✕ Clear filters
3,339 lessons

🔐 Cybersecurity

Ethical hacking, penetration testing, network security, CTFs and defensive security

All ▶ YouTube 176,281📚 Coursera 16,096
IBM and ISC2 Cybersecurity Certificate: Build Skills for High-Stakes Security Roles
Cybersecurity
IBM and ISC2 Cybersecurity Certificate: Build Skills for High-Stakes Security Roles
Coursera Beginner 11mo ago
LIVE: Web Hacking | Pentesting | AppSec | Cybersecurity | TryHackme | AMA
Cybersecurity
LIVE: Web Hacking | Pentesting | AppSec | Cybersecurity | TryHackme | AMA
The Cyber Mentor Beginner 11mo ago
Secure VPC Networks with Cloud Next Generation Firewall
Cybersecurity
Secure VPC Networks with Cloud Next Generation Firewall
Google Cloud Beginner 11mo ago
Top 7 High-Paying Tech Jobs in 2025! 🚀
Cybersecurity
Top 7 High-Paying Tech Jobs in 2025! 🚀
GeeksforGeeks Beginner 11mo ago
cybersecurity expert gets hacked
Cybersecurity
cybersecurity expert gets hacked
John Hammond Beginner 11mo ago
Hacking My Dog's Microchip With a Flipper Zero!
Cybersecurity
Hacking My Dog's Microchip With a Flipper Zero!
The Cyber Mentor Beginner 11mo ago
Never Charge Your Phone in Public Without Watching This! #phonetheft #usefultips #techintamil
Cybersecurity
Never Charge Your Phone in Public Without Watching This! #phonetheft #usefultips #techintamil
Arivi by HCL GUVI Beginner 11mo ago
10 Marketing Strategies That Actually Work (For ANY Business)
Cybersecurity
10 Marketing Strategies That Actually Work (For ANY Business)
Adam Erhart Beginner 11mo ago
Introduction to Cloud Next Generation Firewall
Cybersecurity
Introduction to Cloud Next Generation Firewall
Google Cloud Beginner 11mo ago
Uncovering the Reality of OTP Hacking in 2026 | How Hackers Steal Your OTPs | OTP Security | Edureka
Cybersecurity
Uncovering the Reality of OTP Hacking in 2026 | How Hackers Steal Your OTPs | OTP Security | Edureka
edureka! Beginner 11mo ago
Why Most People Stay Broke | MASTER Discipline to Build Unshakable Wealth!
Cybersecurity
Why Most People Stay Broke | MASTER Discipline to Build Unshakable Wealth!
Evan Carmichael Beginner 11mo ago
HackTheBox - Vintage
Cybersecurity
HackTheBox - Vintage
IppSec Beginner 11mo ago
Giving Back to the Cybersecurity Community Through Teaching
Cybersecurity
Giving Back to the Cybersecurity Community Through Teaching
SANS Institute Beginner 11mo ago
DDoS Attack | What is a DDoS Attack? | DDoS Attack Explained | Edureka
Cybersecurity
DDoS Attack | What is a DDoS Attack? | DDoS Attack Explained | Edureka
edureka! Beginner 11mo ago
Level Up Your Security Team Through Automation
Cybersecurity
Level Up Your Security Team Through Automation
SANS Institute Beginner 11mo ago
IT Skills You'll Learn in the IBM IT Support Professional Certificate Program
Cybersecurity
IT Skills You'll Learn in the IBM IT Support Professional Certificate Program
Coursera Beginner 11mo ago
HackTheBox - Administrator
Cybersecurity
HackTheBox - Administrator
IppSec Beginner 11mo ago
Hidden Dangers of Phone Cameras! #PhoneCameraSpy #CameraHack #CyberSecurity
Cybersecurity
Hidden Dangers of Phone Cameras! #PhoneCameraSpy #CameraHack #CyberSecurity
Arivi by HCL GUVI Beginner 12mo ago
4chan penetrated by a gang of soyjaks…
Cybersecurity
4chan penetrated by a gang of soyjaks…
Fireship Beginner 12mo ago
Open Source Vs  Closed Source Model | Amr Awadallah | Data Science Dojo #opensource #ai
Cybersecurity
Open Source Vs Closed Source Model | Amr Awadallah | Data Science Dojo #opensource #ai
Data Science Dojo Beginner 12mo ago
Screenshot.jpg (When They Got Hacked)
Cybersecurity
Screenshot.jpg (When They Got Hacked)
John Hammond Beginner 1y ago
From Zero to Zero Day (and beyond) - Life of a Hacker: Jonathan Jacobi
Cybersecurity
From Zero to Zero Day (and beyond) - Life of a Hacker: Jonathan Jacobi
LiveOverflow Beginner 1y ago
How to Pass the PNPT: From Zero to Hero!
Cybersecurity
How to Pass the PNPT: From Zero to Hero!
The Cyber Mentor Beginner 11mo ago
How I Almost Got Phished From a Text Message!
Cybersecurity
How I Almost Got Phished From a Text Message!
The Cyber Mentor Beginner 11mo ago
LIVE: Exploit Development | Shellcoding | Cybersecurity | Red Team | AMA
Cybersecurity
LIVE: Exploit Development | Shellcoding | Cybersecurity | Red Team | AMA
The Cyber Mentor Beginner 11mo ago
Evaluate Your Cloud Next Generation Firewall Needs
Cybersecurity
Evaluate Your Cloud Next Generation Firewall Needs
Google Cloud Beginner 11mo ago
3 Tech Books You MUST Read
Cybersecurity
3 Tech Books You MUST Read
The Cyber Mentor Beginner 11mo ago
The Best and The Worst of Cybersecurity Career Advice!
Cybersecurity
The Best and The Worst of Cybersecurity Career Advice!
