✕ Clear filters
502 lessons

Beginner Lessons

Curated from top practitioners. Filtered, not flooded.

All ▶ YouTube 184,518📚 Coursera 16,214
Telegram Has Been Hacked
AI News & Updates
Telegram Has Been Hacked
John Hammond Beginner 1y ago
Scraping Dark Web Sites with Python
Cybersecurity
Scraping Dark Web Sites with Python
John Hammond Beginner 2y ago
How Hackers Can Hide PowerShell in Environment Variables
Cybersecurity
How Hackers Can Hide PowerShell in Environment Variables
John Hammond Beginner 2y ago
Malware & Cybersecurity Threats on the Horizon
Cybersecurity
Malware & Cybersecurity Threats on the Horizon
John Hammond Beginner 2y ago
Hackers Hide with Clever Alternate Data Streams
Cybersecurity
Hackers Hide with Clever Alternate Data Streams
John Hammond Beginner 2y ago
The Apex Legends Hacker: Destroyer2009
AI News & Updates
The Apex Legends Hacker: Destroyer2009
John Hammond Beginner 2y ago
Github Copilot Made My Code More Vulnerable
AI-Assisted Coding
Github Copilot Made My Code More Vulnerable
John Hammond Beginner 2y ago
Malware Analysis & Threat Intel: UAC Bypasses
Cybersecurity
Malware Analysis & Threat Intel: UAC Bypasses
John Hammond Beginner 2y ago
Hackers Can Phish with PLAINTEXT QR Codes
AI News & Updates
Hackers Can Phish with PLAINTEXT QR Codes
John Hammond Beginner 2y ago
I Made Malware In Under 20 Minutes
Cybersecurity
I Made Malware In Under 20 Minutes
John Hammond Beginner 2y ago
Sweet New Threat Intel Just Dropped
Cybersecurity
Sweet New Threat Intel Just Dropped
John Hammond Beginner 2y ago
Malware Analysis Made Easy: Cloud Investigations
Cybersecurity
Malware Analysis Made Easy: Cloud Investigations
John Hammond Beginner 2y ago
Calculating Smart Contract Vulnerability Impact: Low To Critical
Cybersecurity
Calculating Smart Contract Vulnerability Impact: Low To Critical
John Hammond Beginner 2y ago
Learning Entra ID (Azure Active Directory)
Cybersecurity
Learning Entra ID (Azure Active Directory)
John Hammond Beginner 2y ago
Network Threat Hunting Made Easy (Finding Hackers)
Cybersecurity
Network Threat Hunting Made Easy (Finding Hackers)
John Hammond Beginner 2y ago
How to Hack Active Directory with ASREP Roasting
Cybersecurity
How to Hack Active Directory with ASREP Roasting
John Hammond Beginner 2y ago
Create Your Own File Extension
Cybersecurity
Create Your Own File Extension
John Hammond Beginner 2y ago
Learn to Hack AWS & Kubernetes Clusters (for free)
Cybersecurity
Learn to Hack AWS & Kubernetes Clusters (for free)
John Hammond Beginner 2y ago
Writing Custom Malware: Import Address Table Hooking
Cybersecurity
Writing Custom Malware: Import Address Table Hooking
John Hammond Beginner 2y ago
Can ChatGPT Find Smart Contract Vulnerabilities?
Cybersecurity
Can ChatGPT Find Smart Contract Vulnerabilities?
John Hammond Beginner 2y ago
How Hackers Hide From Memory Scanners
Cybersecurity
How Hackers Hide From Memory Scanners
John Hammond Beginner 2y ago
ChatGPT Learns the Rust Programming Language
Cybersecurity
ChatGPT Learns the Rust Programming Language
John Hammond Beginner 2y ago
Create Your Own Dark Web Website
Cybersecurity
Create Your Own Dark Web Website
John Hammond Beginner 2y ago
How Hackers Exploit Vulnerable Drivers
Cybersecurity
How Hackers Exploit Vulnerable Drivers
John Hammond Beginner 2y ago
Hackers Are Exploiting Critical Vulnerabilities in File Transfer Software
Cybersecurity
Hackers Are Exploiting Critical Vulnerabilities in File Transfer Software
John Hammond Beginner 2y ago
I Explored Ransomware Cybercrime on the Dark Web
Cybersecurity
I Explored Ransomware Cybercrime on the Dark Web
John Hammond Beginner 2y ago
Learn Active Directory Kerberoasting
Cybersecurity
Learn Active Directory Kerberoasting
John Hammond Beginner 2y ago
How Does Malware Know It's Being Monitored?
AI Safety & Ethics
How Does Malware Know It's Being Monitored?
