✕ Clear filters
815 lessons

🔐 Cybersecurity

Ethical hacking, penetration testing, network security, CTFs and defensive security

All ▶ YouTube 176,388📚 Coursera 16,152
HUGE AI-powered Microsoft Account phishing campaign
Cybersecurity
HUGE AI-powered Microsoft Account phishing campaign
John Hammond Beginner 5d ago
How Teenage Hackers Hijack the Internet (with Joe Tidy!)
Cybersecurity
How Teenage Hackers Hijack the Internet (with Joe Tidy!)
John Hammond Beginner 6d ago
Hackers make FAKE notifications
Cybersecurity
Hackers make FAKE notifications
John Hammond Advanced 1w ago
Extremely Easy Identity Management (with Fletcher Heisler!)
Cybersecurity
Extremely Easy Identity Management (with Fletcher Heisler!)
John Hammond Beginner 1w ago
AI Cyber Defense Ops Course Launch!
Cybersecurity
AI Cyber Defense Ops Course Launch!
John Hammond Advanced 2w ago
HUGE supply chain attack
Cybersecurity
HUGE supply chain attack
John Hammond Beginner 2w ago
ChatGPT For The Dark Web
Cybersecurity
ChatGPT For The Dark Web
John Hammond Beginner 3w ago
State of the Cybersecurity Workforce, JHT / WiCyS RSAC Preview
Cybersecurity
State of the Cybersecurity Workforce, JHT / WiCyS RSAC Preview
John Hammond Advanced 3w ago
NahamSec Teaches Me Bug Bounty Basics
Cybersecurity
NahamSec Teaches Me Bug Bounty Basics
John Hammond Beginner 1mo ago
GraphSpy: Hacker's Tooling Deep Dive (w/ creator @RedByte1337!)
Cybersecurity
GraphSpy: Hacker's Tooling Deep Dive (w/ creator @RedByte1337!)
John Hammond Intermediate 1mo ago
An Interview with Allie Mellen (author: CODE WAR)
Cybersecurity
An Interview with Allie Mellen (author: CODE WAR)
John Hammond Beginner 1mo ago
The Payload Podcast #003
Cybersecurity
The Payload Podcast #003
John Hammond Beginner 1mo ago
crypto scammers phish with physical mail
Cybersecurity
crypto scammers phish with physical mail
John Hammond Beginner 1mo ago
h?ckers a[r]e gl*bbing
Cybersecurity
h?ckers a[r]e gl*bbing
John Hammond Intermediate 1mo ago
thousands of Google API keys exposed
Cybersecurity
thousands of Google API keys exposed
John Hammond Beginner 1mo ago
Learn PowerShell!
Cybersecurity
Learn PowerShell!
John Hammond Beginner 1mo ago
The Payload Podcast #002 with Connor McGarr
Cybersecurity
The Payload Podcast #002 with Connor McGarr
John Hammond Beginner 1mo ago
Russia is hacking zero-days again
Cybersecurity
Russia is hacking zero-days again
John Hammond Beginner 1mo ago
ContinuumCon is back for 2026!
Cybersecurity
ContinuumCon is back for 2026!
John Hammond Beginner 1mo ago
An Interview with Eva Benn!
Cybersecurity
An Interview with Eva Benn!
John Hammond Beginner 1mo ago
TiKTok needs to fix this vulnerability
Cybersecurity
TiKTok needs to fix this vulnerability
John Hammond Beginner 1mo ago
AI wrote a hit piece
Cybersecurity
AI wrote a hit piece
John Hammond Beginner 1mo ago
this is really funny
Cybersecurity
this is really funny
John Hammond Beginner 1mo ago
Moltbook is still weird (and AI skills suck)
Cybersecurity
Moltbook is still weird (and AI skills suck)
John Hammond Beginner 2mo ago
The Payload Podcast #001 with Jonny Johnson & Max Harley
Cybersecurity
The Payload Podcast #001 with Jonny Johnson & Max Harley
John Hammond Beginner 2mo ago
Clawdbot Malware
Cybersecurity
Clawdbot Malware
John Hammond Advanced 2mo ago
