✕ Clear filters
1,053 lessons

Browse Lessons

Curated from top practitioners. Filtered, not flooded.

All ▶ YouTube 184,513📚 Coursera 16,210
Unlocking Docker Inside Docker: The DIND Revolution
AI Safety & Ethics
Unlocking Docker Inside Docker: The DIND Revolution
John Hammond Intermediate 1y ago
Learn Cryptography!
Cybersecurity
Learn Cryptography!
John Hammond Beginner 1y ago
Social Engineering: Accessing Microsoft Graph API Secrets
AI News & Updates
Social Engineering: Accessing Microsoft Graph API Secrets
John Hammond Intermediate 1y ago
Mastering Docker: Build Your Own Authentication & Registry Service
AI Safety & Ethics
Mastering Docker: Build Your Own Authentication & Registry Service
John Hammond Intermediate 1y ago
Unlocking the Secrets of Docker: A Creative Journey
AI Safety & Ethics
Unlocking the Secrets of Docker: A Creative Journey
John Hammond Intermediate 1y ago
Unlocking Service User Secrets: Bypassing Authentication Flaws
AI Safety & Ethics
Unlocking Service User Secrets: Bypassing Authentication Flaws
John Hammond Intermediate 1y ago
Master Docker Images with Scopio: Simplify Your Workflow
AI Tools & Apps
Master Docker Images with Scopio: Simplify Your Workflow
John Hammond Intermediate 1y ago
Linux Challenges for Holiday Hacking
Cybersecurity
Linux Challenges for Holiday Hacking
John Hammond Intermediate 1y ago
Inside the Registry Challenge: CTF Zone Finals 2024
Cybersecurity
Inside the Registry Challenge: CTF Zone Finals 2024
John Hammond Intermediate 1y ago
Capture the Flag! Command Injection by Docker Layers
Cybersecurity
Capture the Flag! Command Injection by Docker Layers
John Hammond Beginner 1y ago
From Novice to Pro: Unleashing Hacking Genius
Cybersecurity
From Novice to Pro: Unleashing Hacking Genius
John Hammond Intermediate 1y ago
Unlock Your Cybersecurity Potential with Hands-On Labs
Cybersecurity
Unlock Your Cybersecurity Potential with Hands-On Labs
John Hammond Intermediate 1y ago
Unlocking Privilege Escalation in EntraID: The Essentials
Cybersecurity
Unlocking Privilege Escalation in EntraID: The Essentials
John Hammond Intermediate 1y ago
Exposing Vulnerabilities in EntraID: Ethical Hacking Insights
Cybersecurity
Exposing Vulnerabilities in EntraID: Ethical Hacking Insights
John Hammond Intermediate 1y ago
Hacking Everyday Items: The Truth Behind Suitcase Locks
Cybersecurity
Hacking Everyday Items: The Truth Behind Suitcase Locks
John Hammond Intermediate 1y ago
Exciting New Game Releases and Holiday Fun!
AI News & Updates
Exciting New Game Releases and Holiday Fun!
John Hammond Intermediate 1y ago
Hacking Microsoft 365: Maintain Access Like a Pro
AI News & Updates
Hacking Microsoft 365: Maintain Access Like a Pro
John Hammond Intermediate 1y ago
Microsoft Graph API
AI News & Updates
Microsoft Graph API
John Hammond Intermediate 1y ago
Staged Releases in SANS HHC
AI News & Updates
Staged Releases in SANS HHC
John Hammond Intermediate 1y ago
Collaborative Hacking with HHC 2024
Cybersecurity
Collaborative Hacking with HHC 2024
John Hammond Intermediate 1y ago
A Holiday Hacking Dream
Cybersecurity
A Holiday Hacking Dream
John Hammond Intermediate 1y ago
World Building for SANS Holiday Hack Challenge
Cybersecurity
World Building for SANS Holiday Hack Challenge
John Hammond Beginner 1y ago
Cities Skylines II Malware [FULL REVERSE ENGINEERING ANALYSIS]
Cybersecurity
Cities Skylines II Malware [FULL REVERSE ENGINEERING ANALYSIS]
John Hammond Beginner 1y ago
SaaS apps are vulnerable too!!! (ServiceNow Exploitation)
Cybersecurity
SaaS apps are vulnerable too!!! (ServiceNow Exploitation)
John Hammond Beginner 1y ago
How Hackers Persist & Privesc in Microsoft 365
Cybersecurity
