✕ Clear filters
1,053 lessons

Browse Lessons

Curated from top practitioners. Filtered, not flooded.

All ▶ YouTube 184,430📚 Coursera 16,184
BloodHound can map ANYTHING
Cybersecurity
BloodHound can map ANYTHING
John Hammond Beginner 7mo ago
i need your help.
Cybersecurity
i need your help.
John Hammond Beginner 7mo ago
how hackers hide (Intro to Beacon Object Files - with Empire C2!)
Cybersecurity
how hackers hide (Intro to Beacon Object Files - with Empire C2!)
John Hammond Beginner 9mo ago
how hackers avoid getting caught
Cybersecurity
how hackers avoid getting caught
John Hammond Beginner 9mo ago
Learn Google Dorking!
AI News & Updates
Learn Google Dorking!
John Hammond Beginner 9mo ago
Reverse Engineering Anti-Debugging Techniques (with Nathan Baggs!)
Cybersecurity
Reverse Engineering Anti-Debugging Techniques (with Nathan Baggs!)
John Hammond Beginner 9mo ago
this malware hides in a WALLPAPER
Cybersecurity
this malware hides in a WALLPAPER
John Hammond Advanced 9mo ago
hackers trick everyone to run malware (FileFix)
Cybersecurity
hackers trick everyone to run malware (FileFix)
John Hammond Beginner 9mo ago
How You Can Impersonate Anyone in Active Directory (with Shikata!)
Cybersecurity
How You Can Impersonate Anyone in Active Directory (with Shikata!)
John Hammond Intermediate 9mo ago
Learn Capture the Flag!
Cybersecurity
Learn Capture the Flag!
John Hammond Beginner 9mo ago
Evading Antivirus Detection in C (with Dahvid Schloss)
Cybersecurity
Evading Antivirus Detection in C (with Dahvid Schloss)
John Hammond Intermediate 9mo ago
Learning to Hack Active Directory Certificate Services (with Shikata!)
Cybersecurity
Learning to Hack Active Directory Certificate Services (with Shikata!)
John Hammond Intermediate 10mo ago
Learn Phishing!
Cybersecurity
Learn Phishing!
John Hammond Beginner 10mo ago
Hunting Phishing Kits
Cybersecurity
Hunting Phishing Kits
John Hammond Beginner 10mo ago
Windows Endpoint Telemetry (ft. Jonny Johnson)
Cybersecurity
Windows Endpoint Telemetry (ft. Jonny Johnson)
John Hammond Intermediate 10mo ago
Malware & Hackers Evade Antivirus with Windows Sandbox
Cybersecurity
Malware & Hackers Evade Antivirus with Windows Sandbox
John Hammond Intermediate 10mo ago
hackers weaponize... really long filenames??
Cybersecurity
hackers weaponize... really long filenames??
John Hammond Intermediate 10mo ago
FAKE Gambling Cheat Runs Malware
Cybersecurity
FAKE Gambling Cheat Runs Malware
John Hammond Advanced 10mo ago
Learn Quantum Computing!
Cybersecurity
Learn Quantum Computing!
John Hammond Beginner 10mo ago
golang obfuscated malware goes crazy
Cybersecurity
golang obfuscated malware goes crazy
John Hammond Intermediate 11mo ago
The CVE Foundation Interview
Cybersecurity
The CVE Foundation Interview
John Hammond Intermediate 11mo ago
The Gremlin Stealer Malware
Cybersecurity
The Gremlin Stealer Malware
John Hammond Beginner 11mo ago
Team Shellphish AIxCC Interview
Cybersecurity
Team Shellphish AIxCC Interview
John Hammond Intermediate 11mo ago
Artificial Intelligence x Cyber Challenge (DARPA Interview)
Cybersecurity
Artificial Intelligence x Cyber Challenge (DARPA Interview)
John Hammond Beginner 11mo ago
How Hackers Steal Passwords
Cybersecurity
How Hackers Steal Passwords
John Hammond Intermediate 11mo ago
cybersecurity expert gets hacked
Cybersecurity
cybersecurity expert gets hacked
John Hammond Beginner 11mo ago
Blocking EVERYTHING with Windows Firewall
Cybersecurity
Blocking EVERYTHING with Windows Firewall