🦞🤖MOAR CLAWDBOT CRAP🦞🤖
Cybersecurity
🦞🤖MOAR CLAWDBOT CRAP🦞🤖
John Hammond Beginner 2mo ago
🦞🤖CLAWDBOT SECURITY??🦞🤖
Cybersecurity
🦞🤖CLAWDBOT SECURITY??🦞🤖
John Hammond Beginner 2mo ago
🤖🤖🤖
Cybersecurity
🤖🤖🤖
John Hammond Beginner 2mo ago
🤖🤖
Cybersecurity
🤖🤖
John Hammond Beginner 2mo ago
🤖
Cybersecurity
🤖
John Hammond Beginner 2mo ago
"I made an Evil MCP server" (and AI fell for it)
Cybersecurity
"I made an Evil MCP server" (and AI fell for it)
John Hammond Beginner 2mo ago
NTUSER.MAN
Cybersecurity
NTUSER.MAN
John Hammond Intermediate 2mo ago
Learn Cyber Deception!
Cybersecurity
Learn Cyber Deception!
John Hammond Beginner 3mo ago
Hacking Endpoint to Identity (Microsoft 365): "ConsentFix"
Cybersecurity
Hacking Endpoint to Identity (Microsoft 365): "ConsentFix"
John Hammond Beginner 4mo ago
Infostealer Malware Logs Analyzed by... AI !?!
Cybersecurity
Infostealer Malware Logs Analyzed by... AI !?!
John Hammond Beginner 4mo ago
carving emails & AI prompt injection hacking
Cybersecurity
carving emails & AI prompt injection hacking
John Hammond Beginner 4mo ago
Beginner Blue Team Training!
Cybersecurity
Beginner Blue Team Training!
John Hammond Beginner 4mo ago
so malware is invisible now lol
Cybersecurity
so malware is invisible now lol
John Hammond Advanced 4mo ago
Next.js & React vulnerability will break the internet
Cybersecurity
Next.js & React vulnerability will break the internet
John Hammond Advanced 4mo ago
Phishing for Passwords! (Advent of Cyber Day 02)
Cybersecurity
Phishing for Passwords! (Advent of Cyber Day 02)
John Hammond Beginner 4mo ago
NPM malware now has multiple targets!
Cybersecurity
NPM malware now has multiple targets!
John Hammond Beginner 4mo ago
Learn Cybersecurity: Advent of Cyber 2025 (TryHackMe!)
Cybersecurity
Learn Cybersecurity: Advent of Cyber 2025 (TryHackMe!)
John Hammond Beginner 4mo ago
The State of Cybercrime in 2025 Part 2 (with Nick Ascoli!)
Cybersecurity
The State of Cybercrime in 2025 Part 2 (with Nick Ascoli!)
John Hammond Advanced 4mo ago
Keylogger Malware Analysis
Cybersecurity
Keylogger Malware Analysis
John Hammond Beginner 4mo ago
Wazuh gives visibility to EVERYTHING
Cybersecurity
Wazuh gives visibility to EVERYTHING
John Hammond Beginner 4mo ago
hacking twitch chat
Cybersecurity
hacking twitch chat
John Hammond Beginner 4mo ago
Mostly Stupid Hacks
Cybersecurity
Mostly Stupid Hacks
John Hammond Intermediate 4mo ago
📚 Coursera Courses Opens on Coursera · Free to audit
1 / 3 View all →
Certified Kubernetes Administrator (CKA): Unit 4
📚 Coursera Course ↗
Self-paced
Certified Kubernetes Administrator (CKA): Unit 4
Opens on Coursera ↗
Protection of Information Assets
📚 Coursera Course ↗
Self-paced
Protection of Information Assets
Opens on Coursera ↗
Securing and Monitoring AWS Infrastructure
📚 Coursera Course ↗
Self-paced
Securing and Monitoring AWS Infrastructure
Opens on Coursera ↗
AI for Cybersecurity
📚 Coursera Course ↗
Self-paced
AI for Cybersecurity
Opens on Coursera ↗
Intermediate Ethical Hacking Techniques
📚 Coursera Course ↗
Self-paced
Intermediate Ethical Hacking Techniques
Opens on Coursera ↗
TLS & HTTPS Explained – Visualizations & Localhost Setup
📚 Coursera Course ↗
Self-paced
TLS & HTTPS Explained – Visualizations & Localhost Setup
Opens on Coursera ↗