✕ Clear filters
501 lessons

Intermediate Lessons

Curated from top practitioners. Filtered, not flooded.

All ▶ YouTube 184,475📚 Coursera 16,202
Preventing Session Hijacking: Essential Cybersecurity Strategies
Cybersecurity
Preventing Session Hijacking: Essential Cybersecurity Strategies
John Hammond Intermediate 1y ago
Unlocking Secrets: Hacking With InfoStealer Malware
Cybersecurity
Unlocking Secrets: Hacking With InfoStealer Malware
John Hammond Intermediate 1y ago
Hacking a Reddit Account: A Step-by-Step Demonstration
Cybersecurity
Hacking a Reddit Account: A Step-by-Step Demonstration
John Hammond Intermediate 1y ago
Exploring Docker: Downloading and Testing Build Scripts
AI Safety & Ethics
Exploring Docker: Downloading and Testing Build Scripts
John Hammond Intermediate 1y ago
Stop Session Hijacking: Protect Your Accounts Now!
AI Safety & Ethics
Stop Session Hijacking: Protect Your Accounts Now!
John Hammond Intermediate 1y ago
Mastering Token Access: Uncovering Microsoft Graph API Secrets
Large Language Models
Mastering Token Access: Uncovering Microsoft Graph API Secrets
John Hammond Intermediate 1y ago
Unlocking Docker Inside Docker: The DIND Revolution
AI Safety & Ethics
Unlocking Docker Inside Docker: The DIND Revolution
John Hammond Intermediate 1y ago
Social Engineering: Accessing Microsoft Graph API Secrets
AI News & Updates
Social Engineering: Accessing Microsoft Graph API Secrets
John Hammond Intermediate 1y ago
Mastering Docker: Build Your Own Authentication & Registry Service
AI Safety & Ethics
Mastering Docker: Build Your Own Authentication & Registry Service
John Hammond Intermediate 1y ago
Unlocking the Secrets of Docker: A Creative Journey
AI Safety & Ethics
Unlocking the Secrets of Docker: A Creative Journey
John Hammond Intermediate 1y ago
Unlocking Service User Secrets: Bypassing Authentication Flaws
AI Safety & Ethics
Unlocking Service User Secrets: Bypassing Authentication Flaws
John Hammond Intermediate 1y ago
Master Docker Images with Scopio: Simplify Your Workflow
AI Tools & Apps
Master Docker Images with Scopio: Simplify Your Workflow
John Hammond Intermediate 1y ago
Linux Challenges for Holiday Hacking
Cybersecurity
Linux Challenges for Holiday Hacking
John Hammond Intermediate 1y ago
Inside the Registry Challenge: CTF Zone Finals 2024
Cybersecurity
Inside the Registry Challenge: CTF Zone Finals 2024
John Hammond Intermediate 1y ago
From Novice to Pro: Unleashing Hacking Genius
Cybersecurity
From Novice to Pro: Unleashing Hacking Genius
John Hammond Intermediate 1y ago
Unlock Your Cybersecurity Potential with Hands-On Labs
Cybersecurity
Unlock Your Cybersecurity Potential with Hands-On Labs
John Hammond Intermediate 1y ago
Unlocking Privilege Escalation in EntraID: The Essentials
Cybersecurity
Unlocking Privilege Escalation in EntraID: The Essentials
John Hammond Intermediate 1y ago
Exposing Vulnerabilities in EntraID: Ethical Hacking Insights
Cybersecurity
Exposing Vulnerabilities in EntraID: Ethical Hacking Insights
John Hammond Intermediate 1y ago
Hacking Everyday Items: The Truth Behind Suitcase Locks
Cybersecurity
Hacking Everyday Items: The Truth Behind Suitcase Locks
John Hammond Intermediate 1y ago
Exciting New Game Releases and Holiday Fun!
AI News & Updates
Exciting New Game Releases and Holiday Fun!
John Hammond Intermediate 1y ago
Hacking Microsoft 365: Maintain Access Like a Pro
AI News & Updates
Hacking Microsoft 365: Maintain Access Like a Pro
John Hammond Intermediate 1y ago
Microsoft Graph API
AI News & Updates
Microsoft Graph API
John Hammond Intermediate 1y ago
Staged Releases in SANS HHC
AI News & Updates
Staged Releases in SANS HHC
John Hammond Intermediate 1y ago
Collaborative Hacking with HHC 2024
Cybersecurity
Collaborative Hacking with HHC 2024