How Hackers Persist & Privesc in Microsoft 365
John Hammond Beginner 1y ago
Learn Open-Source Intelligence (OSINT)!
Cybersecurity
Learn Open-Source Intelligence (OSINT)!
John Hammond Beginner 1y ago
Holiday Hack Challenge   Ed Skoudis Interview
Cybersecurity
Holiday Hack Challenge Ed Skoudis Interview
John Hammond Beginner 1y ago
Exploring the Wiz Cloud Security Platform
Cybersecurity
Exploring the Wiz Cloud Security Platform
John Hammond Beginner 1y ago
Windows Servers Can Expose PowerShell on the Web
Cybersecurity
Windows Servers Can Expose PowerShell on the Web
John Hammond Beginner 1y ago
Hackers Abuse MeshCentral for a RAT
Cybersecurity
Hackers Abuse MeshCentral for a RAT
John Hammond Beginner 1y ago
Bruteforcing Windows Defender Exclusions
Cybersecurity
Bruteforcing Windows Defender Exclusions
John Hammond Advanced 1y ago
REAL Ransomware Chat Logs
Cybersecurity
REAL Ransomware Chat Logs
John Hammond Beginner 1y ago
Github Intentionally Lets You Read Deleted & Private Commits
Cybersecurity
Github Intentionally Lets You Read Deleted & Private Commits
John Hammond Beginner 1y ago
Three Ways to Hack Mobile Apps
Cybersecurity
Three Ways to Hack Mobile Apps
John Hammond Beginner 1y ago
They Say This Malware is INSANE
Cybersecurity
They Say This Malware is INSANE
John Hammond Beginner 1y ago
Hacking from Cloud to Endpoint (and vice versa)
Cybersecurity
Hacking from Cloud to Endpoint (and vice versa)
John Hammond Beginner 1y ago
Where Does Malware Go On Your Computer?
Cybersecurity
Where Does Malware Go On Your Computer?
John Hammond Beginner 1y ago
Hacking ALL Levels in this Game!
Cybersecurity
Hacking ALL Levels in this Game!
John Hammond Beginner 1y ago
Cracking Active Directory Passwords & MFA Fatigue
Cybersecurity
Cracking Active Directory Passwords & MFA Fatigue
John Hammond Beginner 1y ago
How to Scrape Telegram with Python
Cybersecurity
How to Scrape Telegram with Python
John Hammond Beginner 1y ago
Fake CAPTCHA Runs Malware
Cybersecurity
Fake CAPTCHA Runs Malware
John Hammond Beginner 1y ago
Ransomware In Action: MedusaLocker ReadText34
Cybersecurity
Ransomware In Action: MedusaLocker ReadText34
John Hammond Advanced 1y ago
Chinese Hackers use Visual Studio Code to Target Asian Governments
AI News & Updates
Chinese Hackers use Visual Studio Code to Target Asian Governments
John Hammond Beginner 1y ago
The Hacker with Hardware Implants (interview)
Cybersecurity
The Hacker with Hardware Implants (interview)
John Hammond Beginner 1y ago
Hacking Games with MelonLoader
Cybersecurity
Hacking Games with MelonLoader
John Hammond Beginner 1y ago
I Can't Scan This Website
Cybersecurity
I Can't Scan This Website
John Hammond Beginner 1y ago
Unity Game Hacking with dnSpy
Cybersecurity
Unity Game Hacking with dnSpy
John Hammond Beginner 1y ago
Self-Extracting Executables for Hackers
AI News & Updates
Self-Extracting Executables for Hackers
John Hammond Beginner 1y ago
📚 Coursera Courses Opens on Coursera · Free to audit
1 / 3 View all →
The Solar System
📚 Coursera Course ↗
Self-paced
The Solar System
Opens on Coursera ↗
English for Journalism
📚 Coursera Course ↗
Self-paced
English for Journalism
Opens on Coursera ↗
Industrial Cybersecurity
📚 Coursera Course ↗
Self-paced
Industrial Cybersecurity
Opens on Coursera ↗
AI Demystified - A Simple Guide for Newcomers
📚 Coursera Course ↗
Self-paced
AI Demystified - A Simple Guide for Newcomers
Opens on Coursera ↗
Einführung in Easil für Soziale Medien
📚 Coursera Course ↗
Self-paced
Einführung in Easil für Soziale Medien
Opens on Coursera ↗
C++ Lambda Expressions - From C++98 to C++23
📚 Coursera Course ↗
Self-paced
C++ Lambda Expressions - From C++98 to C++23
Opens on Coursera ↗