Tech Skills

Cybersecurity

Ethical hacking, penetration testing, network security, CTFs and defensive security

3848
videos
The Payload Podcast #002 with Connor McGarr
🔐 Cybersecurity
The Payload Podcast #002 with Connor McGarr
John Hammond Beginner 1mo ago
The three paths AI could take from here - Shawn Wang SWYX interview [Podcast #208]
🔐 Cybersecurity
The three paths AI could take from here - Shawn Wang SWYX interview [Podcast #208]
freeCodeCamp.org Beginner 1mo ago
Russia is hacking zero-days again
🔐 Cybersecurity
Russia is hacking zero-days again
John Hammond Beginner 1mo ago
IoT Hacking Stream
🔐 Cybersecurity
IoT Hacking Stream
The Cyber Mentor Beginner 1mo ago
Agentic AI is breaking your Cybersecurity controls (and how to solve it)
🔐 Cybersecurity
Agentic AI is breaking your Cybersecurity controls (and how to solve it)
David Bombal Beginner 1mo ago
ContinuumCon is back for 2026!
🔐 Cybersecurity
ContinuumCon is back for 2026!
John Hammond Beginner 1mo ago
Zonta International Women in Business Award Winner
🔐 Cybersecurity
Zonta International Women in Business Award Winner
Saïd Business School, University of Oxford Intermediate 1mo ago
Keynote | The Augmented Era: Disrupt or be Disrupted
🔐 Cybersecurity
Keynote | The Augmented Era: Disrupt or be Disrupted
SANS Institute Advanced 1mo ago
Red Team | AI’s Role in the Future of Vulnerability Research
🔐 Cybersecurity
Red Team | AI’s Role in the Future of Vulnerability Research
SANS Institute Advanced 1mo ago
Blue Team | Unveiling Insider Threats Beyond the Logs
🔐 Cybersecurity
Blue Team | Unveiling Insider Threats Beyond the Logs
SANS Institute Intermediate 1mo ago
Red Team | MEDSHIELD: Threat Modeling for Medical IoT
🔐 Cybersecurity
Red Team | MEDSHIELD: Threat Modeling for Medical IoT
SANS Institute Intermediate 1mo ago
Red Team | Looting Credentials from Modern Browsers
🔐 Cybersecurity
Red Team | Looting Credentials from Modern Browsers
SANS Institute Beginner 1mo ago
Red Team | Weaponizing Windows Crash Dumps
🔐 Cybersecurity
Red Team | Weaponizing Windows Crash Dumps
SANS Institute Intermediate 1mo ago
Blue Team | Final Thoughts and Q&A
🔐 Cybersecurity
Blue Team | Final Thoughts and Q&A
SANS Institute Intermediate 1mo ago
Blue Team | Intelligence-Driven Defense for the Real World
🔐 Cybersecurity
Blue Team | Intelligence-Driven Defense for the Real World
SANS Institute Intermediate 1mo ago
Keynote | Blue Team | SOC of the Future…the Future Is Now
🔐 Cybersecurity
Keynote | Blue Team | SOC of the Future…the Future Is Now
SANS Institute Intermediate 1mo ago
Red Team | Subverting macOS Apps and Security Controls
🔐 Cybersecurity
Red Team | Subverting macOS Apps and Security Controls
SANS Institute Intermediate 1mo ago
Blue Team | From Exploit to Risk: Scaling Purple Team Insights
🔐 Cybersecurity
Blue Team | From Exploit to Risk: Scaling Purple Team Insights
SANS Institute Intermediate 1mo ago
Blue Team | Hunting Cloud Persistence Without Malware
🔐 Cybersecurity
Blue Team | Hunting Cloud Persistence Without Malware
SANS Institute Intermediate 1mo ago
Blue Team | Determining Malice Through Context and Analytics
🔐 Cybersecurity
Blue Team | Determining Malice Through Context and Analytics
SANS Institute Intermediate 1mo ago
The Core Principle in Forensic Science
🔐 Cybersecurity
The Core Principle in Forensic Science
The Cyber Mentor Beginner 1mo ago
Official Cisco Ethical Hacking Course Is FREE
🔐 Cybersecurity
Official Cisco Ethical Hacking Course Is FREE
David Bombal Beginner 1mo ago
An Interview with Eva Benn!
🔐 Cybersecurity
An Interview with Eva Benn!
John Hammond Beginner 1mo ago
SANS Share Your Story: Becoming a Cross-Functional Leader with Dr. Natalie Foster Johnson
🔐 Cybersecurity
SANS Share Your Story: Becoming a Cross-Functional Leader with Dr. Natalie Foster Johnson
SANS Institute Beginner 1mo ago