
Jack Rhysider Intermediate 2y ago
Here's a quick look at a path to becoming a webapp pentester! #webapp #pentesting #cybersecurity
๐Ÿ” Cybersecurity
Here's a quick look at a path to becoming a webapp pentester! #webapp #pentesting #cybersecurity
The Cyber Mentor Intermediate 2y ago
The BEST Notetaking Apps Ranked
๐Ÿ” Cybersecurity
The BEST Notetaking Apps Ranked
The Cyber Mentor Beginner 2y ago
Strategy 2: Give the SOC the Authority to Do Its Job
๐Ÿ” Cybersecurity
Strategy 2: Give the SOC the Authority to Do Its Job
SANS Institute Intermediate 2y ago
How to be Invisible Online (and the hard truth about it)...
๐Ÿ” Cybersecurity
How to be Invisible Online (and the hard truth about it)...
David Bombal Beginner 2y ago
Are you getting ready for Summer? So are hackers! #passwordchange  #ethicalhacking #cybersecurity
๐Ÿ” Cybersecurity
Are you getting ready for Summer? So are hackers! #passwordchange #ethicalhacking #cybersecurity
The Cyber Mentor Intermediate 2y ago
FIVE Practical AI Uses for Cybersecurity
๐Ÿ” Cybersecurity
FIVE Practical AI Uses for Cybersecurity
The Cyber Mentor Beginner 2y ago
L2CODE like a hacker #programming #python #rust #cybersecurity
๐Ÿ” Cybersecurity
L2CODE like a hacker #programming #python #rust #cybersecurity
The Cyber Mentor Intermediate 2y ago
๐Ÿ“š Coursera Courses Opens on Coursera ยท Free to audit
1 / 3 View all โ†’
Practical Cybersecurity Fundamentals: Unit 1
๐Ÿ“š Coursera Course โ†—
Self-paced
Practical Cybersecurity Fundamentals: Unit 1
Opens on Coursera โ†—
Sรฉcuriser GKE avec Cloud Next Generationย Firewall
๐Ÿ“š Coursera Course โ†—
Self-paced
Sรฉcuriser GKE avec Cloud Next Generationย Firewall
Opens on Coursera โ†—
Systems and Cybersecurity Fundamentals Part 1
๐Ÿ“š Coursera Course โ†—
Self-paced
Systems and Cybersecurity Fundamentals Part 1
Opens on Coursera โ†—
Security & Ethical Hacking: Attacking Unix and Windows
๐Ÿ“š Coursera Course โ†—
Self-paced
Security & Ethical Hacking: Attacking Unix and Windows
Opens on Coursera โ†—
Data Visualization & Advanced App Logic
๐Ÿ“š Coursera Course โ†—
Self-paced
Data Visualization & Advanced App Logic
Opens on Coursera โ†—
Risk Management Excellence - NIST 800-37 Framework Training
๐Ÿ“š Coursera Course โ†—
Self-paced
Risk Management Excellence - NIST 800-37 Framework Training
Opens on Coursera โ†—