✕ Clear filters
237 lessons

🔐 Cybersecurity

Ethical hacking, penetration testing, network security, CTFs and defensive security

All ▶ YouTube 184,430📚 Coursera 16,184
Git'ing Users for OSINT: Analysis of All GitHub Users | SANS@MIC Talk
Cybersecurity
Git'ing Users for OSINT: Analysis of All GitHub Users | SANS@MIC Talk
SANS Institute Advanced 5y ago
The 14 Absolute Truths of Security | SANS@MIC Talk
Cybersecurity
The 14 Absolute Truths of Security | SANS@MIC Talk
SANS Institute Advanced 5y ago
Wiresharking CURL - How a single GET request translates to 10 TCP Packets
Cybersecurity
Wiresharking CURL - How a single GET request translates to 10 TCP Packets
Hussein Nasser Advanced 5y ago
How End-to-End encryption Works?
Cybersecurity
How End-to-End encryption Works?
Hussein Nasser Advanced 6y ago
Penetration Testing Bootcamp - Passive Information Gathering Techniques & Tools
Cybersecurity
Penetration Testing Bootcamp - Passive Information Gathering Techniques & Tools
HackerSploit Advanced 6y ago
Penetration Testing Bootcamp - Information Gathering
Cybersecurity
Penetration Testing Bootcamp - Information Gathering
HackerSploit Advanced 6y ago
UniFi Dream Machine - the BEST WiFi router (Review and Advanced Setup)
Cybersecurity
UniFi Dream Machine - the BEST WiFi router (Review and Advanced Setup)
NetworkChuck Advanced 6y ago
No more excuses! Take ownership of your career. Your life. Your future. Your choice!
Cybersecurity
No more excuses! Take ownership of your career. Your life. Your future. Your choice!
David Bombal Advanced 7y ago
Multiple Comparisons and Conversion Optimization
Cybersecurity
Multiple Comparisons and Conversion Optimization
Data Skeptic Advanced 8y ago
Live Q&A on hacking prevention and recovery
Cybersecurity
Live Q&A on hacking prevention and recovery
Google Search Central Advanced 10y ago
#LevelUpLabs | SANS@MIC Talk
Cybersecurity
#LevelUpLabs | SANS@MIC Talk
SANS Institute Advanced 5y ago
SEC510: Multicloud Security Assessment and Defense | SANS@MIC Talk
Cybersecurity
SEC510: Multicloud Security Assessment and Defense | SANS@MIC Talk
SANS Institute Advanced 5y ago
Threat Hunting via DNS | SANS@MIC Talk
Cybersecurity
Threat Hunting via DNS | SANS@MIC Talk
SANS Institute Advanced 5y ago
No SQL Injection in MongoDB Applications | SANS@MIC Talk
Cybersecurity
No SQL Injection in MongoDB Applications | SANS@MIC Talk
SANS Institute Advanced 5y ago
The Only Constant is Change: Tracking Adversary Trends | STAR Webcast
Cybersecurity
The Only Constant is Change: Tracking Adversary Trends | STAR Webcast
SANS Institute Advanced 5y ago
Shellcode Analysis 101 | SANS@MIC Talk
Cybersecurity
Shellcode Analysis 101 | SANS@MIC Talk
SANS Institute Advanced 5y ago
SANS Live Online Interactive Local Lab Demo – FOR508: Advanced Incident Response
Cybersecurity
SANS Live Online Interactive Local Lab Demo – FOR508: Advanced Incident Response
SANS Institute Advanced 5y ago
Threat Hunting and the Rise of Targeted eCrime Intrusions | STAR Webcast
Cybersecurity
Threat Hunting and the Rise of Targeted eCrime Intrusions | STAR Webcast
SANS Institute Advanced 5y ago
Find_Evil - Threat Hunting | SANS@MIC Talk
Cybersecurity
Find_Evil - Threat Hunting | SANS@MIC Talk
SANS Institute Advanced 5y ago
Tricking modern endpoint security products | SANS@MIC Talk
Cybersecurity
Tricking modern endpoint security products | SANS@MIC Talk
SANS Institute Advanced 5y ago
The Hackers Apprentice | SANS@MIC Talk
Cybersecurity
The Hackers Apprentice | SANS@MIC Talk
SANS Institute Advanced 5y ago
How Threats are Responding to COVID-19 | STAR Webcast
Cybersecurity
How Threats are Responding to COVID-19 | STAR Webcast
SANS Institute Advanced 6y ago
Pen Testing ICS and Other Highly Restricted Environments | SANS@MIC Talk
Cybersecurity
Pen Testing ICS and Other Highly Restricted Environments | SANS@MIC Talk
SANS Institute Advanced 6y ago
The Hackers Apprentice | SANS@MIC Talk
Cybersecurity
The Hackers Apprentice | SANS@MIC Talk
SANS Institute Advanced 6y ago
xHunt - An Anime Fan's Attack Campaign in the Middle East | STAR Webcast
Cybersecurity
