✕ Clear filters
1,054 lessons

Browse Lessons

Curated from top practitioners. Filtered, not flooded.

All ▶ YouTube 184,623📚 Coursera 16,277
FAKE Microsoft Login to Hacked Charity Scam
AI News & Updates
FAKE Microsoft Login to Hacked Charity Scam
John Hammond Beginner 2y ago
Hands-on Ransomware: Exploring Cybercrime
AI Safety & Ethics
Hands-on Ransomware: Exploring Cybercrime
John Hammond Beginner 2y ago
Threat Emulation & Purple Teaming (with PlexTrac Runbooks)
Data Analytics & Business Intelligence
Threat Emulation & Purple Teaming (with PlexTrac Runbooks)
John Hammond Beginner 2y ago
How Can CI/CD Go Horribly Wrong?
AI Safety & Ethics
How Can CI/CD Go Horribly Wrong?
John Hammond Beginner 2y ago
Rapid Windows Memory Analysis with Volatility 3
Cybersecurity
Rapid Windows Memory Analysis with Volatility 3
John Hammond Intermediate 2y ago
Exploring the Latest Dark Web Onion Sites
Cybersecurity
Exploring the Latest Dark Web Onion Sites
John Hammond Intermediate 2y ago
Raspberry Pi Malware uses IRC Remote Access Trojan (RAT)
AI Safety & Ethics
Raspberry Pi Malware uses IRC Remote Access Trojan (RAT)
John Hammond Intermediate 2y ago
ChatGPT Analyzes Fake ChatGPT Malware
Large Language Models
ChatGPT Analyzes Fake ChatGPT Malware
John Hammond Intermediate 2y ago
Why Don't People Want Security?
Data Analytics & Business Intelligence
Why Don't People Want Security?
John Hammond Intermediate 2y ago
Hide a Hacker's Reverse Shell in ONE Command
Cybersecurity
Hide a Hacker's Reverse Shell in ONE Command
John Hammond Intermediate 2y ago
Getting Started in Firmware Analysis & IoT Reverse Engineering
Cybersecurity
Getting Started in Firmware Analysis & IoT Reverse Engineering
John Hammond Beginner 2y ago
How To Setup ELK | Elastic Agents & Sysmon for Cybersecurity
AI Agents & Automation
How To Setup ELK | Elastic Agents & Sysmon for Cybersecurity
John Hammond Intermediate 2y ago
PowerShell CRYPTOSTEALER through DNS
AI Safety & Ethics
PowerShell CRYPTOSTEALER through DNS
John Hammond Intermediate 2y ago
Hacking Complex Passwords with Rules & Munging
Cybersecurity
Hacking Complex Passwords with Rules & Munging
John Hammond Intermediate 2y ago
Living Off The Land - Windows Disk Cleaner Persistence
Cybersecurity
Living Off The Land - Windows Disk Cleaner Persistence
John Hammond Intermediate 2y ago
Hunt for Hackers with Velociraptor
AI Safety & Ethics
Hunt for Hackers with Velociraptor
John Hammond Beginner 2y ago
ChatGPT tries a BASIC Capture The Flag (CTF) Challenge
Large Language Models
ChatGPT tries a BASIC Capture The Flag (CTF) Challenge
John Hammond Intermediate 2y ago
How To Test Your Security with Atomic Red Team
Cybersecurity
How To Test Your Security with Atomic Red Team
John Hammond Intermediate 2y ago
Quick Forensics of Windows Event Logs (DeepBlueCLI)
AI Safety & Ethics
Quick Forensics of Windows Event Logs (DeepBlueCLI)
John Hammond Beginner 2y ago
winget: Install ROGUE Software & Packages?
Cybersecurity
winget: Install ROGUE Software & Packages?
John Hammond Intermediate 2y ago
What SECRETS are in your Clipboard?
Cybersecurity
What SECRETS are in your Clipboard?
John Hammond Beginner 2y ago
Kubernetes Hacking: From Weak Applications to Cluster Control
Cybersecurity
Kubernetes Hacking: From Weak Applications to Cluster Control
John Hammond Intermediate 2y ago
Python Pwntools Hacking: ret2libc GOT & PLT
Cybersecurity
Python Pwntools Hacking: ret2libc GOT & PLT
John Hammond Intermediate 3y ago
Cybersecurity Labs (FOR FREE) - Linux Backdoor Analysis
Cybersecurity
Cybersecurity Labs (FOR FREE) - Linux Backdoor Analysis
John Hammond Beginner 3y ago
Most ChatGPT Extensions Are Just Malware
Large Language Models
Most ChatGPT Extensions Are Just Malware
John Hammond Advanced 3y ago
How FAST Can You Write a Pentest Report?
Cybersecurity
How FAST Can You Write a Pentest Report?
John Hammond Beginner 3y ago