John Hammond Intermediate 11mo ago
cybersecurity just got f***ed
Cybersecurity
cybersecurity just got f***ed
John Hammond Intermediate 12mo ago
Finding Web App Vulnerabilities with AI
Cybersecurity
Finding Web App Vulnerabilities with AI
John Hammond Intermediate 12mo ago
Screenshot.jpg (When They Got Hacked)
Cybersecurity
Screenshot.jpg (When They Got Hacked)
John Hammond Beginner 1y ago
I Backdoored Cursor AI
Cybersecurity
I Backdoored Cursor AI
John Hammond Intermediate 1y ago
Learn Cybersecurity Defense!
Cybersecurity
Learn Cybersecurity Defense!
John Hammond Beginner 1y ago
We're Hosting a Conference
Cybersecurity
We're Hosting a Conference
John Hammond Beginner 1y ago
this MP3 file is malware
Cybersecurity
this MP3 file is malware
John Hammond Intermediate 1y ago
the CRITICAL 9.1 severity Next.js vulnerability
Cybersecurity
the CRITICAL 9.1 severity Next.js vulnerability
John Hammond Intermediate 1y ago
Learn API Hacking!
Cybersecurity
Learn API Hacking!
John Hammond Beginner 1y ago
ms teams is now a C2 (command-and-control)
Cybersecurity
ms teams is now a C2 (command-and-control)
John Hammond Intermediate 1y ago
I took the TryHackMe Security Analyst Level 1 Certification (SAL1)
Cybersecurity
I took the TryHackMe Security Analyst Level 1 Certification (SAL1)
John Hammond Beginner 1y ago
they tried to hack me so i confronted them
Cybersecurity
they tried to hack me so i confronted them
John Hammond Intermediate 1y ago
LEAKED Russian Hackers Internal Chats
Cybersecurity
LEAKED Russian Hackers Internal Chats
John Hammond Beginner 1y ago
MSPGEEKCON is back for 2025
Cybersecurity
MSPGEEKCON is back for 2025
John Hammond Beginner 1y ago
TECH SUPPORT GONE WRONG
Cybersecurity
TECH SUPPORT GONE WRONG
John Hammond Beginner 1y ago
the tools that real hackers use
Cybersecurity
the tools that real hackers use
John Hammond Intermediate 1y ago
are built-in windows programs vulnerable?
Cybersecurity
are built-in windows programs vulnerable?
John Hammond Intermediate 1y ago
Can you handle a cyber attack? TryHackMe SOC Simulator
Cybersecurity
Can you handle a cyber attack? TryHackMe SOC Simulator
John Hammond Advanced 1y ago
The Snyk Fetch the Flag CTF is LIVE right now!!
Cybersecurity
The Snyk Fetch the Flag CTF is LIVE right now!!
John Hammond Intermediate 1y ago
my shortest video ever
Cybersecurity
my shortest video ever
John Hammond Beginner 1y ago
Chat with Microsoft about NEW Scareware Blocker
Cybersecurity
Chat with Microsoft about NEW Scareware Blocker
John Hammond Beginner 1y ago
📚 Coursera Courses Opens on Coursera · Free to audit
1 / 3 View all →
Evaluate, Create, and Analyze App Security
📚 Coursera Course ↗
Self-paced
Evaluate, Create, and Analyze App Security
Opens on Coursera ↗
Predictive Models: Build, Explore Data & Deploy
📚 Coursera Course ↗
Self-paced
Predictive Models: Build, Explore Data & Deploy
Opens on Coursera ↗
Observability Engineering: Metrics, Logs, and Traces
📚 Coursera Course ↗
Self-paced
Observability Engineering: Metrics, Logs, and Traces
Opens on Coursera ↗
Disease Screening in Public Health
📚 Coursera Course ↗
Self-paced
Disease Screening in Public Health
Opens on Coursera ↗
Internet of Things: Setting Up Your DragonBoard™ Development Platform
📚 Coursera Course ↗
Self-paced
Internet of Things: Setting Up Your DragonBoard™ Development Platform
Opens on Coursera ↗
Personal & Professional Development: Digital Norms for Teams
📚 Coursera Course ↗
Self-paced
Personal & Professional Development: Digital Norms for Teams
Opens on Coursera ↗