John Hammond Beginner 2y ago
We Hacked An AWS Account. Again.
Large Language Models
We Hacked An AWS Account. Again.
John Hammond Beginner 2y ago
How Hackers & Malware Spoof Processes
AI Safety & Ethics
How Hackers & Malware Spoof Processes
John Hammond Beginner 2y ago
Zimbra ZCS 0-day Exploited In The Wild
Cybersecurity
Zimbra ZCS 0-day Exploited In The Wild
John Hammond Beginner 2y ago
Dependency Confusion with AWS CodeArtifact
AI Tools & Apps
Dependency Confusion with AWS CodeArtifact
John Hammond Beginner 2y ago
Dark Web Dumpster Diving (Hunting Infostealer Malware)
Cybersecurity
Dark Web Dumpster Diving (Hunting Infostealer Malware)
John Hammond Beginner 2y ago
How Hackers Write Malware & Evade Antivirus (Nim)
AI Safety & Ethics
How Hackers Write Malware & Evade Antivirus (Nim)
John Hammond Beginner 2y ago
TryHackMe! Finding Computer Artifacts with osquery
Cybersecurity
TryHackMe! Finding Computer Artifacts with osquery
John Hammond Beginner 2y ago
Stealing OAuth Github Tokens with AWS CodeBuild
Large Language Models
Stealing OAuth Github Tokens with AWS CodeBuild
John Hammond Beginner 2y ago
Bypassing Branch Protections with Github Actions (CI/CD)
AI Safety & Ethics
Bypassing Branch Protections with Github Actions (CI/CD)
John Hammond Beginner 2y ago
Ethical Hacking: Bypass Passwords with Linux PAM Degradation Attack
Cybersecurity
Ethical Hacking: Bypass Passwords with Linux PAM Degradation Attack
John Hammond Beginner 2y ago
FAKE Microsoft Login to Hacked Charity Scam
AI News & Updates
FAKE Microsoft Login to Hacked Charity Scam
John Hammond Beginner 2y ago
Hands-on Ransomware: Exploring Cybercrime
AI Safety & Ethics
Hands-on Ransomware: Exploring Cybercrime
John Hammond Beginner 2y ago
Threat Emulation & Purple Teaming (with PlexTrac Runbooks)
Data Analytics & Business Intelligence
Threat Emulation & Purple Teaming (with PlexTrac Runbooks)
John Hammond Beginner 2y ago
How Can CI/CD Go Horribly Wrong?
AI Safety & Ethics
How Can CI/CD Go Horribly Wrong?
John Hammond Beginner 2y ago
Getting Started in Firmware Analysis & IoT Reverse Engineering
Cybersecurity
Getting Started in Firmware Analysis & IoT Reverse Engineering
John Hammond Beginner 2y ago
Hunt for Hackers with Velociraptor
AI Safety & Ethics
Hunt for Hackers with Velociraptor
John Hammond Beginner 2y ago
Quick Forensics of Windows Event Logs (DeepBlueCLI)
AI Safety & Ethics
Quick Forensics of Windows Event Logs (DeepBlueCLI)
John Hammond Beginner 2y ago
What SECRETS are in your Clipboard?
Cybersecurity
What SECRETS are in your Clipboard?
John Hammond Beginner 2y ago
Cybersecurity Labs (FOR FREE) - Linux Backdoor Analysis
Cybersecurity
Cybersecurity Labs (FOR FREE) - Linux Backdoor Analysis
John Hammond Beginner 3y ago
How FAST Can You Write a Pentest Report?
Cybersecurity
How FAST Can You Write a Pentest Report?
John Hammond Beginner 3y ago
📚 Coursera Courses Opens on Coursera · Free to audit
1 / 3 View all →
Mastering Reviews and Test Automation: Techniques & Tools
📚 Coursera Course ↗
Self-paced
Mastering Reviews and Test Automation: Techniques & Tools
Opens on Coursera ↗
Ensure Data Integrity: Build Quality Pipelines
📚 Coursera Course ↗
Self-paced
Ensure Data Integrity: Build Quality Pipelines
Opens on Coursera ↗
Data Ingestion, Exploration & Visualization in Qlik Sense
📚 Coursera Course ↗
Self-paced
Data Ingestion, Exploration & Visualization in Qlik Sense
Opens on Coursera ↗
Dynamic Routing with Next.js: Improve a Tech News Website
📚 Coursera Course ↗
Self-paced
Dynamic Routing with Next.js: Improve a Tech News Website
Opens on Coursera ↗
Beer Quality: Foam
📚 Coursera Course ↗
Self-paced
Beer Quality: Foam
Opens on Coursera ↗
Predictive Analytics: Apply, Analyze & Interpret
📚 Coursera Course ↗
Self-paced
Predictive Analytics: Apply, Analyze & Interpret
Opens on Coursera ↗