The Cyber Mentor Beginner 11mo ago
Will AI Replace Your Tech Job in 2025?
Cybersecurity
Will AI Replace Your Tech Job in 2025?
The Cyber Mentor Beginner 11mo ago
LIVE: PowerShell Deobfuscation | Cybersecurity | Blue Team | AMA
Cybersecurity
LIVE: PowerShell Deobfuscation | Cybersecurity | Blue Team | AMA
The Cyber Mentor Beginner 11mo ago
Penetration Testing For Beginners | Phases of Penetration Testing | Penetration Testing Tutorial
Cybersecurity
Penetration Testing For Beginners | Phases of Penetration Testing | Penetration Testing Tutorial
edureka! Beginner 11mo ago
Ethical Hacking for Beginners | 5 Phases of Ethical Hacking | Ethical Hacking Tutorial | Edureka
Cybersecurity
Ethical Hacking for Beginners | 5 Phases of Ethical Hacking | Ethical Hacking Tutorial | Edureka
edureka! Beginner 11mo ago
How Hackers Break Into Servers Through IoT Hardware
Cybersecurity
How Hackers Break Into Servers Through IoT Hardware
The Cyber Mentor Beginner 11mo ago
What is the MITRE CVE Program - and Why It Matters So Much
Cybersecurity
What is the MITRE CVE Program - and Why It Matters So Much
The Cyber Mentor Beginner 12mo ago
RIP CVE Program?! How the MITRE Funding Crisis Threatens Cybersecurity
Cybersecurity
RIP CVE Program?! How the MITRE Funding Crisis Threatens Cybersecurity
The Cyber Mentor Beginner 12mo ago
LIVE: Moose on the loose | CVE | Cybersecurity | AMA
Cybersecurity
LIVE: Moose on the loose | CVE | Cybersecurity | AMA
The Cyber Mentor Beginner 12mo ago
Hardware Reverse Engineering with a Logic Analyzer
Cybersecurity
Hardware Reverse Engineering with a Logic Analyzer
The Cyber Mentor Beginner 12mo ago
Lightning Talk | Ever sucked into Wikipedia for three hours? CTI might be for you!
Cybersecurity
Lightning Talk | Ever sucked into Wikipedia for three hours? CTI might be for you!
SANS Institute Beginner 12mo ago
A Day in the Life of a Threat Emulation Specialist: Demystifying Offensive Cybersecurity
Cybersecurity
A Day in the Life of a Threat Emulation Specialist: Demystifying Offensive Cybersecurity
SANS Institute Beginner 12mo ago
Lightning Talk | Negating the Noise: Prioritize Your Cybersecurity
Cybersecurity
Lightning Talk | Negating the Noise: Prioritize Your Cybersecurity
SANS Institute Beginner 12mo ago
Cyber Adjacent: 5 Lessons Learned from a Day in the Life of an IT Project Manager
Cybersecurity
Cyber Adjacent: 5 Lessons Learned from a Day in the Life of an IT Project Manager
SANS Institute Beginner 12mo ago
From TV news to cybersecurity: the 5 steps I took to completely change careers
Cybersecurity
From TV news to cybersecurity: the 5 steps I took to completely change careers
SANS Institute Beginner 12mo ago
Going Technical, Against All Odds: From Digital Communications to Reverse Engineering Malware
Cybersecurity
Going Technical, Against All Odds: From Digital Communications to Reverse Engineering Malware
SANS Institute Beginner 12mo ago
HackTheBox - LinkVortex
Cybersecurity
HackTheBox - LinkVortex
IppSec Beginner 1y ago
Cybersecurity Skills You NEED To Learn (2026) | The Most In-Demand Cybersecurity Skills | Edureka
Cybersecurity
Cybersecurity Skills You NEED To Learn (2026) | The Most In-Demand Cybersecurity Skills | Edureka
edureka! Beginner 1y ago
How AI Dating Scams Are Getting Dangerously Smart in 2025
Cybersecurity
How AI Dating Scams Are Getting Dangerously Smart in 2025
The Cyber Mentor Beginner 1y ago
LIVE: Memory Forensics | Volatility | Cybersecurity | Blue Team | AMA
Cybersecurity
LIVE: Memory Forensics | Volatility | Cybersecurity | Blue Team | AMA
The Cyber Mentor Beginner 1y ago
Hide Your Secrets Like a Pro! #tricks #techintamil #tech
Cybersecurity
Hide Your Secrets Like a Pro! #tricks #techintamil #tech
Arivi by HCL GUVI Beginner 1y ago
📚 Coursera Courses Opens on Coursera · Free to audit
1 / 3 View all →
Beginning Security
📚 Coursera Course ↗
Self-paced
Beginning Security
Opens on Coursera ↗
Malware Analysis and Introduction to Assembly Language
📚 Coursera Course ↗
Self-paced
Malware Analysis and Introduction to Assembly Language
Opens on Coursera ↗
Securing and Monitoring AWS Infrastructure
📚 Coursera Course ↗
Self-paced
Securing and Monitoring AWS Infrastructure
Opens on Coursera ↗
Exploit Development, Malware, & Defensive Strategies
📚 Coursera Course ↗
Self-paced
Exploit Development, Malware, & Defensive Strategies
Opens on Coursera ↗
Defending Against AI-Driven Phishing and Social Engineering
📚 Coursera Course ↗
Self-paced
Defending Against AI-Driven Phishing and Social Engineering
Opens on Coursera ↗
Cloud Security on AWS
📚 Coursera Course ↗
Self-paced
Cloud Security on AWS
Opens on Coursera ↗