Password Hacking in Kali Linux
Cybersecurity
Password Hacking in Kali Linux
John Hammond Intermediate 3y ago
The Latest YouTube Malware Scam
Copywriting & Content Strategy
The Latest YouTube Malware Scam
John Hammond Beginner 3y ago
3CX VOIP Compromised & Supply Chain Threat
AI News & Updates
3CX VOIP Compromised & Supply Chain Threat
John Hammond Beginner 3y ago
You Can BUY This Hacked YouTube Channel
AI Safety & Ethics
You Can BUY This Hacked YouTube Channel
John Hammond Intermediate 3y ago
So Linus Tech Tips Got Hacked...
AI Safety & Ethics
So Linus Tech Tips Got Hacked...
John Hammond Intermediate 3y ago
Hackers Bypass Google Two-Factor Authentication (2FA) SMS
Cybersecurity
Hackers Bypass Google Two-Factor Authentication (2FA) SMS
John Hammond Intermediate 3y ago
CI/CD GOAT: Mad Hatter Capture The Flag
Cybersecurity
CI/CD GOAT: Mad Hatter Capture The Flag
John Hammond Beginner 3y ago
Kali Linux for DEFENSE? (Kali Purple 2023.1 Review)
AI Tools & Apps
Kali Linux for DEFENSE? (Kali Purple 2023.1 Review)
John Hammond Intermediate 3y ago
I Found Your Github Secrets
AI Safety & Ethics
I Found Your Github Secrets
John Hammond Intermediate 3y ago
Free Hacking APIs Course (APISEC University!)
Cybersecurity
Free Hacking APIs Course (APISEC University!)
John Hammond Beginner 3y ago
Hacking CI/CD (Basic Pipeline Poisoning)
Cybersecurity
Hacking CI/CD (Basic Pipeline Poisoning)
John Hammond Intermediate 3y ago
How YouTubers Are Getting Hacked
AI Safety & Ethics
How YouTubers Are Getting Hacked
John Hammond Intermediate 3y ago
a Hacker's Backdoor: Service Control Manager
AI News & Updates
a Hacker's Backdoor: Service Control Manager
John Hammond Beginner 3y ago
Unraveling Discord Token Stealer (python MALWARE)
Cybersecurity
Unraveling Discord Token Stealer (python MALWARE)
John Hammond Beginner 3y ago
My Password Was Pwned 13 Times
AI Safety & Ethics
My Password Was Pwned 13 Times
John Hammond Intermediate 3y ago
New IT & Security Event: MSPGEEKCON
AI Safety & Ethics
New IT & Security Event: MSPGEEKCON
John Hammond Intermediate 3y ago
Is This Website LEAKING?
Cybersecurity
Is This Website LEAKING?
John Hammond Beginner 3y ago
Strange File in Downloads Folder? Gootloader Malware Analysis
Cybersecurity
Strange File in Downloads Folder? Gootloader Malware Analysis
John Hammond Beginner 3y ago
Carving Exfiltrated Network Data from a Hack (Python & Scapy)
Cybersecurity
Carving Exfiltrated Network Data from a Hack (Python & Scapy)
John Hammond Beginner 3y ago
I Tried The HackTheBox Certified Pentester Exam
Cybersecurity
I Tried The HackTheBox Certified Pentester Exam
John Hammond Advanced 3y ago
Can You Find Where a Picture was Taken?
AI Safety & Ethics
Can You Find Where a Picture was Taken?
John Hammond Intermediate 3y ago
Evading Filters to Dump Databases (like a hacker)
Cybersecurity
Evading Filters to Dump Databases (like a hacker)
John Hammond Advanced 3y ago
📚 Coursera Courses Opens on Coursera · Free to audit
1 / 3 View all →
AI Workflow: Business Priorities and Data Ingestion
📚 Coursera Course ↗
Self-paced
AI Workflow: Business Priorities and Data Ingestion
Opens on Coursera ↗
Data Science Fundamentals Part 1: Unit 2
📚 Coursera Course ↗
Self-paced
Data Science Fundamentals Part 1: Unit 2
Opens on Coursera ↗
Sensors and Systems for Biomedical Applications
📚 Coursera Course ↗
Self-paced
Sensors and Systems for Biomedical Applications
Opens on Coursera ↗
Mastering Data Visualization in Microsoft PowerPoint
📚 Coursera Course ↗
Self-paced
Mastering Data Visualization in Microsoft PowerPoint
Opens on Coursera ↗
Production Machine Learning Systems - Español
📚 Coursera Course ↗
Self-paced
Production Machine Learning Systems - Español
Opens on Coursera ↗
Evaluate Vision Errors: Identify Failure Patterns
📚 Coursera Course ↗
Self-paced
Evaluate Vision Errors: Identify Failure Patterns
Opens on Coursera ↗