John Hammond Intermediate 1y ago
A Holiday Hacking Dream
Cybersecurity
A Holiday Hacking Dream
John Hammond Intermediate 1y ago
Scan QR Codes on Linux
AI Safety & Ethics
Scan QR Codes on Linux
John Hammond Intermediate 1y ago
QR Codes on Linux
AI Safety & Ethics
QR Codes on Linux
John Hammond Intermediate 1y ago
Decode Hex on Linux
AI Safety & Ethics
Decode Hex on Linux
John Hammond Intermediate 1y ago
How Hackers Compromise BIG Networks (with NetExec)
Cybersecurity
How Hackers Compromise BIG Networks (with NetExec)
John Hammond Intermediate 2y ago
The Apex Legends Hack.
Cybersecurity
The Apex Legends Hack.
John Hammond Intermediate 2y ago
Finding WEIRD Typosquatting Websites
Cybersecurity
Finding WEIRD Typosquatting Websites
John Hammond Intermediate 2y ago
The Secrets of The Tor Browser
Cybersecurity
The Secrets of The Tor Browser
John Hammond Intermediate 2y ago
Can a PDF File be Malware?
Cybersecurity
Can a PDF File be Malware?
John Hammond Intermediate 2y ago
Free Coding Tool Distributes Malware
Cybersecurity
Free Coding Tool Distributes Malware
John Hammond Intermediate 2y ago
Notepad.exe Will Snitch On You (full coding project)
Cybersecurity
Notepad.exe Will Snitch On You (full coding project)
John Hammond Intermediate 2y ago
One Code Mistake Ruined This Website
Cybersecurity
One Code Mistake Ruined This Website
John Hammond Intermediate 2y ago
Tracking Cybercrime on Telegram
Cybersecurity
Tracking Cybercrime on Telegram
John Hammond Intermediate 2y ago
Don't Forget This One Hacking Trick
Cybersecurity
Don't Forget This One Hacking Trick
John Hammond Intermediate 2y ago
SMB Shares & Cronjob to Initial Access (Proving Grounds: Dawn)
Cybersecurity
SMB Shares & Cronjob to Initial Access (Proving Grounds: Dawn)
John Hammond Intermediate 2y ago
Enterprise security one step at a time
Cybersecurity
Enterprise security one step at a time
John Hammond Intermediate 2y ago
I AUTOMATED a Penetration Test!?
Cybersecurity
I AUTOMATED a Penetration Test!?
John Hammond Intermediate 2y ago
Healthcare Software Exploit: CVE-2023-43208
Cybersecurity
Healthcare Software Exploit: CVE-2023-43208
John Hammond Intermediate 2y ago
Run this script with Eval
Cybersecurity
Run this script with Eval
John Hammond Intermediate 2y ago
Debug with JS-Beautify
Cybersecurity
Debug with JS-Beautify
John Hammond Intermediate 2y ago
Debug with Visual Studio
Cybersecurity
Debug with Visual Studio
John Hammond Intermediate 2y ago
Exploring the BIGGEST SCAMS in the Dark Web
Cybersecurity
Exploring the BIGGEST SCAMS in the Dark Web
John Hammond Intermediate 2y ago
Welcome back, Ryan Chapman
Cybersecurity
Welcome back, Ryan Chapman
John Hammond Intermediate 2y ago
PikaBot Malware Analysis: Debugging in Visual Studio
Cybersecurity
PikaBot Malware Analysis: Debugging in Visual Studio
John Hammond Intermediate 2y ago
📚 Coursera Courses Opens on Coursera · Free to audit
1 / 3 View all →
Boost Your Productivity with GitHub Copilot
📚 Coursera Course ↗
Self-paced
Boost Your Productivity with GitHub Copilot
Opens on Coursera ↗
Apply C# Skills Through a Student Management Project
📚 Coursera Course ↗
Self-paced
Apply C# Skills Through a Student Management Project
Opens on Coursera ↗
Systems and Solutions Architect Capstone Project
📚 Coursera Course ↗
Self-paced
Systems and Solutions Architect Capstone Project
Opens on Coursera ↗
The Solar System
📚 Coursera Course ↗
Self-paced
The Solar System
Opens on Coursera ↗
Creatividad en la bandeja de entrada: marketing por correo electrónico
📚 Coursera Course ↗
Self-paced
Creatividad en la bandeja de entrada: marketing por correo electrónico
Opens on Coursera ↗
Materials and Textures in Unreal Engine 5
📚 Coursera Course ↗
Self-paced
Materials and Textures in Unreal Engine 5
Opens on Coursera ↗