xHunt - An Anime Fan's Attack Campaign in the Middle East | STAR Webcast
SANS Institute Advanced 6y ago
Penetration Testing Bootcamp - Penetration Testing Methodologies
Cybersecurity
Penetration Testing Bootcamp - Penetration Testing Methodologies
HackerSploit Advanced 6y ago
Penetration Testing Bootcamp - Penetration Testing Terminology
Cybersecurity
Penetration Testing Bootcamp - Penetration Testing Terminology
HackerSploit Advanced 6y ago
Cyber Threats to Electric Industry - What You Need to Know | STAR Webcast
Cybersecurity
Cyber Threats to Electric Industry - What You Need to Know | STAR Webcast
SANS Institute Advanced 6y ago
Build Effective Cybersecurity Team Skills | SANS Team-Based Training
Cybersecurity
Build Effective Cybersecurity Team Skills | SANS Team-Based Training
SANS Institute Advanced 6y ago
SPECIAL WEBCAST: What you need to know about the Crypt32.dll / CryptoAPI Flaw
Cybersecurity
SPECIAL WEBCAST: What you need to know about the Crypt32.dll / CryptoAPI Flaw
SANS Institute Advanced 6y ago
How HTTPS Work?
Cybersecurity
How HTTPS Work?
Hussein Nasser Advanced 6y ago
Latest Techniques in Hacking the Human | SANS Security Awareness Summit
Cybersecurity
Latest Techniques in Hacking the Human | SANS Security Awareness Summit
SANS Institute Advanced 6y ago
Remcos RAT Review - The Most Advanced Remote Access Tool
Cybersecurity
Remcos RAT Review - The Most Advanced Remote Access Tool
HackerSploit Advanced 6y ago
Flare-On FireEye 2018 CTF - Malware Analysis With Amr Thabet - Flare Minesweeper
Cybersecurity
Flare-On FireEye 2018 CTF - Malware Analysis With Amr Thabet - Flare Minesweeper
HackerSploit Advanced 7y ago
SANS ICS Security Summit & Training 2019
Cybersecurity
SANS ICS Security Summit & Training 2019
SANS Institute Advanced 7y ago
SANS STX Cyber Range
Cybersecurity
SANS STX Cyber Range
SANS Institute Advanced 7y ago
Practical Advice for Submitting to Speak at a Cybersecurity Conference
Cybersecurity
Practical Advice for Submitting to Speak at a Cybersecurity Conference
SANS Institute Advanced 7y ago
SANS Webcast - Perimeter Security and Why it is Obsolete
Cybersecurity
SANS Webcast - Perimeter Security and Why it is Obsolete
SANS Institute Advanced 7y ago
Kali Linux On Windows 10 Official - WSL - Installation & Configuration
Cybersecurity
Kali Linux On Windows 10 Official - WSL - Installation & Configuration
HackerSploit Advanced 8y ago
SANS Automotive Summit Webcast
Cybersecurity
SANS Automotive Summit Webcast
SANS Institute Advanced 8y ago
Nikto Web Vulnerability Scanner - Web Penetration Testing - #1
Cybersecurity
Nikto Web Vulnerability Scanner - Web Penetration Testing - #1
HackerSploit Advanced 8y ago
Generating A PHP Backdoor with weevely
Cybersecurity
Generating A PHP Backdoor with weevely
HackerSploit Advanced 8y ago
SANS Pen Test HackFest Summit & Training 2017
Cybersecurity
SANS Pen Test HackFest Summit & Training 2017
SANS Institute Advanced 8y ago
Parrot OS 3.5 Review | The Best Kali Linux Alternative
Cybersecurity
Parrot OS 3.5 Review | The Best Kali Linux Alternative
HackerSploit Advanced 9y ago
SANS VetSuccess Academy Overview
Cybersecurity
SANS VetSuccess Academy Overview
SANS Institute Advanced 9y ago
📚 Coursera Courses Opens on Coursera · Free to audit
1 / 3 View all →
Aspiring CIO & CISO: Leadership Development Guide
📚 Coursera Course ↗
Self-paced
Aspiring CIO & CISO: Leadership Development Guide
Opens on Coursera ↗
Secure VPC Networks with Cloud Next Generation Firewall
📚 Coursera Course ↗
Self-paced
Secure VPC Networks with Cloud Next Generation Firewall
Opens on Coursera ↗
Cloud Network Security & Operations
📚 Coursera Course ↗
Self-paced
Cloud Network Security & Operations
Opens on Coursera ↗
Exploiting and Securing Vulnerabilities in Java Applications
📚 Coursera Course ↗
Self-paced
Exploiting and Securing Vulnerabilities in Java Applications
Opens on Coursera ↗
Practical Pentesting
📚 Coursera Course ↗
Self-paced
Practical Pentesting
Opens on Coursera ↗
Cybersécurité : comment sécuriser un site web
📚 Coursera Course ↗
Self-paced
Cybersécurité : comment sécuriser un site web
Opens on Coursera ↗